Free Essay

Intro to Networking

In: Computers and Technology

Submitted By jeffgarwood
Words 719
Pages 3
Intro to Networking
Lab 3
Jeff Garwood
EX. 3.1 Review
1. The MAC Address is sufficient to route traffic locally because it provides the needed information with regards to the equipment location. This is mostly true on level 2 networks.
2. The Open Systems Interconnection was started in two documents in 1978. The International Organization for Standardization (ISO) and the International Telegraph and Telephone Consultative Committee, or CCITT. In 1983 these two documents were combined as the basic reference model for the OSI. It was created so Protocols could allow the entity in one host to interact with a corresponding entity at the same layer in another host.
3. The TCP dates back into the 1960s on the DOD sponsored ARPANET. In 1973 the TCP/IP came to be and consisted of dozens of different protocols. Of these key protocols, two are usually considered the most important. The Internet Protocol (IP) is the primary OSI network layer (layer three) protocol that provides addressing, datagram routing and other functions in an internetwork.

EX. 3.2 Review

1. The composition of the physical wiring, and connectors no matter the type are strictly regulated to ensure the electrons within the communications signal can move fast enough to maintain a connection. The addition of network devices such as switches and routers complete the campus style network.
2. The OSI model is not implemented in a network but is used as a model to guide troubleshooting a local network in reference to the national network.
3. Each layer is based on how it processes or delivers data. They can be separated or combined as long as the models are followed.

EX. 3.3 Review
1. The UDP Protocol is used with Time-sensitive applications because dropping packets is preferable to waiting for delayed packets, which may not be an option in a real-time system. If needed Transmission Control Protocols or Stream Control Transmission Protocols can be used for packet checking in the local network.
2. TCP is considered very reliable the TCP assures a delivery by resending anything that gets lost while traveling the network. The TCP uses a sliding window mechanism to maintain data integrity because different equipment runs at different speeds. TCP allows for full duplex communications at all times.
EX. 3.4.1
1. The IP provides the needed information with regards to location on a level 2 network.

Ex. 3.4.2

Ex.3.4.3
Using the www.nfl.com site I had http and TCP protocols

EX. 3.4.4

EX 3.4.5
The invoked protocols are ICMPV6, Browser, TCP, HTTP and TLSV1.

EX 3.4 Review
1. Only people with administrative level access should use Wireshark due to the passwords shown in the data lines. Potential buffer overruns and security risks with any application that is taking data from uncontrolled sources, especially if the application is running with root/superuser privileges.
2. You can get the IP and MAC addresses for anyone in the network, passwords that are sent in the dada line, router numbers. All of this can compromise your network if found.
EX 3.5.1
It is important to keep a record of who is authorized to have file and printer access to govern and identify new network members and quickly identify anyone who may break into your network. File and printer sharing is a great way to cut the network installation cost and network clutter.
I have Windows 8.1 all the printer and file sharing is done through the advanced settings in the Network Sharing Center.
EX 3.5 Review
1. Whatever you share can be altered unless you give them read only access. Depending on what the computer is used for dictates whether or not you will allow sharing. If there is classified documents or personal information you may keep this on a different computer or storage device. On windows 8 I go to the sharing center and all files are listed.
2. Enabling a shared printer can give backdoor access to you IP address which can be used to access your system even your home if you log in remotely. Limited memory and storage can translate into little or no activity logging, making it harder to detect malicious activity before or right after it takes place.

Similar Documents

Premium Essay

Intro to Networking

...NT-1210 Intro to Networking 05/30/2012 CH 10-11 Research Paper Essay In the evolution of smart phones the first use of text messaging did not take place until 1992 in England, and this was from a computer to a cell phone. The first cell phone to cell phone text happened in 1993 in Finland, which during this period was leading the cell phone technology race, and in 2000 was the first to offer mobile news services. In this time period of the early 2g (second generation) and 2.5g networks mobile providers started to pop up everywhere making communications more reliable. In 2001 the 3g network was introduced and with this technology came the ability to send pictures and stream video. Mobile providers started to offer media content such as ringtones, news, weather, jokes, music and videos, which in 2007 reached 31 billion in sales and outpaced computer internet sales. In the business aspect of this technology, all of this is the icing on the cake. The ability to keep in touch with your employees at any time or location is priceless. Gone are the days of the travelling salesperson with only the information that was current when they began their journey. Changes to information or current events can be sent immediately, lost files can be sent, up to date sales figures can be accessed and video conferencing is possible. A new application being researched for business use is Unified Messaging, a system that offers access to E-mail, voice and fax messages though a unified application...

