Free Essay

Computer Network Lab Manual

In: Computers and Technology

Submitted By MahanteshGowda
Words 3647
Pages 15
CN LAB REPORT

Dept. of ISE, BVBCET
Department of Information Science & Engineering,
BVBCET Hubballi

COMPUTER NETWORKING
LAB
Mahantesh Patil 2BV14IS410

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

LAB-01
List the hardware components
1) Difference between switch and Hub:
2) Difference between SWITCH and ROUTER
3) Differences between Router and Gateway
4) What is the Difference between Subnetting and Supernetting?

HARDWARE COMPONENTS

Cables:

1|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable,
Twisted pair cable.

RJ-45

The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in
Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way.

2|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

SWITCHES:

Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports.

NIC(NETWORK INTERFACE CARD)

A network card, network adapter, or NIC is a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a low-level addressing system through the MAC address Each network interface card has its unique id. This is written on a chip which is mounted on the card
3|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Hub:

A hub is a networking device used to connect multiple devices directly to the network using cables. Each connection is called a 'port.' The connections typically consist of a fiber optic
Ethernet cable. When the hub receives data at one of its ports, it distributes the data to the other ports in the network. Typically, a hub sends all the data it receives to all the other ports.

Routers:

A router is the smartest and most complicated of the bunch. Routers come in all shapes and sizes – from the small, four-port broadband routers that are very popular right now to the large industrial strength devices that drive the internet itself. Includes a mainframe system will need a gateway since this type of network uses different communication protocols.

4|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

GATEWAY:

A gateway interfaces networks that use different protocols. A gateway may contain devices such as protocol translator, impedance matching devices, rate converters, etc
Gateways, also called protocol converts, can operate at any network layer. The activities of a gateway are more complex than that of the router or switch as it communicates using more than one protocol.

Bridges:
Bridges are networking devices that divide up the network into different segments to manage the amount of traffic. This prevents unnecessary traffic from entering other parts of the network and reduces congestion. As a network becomes more complex, bridges make sure your network speed doesn't drop dramatically.

5|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

SERVER:

Server: In information technology, a server is a computer program that provides services to other computer programs in the same or other computers. A server is both a running instance of some software capable of accepting requests from clients, and the computer such a server runs on. Servers operate within a client-server architecture where "servers" are computer programs running to serve the requests of other programs, the "clients"

6|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Difference between switch and Hub:
Hub: In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that the frame is only destined for one port. The hub has no way of distinguishing which port a frame should be sent to. Passing it along to every port ensures that it will reach its intended destination. This places a lot of traffic on the network and can lead to poor network response times.
Additionally, a 10/100Mbps hub must share its bandwidth with each and every one of its ports. So when only one PC is broadcasting, it will have access to the maximum available bandwidth. If, however, multiple PCs are broadcasting, then that bandwidth will need to be divided among all of those systems, which will degrade performance
Switch: A switch, however, keeps a record of the MAC addresses of all the devices connected to it. With this information, a switch can identify which system is sitting on which port. So when a frame is received, it knows exactly which port to send it to, without significantly increasing network response times. And, unlike a hub, a 10/100Mbps switch will allocate a full 10/100Mbps to each of its ports. So regardless of the number of PCs transmitting, users will always have access to the maximum amount of bandwidth. It's for these reasons a switch is considered to be a much better choice than a hub.

Difference between SWITCH and HUB
Hub

Switch
Physical layer. Hubs are classified as Data Link Layer.
Layer 1 devices per the OSI model.
Network switches operate at Layer 2 of the OSI model.

