Netw310 Week 1 Lab

In: Computers and Technology

Submitted By pingpongitore
Words 485
Pages 2
NETW310,
Lab #1, Examine the Physical Layer

Lab Report

Each answer is worth seven points.

Use a red colored font for you answers.

Place the answers below the questions.

1. There are three patterns outlined on the screen which one of these is identifying the noise floor?

Note: You are to give the PATTERN number (1 – 4), not state which panel or view it is shown in. Refer to the video named Recognizing the Noise Floor for this question.

The first pattern shows the noise floor

2. What is the approximate signal level of the noise floor?

Note: You are looking for the amplitude in dB. Refer to the video named Recognizing the Noise Floor for this question.

2.4GHz band noise floor is -95db, 5Ghz band noise floor is -100db

3. Of the 11 channels being displayed which ones have the lowest noise floor?

Note: The tapering area on the far right edge is due to the fact that 2.4 GHz signal ends at channel 11. Observe the area to the right of channel 1 and the left of channel 11. Refer to the video named Recognizing the Noise Floor for this question.

Channels 8-11 have the lowest noise floors

4. Inside the circle marked as Pattern 2 is this a signal from one of the three unlicensed frequency ranges?

Note: Refer to the video named Recognizing Unlicensed Bands Signals for this question.

Yes it is

5. If it is, what type of signal is this, 900 MHz, 2.4GHz, or 5 GHz?

Note: Refer to the video named Recognizing Unlicensed Bands Signals for this question.

2.4Ghz

6. Inside the circle marked as Pattern 3 is this a signal from one of the three unlicensed signal ranges?

Note: Pay attention to the signals shapes in the video. Refer to the video named Recognizing Unlicensed Bands Signals for this question.

Yes it is

7. If it is, what type of signal is this, 900 MHz, 2.4GHz, or 5 GHz?

Note: Refer to the video named…...

Similar Documents

Netw310 Week 1 Lab

...NETW310, Lab #1, Examine the Physical Layer Lab Report Each answer is worth seven points. Use a red colored font for you answers. Place the answers below the questions. 1. There are three patterns outlined on the screen which one of these is identifying the noise floor? Note: You are to give the PATTERN number (1 – 4), not state which panel or view it is shown in. Refer to the video named Recognizing the Noise Floor for this question. The first pattern shows the noise floor 2. What is the approximate signal level of the noise floor? Note: You are looking for the amplitude in dB. Refer to the video named Recognizing the Noise Floor for this question. 2.4GHz band noise floor is -95db, 5Ghz band noise floor is -100db 3. Of the 11 channels being displayed which ones have the lowest noise floor? Note: The tapering area on the far right edge is due to the fact that 2.4 GHz signal ends at channel 11. Observe the area to the right of channel 1 and the left of channel 11. Refer to the video named Recognizing the Noise Floor for this question. Channels 8-11 have the lowest noise floors 4. Inside the circle marked as Pattern 2 is this a signal from one of the three unlicensed frequency ranges? Note: Refer to the video named Recognizing Unlicensed Bands Signals for this question. Yes it is 5. If it is, what type of signal is this, 900 MHz, 2.4GHz, or 5 GHz? Note: Refer to the video named Recognizing Unlicensed Bands Signals for...

Words: 485 - Pages: 2

Week 1 Lab

...NETW420 ADVANCED NETWORK MANAGEMENT Title of the Lab School of Engineering and Information Sciences Instructor Name SUBMITTED BY: SUBMITTED ON: Table of Contents Objectives 3 Problem Definition 3 Background Theory 3 Methodology and Procedure 3 Observations, Data, Findings, and Results 4 Questions and Answers 4 Recommendations and Conclusions 4 Lessons Learned 4 Document Certification 4 Objectives * Write the purpose and usefulness of the lab experiment. * What are the main outcomes that will be addressed in this lab experiment? * For example, * This lab report investigates * network performance in a hub-based network; * the impact of quality of service (QoS) on VoIP and videoconferencing; and * the impact of intrusion prevention systems (IPS) on distributed denial of service (DDoS) attacks. Problem Definition * Discuss what you are trying to investigate. * Look at it this way: If there was nothing wrong, would you be performing this lab experiment? * What is not working right now that leads to the need of performing this lab experiment? * This will closely tie in with your recommendations later in the lab report. Background Theory * What networking theory is aligned with this lab experiment? * Perform a basic summary and analysis of the said theory, and explain how the theory will support the findings. Methodology and Procedure * For example, we use OpNet as a...

