Premium Essay

Lab 10 Networking

In: Computers and Technology

Submitted By jovila1027
Words 576
Pages 3
Lab 10 Networking
1. Describe the following network Models.
A. Peer-to-Peer: Two or more PCs are connected and share resources without being on separate servers. i. Client/Server: What is a client? A computer, program or process that makes requests for information from another computer. ii. What is a Server? The computer on which a program runs which then gives certain kinds of service to clients. 2. What is a computer modem and what does it do? The device is short for modulator-demodulator a modem or program that enables a computer to transmit data over for example telephone or cable lines. Computer information is stored digitally whereas information transmitted over telephone lines is transmitted in the form of analog waves
3. What is networking protocol?
A network protocol defines rules and conventions for communication between network devices. A common example TCP/IP internet protocols Transmission control protocol TCP which uses set of rules to exchange messages with other internet points at the information packet level.
Internet protocol IP which uses a set of rules to send and receive messages at the internet address level.

4. From the PC you are using 1. Click on Start then Run. 2. Type CMD in the run box. 3. You should now see the command prompt window. 4. Type IPCONFIG /all in this window then press enter. 5. Record the information for the following. 1. Physical Address: 12-21-00-82-AE-12 2. IPV4 Address:<Preferred> 3. Subnet Mask: 4. Gateway: 5. DHCP Servers: 6. DNS Servers: 6. Describe and tell purpose of the following. 7. Physical Address: is a binary number in the form of logical high and low states on an address bus that corresponds to…...

Similar Documents

Free Essay

Wireshark Lab 10 - Udp

...Wireshark Lab 10: UDP Submitted in Partial Fulfillment of the Requirements for CIS240 Networking Concepts Spring 2013 1. Select one UDP packet from your trace. From this packet, determine how many fields there are in the UDP header. (You shouldn’t look in the textbook! Answer these questions directly from what you observe in the packet trace.) Name these fields. There are 4 fields in the UDP datagram 1) Source Port 2) Destination Port 3) UDP Datagram length 4) Checksum field 2. By consulting the displayed information in Wireshark’s packet content field for this packet, determine the length (in bytes) of each of the UDP header fields. UDP Header Length = Source Port (2 bytes) + Destination Port (2 bytes) + Length Field (2 bytes) + Checksum field (2 bytes) = 8 bytes 3. The value in the Length field is the length of what? (You can consult the text for this answer). Verify your claim with your captured UDP packet. The length field = 59 bytes – this is the sum of the UDP header (8 bytes) + UDP payload (in this case SMNP data 51 bytes) 4. What is the maximum number of bytes that can be included in a UDP payload? (Hint: the answer to this question can be determined by your answer to 2. above) The length of the length field is 2 bytes or 216 – 1 less the header bytes = 65535 – 8 = 65527 bytes. This is in theory. In practice, due to avoiding fragmentation in Network layer, this is restricted to the MTU defined in data link......

Words: 478 - Pages: 2

Free Essay

Chapter 4 Lab Intro to Networking

...Lab Chapter 4 4.1.1 Exercise: Standards are important for NIC, Connectors and Media, because of the Stability, Consistency, and Minimization of packet errors. 4.1.2 Exercise: Why is it so low when the capacity for transmission electricity on the copper wire is so high? Because, due to truncation on the transmission of voltage with an electric current. 4,1,3 Exercise: It’s used in the Healthcare facilities, because it’s more fire resistance. 4.1.4 Exercise: Category | Maximum Speed | Application | 1 | 10 Mbps | Telephone Cabling (POTS) | 2 | 4 Mbps | Token Ring | 3 | 10 Mbps | Ethernet | 4 | 20 Mbps | Token Ring | 5 | 100 Mbps | Fast Ethernet | 5e | 1 Gbps | Gigabit Ethernet | 6 | 2500 Mbps | Gigabit Ethernet | 6a | 10,000 Mbps | Gigabit Ethernet | 4.1.5 Exercise: 4.1.6 Exercise: * , The central layer comprises of a conducting material. This layer transmits the baseband video signal. * The dielectric layer surrounds the centre copper core. The function of the dielectric is to separate the inner conductor from the shield and provide physical support. * The next layer is the metallic shield, generally composed of braided copper. It has two main purposes: to protect the conductor from noise or other unwanted signals, referred to as ingress, and to retain the transmitted signal in the conductor. * The last layer is the outside insulation which encloses all the inner layers. This is called a jacket and is usually made from......

