Lab 10 Networking

In: Computers and Technology

Submitted By jovila1027
Words 576
Pages 3
Lab 10 Networking
1. Describe the following network Models.
A. Peer-to-Peer: Two or more PCs are connected and share resources without being on separate servers. i. Client/Server: What is a client? A computer, program or process that makes requests for information from another computer. ii. What is a Server? The computer on which a program runs which then gives certain kinds of service to clients. 2. What is a computer modem and what does it do? The device is short for modulator-demodulator a modem or program that enables a computer to transmit data over for example telephone or cable lines. Computer information is stored digitally whereas information transmitted over telephone lines is transmitted in the form of analog waves
3. What is networking protocol?
A network protocol defines rules and conventions for communication between network devices. A common example TCP/IP internet protocols Transmission control protocol TCP which uses set of rules to exchange messages with other internet points at the information packet level.
Internet protocol IP which uses a set of rules to send and receive messages at the internet address level.

4. From the PC you are using 1. Click on Start then Run. 2. Type CMD in the run box. 3. You should now see the command prompt window. 4. Type IPCONFIG /all in this window then press enter. 5. Record the information for the following. 1. Physical Address: 12-21-00-82-AE-12 2. IPV4 Address: 192.168.1.7<Preferred> 3. Subnet Mask: 255.255.255.0 4. Gateway: 192.168.1.1 5. DHCP Servers: 192.168.1.1 6. DNS Servers: 192.168.1.1 6. Describe and tell purpose of the following. 7. Physical Address: is a binary number in the form of logical high and low states on an address bus that corresponds to…...

Similar Documents

Wireshark Lab 10 - Udp

...Wireshark Lab 10: UDP Submitted in Partial Fulfillment of the Requirements for CIS240 Networking Concepts Spring 2013 1. Select one UDP packet from your trace. From this packet, determine how many fields there are in the UDP header. (You shouldn’t look in the textbook! Answer these questions directly from what you observe in the packet trace.) Name these fields. There are 4 fields in the UDP datagram 1) Source Port 2) Destination Port 3) UDP Datagram length 4) Checksum field 2. By consulting the displayed information in Wireshark’s packet content field for this packet, determine the length (in bytes) of each of the UDP header fields. UDP Header Length = Source Port (2 bytes) + Destination Port (2 bytes) + Length Field (2 bytes) + Checksum field (2 bytes) = 8 bytes 3. The value in the Length field is the length of what? (You can consult the text for this answer). Verify your claim with your captured UDP packet. The length field = 59 bytes – this is the sum of the UDP header (8 bytes) + UDP payload (in this case SMNP data 51 bytes) 4. What is the maximum number of bytes that can be included in a UDP payload? (Hint: the answer to this question can be determined by your answer to 2. above) The length of the length field is 2 bytes or 216 – 1 less the header bytes = 65535 – 8 = 65527 bytes. This is in theory. In practice, due to avoiding fragmentation in Network layer, this is restricted to the MTU defined in data link......

Words: 478 - Pages: 2

Is3230 Lab 10 Assessment

...Lab 10 Assessment Questions 1. Describe what ZenMap GUI performs to do passive OS fingerprinting? * ZenMap GUI sends out broadcasts for server queries for various different types of operating systems in servers (OS). By examining how various hosts respond to certain queries, ZenMap GUI can distinguish what kind of OS and server exists. 2. Nmap can also help define applications that are available on the machines it is scanning. How does it know the application? Is this a reliable method of identifying running services on a target machine? * Nmap searches its internal database and what ports on the IP’s are listening and matches it to the best known application. Applications like MSSQL and Web servers usually use the same ports over and again For example tcp port 3389 will most definitely show Microsoft Remote Desktop application listening for incoming connections by default. This is not a very reliable form of identifying services because any service can manually be started on a well-known port number invalidating Nmap’s list of commonly used ports. 3. Why would you want to use Nmap before an attack as opposed to after the attack? * Student’s discretion - Typically to discover live hosts and open ports but it can be argued that Nmap is useful both pre- and post- attack to determine courses of action which are taken on any attacked systems. 4. How does Nessus® differ from Nmap (ZeNmap GUI) and which tool would you use for network discovery and......