Layer

4/12 ports

Switch is multi port Bridge. 24/48 ports Passive Device (Without Software)

Active
Device
(With Software) &
Networking device

Ports

Device Type

Data form Transmission

Electrical signal or bits

Frame (L2 Switch)
Frame
&Packet
(L3 switch)

7|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Difference between Switch and Router:
Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports
Router: A router is the smartest and most complicated of the bunch. Routers come in all shapes and sizes – from the small, four-port broadband routers that are very popular right now to the large industrial strength devices that drive the internet itself. Includes a mainframe system will need a gateway since this type of network uses different communication protocols. Difference between Routers and Gateway:
Routers: are communication devices used to connect two different networks. A router sorts incoming data and distributes it to the correct destination. For example, if you have a network within a single office building, many different devices from within the network may access resources outside the network. The best example of this would be the Internet. A router ensures that requests from within the network for information over the Internet are distributed to the correct computer within the network.
The Internet itself uses numerous routers to direct all the traffic taking place. Such routers are typically very large and heavy-duty pieces of hardware, designed to handle huge amounts of data traffic. Routers can be used for wired connection, wireless connections or both. A router that provides a wireless connection is referred to as a 'wireless router.'
While routers are used to connect different networks, they only work if the network protocols are the same. A gateway interfaces networks that use different protocols. You can think of a gateway as a router that includes protocol translators. The terms 'router' and 'gateway' are often used interchangeably, but it is important to remember that only gateways make it possible to connect networks using different protocols.
Since the Internet and many other computer networks use the same TCP/IP protocols, routers are sometimes all that is needed for a particular network. However, any network that also

8|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

What is Subnetting?
Process of dividing an IP network in to sub divisions is called subnetting. Subnetting divides an IP address in to two parts as the network (or routing prefix) and the rest field (which is used to identify a specific host). CIDR notation is used to write a routing prefix. This notation uses a slash (/) to separate the network starting address and the length of the network prefix
(in bits). For example, in IPv4, 192.60.128.0/22 indicates that 22 bits are allocated for the network prefix and the remaining 10 bits are reserved for the host address. In addition, routing prefix can also be represented using the subnet mask. 255.255.252.0
(11111111.11111111.11111100.00000000) is the subnet mask for 192.60.128.0/22.
Separating the network portion and the subnet portion of an IP address is done by performing a bitwise AND operation between the IP address and the subnet mask. This would result in identifying the network prefix and the host identifier.

What is Supernetting?
Supernetting is the process of combining several IP networks with a common network prefix.
Supernetting was introduced as a solution to the problem of increasing size in routing tables.
Supernetting also simplifies the routing process. For example, the subnetworks 192.60.2.0/24 and 192.60.3.0/24 can be combined in to the supernetwork denoted by 192.60.2.0/23. In the supernet, the first 23 bits are the network part of the address and the other 9 bits are used as the host identifier. So, one address will represent several small networks and this would reduce the number of entries that should be included in the routing table. Typically, supernetting is used for class C IP addresses (addresses beginning with 192 to 223 in decimal), and most of the routing protocols support supernetting. Examples of such protocols are Border Gateway Protocol (BGP) and Open Shortest Path First (OSPF). But, protocols such as Exterior Gateway Protocol (EGP) and the Routing Information Protocol (RIP) do not support supernetting.

9|Page

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

LAB-02
Work on all networking commands in command prompt
Commands:
ARP

Ipconfig

Ipconfig is an MS-DOS utility that can be used from MS-DOS and an MS-DOS shell to display the network settings currently assigned and given by a network. This command can be utilized to verify a network connection as well as to verify your network settings.

10 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Ipconfig\all

Ping

11 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Ping is one of the most commonly used network commands that allows you to ping another network IP address. Pinging another address helps determine if the network card can communicate within the local network or outside network.

telnet

Netstat

The netstat command is used to display the TCP/IP network protocol statistics and information. 12 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Ns lookup

The nslookup MS-DOS utility that enables a user to do a reverse lookup on an IP address of a domain or host on a network.

Tracert
The tracert command in MS-DOS and Windows (known as traceroute in Unix-like operating systems) is a useful tool for diagnosing network issues. It allows you to view a listing of how a network packet travels through the network and where it may fail or slow down. Using this information you can determine the computer, router, switch or other network device possibly causing your network issues.

13 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

After connecting a two pc’s
Ipconfig

14 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Netstat

Ns lookup

Tracert

15 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

LAB-03
Study the different header formats

Protocol Header Format
TCP

TCP segments are sent as internet datagrams. The Internet Protocol header carries several information fields, including the source and destination host addresses. A TCP header follows the internet header, supplying information specific to the TCP protocol. This division allows for the existence of host level protocols other than TCP.

