Free Essay

Lab 4

In: Computers and Technology

Submitted By gps676
Words 611
Pages 3
NT1210
Lab 4.1 : Copper Cabling

Exercise 4.1.1
Stability, consistency, and minimization of packet errors.

Exercise 4.1.2
The power requirements to send data is much lower than the requirements to transfer electricity.

Exercise 4.1.3
Protection from power frequency, radio frequency interference, reducing errors generated.

Exercise 4.1.4
CategoryMaximum SpeedApplication
11MbpsVOICE ONLY( TELEPHONE WIRES)
24MbpsLOCAL TALK & TELEPHONE
316Mbps10 BASE T ETHERNET
420MbpsTOKEN RING
5100/1000100 BASE T ETHERNET/GIGABIT ETHERNET
5E1Gbps/1000mbpsGIGABIT ETHERNET
610GbpsGIGABIT ETHERNET/IP TELPHONY
6E10GbpsGAGBIT ETHERNET/HIG END WORK STATION

Exercise 4.1.5

Exercise 4.1.6
Coaxial cable conducts electrical signal using an inner conductor (usually a solid copper, stranded copper or copper plated steel wire) surrounded by an insulating layer and all enclosed by a shield, typically one to four layers of woven metallic braid and metallic tape. The cable is protected by an outer insulating jacket. Normally, the shield is kept at ground potential and a voltage is applied to the center conductor to carry electrical signals.

Exercise 4.1.7
The distance limit is 100m for UTP cabling. It is very important that you know exactly how to wire UTP cables. Cabling is the base of a solid network, and doing it correctly the first time will help you avoid hours of frustration and troubleshooting. On the other hand, if you are dealing with a poorly cabled network, this knowledge will help you to find the problem and fix it more efficiently.

Exercise 4.1.8
Cross over cable is used to connect two similar devices 2 computers. The straight cable is used to connect two dissimilar devices computer and switch.

Exercise 4.1.9
S1 and S2 will require a crossover cable.

Exercise 4.1.10
Multimeter – is an electronic device used to measure voltage, current and resistance. (Wal-Mart $17.00.)
Tone Generator – signal generator used to generate an audible frequency signal. (Home Depot $39.00.)
Pair Scanner – Used to test Ethernet cable. (Ebay $100 - $300.)
Time Domain Reflectometer – used to characterize and locate faults in metallic cables. (Zorotools $800.) Lab 4.1 Review
1. To eliminate the crossover issue, lower the amount of equipment and cost. Simplify a network.
2. To increase the maximum distance for a signal. If put after the maximum distance the signal may degrade.
3. The connection and processing speed. It also depends on the number of connections the computer or laptop will allow.

Exercise 4.2.1

There are two common types of fiber optic cables used: Single and multimode. Single mode cable uses one strand of glass fiber. Single mode cabling is used with multi-frequency data transmission and gives a faster speed then multimode. However single mode cable is more expensive. Multimode fiber optic cabling uses two fibers for transmission and reaches speeds of Megabits per second up to Gigabits per second. They are used for medium distances no further than a few kilometers.

Exercise 4.2.1

Copper wire transmits electrical current that would require a large amount of energy to transmit and receive data over distances while fiber optic technology transmits pulses of light generated by a light emitting diode or laser along optical fibers.

Exercise 4.2.3
Because it’s a smaller area for the light to travel down.

Lab Review: 4.2
1. A. Bend Radius: The minimum radius that a fiber optic cable can be bent without loss of light or impairment. A general rule that it be no less than 15 times the cable diameter B. To not affect a signal sent down the line.
2. The core/Glass Filament, Cladding, Buffer, Strengthener and Outer Jacket.

Exercise 4.3.1

Similar Documents

Premium Essay

Lab 4

...Lab 4 Daniel Torres NT1410 Mr. Kay 1/28/2016 Virtual Lab Tour The first difference I did take notice was the entirely different look that it brought up. With Windows 10, we have the start menu, which in my case, is a reason I love Windows and its OS. Ubuntu doesn’t have one, but it is still manageable. The office applications it comes with is pre-installed and works just as fine as it would with Windows. Spreadsheets to Word, it is all in there with no hassle. The office suite that really makes the difference in both configurations is the look and feel. With icons being changed and a different feel about it. The windows landscape of it changing the closing current window bugs me because it is on the left rather than the normal right I am used to. Although Ubuntu office software is limited and only most used applications for that suite would be used on everyday uses, it doesn’t compare to that of Windows 10. The dash home environment from Ubuntu brings up limited content that you would use immediately, but not the essentials in Windows 10. I would like to implement the Start Menu to Ubuntu as many users in the Windows 8 community did not like the fact that Microsoft took the number one feature out. The installation of Ubuntu differed on the fact that it took quite some time to install and the student next to me had a problem himself though. It sent him into terminal rather than the GUI interface of the desktop. I had no issues on my part, other than......