Words: 430 - Pages: 2

Free Essay

Intro Networking

...process that are readily available by the industry. Some of these open standards include such prefixes as: HTTP, HTML and TCP/IP. The benefits of open standards are you have the option not to be locked into one vendor. Since the specifics are open and detailed another vendor could come in and also give work and or solutions to the project. Another benefit would be it is easier for systems using different vendors to be able to adapt to the technology and communicate with each other. Therefore open standards are here to stay and further the internet and other projects well from what it is now. Layered architecture is beneficial to society for the reason of easily organizing the tasks at hand. With this method it not only pertains to networking but to real life as well. Layered architecture is not a new process it has been around for quite some time. A protocol is a set of rules that allows the communications between computers on the network. These rules help regulate the guidelines of speed data transfer and access method. A society based protocol would be like a motorcycle club. For example the network would be the president and the computers would be the other members. The protocol would be the Sgt of Arms as for he would be the one that controls the communication between he members and the president. The four types of different networks are LAN (local area network), WLAN (wireless local area network), WAN (wide area network), and VPN (virtual private network). LAN...

Words: 449 - Pages: 2

Premium Essay

Intro to Networking

...Exercise1.4.1 What is the ASCII hexadecimal code for a blank space? Why is it necessary to represent a blank space as a separate character in text? A) 0000 B) Defines ascII symbol table Exercise1.4.2 Using Microsoft Word or Excel, create a chart similar to Table 1-3 for the hexadecimal codes for the numbers from 0 through 0) 0000 1) 0001 2) 0010 3) 0011 4) 0100 5) 0101 6) 0110 7) 0111 8) 1000 9) 1001 Exercise1.4.3 What are the binary and decimal values of the ASCII letter K? Show the steps of the conversion. decimal | binary | 75 | 01001011 | Exercise1.4.4 Use the web to explore the origin of the Universal Character Set (UCS)—ISO/IEC 10646—and explain why it was developed. And contrast this system with ASCII. What is the relationship of ASCII to the UCS encoding? A) For communication and exchange of electronic information B) The way they encode each character and the number of bits used Exercise1.4.5 Use the web to explore the application of UTF-8 text encoding. What features are provided by UTF-8 that is not provided by ASCII? Why was it chosen to replace ASCII as the standard for the web? A) A variable with encoding that can represent every character in the Unicode character set B) Utf-8 functions better on the web C) It can translate foreign languages Lab Review 1.4 1...

Words: 1580 - Pages: 7

Free Essay

Intro to Networking

...Networks This chapter will allow you to explore the common models of networking from the physical media connection to the application that displays the information, including how these layers interact and how they map to real networking devices. The labs in this chapter are designed to reinforce concepts from Chapter 3 of your Introduction to Networking textbook and allow you to explore some of the more important ideas with greater depth. You will explore the different types of network reference models available and analyze how each one applies to real network technology. You will also use packet capturing to look at real network traffic and explore the data link layer of networking. At the end of this chapter, you should be able to ■ Explain the purpose of network reference models ■ Describe the layers of the OSI reference model and explain what each layer provides ■ Describe the layers of the TCP/IP model and relate it to the OSI model and real networking equipment ■ Capture live packet information on a network and explain the data link layer portion of the packets captured ■ Enable network resources such as shared printers and file sharing on your own PC Lab 3.1: Network Reference Models approximate Lab Time: 10–15 min. Materials Needed: paper/pencil, Textbook, and Internet research This lab reviews the importance of modeling communication on a network. This will include a review of the state of networking before standardized reference models existed and the impact that...

Words: 270 - Pages: 2

Free Essay

Intro to Networking

...Chapter 2 Mind Map Chapter 2 Lab Two Extra Sources Some of the things that I have learned from searching information on chapter two are that there are way more networking systems then I have ever dreamed about. I just thought WAN stood for wide area network and was just another name for the internet. I learned that WAN is everywhere we are and imbedded in our lives. One of the biggest claims of this would be the ATM. I have used it many times but never knew that it was running off of a WAN. I also found out that WAN can be localized as well as worldwide and that it can incorporate the city you live in, the state you live in, and even the United States. Mind Mapping is a brain emulating method for generating and organizing ideas. This was inspired by a great man and his way of doing things, which was Leonardo da Vinci's and his approach to note-taking. Now that is something really cool and another reason we should have been doing something like this a long time ago. Mind mapping is more than just a simple brain storming tool, it is a tool that we can use to organize our lives, organize our jobs and our responsibilities, and it can even be used to organize our day to make us more proficient in our jobs. I am glad that I have been introduced to this tool so early in my career. Bibliography WAN, MAN, LAN, PAN, And SAN: Evolution, Not Revolution | Digital ICs content from Electronic Design. (n.d.). Retrieved June 29, 2013, from http://electronicdesign.com/digital-ic...