16 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Table 156: TCP Segment Format
Field Name

Size
Description
(bytes)

2

Source Port: The 16-bit port number of the process that originated the TCP segment on the source device. This will normally be an ephemeral (client) port number for a request sent by a client to a server, or a wellknown/registered (server) port number for a reply from a server to a client.

2

Destination Port: The 16-bit port number of the process that is the ultimate intended recipient of the message on the destination device. This will usually be a wellknown/registered (server) port number for a client request, or an ephemeral (client) port numberfor a server reply. 4

Sequence Number: For normal transmissions, the sequence number of the first byte of data in this segment. In a connection request (SYN) message, this carries the initial sequence number (ISN) of the source
TCP. The first byte of data will be given the next sequence number after the contents of this field

Acknowledgme
4
nt Number

Acknowledgment Number: When the ACK bit is set, this segment is serving as an acknowledgment (in addition to other possible duties) and this field contains the sequence number the source is next expecting the destination to send.

Source Port

Destination
Port

Sequence
Number

Data Offset

1/2
(4 bits)

Data Offset: Specifies the number of 32-bit words of data in the TCP header. In other words, this value times four equals the number of bytes in the header, which must always be a multiple of four. It is called a “data offset” since it indicates by how many 32-bit words the start of the data is offset from the beginning of the TCP segment. Reserved

3/4
(6 bits)

Reserved: 6 bits reserved for future use; sent as zero.

17 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Control Bits

Window

Checksum

Urgent Pointer

Dept. of ISE, BVBCET

3/4
(6 bits)

2

Window: Indicates the number of octets of data the sender of this segment is willing to accept from the receiver at one time. This normally corresponds to the current size of the buffer allocated to accept data for this connection. This field is, in other words, the current receive window size for the device sending this segment, which is also the send window for the recipient of the segment. 2

Checksum: A 16-bit checksum for data integrity protection, computed over the entire TCP datagram plus a special “pseudo header” of fields. It is used to protect the entire TCP segment against not just errors in transmission, but also errors in delivery. Optional alternate checksum methods are also supported.

2

Urgent
Pointer: Used in conjunction with the URG control bit for priority data transfer. This field contains the sequence number of the last byte of urgent data. 18 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Options

Variabl e Padding

Padding: If the Options field is not a multiple of 32 bits
Variabl
in length, enough zeroes are added to pad the header so e it is a multiple of 32 bits.

Data

Variabl
Data: The bytes of data being sent in the segment. e UDP HEADER FORMAT

The User Datagram Protocol offers only a minimal transport service -- non-guaranteed datagram delivery -- and gives applications direct access to the datagram service of the IP layer. UDP is used by applications that do not require the level of service of TCP or that wish to use communications services (e.g., multicast or broadcast delivery) not available from
TCP.
UDP is almost a null protocol; the only services it provides over IP are check summing of data and multiplexing by port number. Therefore, an application program running over UDP
19 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

must deal directly with end-to-end communication problems that a connection-oriented protocol would have handled -- e.g., retransmission for reliable delivery, packetization and reassembly, flow control, congestion avoidance, etc., when these are required. The fairly complex coupling between IP and TCP will be mirrored in the coupling between UDP and many applications using UDP.
DHCP

Op – the message type (see DHCP message types table below)
Htype – Hardware address type (see HTYPE codes table below)
20 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Hlen – Hardware address length
Hops – set to zero by a client – but can optionally be used when booting via a relay agent
Xid – Transaction ID, a random number choosen by the client, used by the client and server so that no-one get confused between messages.
Secs – The number in seconds since the address was allocated, the client fills this part
Flags – Exactly what it says on the tin
Ciaddr – The clients IP address, but only if they have one, basically if the client is BOUND,
RENEW or REBINDING.
Yiaddr – Your (client) IP address.
Siaddr – IP address of the next server to use in bootstrap. Is returned in DHCPOFFER and
DHCPACK messages by the DCHP server.
Giaddr – VPN server IP address used in booting via relay agents
Chaddr – Client Hardware address (should be unique – LOL)
Sname – Optional server host name, should be a null terminated string
File – Boot file name, it should be a null terminated string. For DHCPDISCOVER messages it should be a fully generic name or null, for DHCPOFFER messages it should be a fully qualified directory path name.
Options – For optional parameters.
ARP

21 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

HTTP

DNS

22 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

As we can see, the Type field (red circle) in the first answer of the Authoritative Name Servers section is set to NS, which means this part contains information about the Authoritative name servers of the queried domain.