Words: 358 - Pages: 2

Premium Essay

Lab 10 Assessment Worksheet

...need to have access to the internet for the scan to be successful. 5. In what formats can the scan results be viewed? If you are running the tool from the GUI you can view them in there right after the scans. If you run it from the command line you can view it in the text file. 6. Could you scan one computer at a time or could you perform multiple scans at a time? Each computer can only be scanned at a time. 7. What portion of the scan takes longer? Is it necessary to perform this scan every time? Full scan. No, but you should run a full scan periodically. 8. Are the scans saved locally, and if so where? Yes, C:\users\username\SecurityScans folder 9. Could you exclude patches to be scanned for? No. 10. Which are some of the major recommendations that you would provide to secure any Windows system? Harden the operating system FIRST; install only the necessary services; use server roles when possible; SCW to apply least privilege principle to applications; remove or disable unneeded services, user accounts and extra application components; only open the minimum required ports at the firewall; define unique user accounts; user strong authentication; use encrypted connections for all communications; encrypt file, folders and volumes that contain private data; develop and maintain a Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP); disable any server features not needed; ensure every computer has up-to-date anti-malware......

Words: 368 - Pages: 2

Premium Essay

Lab Report 10

...Group Members:Edna Rodriguez, Bryce Bash, Alex Chick, Kang Park, Rose Date: 4/3/14 LI Jonathan Turner Unique 49190 Day: Thursday Room: 1.24 Lab Start Time 1:30pm Exercise 10 Lab Report Adhere to UT’s Honor Code and course policies. Answer group questions individually first before compiling them into one consensus group response. Individual questions are to be answered independently. Balance between brevity and completeness. Show your work for all calculations and be sure to include proper units where necessary. Any secondary resources need to be cited. One printed report is to be submitted at the START of your next laboratory period as well as a digital pdf version uploaded to Canvas. GROUP QUESTIONS 1. List the functions of the following external structures: (3 pts.) (a.) Chelapeds: large walking appendages of a crayfish; appendages allow the crayfish to grasp and tear food, and also defend itself (b.) Walking legs: the 4 pairs of appendages used to locomote in the crayfish, they are equipped with gills which allows for gas exchange (taking in oxygen, releasing carbon dioxide) (c:.) Maxillapeds: an appendage modified for feeding: holding food, touching and tasting (d.) Cephalothorax: the first segment of a crayfish, consisting of a head fused to the thorax (e.) Genital pore: location of where sperm or eggs are released (f.) Nephridiopore: Part of the excretory system for removing nitrogenous waste. (g.) Abdomen: the multi-segmented posterior region of the crayfish......

Words: 2434 - Pages: 10

Free Essay

Networking Week 1 Lab Report

...Tutorial, How to use vLabs Lab - 10 Points | 10 | After reading the reading the ElementK iLab Tutorial, answer the related questions. | Section 2Using Windows Applications as Network Tools - 15 Points * Task 1, Step 3 * Related explanation or response * Task 1, Step 7 * Related explanation or response * Task 1, Step 19 * Related explanation or response * Task 1, Step 22 * Related explanation or response * Summary Paragraph | .625.625.625.625.625.625.625.62510 | Required ScreenshotAnswer the question or provide the required observation when requested.In your own words, summarize what you have learned concerning network commands available within the Windows operating system. | Section 3Troubleshooting TCP/IP Problems Lab - 15 Points * Task 1, Step 1 * Related explanation or response * Task 2, Step 2 * Related explanation or response * Task 2, Step 3 * Related explanation or response * Task 3, Step 1 * Related explanation or response * Summary Paragraph | .625.625.625.625.625.625.625.62510 | Required ScreenshotAnswer the question or provide the required observation when requested.In your own words, summarize what you have learned about the Network Monitor. | Total | 40 | | ------------------------------------------------- Name: Date: Professor: ------------------------------------------------- ElementK Tutorial, How to use vLabs Lab (10......