Words: 308 - Pages: 2

Free Essay

Intro to Networking Project

...Dell PowerEdge R515 server * The PowerEdge R515 is an AMD processor-based 2-socket, 2U rack server that is great for department, branch or small business database tasks and business applications with large storage * Up to 256GB (8 DIMM slots): 1GB/2GB/4GB/8GB/16GB/32GB DDR3 up to 1600MT/s * AMD (SR5670 and SP5100) * Up to 25TB of internal storage space gives you ample capacity Dell Price - $14,219.00 American power conversion system PX 30 kW UPS * Power provided 30 kW/30,000 VA * Run time up to 4 min at full load * Battery Type - Maintenance-free sealed Lead-Acid battery with suspended electrolyte : leak proof * Included Battery Modules - 3 * Available Battery Module Slots - 1 * Typical recharge time - 2 hour(s) Price – $30,000 Cisco 3825 Integrated Services Router * It supports VPN payload encryption with Ko software * Services at line rate is 1/2 T3 * 4 high-speed WAN interface cards slots Price $5,289.00 Cisco catalyst 3560e-24TD * 24 Ethernet 10/100/1000 ports and * 2 X2 10 Gigabit Ethernet uplinks * Forwarding rate is 65.5 Mbps Price – $1, 129.95 Cisco AP 541N wireless access point * Consistent wireless coverage * High security with\out a loss in performance * Compatible with power over Ethernet Price- 378.00 Cisco POESS 5-volt power over Ethernet splitter * Ports 1 RJ-45 Ethernet port * Ethernet...

Words: 2164 - Pages: 9

Premium Essay

Intro to Networking U5L1

...A user boots his or her computer and hears a sequence of six beeps The computer uses AMI BIOS. What error is indicated by the six beeps? Using AMI BIOS six beeps means that there has been failure with the 8042 Gate a20 test. The cause is normally a failed expansion card or motherboard that no longer runs properly. A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. the sequence is beep - pause - beep beep beep - pause - beep beep beep beep - beep beep beep. What error is indicated by this beep sequence? This kind of beep pattern indicates an issue with memory, The most common answer for this problem is merely replacing the RAM cartridges in your pc Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Hardware Firewalls - Hardware Firewalls can be found as a standalone product but can also be found in broadband routers. Hardware Firewalls use packet filtering to examine the header of a packet and determine its source and destination. This information can be compared to a pre-defined list of rules to determine whether or not the packet will be dropped. Software Firewalls - Software firewalls are fairly popular and common with household users, because they can be downloaded and installed freely and are easily...

Words: 313 - Pages: 2

Premium Essay

Nt1210 Intro to Networking

...NT1210 Unit 1 HomeWork Assignment 1: 1. Which of the following is true about 1 bit? a. Can represent decimal values 0 through 9 2. How many bits are in a byte? ____8_____ 3. Fill out the following Chart Term | Size(Bytes) | Size(2n Bytes) | Rounded Size (Bytes) | Kilobyte | 1024 | 2 10 | 1000 | Megabyte | 1,048,576 | 2 20 | 1,000,000 | Gigabyte | 1,073,741,824 | 2 30 | 1,000,000,000 | Terabyte | 1,099,511,627,776 | 2 40 | 1,000,000,000,000 | 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.) b. Used for long-term memory d. Connects to the CPU over a bus using a cable 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. 6. Define Character set: A list of all the characters on a computer with matching binary values ex: a = 110001 in ASCII which uses a 7bit code. 7. Character encoding scheme is another name for character set? a. True 8 & 9. Complete the following Decimal to binary chart. Decimal | Binary | | Decimal | Binary | 193 | 11000001 | | 255 | 1111111 | 52 | 00110100 | | 19 | 10011 | 50 | 110010 | | 172 | 10101100 | 170 | 10101010 | | 14 | 1110 | 6 | 110 (binary) | | 0 | 0000 | 10. Which of the...