Going to the first answer of the Additional records, we can see that the Type field here is set to A, which means the data contained in this part is an IP address for the particular host.
When requesting the name servers for a domain, it also also essential their IP address is also provided, so that the client can construct a DNS query and send it to the name servers for that domain. In this article we analysed the DNS response message format by looking into the details of a DNS response packet. We also covered the different DNS type field messages and explained the contents of the DNS Response message.

23 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

LAB-04
Correlate Theory with TCP protocol
Using Netmon tool we are analysing TCP protocol with theory concepts. The following snaps will show the TCP protocol header formats.

In this below snap it shows TCP header format like,
Sorceport, destport, seqnumber, acknumber, etc

24 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Graph:

25 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

26 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

LAB-05
Bit Stuffing:
Bit stuffing is the insertion of one or more bits into a transmission unit as a way to provide signalling information to a receiver. The receiver knows how to detect and remove or disregard the stuffed bits.
 Each frame begins and ends with a special bit pattern called a flag byte [01111110].
 Whenever sender data link layer encounters five consecutive ones in the data stream, it automatically stuffs a 0 bit into the outgoing stream.
 When the receiver sees five consecutive incoming ones followed by a 0 bit, it automatically de-stuffs the 0 bit before sending the data to the network layer.
Bit Stuffing:
Input Data: 0110111111100111110111111111100000
Stuffed data: 011011111 0 110011111 0 011111 0 11111 0 00000
Red colour highlighted bit is stuffed bit.
Unstuffed data: 0110111111100111110111111111100000

27 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

Code:
Server:
#include
#include
#include
#pragma comment(lib,"ws2_32.lib") //Winsock Library int main(int argc , char *argv[])
{

WSADATA wsa ;
SOCKET s , new_socket; struct sockaddr_in server , client; int c, cnt; char msg [100],msg1[100]; char client_reply[2000]; int recv_size; int count=0,j,nl; int i,jl,a; char ar[60]; int flag = 0;

printf("\nInitialising Winsock..."); if (WSAStartup(MAKEWORD(2,2),&wsa) != 0)
{
printf("Failed. Error Code : %d",WSAGetLastError()); return 1;
}

28 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

printf("Initialised.\n");

if((s = socket(AF_INET , SOCK_STREAM , 0 )) == INVALID_SOCKET)
{
printf("Could not create socket : %d" , WSAGetLastError());
}
printf("Socket created.\n"); server.sin_family = AF_INET; server.sin_addr.s_addr = inet_addr ("127.0.0.1"); server.sin_port = htons( 8888 );

if( bind(s ,(struct sockaddr *)&server , sizeof(server)) == SOCKET_ERROR)
{
printf("Bind failed with error code : %d" , WSAGetLastError());
}
puts("Bind done"); listen(s , 3);

puts("Waiting for incoming connections...");

c = sizeof(struct sockaddr_in); new_socket = accept(s , (struct sockaddr *)&client, &c); if (new_socket == INVALID_SOCKET)
{
printf("accept failed with error code : %d" , WSAGetLastError());
29 | P a g e

Mahantesh Patil 2BV14IS410

CN LAB REPORT

Dept. of ISE, BVBCET

}

puts("Connection accepted"); while(1){printf ("Server: "); printf("enter the bit string to be Stuffed::"); gets(ar); for (i=0;i

Similar Documents

Premium Essay

Police Abuse Essay

...unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh. Assignment...

Words: 16043 - Pages: 65

Premium Essay

Unit 1 Labs

...handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh. Assignment Requirements ...