Words: 488 - Pages: 2

Netw208 Week 1 Lab

...NETW208 Week 1 iLab Report There are two sections to this iLab. * Section 1: Configuring a Dedicated VPN Using a Tunnel and Data Encryption vLab (20 points) * Section 2: Managing Remote Access Sessions vLab (20 points) Configuring a Dedicated VPN Using a Tunnel and Data Encryption vLab (20 points) Review the grading rubric below, and then complete the work for each step as indicated. Category | Points | Description | Section 1Configuring a Dedicated VPN Using a Tunnel and Data Encryption—20 points * Task 5: Step 3 * Related Explanation or Response * Task 10: Step 1 * Related Explanation or Response * Task 10: Step 2 * Related Explanation or Response * Task 10: Step 4 * Related Explanation or Response * Summary Paragraph | 121212128 | Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.In your own words, summarize what you have learned about configuring a dedicated VPN using a tunnel and data encryption. | Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab; what you learned by performing it; how it relates to this week’s TCOs and other course material; and, just as important, how you feel it will benefit you in your academic and professional career. (8 points...

Words: 938 - Pages: 4

Week 1 Lab Report

...NETW310 Week 1 Lab Report Edward Welsh NETW310, Kenneth Chipps 3/8/14 Lab #1, Examine the Physical Layer Lab Report Each answer is worth seven points. Use a red colored font for you answers. Place the answers below the questions. 1. There are three patterns outlined on the screen which one of these is identifying the noise floor? The first pattern identifies the noise floor. 2. What is the approximate signal level of the noise floor? The approximate signal level of the noise floor is -95db at 2.4 GHz and -100db at 5GHz. 3. Of the 11 channels being displayed which ones have the lowest noise floor? Channels 8-11 have the lowest noise floors 4. Inside the circle marked as Pattern 2 is this a signal from one of the three unlicensed fequency ranges? Yes, it is a signal from one of the three unlicensed frequency ranges. 5. If it is, what type of signal is this, 900 MHz, 2.4GHz, or 5 GHz? 2.4GHz 6. Inside the circle marked as Pattern 3 is this a signal from one of the three unlicensed signal ranges?  Yes, it is a signal from one of the three unlicensed frequency ranges. 7. If it is, what type of signal is this, 900 MHz, 2.4GHz, or 5 GHz? 900MHz 8. In the area marked as Pattern 4 some interference has appeared. What type of interference is this, such as all-channel, co-channel, adjacent-channel? The type of interference is the adjacent-channel interference. 9. On what channel has this interference appeared on? The interference has appeared......

Words: 314 - Pages: 2

Is404 Week 1 Lab

...Week 1 Lab Part 1 - Assessment Worksheet Assess the Impact on Access Controls for a Regulatory Case Study Overview Watch the Demo Lab in the Week 1 Learning Space Unit 1, and answer the questions below. The lab demonstrates creating an Active Directory domain as well as user and group objects within the new domain. Directories will be created and permissions assigned based on the required access control as defined in the matrix. Group Policy Objects will also be created and linked to Objects within the domain to enforce security settings. Lab Assessment Questions & Answers 1. What does DACL stand for and what does it mean? Discretionary access control List (DACL) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong 2. Why would you add permissions to a group instead of the individual? It is more resourceful and less time consuming. 3. List at least 3 different types of access control permissions available in Windows. Full Control, Modify, Execute, Read, Write 4. What are the least permissions that you need in order to view the contents of a folder? Read, so the user has access to any file on the system that they are entitled to, but they are not able to make any changes. 5. What are other available Password Policy options that could be enforce to improve security...

Words: 1093 - Pages: 5

Netw240 Week 1 Lab

...Name: DSI# Date | 11/03/13 | NETW240 Week 1 Lab Report: Installing Fedora Linux 20 points In the space provided below, write a minimum of five college-level sentences in your own words that describe your experiences with this lab assignment. Include an overview of the major tasks accomplished in this lab and any difficulties you encountered in the completion of this lab assignment. Installing the Fedora 13 seemed easy enough but did take a long time when it came to the part of loading everything. I followed the lab instruction that helped me accomplished this which wasn’t too bad to follow. I did wish it had the explanation of each step like the other labs because it helped me understand what I’m doing and given the reason I never dealt with Linux before. The overview of the whole installation started with the “disc” and running it, then from the initial I was able to customize a few things (language, date and time, storage drive, own password, partition, software package, etc.). Luckily I did not encounter any problem that I was not able to install it but instead it went smooth. Something I did notice different was the appearance and where the taskbar was located. Installing the Fedora 13 seemed easy enough but did take a long time when it came to the part of loading everything. I followed the lab instruction that helped me accomplished this which wasn’t too bad to follow. I did wish it had the explanation of each step like the other labs because it helped me......