Words: 1421 - Pages: 6

Free Essay

Nt1210 Intro to Networking 4.3

...NT1210 Lab 4.3 Cabling exploration Exercise 4.3.1 Use your textbook and Internet research to complete the comparison in Table 4-3. Cite the sources from which you retrieved the information to complete the comparison. UTP-Defines a cable that can carry data up to 100 Mbps. The signaling frequency of this cable is up to 100 MHz. Cheapest form of cable available for networking purposes. Easy to handle and install. Highly prone to external interference like EMI and RFI. Highly prone to crosstalk. Unable to provide secured transmission of data. Coaxial (Thinnet) 185m 100 Mbps Low Uses thin cabling, low hardware costs Difficult to troubleshoot, difficult to maintain. Coaxial (Thicknet) 500m 100 Mbps directly connects computers and it costs more. Multimode cables are less expensive to operate, install and maintain than single-mode cables. However, they are much more limited in both speed and distance. For instance, the maximum speed of a multimode cable is 10GB, but only up to a distance of 300 meters. Up to 2 kilometers, it is only capable of transmitting at 100Mbit. Beyond that, its transfer speed becomes negligible. This limitation is negated by the fact that its maximum speed is sufficient for the environment that it is most often used in. Singlemode cable provides less signal attenuation, higher transmissions speeds, and up to 50 times greater transmission distance than multimode cable. Singlemode cable can transmit data at terabits per second over 100km without requiring...

Words: 866 - Pages: 4

Premium Essay

Nt1210 Intro to Networking 5.2

...NT1210 MAC and IP Addresses Exercise 5.2.1 Why must a MAC address be unique for every NIC produced? What effect will it have on the network if two devices from two different manufacturers share the last 24 bits of their MAC addresses? Explain your answer. Use your textbook and the Internet to research your answer. Think of it as your address or phone at your home it has to be unique. Has to be unique so the entire world can see it. So the network traffic couldn’t find its way to the right PC. Exercise 5.2.2 What information about the network connection is given on the Support tab of the status window? Gives you the IP address, Subnet Mask and default gateway. Exercise 5.2.3 What is the physical address (the MAC address) of the NIC (or network adapter) for this connection? Physical Address: ‎00-1E-65-DC-C4-DA. Exercise 5.2.4 You can determine the manufacturer of your NIC using the first six characters of your MAC address. To do this, you must search the IEEE records database for the unique OUI. You can access the IEEE database at this address: http://standards.ieee.org/develop/regauth/oui/public.html. On this page, you should locate the search box and enter the first three bytes of your MAC address separated by hyphens (such as “00-0C-44”), and then click the Search button. Who is the manufacturer for your NIC? What information is given about the manufacturer? You can see an example record returned from this site in Figure 5-5. MAC Address/OUI Vendor {Company}...

Words: 725 - Pages: 3

Premium Essay

Intro to Networking Lab 9.1

...Lab 9.1 – 9.4 ITT – Technical Institute Introduction to Networking Martin Gilmore January 6, 2016 Lab 9.1: Broadband Internet Exercise 9.1.1 * This was inefficient because it prohibited the use of the phone line for its original intention. * The limitation of the data rate for this type of connection was 56kbps. Exercise 9.1.2 * Broadband uses multiple channels of frequencies to transmit data more efficiently where broadband uses a single channel. Exercise 9.1.3 DSL Connection Types DSL Type | Maximum Download Speed | Maximum Upload Speed | Maximum Distance (m) | ADSL | 24 Mbps | 1.4 Mbps | 6000+ | HDSL | 1.54 Mbps | 1.54 Mbps | 3650 | IDSL | 144 Kbps | 144 Kbps | 10,700 | MSDSL | 2 Mbps | 2 Mbps | 8800 | RADSL | 7 Mbps | 1 Mbps | 5500 | SDSL | 2,048 Mbps | 2,048 Mbps | 3000 | VDSL | 52 Mbps | 16 Mbps | 1000+ | Lab 9.2: Networks and Subnets Exercise 9.2.1 * If you had 4 bits for the host ID, how many unique combinations can be made from 4 bits? * 16 * What is another way to express this value as a power of 2? * 42 Exercise 9.2.2 * On a /24 network, how many unique host ID values exist? * 256 hosts * On a /16 network, how many unique host ID values exist? * 65,534 hosts, or 164 Exercise 9.2.3 * What is the reserved network address? * 176.33.4.0 * What is the reserved broadcast address? * 176.33.4.255 * What is the first available host ID for a unique host on this network...