Words: 16182 - Pages: 65

Premium Essay

Introduction to Networking

...unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh. Assignment...

Words: 16043 - Pages: 65

Premium Essay

Nt 1210

... Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

... Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical...

Words: 4400 - Pages: 18

Premium Essay

Module 3 Essay

...hours: 4.5 Contact/Instructional hours: 56 (34 Theory, 22 Lab) Prerequisite: NT1110 Computer Structure and Logic or equivalent © ITT Educational Services, Inc. All Rights Reserved. -1- 05/08/2013 Introduction to Networking SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments. MAJOR INSTRUCTIONAL AREAS 1. Networking fundamentals 2. The OSI model and its use in networking 3. LANs, WANs, MANs and their implementation 4. Physical layer fundamentals 5. Basics of the data link layer 6. The functions of TCP/IP 7. IP addressing, subnetting, and supernetting 8. Diagramming the physical components that comprise a network 9. Logic created by the interconnectivity of network components 10. Applying network security 11. Future developments in networking COURSE OBJECTIVES 1. Explain key networking concepts and terminology. 2. Identify the advances in computer networking from an historical perspective. 3. Describe...

Words: 4795 - Pages: 20

Free Essay

Deploying a Ftp Server

...Lab 4-1 70-643 worksheet Deploying an FTP Server This lab contains the following exercises: Exercise 4-1-1 Installing the Web Server (IIS) Role Exercise 4-1-2 Creating an FTP6 Site Exercise 4-1-3 Configuring FTP6 Security Lab Review: Questions Lab Challenge: Creating a Combined Web/FTP Site Estimated lab time: 55 minutes BEFORE YOU BEGIN The classroom network consists of Windows Server 2008 student server A and B a connected to via an internal local area network. NT2670Srv##A the domain controller for the contoso##.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the NT2670Srv##A. To accommodate various types of classroom arrangements, each lab in this manual assumes that the student servers are in their baseline configuration, as described in Lab 1-2, “Preparing an Application Server.” If you have not done so already, complete the initial configuration tasks in Lab 1-2-1 before beginning this lab. Your instructor should have supplied the information needed to complete the following table: Student computer name (NT2670Srv##A) | | Student account name (Student##) | | To complete the exercises in this lab, you must access a second student computer on the classroom network, referred to in the exercises as your partner server. Depending on the network configuration, use one of the following options, as directed by your instructor: ...

Words: 964 - Pages: 4

Premium Essay

Chapter 1 Lab

...Chapter 1 First Look at Computer Parts and Tools Lab 1.1 Record Your Work and Make Deliverables Review Questions 1. What are the eight categories in the Category view in Control Panel? Answer: System and Security Network and Internet Hardware and Sound Programs User Accounts and Family Safety Appearance and Personalization Clock, Language and Region Ease of Access 2. What are the four file types that can be used to save a snip using the Windows Snipping Tool? Answer: Portable Network Graphic file (PNG) (*.PNG) GIF file (*.GIF) JPEG file (*.JPG) Single file HTML (MHT) (*.MHT) 3. The Windows Experience Index rates a computer’s performance on a scale of 1.0 to 7.9. Based on the rating of your computer, what can you conclude about its performance? Answer: The Windows Experience Index rates certain components giving them a sub score. The component with the lowest score is the Windows Score Index Score. In this case the lowest score was for the graphics components, which means that it has a basic graphics chip, instead of high end graphics chip. 4. Search the web for information about the price of Windows 7. How much would it cost to buy your current edition of the Windows 7 operating system as an upgrade from Windows Vista? Answer: About $76.00 for an upgrade Lab 1.2 Gather And Record System Information Review Questions 1. List two categories available in Control Panel that were...