Words: 853 - Pages: 4

Lab 10 Assessment Worksheet

...need to have access to the internet for the scan to be successful. 5. In what formats can the scan results be viewed? If you are running the tool from the GUI you can view them in there right after the scans. If you run it from the command line you can view it in the text file. 6. Could you scan one computer at a time or could you perform multiple scans at a time? Each computer can only be scanned at a time. 7. What portion of the scan takes longer? Is it necessary to perform this scan every time? Full scan. No, but you should run a full scan periodically. 8. Are the scans saved locally, and if so where? Yes, C:\users\username\SecurityScans folder 9. Could you exclude patches to be scanned for? No. 10. Which are some of the major recommendations that you would provide to secure any Windows system? Harden the operating system FIRST; install only the necessary services; use server roles when possible; SCW to apply least privilege principle to applications; remove or disable unneeded services, user accounts and extra application components; only open the minimum required ports at the firewall; define unique user accounts; user strong authentication; use encrypted connections for all communications; encrypt file, folders and volumes that contain private data; develop and maintain a Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP); disable any server features not needed; ensure every computer has up-to-date anti-malware......

Words: 368 - Pages: 2

Lab Report 10

...Group Members:Edna Rodriguez, Bryce Bash, Alex Chick, Kang Park, Rose Date: 4/3/14 LI Jonathan Turner Unique 49190 Day: Thursday Room: 1.24 Lab Start Time 1:30pm Exercise 10 Lab Report Adhere to UT’s Honor Code and course policies. Answer group questions individually first before compiling them into one consensus group response. Individual questions are to be answered independently. Balance between brevity and completeness. Show your work for all calculations and be sure to include proper units where necessary. Any secondary resources need to be cited. One printed report is to be submitted at the START of your next laboratory period as well as a digital pdf version uploaded to Canvas. GROUP QUESTIONS 1. List the functions of the following external structures: (3 pts.) (a.) Chelapeds: large walking appendages of a crayfish; appendages allow the crayfish to grasp and tear food, and also defend itself (b.) Walking legs: the 4 pairs of appendages used to locomote in the crayfish, they are equipped with gills which allows for gas exchange (taking in oxygen, releasing carbon dioxide) (c:.) Maxillapeds: an appendage modified for feeding: holding food, touching and tasting (d.) Cephalothorax: the first segment of a crayfish, consisting of a head fused to the thorax (e.) Genital pore: location of where sperm or eggs are released (f.) Nephridiopore: Part of the excretory system for removing nitrogenous waste. (g.) Abdomen: the multi-segmented posterior region of the crayfish......

Words: 2434 - Pages: 10

Networking Itt Labs 1.1-1.6

...Lab 1 Exercise 1.1.1 Create a mapping similar to Figure 1- 1 for the decimal number 2931 using either paper and pencil or a Word document. 10^3 10^2 10^1 10^0 1000 100 10 1 2 9 3 1 2000+900+ 30 + 1 = 2931 Exercise 1.1.2 Create a mapping similar to Figure 1- 2 for the binary number 110 using either paper and pencil or a Word document. 2^2 2^1 2^0 1 1 0 4 + 2 + 0 = 6 Exercise 1.1.3 Create a mapping similar to Figure 1- 2 for the binary number 11 using either paper and pencil or a Word document. 2^1 2^0 1 1 2 + 1 = 3 Exercise 1.1.4 Create an expanded mapping similar to Figure 1- 3 for the binary number 10010 using either paper and pencil or a Word document. 2^4 2^3 2^2 2^1 2^0 16 8 4 2 1 1 0 0 1 0 16 + 2 = 18 Exercise 1.1.5 Create an expanded mapping similar to Figure 1- 3 for the binary number 11100010 using either paper and pencil or a Word document. 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 1 1 1 0 0 0 1 0 128 + 64 +32 + 2 = 226 Exercise 1.1.6 Using the example in Figure 1- 5 and the steps that followed, create a binary conversion for the decimal value......