Words: 542 - Pages: 3

Premium Essay

Nt1210 Intro to Networking 5.1

...NT1210 Lab 5.1 LAN Standards Exercise 5.1.1 The IEEE standards cover more than just Ethernet. The 802.3 standard actually builds upon the 802.1 network architecture standard from IEEE. Briefly define the 802.1 standard and what it provides. Use your textbook and the Internet to research your answer. IEEE 802.1 Working Group (IEEE 802.1) is an IEEE Standards Association (IEEE-SA) group established to ensure network management and monitoring capabilities in networks developed according to IEEE 802 standards. Exercise 5.1.2 The 802.3 family of standards has the format 802.3x where x is a sequence of letters specifying the new standards added to the 802.3 base standard. One of the enhancements to Ethernet is Power over Ethernet (PoE), in which Ethernet cable can provide power to remote, low-power devices that are not near an electrical outlet. What 802.3 standard originally defined PoE functionality? When was the standard enhanced, and what was the new standard name given for the enhancement? Use your textbook and the Internet to research your answer. 802.3 standard originally came about in June 2003 then designated IEEE 802.3at was released in 2009 and this provided for several enhancements to the original IEEE 802.3af specification. Some devices include powering IP telephones, wireless LAN access points, webcams, Ethernet hubs and switches. Exercise 5.1.3 Complete Table 5-1 by researching the various Ethernet standards and their associated properties. You can use your...

Words: 460 - Pages: 2

Premium Essay

Intro to Networking Lab 9.1

...NT1210 Lab 9 The Internet Chandra Ramsey February 29, 2016 Lab 9 The Internet 9.1.1 Broadband Internet The original dialup connections offered by telephone companies required complete use of the telephone cable to connect to the Internet (meaning that no calls could be placed or received during the Internet connection). Why is this inefficient for establishing a connection to the Internet? What was the limitation of the data rates available on this type of Internet connection? First you had to make sure that your call waiting feature was turned off so that there wouldn’t be any interruptions in the service. Because it was like using the telephone, your data rates were charged as long distance telephone calls by the minute. 9.1.2 The term broadband Internet generally refers to higher-speed and constantly available connections to the Internet. The term represents an evolution of Internet connectivity, but it originally referred to the type of media usage. Broadband and baseband are the two types of media usage available. Briefly define these terms and explain the difference between them. Broadband – The term broadband commonly refers to high-speed Internet access that is always on and faster than the traditional dial-up access. It also includes several high-speed transmission technologies such as Digital Subscriber Line (DSL) Cable Modem. Baseband – refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different frequency...

Words: 1408 - Pages: 6

Premium Essay

Nt1210 Intro to Networking 3.2

...NT1210 Lab 3.2. The OSI reference Model Exercise 3.2.1 Using Figure 3-1, define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or Internet research to support your answer. The Physical layer is something simple like wiring, fiber and network cards. Devices that allow communication between the OSI networks. Data link layer is the Ethernet, among other protocols; we're keeping this simple remember. The most important take-away from layer 2 is that you should understand what a bridge is. Switches, as they're called nowadays, are bridges. Network layer is an IP address because you're dealing with layer 3 and "packets" instead of layer 2's "frames." IP is part of layer 3, along with some routing protocols, and ARP (Address Resolution Protocol). Transport layer handles messaging units which is also called packets. When you're talking about specific protocols, like TCP, they're "segments" or "datagrams" in UDP. This layer is responsible for getting the entire message to keep track of fragmentation. Session layer is Network Basic Input/output System model allowing applications on separate computers to communicate over a local area network. The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets. Presentation uses Secure Sockets Layer which provides a secure connection between internet browsers and...

Words: 597 - Pages: 3

Free Essay

Chapter 4 Lab Intro to Networking

...Lab Chapter 4 4.1.1 Exercise: Standards are important for NIC, Connectors and Media, because of the Stability, Consistency, and Minimization of packet errors. 4.1.2 Exercise: Why is it so low when the capacity for transmission electricity on the copper wire is so high? Because, due to truncation on the transmission of voltage with an electric current. 4,1,3 Exercise: It’s used in the Healthcare facilities, because it’s more fire resistance. 4.1.4 Exercise: Category | Maximum Speed | Application | 1 | 10 Mbps | Telephone Cabling (POTS) | 2 | 4 Mbps | Token Ring | 3 | 10 Mbps | Ethernet | 4 | 20 Mbps | Token Ring | 5 | 100 Mbps | Fast Ethernet | 5e | 1 Gbps | Gigabit Ethernet | 6 | 2500 Mbps | Gigabit Ethernet | 6a | 10,000 Mbps | Gigabit Ethernet | 4.1.5 Exercise: 4.1.6 Exercise: * , The central layer comprises of a conducting material. This layer transmits the baseband video signal. * The dielectric layer surrounds the centre copper core. The function of the dielectric is to separate the inner conductor from the shield and provide physical support. * The next layer is the metallic shield, generally composed of braided copper. It has two main purposes: to protect the conductor from noise or other unwanted signals, referred to as ingress, and to retain the transmitted signal in the conductor. * The last layer is the outside insulation which encloses all the inner layers. This is called a jacket and is usually made from PVC...

Words: 358 - Pages: 2