Intro to Networking Lab 9.1

In: Other Topics

Submitted By westbrot
Words 542
Pages 3
Lab 9.1 – 9.4
ITT – Technical Institute
Introduction to Networking
Martin Gilmore
January 6, 2016

Lab 9.1: Broadband Internet
Exercise 9.1.1 * This was inefficient because it prohibited the use of the phone line for its original intention. * The limitation of the data rate for this type of connection was 56kbps. Exercise 9.1.2 * Broadband uses multiple channels of frequencies to transmit data more efficiently where broadband uses a single channel.
Exercise 9.1.3
DSL Connection Types DSL Type | Maximum Download Speed | Maximum Upload Speed | Maximum Distance (m) | ADSL | 24 Mbps | 1.4 Mbps | 6000+ | HDSL | 1.54 Mbps | 1.54 Mbps | 3650 | IDSL | 144 Kbps | 144 Kbps | 10,700 | MSDSL | 2 Mbps | 2 Mbps | 8800 | RADSL | 7 Mbps | 1 Mbps | 5500 | SDSL | 2,048 Mbps | 2,048 Mbps | 3000 | VDSL | 52 Mbps | 16 Mbps | 1000+ |

Lab 9.2: Networks and Subnets
Exercise 9.2.1 * If you had 4 bits for the host ID, how many unique combinations can be made from 4 bits? * 16 * What is another way to express this value as a power of 2? * 42

Exercise 9.2.2 * On a /24 network, how many unique host ID values exist? * 256 hosts * On a /16 network, how many unique host ID values exist? * 65,534 hosts, or 164
Exercise 9.2.3 * What is the reserved network address? * 176.33.4.0 * What is the reserved broadcast address? * 176.33.4.255 * What is the first available host ID for a unique host on this network? * 176.33.4.1 * What is the last available host ID for a unique host on this network? * 176.33.4.254 * How many unique host addresses can be allocated on this network? * 254
Exercise 9.2.4 * Yes, the subnet matches and so does the first two octets of the IP
Exercise 9.2.5 * Yes, the subnet matches, as well as the first three octets of the IP

Exercise 9.2.6…...

Similar Documents

Chapter 4 Lab Intro to Networking

...Lab Chapter 4 4.1.1 Exercise: Standards are important for NIC, Connectors and Media, because of the Stability, Consistency, and Minimization of packet errors. 4.1.2 Exercise: Why is it so low when the capacity for transmission electricity on the copper wire is so high? Because, due to truncation on the transmission of voltage with an electric current. 4,1,3 Exercise: It’s used in the Healthcare facilities, because it’s more fire resistance. 4.1.4 Exercise: Category | Maximum Speed | Application | 1 | 10 Mbps | Telephone Cabling (POTS) | 2 | 4 Mbps | Token Ring | 3 | 10 Mbps | Ethernet | 4 | 20 Mbps | Token Ring | 5 | 100 Mbps | Fast Ethernet | 5e | 1 Gbps | Gigabit Ethernet | 6 | 2500 Mbps | Gigabit Ethernet | 6a | 10,000 Mbps | Gigabit Ethernet | 4.1.5 Exercise: 4.1.6 Exercise: * , The central layer comprises of a conducting material. This layer transmits the baseband video signal. * The dielectric layer surrounds the centre copper core. The function of the dielectric is to separate the inner conductor from the shield and provide physical support. * The next layer is the metallic shield, generally composed of braided copper. It has two main purposes: to protect the conductor from noise or other unwanted signals, referred to as ingress, and to retain the transmitted signal in the conductor. * The last layer is the outside insulation which encloses all the inner layers. This is called a jacket and is usually made from......