Words: 278 - Pages: 2

Premium Essay

Lab 4

...Sandra Guzman 01/22/2015 Lab 4 Deliverables Note: Screenshots will be provided at the end. Q: From your local computer, use your favorite Internet browser to research the threat identified on this screen and the possible remediation steps and document your findings in your Lab Report file. Viruses found: 1. Win32/DH{eR4UTxVzG3U} 2. Win32/DH{eR4UTxVzG3U} 3. Win32/DH{HhMXFE8Vcxt1} 4. Trojan horse Dropper.Generic4.BVMA 5. Trojan horse Hider.BNG 6. Trojan horse PSW.Generic11.NYJ 7. Potentially harmful program Logger.IAC 8. Potentially harmful program RemoteAdmin.IH 9. Potentially harmful program Tool.IT Assessment: 1. It seems that the first three are all the same type of virus. A “Win/DH is a malicious software that once it is executed has the capability of replicating itself and infect other files and programs”( Win/DH). They “can steal hard disk space and memory that slows down or completely halts your PC, corrupt or delete data, erase your hard drive, steal personal information, hijack your screen and spam your contacts to spread itself to other users” (Win/DH). To avoid the possibility of one, you should be careful of e-mail attachments especially if they are from an outside source, as well as download links on websites. Having a virus removing application such as AVG is essential to being able to remove these viruses before they spread. AVG is capable of detecting this virus while surfing the web and...

Words: 1494 - Pages: 6

Premium Essay

Lab 4

...Lab 1 – Introduction to Science Exercise 1: The Scientific Method Dissolved oxygen is oxygen that is trapped in a fluid, such as water. Since many living organisms require oxygen to survive, it is a necessary component of water systems such as streams, lakes, and rivers in order to support aquatic life. The dissolved oxygen is measured in units of parts per million (ppm). Examine the data in Table 4 showing the amount of dissolved oxygen present and the number of fish observed in the body of water the sample was taken from and then answer the questions below. QUESTIONS 1. Make an observation – Based on the data in Table 4, describe the relationship between dissolved oxygen content and fish populations in the body of water. Discuss the pattern observed in the data set. Answer = as the Dissolved Oxygen goes up the greater the survival rate is for the fishes. The pattern for the Dissolved Oxygen goes up by two’s and the number of fish has a unique pattern when matched with the dissolved oxygen. Pattern (2, 4 ppm)…..the fishes decrease by one. (6, 8 ppm)……the fishes increase by 4 (10, 12 ppm)…the fishes increase by 3 (14, 16 ppm)….the fishes decreases by 4 18 ppm…..the fishes decreases by 5 2. Do background research – Utilizing at least one scholarly source, describe how variations in dissolved oxygen content in a body of water can affect fish populations. Answer = According to research the dissolved...

Words: 888 - Pages: 4

Free Essay

Lab 4

...Willie Harris ------------------------------------------------- is3230 lab 4.2 Implement Organizational-Wide Network and WLAN Access Controls 1. Each time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to othersEach time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to others. 2. 2. By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. First if you’re sitting in a coffee shop and decide you want to check your Facebook page and your email to kill some time. You scan the available networks and see one that’s open and unsecured. You connect and start surfing. Coffee and free WiFi, what could be better, right? Wrong! A hacker is also fond of coffee shops and he is located within range of the router you connected to. He’s waiting for one or more people to connect to the network so he can start......

Words: 628 - Pages: 3

Premium Essay

Sql Lab 4

...MET CS 669 Database Design and Implementation for Business SQL Lab 4 Instructions: Procedural......

Words: 6758 - Pages: 28

Premium Essay

Lab 4 Doc.