Words: 862 - Pages: 4

Premium Essay

Random

...termpaperwarehouse.com › Computers and Technology Nov 11, 2012 – Nt2580. Making tradeoffs due to economic scarcity and that every society faces ... For a given set of laboratory services, there is a defined cost. Nt2580 Lab 4 - Term Papers - Jrains www.termpaperwarehouse.com › Computers and Technology Jan 18, 2013 – Nt2580 Lab 4. 1. Define why change control management is relevant to security operations in an organization. Change control is a systematic ... NT2580 Introduction to Network Security stankong.bol.ucla.edu/NT2580/index.htm Welcome to NT2580 Introduction to Network Security ... Home Work , Labs, PowerPoint , Project and Exam Reviews. Fall Quarter 2012 ... Itt tech nt2580 lab 6 - 6 ebooks - free download www.getbookee.org/itt-tech-nt2580-lab-6/ Itt tech nt2580 lab 6 download on GetBookee.org free books and manuals search - 094 ALB 01-09-13 01-09-13 Vol 37-a. Nt2580 unit 9 lab - 4 ebooks - free download www.getbookee.org/nt2580-unit-9-lab/ Nt2580 unit 9 lab download on GetBookee.org free books and manuals search - NT2580 Introduction to If ti S itInformation Security. Nt2580 unit 6 lab - 4 ebooks - free download www.getbookee.org/nt2580-unit-6-lab/ Nt2580 unit 6 lab download on GetBookee.org free books and manuals search - NT2580 Introduction to If ti S itInformation Security. Lab itt edition nt2580 answers - 1 ebooks - free download www.getbookee.org/lab-itt-edition-nt2580-answers/ ...

Words: 435 - Pages: 2

Free Essay

Distance Learning Computer-Based Hands-on Workshop: Experiences on Virtual and Physical Lab Environments

...Distance Learning and the Internet Conference 2008 5-2 Distance Learning Computer-based Hands-on Workshop: Experiences on Virtual and Physical Lab Environments Patcharee Basu, Shoko Mikawa, Achmad Basuki, Achmad Husni Thamrin, Keiko Okawa, Jun Murai Keio University Plenary Sessions Waseda University Presentations {yoo, funya, abazh, husni, keiko, jun}@sfc.wide.ad.jp Abstract In response to the educational demands of computer-skilled human resources, distance learning with ability to support hands-on computer lesson is needed. In this paper, a platform for region-wide distance learning computer-based hands-on workshop is presented through the actual developments. The proposed platform supports 1) teaching/learning activities in a hands-on computer workshop 2) efficient large-scale remote computer laboratory. Computer virtualization and StarBED large-scale computing testbed were utilized to create a distance learning computer laboratory, virtual and physical. This paper discusses various aspects of deploying virtual and physical lab environments for region-wide learners in a synchronous-style distance learning workshop. Keywords Hands-on computer workshop, remote laboratory, distance learning, educational technology 1 Introduction With digital and telecommunication technologies, distance education has been developed to extend boundary of knowledge sharing to be more location and time independent. It has been widely deployed in academic or training programs...

Words: 4133 - Pages: 17

Free Essay

Nt 1210

...NT-1210 Unit Name Lab l Labs Date 1-l Reading Binary Convert the following decimal numbers to binary equivalents: 89 1011001 776 10110000 Convert the following Binary values to their decimal equivalent: 101_0100L 169 11101010 234 Lab 1-2 Binary Math and Logic Draw the graphical symbol Explain the logical operations (give a truth table) for each: AND OR NOT Lab 1.3 Bit and Byte Structure - (see page 15 of lab manual) How many bits are in a byte? 8 1 Kilobyte is equal to: 1024 55,296 23,552 bytes Kilobytes Megabytes Terabytes 54 Megabyte is equalto: 23 Gigabyte is equalto: 5 Terabyte is equal to 5,120 120MB = 16GB= 125,829,120 16,384 bytes MBytes Lab 1.4 ASCII (See page 20 of Lab manual) 1. Decode the simple numerical sentences into one English paragraph. You may use Google to find an ASCII table. Use the keywords-Binary to text conversion; Hexadecimatto text conversion; ASGllto text conversion-to aid the decoding process: Code"Tvoe ASC llcodes Numeric Message 87 101 1 08 1 08 44 32 116 104 97 116 32 109 97 107 101 115 32 111 117 114 32 49 48 32 110 117 109 98 101 114 32 100 101 99 105 109 97'108 3247 3297 115 99 105 10532115121115116 101 '10932 106 117 11511632114105103104 11633148 Translation Well, that makes our 10 number decimal / ASCII system just right! Lab 1.5 Creating a File System Follow the procedures outlined in the Lab Manual on pages 231o27 Exercise...