Words: 358 - Pages: 2

Chapter 3 Labs Intro to Networking

...reliable data transfer services to the upper layers The session layer controls the dialogues (connections) between computers. The presentation layer establishes context between application-layer entities. The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. 3.2.2 2- Data link= bit/frame 3- Network= packet/datagram 4- Transport= segments 3.2.3 A network has read and decipher data so it knows what to show to the end user. 3.2.4 Because it doesn’t have to present or interact with programs to direct traffic. 3.2 review 1. It transfers the bits between nodes 2. Because some of the layers in osi do not pertain to networking because some layers are for the end user to see not the network. 3. Yes because if they all get combined it will be too much data to decipher at once. 3.3.1 Osi 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data link 1. Physical TCP/IP 5. Application 4. Transport 3. Network 2. Data link 1. Physical Tcp has 5 layers and osi has 7 and osi cares about the end user Tcp just sends the information. 3.3.2 The application layer 3.3.3 Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on......

Words: 775 - Pages: 4

Intro to Networking

...Intro to Networking Lab 3 Jeff Garwood EX. 3.1 Review 1. The MAC Address is sufficient to route traffic locally because it provides the needed information with regards to the equipment location. This is mostly true on level 2 networks. 2. The Open Systems Interconnection was started in two documents in 1978. The International Organization for Standardization (ISO) and the International Telegraph and Telephone Consultative Committee, or CCITT. In 1983 these two documents were combined as the basic reference model for the OSI. It was created so Protocols could allow the entity in one host to interact with a corresponding entity at the same layer in another host. 3. The TCP dates back into the 1960s on the DOD sponsored ARPANET. In 1973 the TCP/IP came to be and consisted of dozens of different protocols. Of these key protocols, two are usually considered the most important. The Internet Protocol (IP) is the primary OSI network layer (layer three) protocol that provides addressing, datagram routing and other functions in an internetwork. EX. 3.2 Review 1. The composition of the physical wiring, and connectors no matter the type are strictly regulated to ensure the electrons within the communications signal can move fast enough to maintain a connection. The addition of network devices such as switches and routers complete the campus style network. 2. The OSI model is not implemented in a network but is used as a model to guide troubleshooting a local network in......

Words: 719 - Pages: 3

Intro to Networking

...models of networking from the physical media connection to the application that displays the information, including how these layers interact and how they map to real networking devices. The labs in this chapter are designed to reinforce concepts from Chapter 3 of your Introduction to Networking textbook and allow you to explore some of the more important ideas with greater depth. You will explore the different types of network reference models available and analyze how each one applies to real network technology. You will also use packet capturing to look at real network traffic and explore the data link layer of networking. At the end of this chapter, you should be able to ■ Explain the purpose of network reference models ■ Describe the layers of the OSI reference model and explain what each layer provides ■ Describe the layers of the TCP/IP model and relate it to the OSI model and real networking equipment ■ Capture live packet information on a network and explain the data link layer portion of the packets captured ■ Enable network resources such as shared printers and file sharing on your own PC Lab 3.1: Network Reference Models approximate Lab Time: 10–15 min. Materials Needed: paper/pencil, Textbook, and Internet research This lab reviews the importance of modeling communication on a network. This will include a review of the state of networking before standardized reference models existed and the impact that they have on interoperability. Compile a lab report......

Words: 270 - Pages: 2

Nt1210 Intro to Networking Lab 1.3

...NT1210 Intro to Networking Unit 1 Lab 1.3 Bit Byte Structure exercise 1.3.1 What is the decimal value of Byte 1 by itself? What is the decimal value of Byte 2 by itself? Byte 1 is 6400 and Byte 2 is 233 Exercise 1.3.2 What is the decimal equivalent of the binary sequence in Figure 1-12 (the combined sequence of Byte 1 and Byte 2 as a single decimal value)? How does this compare to the individual values of Byte 1 and Byte 2? The Binary Sequence is 6433 because it is the sum of both values. Exercise 1.3.3 Given a device with a storage capacity of 120 MB, how many bytes can be stored on this device? 1.2x10^8=120,000,000 Bytes Exercise 1.3.4 Given a computer with a disk capacity of 16 GB and a word size of 32 bits, how many words can be stored on the disk? 1.6x10^10=16,000,000,000 Bytes=128,000,000,000 Bits 128,000,000,000/ 32=4,000,000,000 words Exercise 1.3.5 Represent the binary value 110110^2in hexadecimal. Show the steps of conversion that you used. 110110=Two zeros needed to be added to make the value of 8 bits 1101=D 0010=2 Exercise 1.3.6 Represent the hexadecimal value f616 in binary and decimal. Show the steps of conversion that you used. F16 = 11112 and 616 = 01102 when put together the binary value is 111101102 which is equal to 246....