...Lab #4 – Assessment Worksheet Configure Group Policy Objects and Microsoft Baseline Security Analyzer (MBSA) Course Name & Number: NT2580 Student Name: Bryan Villa Instructor Name: Mr. Kravitz Lab Due Date: May 17, 2013 Lab #3 Assessment Questions & Answers 1. Define why change control management is relevant to security operations in an organization? Allows for testing and documentation of changes before they sent to management for review and implementation. 2. What type of access control system uses security labels? Logical/MAC 3. Describe two options you would enable in a Window’s Domain password policy? -Password must meet requirements -30 minute lockout after 3 failed attempts to get login correct 4. Where would patch management and software updates fail under security operations management? They must ensure the patches and updates don’t affect other programs or even leave weak spots in a systems security. 5. Is there a setting in your GPO to specify how many login attempts will lockout an account? Name 2 parameters that you can set to enhance the access control to the system. Yes a. Password must meet the requirements b. Minimum password length 6. What are some Password Policy parameters that you can define for GPOs that can enhance the C-I-A for system access? c. Enforce password history d. Minimum password age e. Maximum password age f. Password must meet complexity requirements 7. What...

Words: 326 - Pages: 2

Premium Essay

Biology Lab 4 Umuc

...Your Full Name: UMUC Biology 102/103 Lab 4: Enzymes INSTRUCTIONS: * On your own and without assistance, complete this Lab 4 Answer Sheet electronically and submit it via the Assignments Folder by the date listed in the Course Schedule (under Syllabus). * To conduct your laboratory exercises, use the Laboratory Manual located under Course Content. Read the introduction and the directions for each exercise/experiment carefully before completing the exercises/experiments and answering the questions. * Save your Lab 4 Answer Sheet in the following format: LastName_Lab4 (e.g., Smith_Lab4). * You should submit your document as a Word (.doc or .docx) or Rich Text Format (.rtf) file for best compatibility. Pre-Lab Questions 1. How could you test to see if an enzyme was completely saturated during an experiment? - Add more substrate and record the rate. If the rate of the reaction is constant, all the enzymes are saturated. 2. List three conditions that would alter the activity of an enzyme. Be specific with your explanation. * Temperature – Cold temperature will cause the enzyme to work slow, hot temperature will cause the enzyme to increase the movement making it less stable. * PH – Difference in range in the PH scale can alter the shape of the enzyme’s active site * Concentration Of Substrate – Less or more of enzymes to substrates ratio will affect the rate of collisions between the two affecting the number of reactions. ...

Words: 1006 - Pages: 5

Premium Essay

Lab 4 Nat

...Lab 4 NAT Joel Garcia Cgs 4285 Contents Objective: 3 Procedures: 3 Experience: 3 Conclusion: 4 Data Table Error! Bookmark not defined. Questions 5 Objective: The objective of this lab is to configure DNS client settings, for Linux and Windows Stations, to observe DNS in action, and to observe NAT in action. Procedures: 1. First, verify that workstation 1 and workstation 2 have the correct IP addresses and default route. 2. Configure DNS servers for workstation 1 and workstation 2. After, configure workstation 2 to use 131.94.131.43 as a DNS resolver by entering the command: echo “nameserver 131.94.133.43” > /etc/resolv.conf. Afterwards, configure workstation 1by going to TCP/IP Properties and adding 131.94.133.43 as the DNS server. 3. Next, find the public IP address of the eth0 interface on the monitor workstation by using the ifconfig command. As a root on the monitor, input: tcpdump -i eth0 -n -s 0 -w /tmp/public.pcap host PUBLICIPADDRESS & tcpdump -i eth1 -n -s 0 -w /tmp/private-net1.pcap & tcpdump -i eth2 -n -s 0 -w /tmp/private-net2.pcap & 4. Then, connect to port 7 and source port 2000 on workstation 1 with the command: nc -p 2000 cgs4285.cs.fiu.edu 7 Type in three or four lines of random data and repeat the same process for workstation 2. Enter “ctrl+c” afterwards to stop the process on workstation 1 and 2. 5. On the monitor......

Words: 932 - Pages: 4

Free Essay

Week 4 Lab

...Lab 4 – Energy Sources and Alternative Energy Experiment 1: The Effects of Coal Mining |Table 1: pH of Water Samples | |Water Sample |Initial pH |Final pH (after 48 hours) | |Pyrite |6 |7 | |Activated Carbon |6 |6 | |Water |6 |6 | POST LAB QUESTIONS 1. Develop hypotheses predicting the effect of pyrite and coal (activated carbon) on the acidity of water? a. Pyrite hypothesis = If pyrite is in the water source, then it will make the specimen more acidic b. Coal (activated carbon) hypothesis = If coal is in the water source, then it will make the specimen less acidic 2. Based on the results of your experiment, would you reject or accept each hypothesis that you produced in question 1? Explain how you determined this. a. Pyrite hypothesis accept/reject = Rejected, The hypothesis “If pyrite is in the water source, then it will make...