Words: 1280 - Pages: 6

Premium Essay

Research Paper Lab 10

...Morgan Johnson (19407679) NS 1110  Friday Research Paper Lab 10 Morgan Johnson (19407679) NS 1110  Friday Research Paper Lab 10 The topic I chose for my research project is setting up a business on the Darknet. I think it would be more accurate to say that the topic chose me. I was originally browsing the internet on the various subjects presented to us in the assignment handout and had started reading a little about ecommerce when this topic jumped out at me. As I started looking into the other topics on the sheet, I couldn’t get the information about the Darknet world out of my mind. I think I have a bit of a fascination with the outer edges of society and that includes cyber-society. The secretive world of the Darknet is interesting in itself but setting up an ebusiness that may or may not provide illegal goods and services requires such an intricate system of safeguards that, for someone new to the tech world like myself, it is like opening the door to a bizarre and complicated dimension. Even after spending some time researching the subject, it would take hours more and I still would have barely explored the world of the cyber underbelly. The first thing a person needs to do when setting up a potentially questionable business, is to research various countries legal relationship with the country you’re based in. For the sake of this paper, we will assume we live in the U.S. Find out which have or don’t have Mutual Legal Assistance Treaties. When you......

Words: 809 - Pages: 4

Premium Essay

Lab #10

...Lab #10 Assessment Questions & Answers Network/Security Assessment Questionnaire Network Assessment – Required Information 1. Do you have detailed logical network drawings? If so, please attach. 2. What Directory service, if any, is in use? 3. How many network elements do you have? List each, including make and model or attach list. 5 4. Have you configured multiple networks on this infrastructure? no 5. What internal (RFC1918 or otherwise not-Internet-routable) IP address ranges do you use? 6. What external (Internet routable) address ranges do you use? 7. What protocols are in use on your network? 8. What is the role of each network? (Attach list if multiple networks.) 9. How many hosts do you have on the network? 10. What operating systems are used among your servers and workstations? 11. What applications rely on your network(s)? 12. How many Internet-exposed servers are on your network? 13. What applications do you use to manage your network(s)? 14. What geographic locations connect to your network(s)? 15. What are your future growth plans for your network(s)? Security Assessment – Required Information 1. Do you have firewalls, ACLs, or other types of traffic filters in place within your network? If yes, please describe. 2. What is the general firewall policy: Default permit, default deny inbound, default permit outbound? 3. Do you have any other filtering technologies implemented at the network or......

Words: 708 - Pages: 3

Premium Essay

Nt1210 Intro to Networking Lab 2.3

...NT1210 Lab 2.3 Network types and Topolgies Exercise 2.3.1 Briefly define LAN, MAN, PAN, and WAN. What is the critical distinction for these networks? LAN=Local Area Network. Which is a computer network that links devices within a building or group of adjacent buildings MAN=Short for Metropolitan Area Network, a data network designed for a town or city. In terms of geographic breadth, MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs). MANs are usually characterized by very high-speed connections using fiber optical cable or other digital media. WAN=Wide Area Network. A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet. PAN=PAN is short for Personal Area Network Based on the electric-field transmission medium,  is an IBM technology that allows individuals to exchange data with a simple touch or grasp, such as a handshake. A PAN user is equipped with a receiver and a transmitter, which constantly sends infinitesimal data-carrying currents -- in the 0.1-1 MHz band -- through the body and picks up currents when in very close range with another device or individual carrying a transmitter. Exercise 2.3.2 Briefly......