Words: 263 - Pages: 2

Nt1210 Intro to Networking Lab 1.5

...NT1210 Lab 1.5 Exercise 1.5.1 On the desktop of your operating system, create a new folder called Classes. Open the C: drive and locate the path through the subfolders from the root directory C: to get to your Classes folder. This path will differ slightly depending on the operating system. Record the navigation path to get to your new Classes folder. Hint: Most directory structures that include the desktop of a computer involve finding a folder for users and selecting the correct user. C:\Classes Exercise 1.5.2 Open the Classes folder you created and move the myname.txt file to the Networking folder. What has happened to the OS reference to the location of the file myname.txt? What has happened to the physical storage location of myname.txt in memory? C:\Classes\Networking\Myname.txt It changes the file path from C:\Classe\ to C:\Classes\Networking Exercise 1.5.3 Inside the Networking folder, create a new set of folders for your labs and assignments. You should add at least five subfolders. Diagram the hierarchy that now exists from the root Classes folder. C:\Classes\Networking C:\Classes\Networking\Coding C:\Classes\Networking\Homework C:\Classes\Networking\Labs C:\Classes\Networking\Networking C:\Classes\Networking\Vitural Computers exercise 1.5.4 Exercise 1.5.4 Disk fragmentation occurs when files are deleted from memory but that space is not used to store another file. Use the web to identify issues that disk fragmentation can cause for......

Words: 441 - Pages: 2

Nt1210 Intro to Networking Lab 1.6

...NT1210 Lab 1.6 gathering file system information. Exercise 1.6.1 Record the amount of space you have available and how much total space you have on your Windows hard drive. My Computer Local Disc C: Right click local disc then properties then this will show you how much capacity the Hard Drive will have used spaced is 56,945,139,712 bytes 53.0 GB free space 102,988,910,592 bytes 95.9 GB Exercise 1.6.2 Using a Linux or Mac OS computer, determine the amount of space you have available and how much total space you have on the hard drive. On Mac OS X, you can get this information by right- clicking the MacintoshHD icon on the desktop and selecting Get Info. On a Linux machine, you can type df -h at the command-line interface. Open System Monitor from Dash and select the Filesystems tab this will show you used disc space with free space. 56,945,139,712 bytes 53.0 GB 102,988,910,592 bytes 95.9 GB Exercise 1.6.3 Locate the system information for your Windows machine and record the amount of RAM you have installed. 2GB Ram Memory Exercise 1.6.4 Locate the amount of RAM you have available on either a Mac OS X machine or a Linux machine. Compare this to the RAM allocated for the Windows machine. On a Mac OS X computer, open the MacintoshHD directory, open the Applications folder, open the Utilities folder, and then choose System Profiler to find the amount of RAM installed. On a Linux machine, you can use the free command to display the amount of memory available and the......

Words: 496 - Pages: 2

Nt1210 Intro to Networking Lab 2.3

...NT1210 Lab 2.3 Network types and Topolgies Exercise 2.3.1 Briefly define LAN, MAN, PAN, and WAN. What is the critical distinction for these networks? LAN=Local Area Network. Which is a computer network that links devices within a building or group of adjacent buildings MAN=Short for Metropolitan Area Network, a data network designed for a town or city. In terms of geographic breadth, MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs). MANs are usually characterized by very high-speed connections using fiber optical cable or other digital media. WAN=Wide Area Network. A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet. PAN=PAN is short for Personal Area Network Based on the electric-field transmission medium,  is an IBM technology that allows individuals to exchange data with a simple touch or grasp, such as a handshake. A PAN user is equipped with a receiver and a transmitter, which constantly sends infinitesimal data-carrying currents -- in the 0.1-1 MHz band -- through the body and picks up currents when in very close range with another device or individual carrying a transmitter. Exercise 2.3.2 Briefly......