Words: 367 - Pages: 2

Itt Week 1 Lab

...Charles M. Krout June 17, 2014 Week 1 Lab: Clear-Text Data in Packet Trace Learning Objectives and Outcomes * You will learn how to identify clear-text data in a packet trace. * You will become familiar with the NetWitness Investigator interface. Assignment Requirements You need a computer and Internet access to complete this assignment. You are newly hired as a technology associate in the information systems department at Corporation Techs in Dallas, Texas. Corporation Techs is an IT services organization supporting a number of clients in the Dallas/Fort Worth area. It’s a Wednesday, a dull day where you have nothing much exciting to do. Suddenly, you get a call from your manager. He appreciates the work you have been doing so far and thinks that you have the ability to take on more challenging work. To complete challenging tasks, you need to become familiar with the tools of the trade. So, you need to learn about a new packet analyzer called NetWitness Inspector. First, you must download and install the NetWitness Investigator software, and then open a demo trace file and find a clear-text password. You must also explore the tools on the toolbar in NetWitness Investigator to understand the options available. Perform the following steps: 1. Download and install the free version of NetWitness Investigator from the NetWitness Corporation Web site: http://www.netwitness.com/products/investigator.aspx 2. Register and activate the...

Words: 366 - Pages: 2

Networking Week 1 Lab Report

...iLab Grading Rubric Category | Points | Description | Section 1ElementK Tutorial, How to use vLabs Lab - 10 Points | 10 | After reading the reading the ElementK iLab Tutorial, answer the related questions. | Section 2Using Windows Applications as Network Tools - 15 Points * Task 1, Step 3 * Related explanation or response * Task 1, Step 7 * Related explanation or response * Task 1, Step 19 * Related explanation or response * Task 1, Step 22 * Related explanation or response * Summary Paragraph | .625.625.625.625.625.625.625.62510 | Required ScreenshotAnswer the question or provide the required observation when requested.In your own words, summarize what you have learned concerning network commands available within the Windows operating system. | Section 3Troubleshooting TCP/IP Problems Lab - 15 Points * Task 1, Step 1 * Related explanation or response * Task 2, Step 2 * Related explanation or response * Task 2, Step 3 * Related explanation or response * Task 3, Step 1 * Related explanation or response * Summary Paragraph | .625.625.625.625.625.625.625.62510 | Required ScreenshotAnswer the question or provide the required observation when requested.In your own words, summarize what you have learned about the Network Monitor. | Total | 40 | | ------------------------------------------------- Name: Date: Professor...

Words: 1280 - Pages: 6

Netw310 Week 5 Ilab

...NETW310, Professor’s Name Lab #5, Wireshark Introduction Lab Lab Report #5 1. Is Wireshark open-source or proprietary? Wireshark is an open-source network analyzer. Wireshark is free for anyone to use. 2. What is seen in each of the three panes that display the packets seen on a local area network? The List Pane shows the packets have been saved or captured. The Tree View shows the headers of the different protocols in the packet and allows the user to see a hierarchical view. Finally, The Byte view shows the raw data at a rate of 16 bytes per row. 3. What does a display filter do? The display filter allows you to pick and choose what packets are displayed in the List pane. 4. What does the protocol column show? The protocol column shows the highest layer protocol in the frame. 5. How do you expand the details in a layer of the packet in the middle frame? If you press the “+” part of a packet in the tree view, you can expand the display details and see more information. 6. Capture files have what file name extension? Captured files will have the file extension of “.pcap”. 7. The time column shows what? The time column shows the time starting at the first packet. By default, the packets are displayed in increasing order after the first one. 8. When you right click on something in one of the panes what happens? You get a context menu just like in windows and it will allow you more control over the info you want to see. 9. How......

Words: 318 - Pages: 2

Week 1 I Lab

.... Wildcards are used to specify a host, network, or part of a network. Used in specifying all IP addresses in 172.16.0.0/16 ntwork. 172.16.0.0 0.0.255.255. ------------------------------------------------- ------------------------------------------------- #7. A few days after configured the ACL in Dallas router, and verified no malicious packets from the Attach PC enters Dallas LAN, the IDS started detecting in the LAN similar malicious packets but coming from other computers in Attack PC’s subnet. 200.100.10.0/24. What modification does the ACL need to prevent entering Dallas LAN any TCP packets from any computer in the Attack PC’s subnet? ------------------------------------------------- A hidden permit command will deny all traffic that requires the hidden permit but doesn’t contain it in the packet. ------------------------------------------------- ------------------------------------------------- #8 . Explain what impact this ACL has on security for the Dallas Server? ------------------------------------------------- This will prevent malicious packets from slipping through security and into the network and PC stations. ------------------------------------------------- ------------------------------------------------- #9. Explain the impact on Dallas Server before the ACL has been applied. ------------------------------------------------- Prior to the permit command any packets could travel to the network virtually......