Words: 3121 - Pages: 13

Research Paper Lab 10

...Morgan Johnson (19407679) NS 1110  Friday Research Paper Lab 10 Morgan Johnson (19407679) NS 1110  Friday Research Paper Lab 10 The topic I chose for my research project is setting up a business on the Darknet. I think it would be more accurate to say that the topic chose me. I was originally browsing the internet on the various subjects presented to us in the assignment handout and had started reading a little about ecommerce when this topic jumped out at me. As I started looking into the other topics on the sheet, I couldn’t get the information about the Darknet world out of my mind. I think I have a bit of a fascination with the outer edges of society and that includes cyber-society. The secretive world of the Darknet is interesting in itself but setting up an ebusiness that may or may not provide illegal goods and services requires such an intricate system of safeguards that, for someone new to the tech world like myself, it is like opening the door to a bizarre and complicated dimension. Even after spending some time researching the subject, it would take hours more and I still would have barely explored the world of the cyber underbelly. The first thing a person needs to do when setting up a potentially questionable business, is to research various countries legal relationship with the country you’re based in. For the sake of this paper, we will assume we live in the U.S. Find out which have or don’t have Mutual Legal Assistance Treaties. When you......

Words: 809 - Pages: 4

Lab #10

...Lab #10 Assessment Questions & Answers Network/Security Assessment Questionnaire Network Assessment – Required Information 1. Do you have detailed logical network drawings? If so, please attach. 2. What Directory service, if any, is in use? 3. How many network elements do you have? List each, including make and model or attach list. 5 4. Have you configured multiple networks on this infrastructure? no 5. What internal (RFC1918 or otherwise not-Internet-routable) IP address ranges do you use? 6. What external (Internet routable) address ranges do you use? 7. What protocols are in use on your network? 8. What is the role of each network? (Attach list if multiple networks.) 9. How many hosts do you have on the network? 10. What operating systems are used among your servers and workstations? 11. What applications rely on your network(s)? 12. How many Internet-exposed servers are on your network? 13. What applications do you use to manage your network(s)? 14. What geographic locations connect to your network(s)? 15. What are your future growth plans for your network(s)? Security Assessment – Required Information 1. Do you have firewalls, ACLs, or other types of traffic filters in place within your network? If yes, please describe. 2. What is the general firewall policy: Default permit, default deny inbound, default permit outbound? 3. Do you have any other filtering technologies implemented at the network or......

Words: 708 - Pages: 3

Nt1210 Intro to Networking Lab 1.3

...NT1210 Intro to Networking Unit 1 Lab 1.3 Bit Byte Structure exercise 1.3.1 What is the decimal value of Byte 1 by itself? What is the decimal value of Byte 2 by itself? Byte 1 is 6400 and Byte 2 is 233 Exercise 1.3.2 What is the decimal equivalent of the binary sequence in Figure 1-12 (the combined sequence of Byte 1 and Byte 2 as a single decimal value)? How does this compare to the individual values of Byte 1 and Byte 2? The Binary Sequence is 6433 because it is the sum of both values. Exercise 1.3.3 Given a device with a storage capacity of 120 MB, how many bytes can be stored on this device? 1.2x10^8=120,000,000 Bytes Exercise 1.3.4 Given a computer with a disk capacity of 16 GB and a word size of 32 bits, how many words can be stored on the disk? 1.6x10^10=16,000,000,000 Bytes=128,000,000,000 Bits 128,000,000,000/ 32=4,000,000,000 words Exercise 1.3.5 Represent the binary value 110110^2in hexadecimal. Show the steps of conversion that you used. 110110=Two zeros needed to be added to make the value of 8 bits 1101=D 0010=2 Exercise 1.3.6 Represent the hexadecimal value f616 in binary and decimal. Show the steps of conversion that you used. F16 = 11112 and 616 = 01102 when put together the binary value is 111101102 which is equal to 246....