Words: 918 - Pages: 4

Premium Essay

Teacher

...Chapter 1 First Look at Computer Parts and Tools Lab 1.1 Record Your Work and Make Deliverables Review Questions 1. What are the eight categories in the Category view in Control Panel? 2. What are the four file types that can be used to save a snip using the Windows Snipping Tool? 3. The Windows Experience Index rates a computer’s performance on a scale of 1.0 to 7.9. Based on the rating of your computer, what can you conclude about its performance? 4. Search the web for information about the price of Windows 7. How much would it cost to buy your current edition of the Windows 7 operating system as an upgrade from Windows Vista? Lab 1.2 Gather And Record System Information Review Questions 1. List two categories available in Control Panel that were not mentioned in the lab: 2. Based on the Windows Experience Index, what component of your computer would you upgrade first? Why? 3. Based on what you found while taking inventory of your computer’s system, what maintenance does this computer currently need? 4. Besides the Computer Inventory and Maintenance form, what other documentation should you keep on each computer? How might you store that information? 5. What differences, if any, are there between a list of components derived from a physical inspection versus a list of components derived from Control Panel and System Properties? Lab 1.3 Identify Computer Parts Review Questions ...

Words: 478 - Pages: 2

Premium Essay

Nt1230 Syllabus

...NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the...

Words: 1834 - Pages: 8

Free Essay

Replication Management

...LAB 4 WORKSHEET WORKING WITH ACTIVE DIRECTORY SITES This lab contains the following exercises: Exercise 4.1 Replication Management Exercise 4.2 Preparing Your Infrastructure Exercise 4.3 Configuring a Site Exercise 4.4 Configuring a New Subnet Exercise 4.5 Moving Computers and Creating Site Links Post-Lab Cleanup Estimated lab time: 100 minutes Exercise 4.1 Replication Management Overview Now that you have added a new domain controller to the Domain99.Local domain, you want to ensure replication is occurring properly. You have reviewed the replication error messages in the Event Viewer Directory Service log and identified some errors that you are anxious to resolve. First, you plan to force replication. Then, you plan to create a manual connection object. Finally, you will use repadmin to troubleshoot any further problems. Completion time 60 minutes  PART A: Forcing Replication Question 1 What is the name of the site that was created by default when you installed the Active Directory Domain Services role?Default –first-site-name Question 2 What servers are listed within this folder? Server2 Question 3 What connection objects are configured in this folder? Automatically generated from Server2  PART B: Managing Connection Objects Question 4 Forcing replication on the new connection object was described in the previous section. How can you tell which connections are the automatically generated connections and which ones have been...

Words: 804 - Pages: 4

Free Essay

Cis Lab

...Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. Tftpd64, Zenmap, NetWitness Investigator, OpenVAS, and Wireshark. 2. What is promiscuous mode? Promiscuous mode allows Wireshark to capture packets destined to any host on the same subnet or virtual LAN (VLAN). 3. How does Wireshark differ from NetWitness Investigator? Wireshark is a network packet analyzer, it will capture network packets and will try to display every detail of that packet. NetWitness Investigator is interactive threat analysis application, it provides the power to perform free-form contextual analysis of raw network data. 4. Why is it important to select the student interface in the Wireshark? When student is not selected the activity is from different computers on the server. When student is selected you get the activity from the computer you are using. 5. What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24? The command line syntax is nmap-t4-a-v172.30.0.0/24 2 | Lab #1: Performing Reconnaissance Using Common Tools 6. Name at least five different scans that may be performed with Zenmap. Intense Scan, Ping Scan, Quick Scan, Regular Scan, and Quick Scan Plus. 7. How many different tests (i.e., scripts) did your Intense Scan perform? 256 tests 8. Based on your interpretation of the Intense Scan, describe the purpose/results of each tests script performed during the report. ...

Words: 315 - Pages: 2