Words: 1082 - Pages: 5

Premium Essay

Nt1210 Intro to Networking Lab 4.1

...NT1210 Lab 4.1 Copper Cabling Exercise 4.1.1 Why are standards so important for NICs, connectors, and media? Use your textbook and Internet research to justify your answer. Simple because Stability, Consistency, Minimization of packet errors. Exercise 4.1.2 The voltage for registering a bit of 1 on Ethernet can be as low as 2.5 volts or even 1 volt. Why is this so low when the capacity for transmitting electricity on the copper wire is so high? Use your textbook and Internet research to support your answer. Because the voltage (or current) used to transmit data needs only be high enough for the receiver to detect it. Making the voltage (much) higher would make the receiver electronics more difficult. Exercise 4.1.3 What are some applications of shielded copper cable? Why is the more expensive shielded cable used in these situations? Use your textbook or Internet research to support your answer. The extra covering in shielded twisted pair wiring protects the transmission line from electromagnetic interference leaking into or out of the cable. STP cabling often is used in Ethernet networks, especially fast data rate Ethernets. Exercise 4.1.4 Complete the entries in Table 4-1. Use your textbook and Internet research to compose your answer. The common connector for interfacing UTP wires to a computer for networking is the Registered Jack 45 (RJ-45) interface. This uses eight copper wires (four twisted pairs) to complete the connec- tion between interfaces. The pinout...

Words: 721 - Pages: 3

Premium Essay

Nt1210 Intro to Networking Lab 5.4

...NT1210 Lab 5.4 Basic Network Troubleshooting Exercise 5.4.1 If you needed to determine the computer name used for node E on the network (starting from node A), what command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. I already have the IP Addresses for all the workstations a simple Ping command in CMD will work. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping –a to retrieve the information we need. Exercise 5.4.2 What is the best (easiest and most efficient) command to determine whether all the hosts on the local-area network are reachable? You can assume that you are starting from computer A. List the command sequence(s) you would need to enter to test this functionality. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping, Ping, and Ping, Ping, and Ping This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping Exercise...

Words: 344 - Pages: 2

Premium Essay

Nt1210 Intro to Networking Lab 2.2

...Exdahellilvn NT1210 Lab 2.2 Networking drives Exercise 2.2.1 If an organization has 30 users, each with his or her own PC, what is the comparative cost of buying a $120 printer for each user versus the cost of buying a single, higher-capacity $500 printer that can be used by the entire office? What is the drawback to having only a single printer? What is the cost of having two additional backup printers for the office compared to having individual printers? How many shared printers can be purchased and still be less expensive than individual printers? It would cost $3,900 if each user had their own printer V.S. buying a high capacity single printer for $500. On top of that if ink cartridges cost around $32.00 dollars apiece for each printer cartridge. It would cost a total of $960 for ink cartridges for all 30 printers. If a single printer was connected to a single workstation then it would be only tied to that workstation. No other users would be able to use printer connected to the workstation. The cost of having two backup printers would depend on what type of printers. There are two known types of printers one LaserJet or standard color ink printers. LaserJet printers can run around $500 each V.S. $120-$150 for a standard color printer. Still the cost of having two additional backup printers is less than having each workstation have their own. You can buy up to four printers costing $500 apiece and still come out money ahead. Even if you spent $100 dollars on......

Words: 838 - Pages: 4

Free Essay

Pt1420 Lab 10

...Lab 10: File Access This lab accompanies Chapter 10 of Starting Out with Programming Logic & Design. Lab 10.1 – File Access and Visual Basic This lab examines how to work with a file by writing Visual Basic code. Read the following programming problem prior to completing the lab. Write and design a simple program that will take 3 pieces of data and write it to a file. Create variables and set them equal to the appropriate values: Declare string firstName = “xxx” Declare string lastName = “xxx” Declare integer age = your age Write this information to a file called myRecords.txt. Next, read this information from the file and print it to the screen. Step 1: Create a new Visual Basic workspace and add the following code: Module Module1 Sub Main() Dim firstName As String = "XXXX" Dim lastName As String = "XXX" Dim age As Integer = #### Dim writer As System.IO.StreamWriter = System.IO.File.CreateText("myRecords.txt") writer.WriteLine(firstName & " " & lastName & " " & age) writer.Close() Dim reader As System.IO.StreamReader = System.IO.File.OpenText("myRecords.txt") Dim myInfo As String = reader.ReadLine() Console.WriteLine(myInfo) reader.Close() 'this causes a pause so you can see your program Console.Write("Press enter to continue...") Console.ReadLine() End Sub End Module Step 2: Change......