Words: 1082 - Pages: 5

Nt1210 Intro to Networking Lab 3.3

...NT1210 Lab 3.3: the TCP/IP Model Exercise 3.3.1 Using your textbook and Internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? Applications, Transport, Network, Network Interface this the TCP/IP model. A huge difference is that TCP/IP model uses 4 major layers instead of 7 layers to OSI model. OSI Model is Applications, Presentation, Session, Transport, Network, Data Link and Physical composed to 7 layers. OSI was developed as theoretical model, while TCP/IP was more practical model. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model Transport layers: The Internet Protocol (IP), Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). These core protocols support many other protocols, to perform a variety of functions at each of the TCP/IP model layers. Still others enable user applications to function. Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and function of each of these. Use your textbook and Internet research to support your answer. TCP (Transmission Control Protocol) Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. User Datagram Protocol a connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery......

Words: 331 - Pages: 2

Nt1210 Intro to Networking Lab 4.1

...NT1210 Lab 4.1 Copper Cabling Exercise 4.1.1 Why are standards so important for NICs, connectors, and media? Use your textbook and Internet research to justify your answer. Simple because Stability, Consistency, Minimization of packet errors. Exercise 4.1.2 The voltage for registering a bit of 1 on Ethernet can be as low as 2.5 volts or even 1 volt. Why is this so low when the capacity for transmitting electricity on the copper wire is so high? Use your textbook and Internet research to support your answer. Because the voltage (or current) used to transmit data needs only be high enough for the receiver to detect it. Making the voltage (much) higher would make the receiver electronics more difficult. Exercise 4.1.3 What are some applications of shielded copper cable? Why is the more expensive shielded cable used in these situations? Use your textbook or Internet research to support your answer. The extra covering in shielded twisted pair wiring protects the transmission line from electromagnetic interference leaking into or out of the cable. STP cabling often is used in Ethernet networks, especially fast data rate Ethernets. Exercise 4.1.4 Complete the entries in Table 4-1. Use your textbook and Internet research to compose your answer. The common connector for interfacing UTP wires to a computer for networking is the Registered Jack 45 (RJ-45) interface. This uses eight copper wires (four twisted pairs) to complete the connec- tion between interfaces. The pinout...

Words: 721 - Pages: 3

Nt1210 Intro to Networking Lab 4.2

...NT1210 Lab 4.2: Fiber-optic Cables Exercise 4.2.1 The light in an SMF cable travels down the center of the fiber parallel to the direction of the fiber in a single path. Can this type of cable be used to transmit and receive bits simultaneously, or does it require one fiber for transmitting and one for receiving? Justify your answer using your textbook and Internet research. No it cannot transmit and simultaneously receive bits with a single cable. A second cable would be needed for sending bits back. In this case you would need two cables one send bits and second cable receiving bits. Exercise 4.2.2 What characteristics of fiber-optic cables allow them to be used over longer distances with less risk than copper cable? The core in single-mode fiber is only approximately 10 times larger than the wavelength of the light it is carrying. This leaves very little room for the light to bounce around. As a result the data carrying light pulses in single-mode fiber are essentially transmitted in a straight line through the core. Electromagnetic immunity including non-conductivity, Security considerations, decreased attenuation and increased transmission distance, Increased bandwidth potential, Small diameter and weight Long term economics Exercise 4.2.3 MMF distances can still far exceed copper cable, but MMF cannot match the distance available from the more expensive SMF. What is the reason for the distance limitation with the use of MMF? Multimode cables are less......