Words: 1163 - Pages: 5

Premium Essay

Jbl Lab #4

...Lab #4 – Assessment Worksheet Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control Course Name and Number: _____CIST 20700_________________________________________ Student Name: ____________Karen Dudley ________________________________________ Overview There are many tools and suites designed to aid the security practitioner and the organization in implementing and managing change management. In this lab, you explored two such tools for the Windows platform: Group Policy Objects (built into the Windows operating systems) and the Microsoft Security Baseline Analyzer (provided free of charge). You used Group Policy Objects to strengthen the organization’s password policy by adding complexity and minimum password length requirements. You scanned the Windows server with the Microsoft Baseline Security Analyzer (MBSA) to assess its security state, and you examined the results of the Microsoft Baseline Security Analyzer in detail. Lab Assessment Questions & Answers 1. Name six (6) policies you could enable in a Windows Domain. Enforce password history Maximum password age Minimum password age Minimum password length Store password using reversible encryption Password must meet complexity requirements 2. What is the minimum password length enforced by the “Password must meet complexity requirements” policy? 8 characters 3. What sources could you use as a source to perform the MBSA security scan? Computer by Name or......

Words: 298 - Pages: 2

Premium Essay

Lab #4 – Assessment Worksheet

...Lab #4 – Assessment Worksheet Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation IS4650 Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you performed all five phases of ethical hacking: reconnaissance (using Zenmap GUI for Nmap), scanning (using OpenVAS), enumeration (exploring the vulnerabilities identified by OpenVAS), compromise (attack and exploit the known vulnerabilities) using the Metasploit Framework application), and conducted post-attack activities by recommending specific countermeasures for remediating the vulnerabilities and eliminating the possible exploits. Lab Assessment Questions & Answers 1. What are the five steps of ethical hacking? reconnaissance, scanning,enumeration, compromise, post-attack activities: recommended countermeasures for remediation. 2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports? There were several Ports, I will list onl a few POrts, 21,3306,22,53,445,111,25, all running TCP: the services running were Linux telneted, smtp Postfix, Apache Tomcat/Coyote JSP 3. What step in the hacking attack process uses......

Words: 285 - Pages: 2

Free Essay

Digital Forensics Lab 4

...CCSI 410 Forensic Lab Report 1) Investigator’s Name: 2) Date of Investigation: August 2, 2014 3) Lab Number and Title: Lab 4 Keyword Searches 4) Summary of Findings: I did the steps required to fulfill my report. I found there is enough evidence to continue the investigation due to the search results. 5) Details of Investigation 1. 11.45 pm – Turned on suspect computer 2. 11: 47 pm – Entered lab environment 3. 11: 49 pm – Determined keyword list 4. 11:59 pm – Added the floppy image 5. Augest 3rd 12:05 am – Added keywords to the search utility 6. 12:09 am – Initial look at .emi files and addressbook.csv complete 7. 12:11 am – Search using keywords 8. 12:15 am – Completed report 6) Please type the answers to the questions found throughout the lab here. 1. Bid rigging is well rigging a bid so that a certain firm will win the bid. http://www.ftc.gov/tips-advice/competition-guidance/guide-antitrust-laws/dealings-competitors/bid-rigging Bid Rotation is when bidding is predetermined which firm is going to win and the other firms involved in the process get something out of it as well so basically a win-win situation for all involved parties. Bid suppression is where firms can enter the bid but choose to not do so in order to let another firm win. Bid cover is when the firms making the bid knows their bid will be rejected so that another firm will the bid. 2. There are many words and......