Words: 263 - Pages: 2

Nt1210 Intro to Networking Lab 1.5

...NT1210 Lab 1.5 Exercise 1.5.1 On the desktop of your operating system, create a new folder called Classes. Open the C: drive and locate the path through the subfolders from the root directory C: to get to your Classes folder. This path will differ slightly depending on the operating system. Record the navigation path to get to your new Classes folder. Hint: Most directory structures that include the desktop of a computer involve finding a folder for users and selecting the correct user. C:\Classes Exercise 1.5.2 Open the Classes folder you created and move the myname.txt file to the Networking folder. What has happened to the OS reference to the location of the file myname.txt? What has happened to the physical storage location of myname.txt in memory? C:\Classes\Networking\Myname.txt It changes the file path from C:\Classe\ to C:\Classes\Networking Exercise 1.5.3 Inside the Networking folder, create a new set of folders for your labs and assignments. You should add at least five subfolders. Diagram the hierarchy that now exists from the root Classes folder. C:\Classes\Networking C:\Classes\Networking\Coding C:\Classes\Networking\Homework C:\Classes\Networking\Labs C:\Classes\Networking\Networking C:\Classes\Networking\Vitural Computers exercise 1.5.4 Exercise 1.5.4 Disk fragmentation occurs when files are deleted from memory but that space is not used to store another file. Use the web to identify issues that disk fragmentation can cause for......

Words: 441 - Pages: 2

Nt1210 Intro to Networking Lab 5.4

...NT1210 Lab 5.4 Basic Network Troubleshooting Exercise 5.4.1 If you needed to determine the computer name used for node E on the network (starting from node A), what command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. I already have the IP Addresses for all the workstations a simple Ping command in CMD will work. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping –a 192.168.1.5 to retrieve the information we need. Exercise 5.4.2 What is the best (easiest and most efficient) command to determine whether all the hosts on the local-area network are reachable? You can assume that you are starting from computer A. List the command sequence(s) you would need to enter to test this functionality. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping 192.168.1.5, Ping 192.168.1.4, and Ping 192.168.1.3, Ping 192.168.1.6, and Ping 192.168.1.2. This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping 192.168.1.4 Exercise...

Words: 344 - Pages: 2

Nt1210 Intro to Networking Lab 2.2

...Exdahellilvn NT1210 Lab 2.2 Networking drives Exercise 2.2.1 If an organization has 30 users, each with his or her own PC, what is the comparative cost of buying a $120 printer for each user versus the cost of buying a single, higher-capacity $500 printer that can be used by the entire office? What is the drawback to having only a single printer? What is the cost of having two additional backup printers for the office compared to having individual printers? How many shared printers can be purchased and still be less expensive than individual printers? It would cost $3,900 if each user had their own printer V.S. buying a high capacity single printer for $500. On top of that if ink cartridges cost around $32.00 dollars apiece for each printer cartridge. It would cost a total of $960 for ink cartridges for all 30 printers. If a single printer was connected to a single workstation then it would be only tied to that workstation. No other users would be able to use printer connected to the workstation. The cost of having two backup printers would depend on what type of printers. There are two known types of printers one LaserJet or standard color ink printers. LaserJet printers can run around $500 each V.S. $120-$150 for a standard color printer. Still the cost of having two additional backup printers is less than having each workstation have their own. You can buy up to four printers costing $500 apiece and still come out money ahead. Even if you spent $100 dollars on......

Words: 838 - Pages: 4

Pt1420 Lab 10

...Lab 10: File Access This lab accompanies Chapter 10 of Starting Out with Programming Logic & Design. Lab 10.1 – File Access and Visual Basic This lab examines how to work with a file by writing Visual Basic code. Read the following programming problem prior to completing the lab. Write and design a simple program that will take 3 pieces of data and write it to a file. Create variables and set them equal to the appropriate values: Declare string firstName = “xxx” Declare string lastName = “xxx” Declare integer age = your age Write this information to a file called myRecords.txt. Next, read this information from the file and print it to the screen. Step 1: Create a new Visual Basic workspace and add the following code: Module Module1 Sub Main() Dim firstName As String = "XXXX" Dim lastName As String = "XXX" Dim age As Integer = #### Dim writer As System.IO.StreamWriter = System.IO.File.CreateText("myRecords.txt") writer.WriteLine(firstName & " " & lastName & " " & age) writer.Close() Dim reader As System.IO.StreamReader = System.IO.File.OpenText("myRecords.txt") Dim myInfo As String = reader.ReadLine() Console.WriteLine(myInfo) reader.Close() 'this causes a pause so you can see your program Console.Write("Press enter to continue...") Console.ReadLine() End Sub End Module Step 2: Change......