Words: 347 - Pages: 2

Premium Essay

Intro to Networking Lab 9.1

...NT1210 Lab 9 The Internet Chandra Ramsey February 29, 2016 Lab 9 The Internet 9.1.1 Broadband Internet The original dialup connections offered by telephone companies required complete use of the telephone cable to connect to the Internet (meaning that no calls could be placed or received during the Internet connection). Why is this inefficient for establishing a connection to the Internet? What was the limitation of the data rates available on this type of Internet connection? First you had to make sure that your call waiting feature was turned off so that there wouldn’t be any interruptions in the service. Because it was like using the telephone, your data rates were charged as long distance telephone calls by the minute. 9.1.2 The term broadband Internet generally refers to higher-speed and constantly available connections to the Internet. The term represents an evolution of Internet connectivity, but it originally referred to the type of media usage. Broadband and baseband are the two types of media usage available. Briefly define these terms and explain the difference between them. Broadband – The term broadband commonly refers to high-speed Internet access that is always on and faster than the traditional dial-up access. It also includes several high-speed transmission technologies such as Digital Subscriber Line (DSL) Cable Modem. Baseband – refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different......

Words: 1408 - Pages: 6

Premium Essay

Networking Labs for Unit 6

...Brandon Hellbach Unit 6 Labs Lab 6.1: Wireless Broadcast Domains Exercise 6.1.1 – A Basic Service Set does exactly what its name says; basic wireless service, one and only one AP creates the wireless LAN. Extended Service Set extends the wireless functions of a Basic Service Set. The difference is that in a BBS uses one AP to create one wireless LAN while an ESS uses more than one AP to create one wireless LAN. Exercise 6.1.2 – IEEE 802.11 Standards Standard | Frequency (GHz) | Maximum Transmission Rate (Mbps) | Standard Indoor Transmission Range (m) | Standard Outdoor Transmission Range (m) | 802.11a | 5 | 54 | 40 | 100 | 802.11b | 2.4 | 11 | 70 | 150 | 802.11g | 2.4 | 54 | 38 | 140 | 802.11n | 2.4 or 2.5 | 600 | 75 | | Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. Infrared has a very short range and cannot penetrate walls and other objects making radio frequency superior. 3. Although WLANs have a lower speed they are more convenient than wired LANs. So the trade-off is speed for convenience of not having wires everywhere which is why WLANs are more common in households. Lab 6.2: Identifying WLANs Exercise 6.2.1 - What information about the wireless networks is available using the utility? The utility provides the name, signal strength, and MAC address of the available wireless networks. What information is given on the wireless networks with the......

Words: 574 - Pages: 3

Premium Essay

Intro to Networking Lab 9.1

...Lab 9.1 – 9.4 ITT – Technical Institute Introduction to Networking Martin Gilmore January 6, 2016 Lab 9.1: Broadband Internet Exercise 9.1.1 * This was inefficient because it prohibited the use of the phone line for its original intention. * The limitation of the data rate for this type of connection was 56kbps. Exercise 9.1.2 * Broadband uses multiple channels of frequencies to transmit data more efficiently where broadband uses a single channel. Exercise 9.1.3 DSL Connection Types DSL Type | Maximum Download Speed | Maximum Upload Speed | Maximum Distance (m) | ADSL | 24 Mbps | 1.4 Mbps | 6000+ | HDSL | 1.54 Mbps | 1.54 Mbps | 3650 | IDSL | 144 Kbps | 144 Kbps | 10,700 | MSDSL | 2 Mbps | 2 Mbps | 8800 | RADSL | 7 Mbps | 1 Mbps | 5500 | SDSL | 2,048 Mbps | 2,048 Mbps | 3000 | VDSL | 52 Mbps | 16 Mbps | 1000+ | Lab 9.2: Networks and Subnets Exercise 9.2.1 * If you had 4 bits for the host ID, how many unique combinations can be made from 4 bits? * 16 * What is another way to express this value as a power of 2? * 42 Exercise 9.2.2 * On a /24 network, how many unique host ID values exist? * 256 hosts * On a /16 network, how many unique host ID values exist? * 65,534 hosts, or 164 Exercise 9.2.3 * What is the reserved network address? * * What is the reserved broadcast address? * * What is the first available host ID for a unique host on this......

Words: 542 - Pages: 3