Words: 579 - Pages: 3

Free Essay

Nt1210 Lab 4

...Lab 4 NT1210 Cristian Randle Lab 4.1: Copper Cabling 4.1.1: So that NIC’s on different ISP providers can communicate to each other. 4.1.2: The copper wiring is used to power appliances and other devices so it has a high capacity for transmitting electricity. 4.1.3: More expensive shielded cables cause far less interference. Steel reinforced concrete, radio transmitters. 4.1.4: Category | Maximum Speed | Application | 1 | 1 Mbps | Telephone cabling (POTS) | 2 | 4 Mbps | Token Ring | 3 | 10 Mbps | Token Rink | 4 | 16 Mbps | Token Ring Networks | 5 | 100 Mbps | Ethernet, Fast Ethernet, Token Ring | 5e | 1Gbps | Ethernet, Fast Ethernet, Gigabit Ethernet | 6 | 10 Gbps | GigabitEthernet, 10G Ethernet | 6a | 10 Gbps | GigabitEthernet, 10G Ethernet | 4.1.5: 4.1.6: Plastic jacket, metallic shield, dielectric insulator and center core. 4.1.7: Only good under 100 meters 4.1.8: Both straight and crossover cables 4.1.9: S2 to G is too far away to work. Fiber optics would be needed. 4.1.10: Multi-meter: It can be used to locate the failure of electrical system and the defective parts. Tone generator: It acts as a testing device for informational signals that come handy when dealing with telephone systems. Pair Scanner: Identifies connection hosts on a subnet. Time Domain Reflectometer: Locate and identify faults in all types of metallic cables Lab 4.1 review: 1. Less confusion, need only one type of cable easier to install, less time......

Words: 739 - Pages: 3

Free Essay

Unit 4 Labs

...Unit 4 Labs Introduction to Programming Mr. Nguyen Lab 4.1 – Pseudocode and Modules Module main ( ) //Declare local variables 1. Declare String clientName 2. Declare Real feetUTP 3. Declare Real subtotal 4. Declare Real taxCost 5. Declare Real totalCost //Module calls 6. Module inputData ( ) 7. Module calcCosts ( ) 8. Module displayBill ( ) End Module //this module takes in the required user input There will //be a display and input for each variable Module inputData (Real Ref feetUTP, String Ref clientName) 9. Display “What is your name? “ 10. Input clientName 11. Display “How many feet of UTP do you need? “ 12. Input feetUTP End Module //this module calculates subTotal, taxCost, and totalCost //you also need feetUTP passed in to calculate subTotal Module calcCosts (13. subTotal, taxCost, and totalCost) 14. subTotal = feetUTP * 0.21 15. taxCost = 0.06 * subTotal 16. totalCost = taxCost + subTotal End Module //this module displays clientName and totalCost Module displayBill (17. clientName, and totalCost) ` 18. Display “clientName” 19. Display “totalCost” Lab 4.2 - Flowcharts and Modules Lab 4.3 – Visual Basic and Modules Module Module1 Sub Main() Dim clientName As String = "NO VALUE" Dim feetUTP As Double = 0 Dim subTotal As Double = 0 Dim taxCost As Double = 0 Dim totalCost As Double = 0 ......

Words: 491 - Pages: 2

Free Essay

Tb 143 Lab 4

...Lab 4: Identify Motherboard Components and Form Factors Motherboard 1 1. The purpose of the LGA 1156 Connector is to connect the CPU to the motherboard. The following processors can be connected to it: Intel Celeron Dual-Core 2.27GHz Intel Core i3 2.93GHz - 3.33GHz Intel Core i5 2.4GHz – 3.6GHz Intel Core i7 2.53GHz – 3.06GHz Intel Pentium Dual-Core 2.8GHz – 2.93GHz Intel Xeon 3400 Series 1.86GHz – 3.06GHz 2. The purpose of the Intel H55 chipset is to provide an interface for the PCI express lanes on the motherboard. The following processors are used with it: Intel Core i7 Intel Core i5 Intel Core i3 Intel Pentium Dual-Core 3. The Gigabyte GA-H55M-UD2H motherboard can support six devices which can be fully operational without the need for drivers to be installed as well as an easy BIOS setting for GPU overclocking. Lab 4: Identify Motherboard Components and Form Factors Motherboard 2 1. The purpose of the AMD 770 Northbridge Chipset is to link the hardware to the computer’s processor. The following processors are used with it: AMD Athlon 64/FX/X2 Athlon II Athlon II X2 FX-Series Opteron 3200 Series Opteron 3300 Series Phenom Phenom II 2nd Gen. Opteron Sempron Sempron X2 2. The purpose of the AMD SB710 Southbridge Chipset is to optimize power......

Words: 297 - Pages: 2