Words: 347 - Pages: 2

Intro to Networking Lab 9.1

...NT1210 Lab 9 The Internet Chandra Ramsey February 29, 2016 Lab 9 The Internet 9.1.1 Broadband Internet The original dialup connections offered by telephone companies required complete use of the telephone cable to connect to the Internet (meaning that no calls could be placed or received during the Internet connection). Why is this inefficient for establishing a connection to the Internet? What was the limitation of the data rates available on this type of Internet connection? First you had to make sure that your call waiting feature was turned off so that there wouldn’t be any interruptions in the service. Because it was like using the telephone, your data rates were charged as long distance telephone calls by the minute. 9.1.2 The term broadband Internet generally refers to higher-speed and constantly available connections to the Internet. The term represents an evolution of Internet connectivity, but it originally referred to the type of media usage. Broadband and baseband are the two types of media usage available. Briefly define these terms and explain the difference between them. Broadband – The term broadband commonly refers to high-speed Internet access that is always on and faster than the traditional dial-up access. It also includes several high-speed transmission technologies such as Digital Subscriber Line (DSL) Cable Modem. Baseband – refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different......

Words: 1408 - Pages: 6

Networking Labs for Unit 6

...Brandon Hellbach Unit 6 Labs Lab 6.1: Wireless Broadcast Domains Exercise 6.1.1 – A Basic Service Set does exactly what its name says; basic wireless service, one and only one AP creates the wireless LAN. Extended Service Set extends the wireless functions of a Basic Service Set. The difference is that in a BBS uses one AP to create one wireless LAN while an ESS uses more than one AP to create one wireless LAN. Exercise 6.1.2 – IEEE 802.11 Standards Standard | Frequency (GHz) | Maximum Transmission Rate (Mbps) | Standard Indoor Transmission Range (m) | Standard Outdoor Transmission Range (m) | 802.11a | 5 | 54 | 40 | 100 | 802.11b | 2.4 | 11 | 70 | 150 | 802.11g | 2.4 | 54 | 38 | 140 | 802.11n | 2.4 or 2.5 | 600 | 75 | | Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. Infrared has a very short range and cannot penetrate walls and other objects making radio frequency superior. 3. Although WLANs have a lower speed they are more convenient than wired LANs. So the trade-off is speed for convenience of not having wires everywhere which is why WLANs are more common in households. Lab 6.2: Identifying WLANs Exercise 6.2.1 - What information about the wireless networks is available using the utility? The utility provides the name, signal strength, and MAC address of the available wireless networks. What information is given on the wireless networks with the......

Words: 574 - Pages: 3

Intro to Networking Lab 9.1

...Lab 9.1 – 9.4 ITT – Technical Institute Introduction to Networking Martin Gilmore January 6, 2016 Lab 9.1: Broadband Internet Exercise 9.1.1 * This was inefficient because it prohibited the use of the phone line for its original intention. * The limitation of the data rate for this type of connection was 56kbps. Exercise 9.1.2 * Broadband uses multiple channels of frequencies to transmit data more efficiently where broadband uses a single channel. Exercise 9.1.3 DSL Connection Types DSL Type | Maximum Download Speed | Maximum Upload Speed | Maximum Distance (m) | ADSL | 24 Mbps | 1.4 Mbps | 6000+ | HDSL | 1.54 Mbps | 1.54 Mbps | 3650 | IDSL | 144 Kbps | 144 Kbps | 10,700 | MSDSL | 2 Mbps | 2 Mbps | 8800 | RADSL | 7 Mbps | 1 Mbps | 5500 | SDSL | 2,048 Mbps | 2,048 Mbps | 3000 | VDSL | 52 Mbps | 16 Mbps | 1000+ | Lab 9.2: Networks and Subnets Exercise 9.2.1 * If you had 4 bits for the host ID, how many unique combinations can be made from 4 bits? * 16 * What is another way to express this value as a power of 2? * 42 Exercise 9.2.2 * On a /24 network, how many unique host ID values exist? * 256 hosts * On a /16 network, how many unique host ID values exist? * 65,534 hosts, or 164 Exercise 9.2.3 * What is the reserved network address? * 176.33.4.0 * What is the reserved broadcast address? * 176.33.4.255 * What is the first available host ID for a unique host on this......

Words: 542 - Pages: 3