Words: 333 - Pages: 2

Nt1210 Intro to Networking Lab 5.3

...NT1210 Lab 5.3 Finding Network Settings Exercise 5.3.1 For this exercise, you will release your IP address using ipconfig. This is a beneficial tool for troubleshooting your own local network and correcting any problems with the assignment of IP addresses. This exercise requires that you have DHCP in use for assigning IP addresses, which is a typical default setting. To begin, you should type the command ipconfig at the command-line interface and press Enter. Record the information it presents for the IP address and default gateway; you can ignore the rest of the information for now. When you have completed this, type the following command to release the IP address: Ipconfig /release To renew your lease on the IP address for your network card or adapter, you will use the following command: Ipconfig /renew This will create a new lease on an IP address for your network card or adapter. When the command to renew the IP address is complete, you should compare the result to the initial run of ipconfig and compare the results. Are the entries the same for the IP address and for the default gateway. Exercise 5.3.2 You can use the ping command on your local machine. This does not send traffic out onto the network, but it is an effective means of making sure that your network adapter is functional. To ping the local host, use the following command: Ping localhost What address is returned as the IP address of localhost? How many times is the ping message sent by default...

Words: 861 - Pages: 4

Nt1210 Intro to Networking Lab 5.4

...NT1210 Lab 5.4 Basic Network Troubleshooting Exercise 5.4.1 If you needed to determine the computer name used for node E on the network (starting from node A), what command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. I already have the IP Addresses for all the workstations a simple Ping command in CMD will work. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping –a 192.168.1.5 to retrieve the information we need. Exercise 5.4.2 What is the best (easiest and most efficient) command to determine whether all the hosts on the local-area network are reachable? You can assume that you are starting from computer A. List the command sequence(s) you would need to enter to test this functionality. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping 192.168.1.5, Ping 192.168.1.4, and Ping 192.168.1.3, Ping 192.168.1.6, and Ping 192.168.1.2. This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping 192.168.1.4 Exercise...

Words: 344 - Pages: 2

Nt1210 Intro to Networking Lab 2.2

...Exdahellilvn NT1210 Lab 2.2 Networking drives Exercise 2.2.1 If an organization has 30 users, each with his or her own PC, what is the comparative cost of buying a $120 printer for each user versus the cost of buying a single, higher-capacity $500 printer that can be used by the entire office? What is the drawback to having only a single printer? What is the cost of having two additional backup printers for the office compared to having individual printers? How many shared printers can be purchased and still be less expensive than individual printers? It would cost $3,900 if each user had their own printer V.S. buying a high capacity single printer for $500. On top of that if ink cartridges cost around $32.00 dollars apiece for each printer cartridge. It would cost a total of $960 for ink cartridges for all 30 printers. If a single printer was connected to a single workstation then it would be only tied to that workstation. No other users would be able to use printer connected to the workstation. The cost of having two backup printers would depend on what type of printers. There are two known types of printers one LaserJet or standard color ink printers. LaserJet printers can run around $500 each V.S. $120-$150 for a standard color printer. Still the cost of having two additional backup printers is less than having each workstation have their own. You can buy up to four printers costing $500 apiece and still come out money ahead. Even if you spent $100 dollars on......

Words: 838 - Pages: 4

Intro to Networking Lab 9.1

...NT1210 Lab 9 The Internet Chandra Ramsey February 29, 2016 Lab 9 The Internet 9.1.1 Broadband Internet The original dialup connections offered by telephone companies required complete use of the telephone cable to connect to the Internet (meaning that no calls could be placed or received during the Internet connection). Why is this inefficient for establishing a connection to the Internet? What was the limitation of the data rates available on this type of Internet connection? First you had to make sure that your call waiting feature was turned off so that there wouldn’t be any interruptions in the service. Because it was like using the telephone, your data rates were charged as long distance telephone calls by the minute. 9.1.2 The term broadband Internet generally refers to higher-speed and constantly available connections to the Internet. The term represents an evolution of Internet connectivity, but it originally referred to the type of media usage. Broadband and baseband are the two types of media usage available. Briefly define these terms and explain the difference between them. Broadband – The term broadband commonly refers to high-speed Internet access that is always on and faster than the traditional dial-up access. It also includes several high-speed transmission technologies such as Digital Subscriber Line (DSL) Cable Modem. Baseband – refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different......

Words: 1408 - Pages: 6