Words: 666 - Pages: 3

Week 1 Lab

...Category | Points | Description | Section 1Configuring Static and Default Routes - 30 Points * Task 4: Step 1 * Related Explanation or Response * Task 4: Step 2 * Related Explanation or Response * Task 5: Step 1 * Related Explanation or Response * Task 5: Step 1 * Related Explanation or Response * Summary Paragraph | 2323232310 | Paste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerPaste the requested screenshotProvide the requested answerIn your own words, summarize what you have learned about Configuring Static and Default Routes. | Total | 30 | | ------------------------------------------------- Name: jim smith Date: Professor: ------------------------------------------------- Configuring Static and Default Routes vLab (30 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCO’s and other course material; and just as important, how you feel it will benefit you in your academic and professional career. (10 points)This week we learned about the significance of an R or S next to a network entry. In class we learned basic cisco routing commands. We also learned about the different router modes and how to diagnose problems with the router setup...

Words: 502 - Pages: 3

Is4550 Week 1 Lab

...------------------------------------------------- Week 1 Laboratory Part 1: Craft an Organization-Wide Security Management Policy for Acceptable Use Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Define the scope of an acceptable use policy as it relates to the User Domain * Identify the key elements of acceptable use within an organization as part of an overall security management framework * Align an acceptable use policy with the organization’s goals for compliance * Mitigate the common risks and threats caused by users within the User Domain with the implementation of an acceptable use policy (AUP) * Draft an acceptable use policy (AUP) in accordance with the policy framework definition incorporating a policy statement, standards, procedures, and guidelines Part 1 – Craft an Organization-Wide Security Management Policy for Acceptable Use Worksheet Overview In this hands-on lab, you are to create an organization-wide acceptable use policy (AUP) that follows a recent compliance law for a mock organization. Here is your scenario: * Regional ABC Credit union/bank with multiple branches and locations thrrxampexoughout the region * Online banking and use of the Internet is a strength of your bank given limited human resources * The customer service department is the most critical business function/operation for the organization * The organization wants...

Words: 639 - Pages: 3

Cis 115 Week 1 Lab

...Week 1 iLab for Rebecca L Bean ------------------------------------------------- TCO 1: Given a simple problem, design and desk-check a solution that is expressed in terms of pseudocode, flowchart, and/or input-process-output (IPO) diagrams. iLab This exercise will cover the steps used to create a solution. You will use variable lists, IPO charts, pseudocode, flowcharts, and desk-checking. Rubric Point distribution for this activity: Lab Activity | Document | Points possible | Points received | Part 1 | 10 | | Part 2 | 10 | | Part 3 | 10 | | Part 4 | 10 | | Part 5 | 10 | | Total points | 50 | | Problem You have an idea for a restaurant tip calculator app that you want to develop for use on your mobile phone when you go out to eat. You can enter the amount of the check before taxes, the tax rate, and the tip percentage. It should display the amount before taxes, the dollar amount of the taxes, the dollar amount of the tip (calculated on amount before taxes), and the total amount including taxes and tip. (1) Variable List With Data Type List all the variables you will use (use valid variable names). Indicate whether the data type is string, integer, or decimal, and so on. CheckAmount, decimal TaxRate, decimal TipPercentage, decimal TaxAmount, decimal TipAmount, decimal TotalAmount, decimal (2) IPO Model List the inputs, any processes, calculations, and outputs. Use the same valid variable names you used in Step...

Words: 648 - Pages: 3

Week 4 Lab 1

...1. Unauthorized access to workstation. Unauthorized access to system, applications and data. Desktop or laptop computer operating system software vulnerabilities. Viruses, malicious code or malware infections. 2. Client-server and Web applications are susceptible to attack. Unauthorized accessed to systems. 3. Enable password protection on workstations for access. Enable auto screen lockout for inactive times. 4. Define strict access control policies, standards, procedures and guidelines. 5. Implement a second-level test to verify a user’s right to gain acces. 6.  Ensure back-ups are enforced and enable an automated antivirus protection solution that scans and updates individual workstaions with proper protection. 7. The Security Configuration and Analysis is a stand-alone snap-in tool that users can use to import one or more saved configurations to a private security database. Importing configurations builds a machine-specific security database that stores a composite configuration. You can apply this composite configuration to the computer and analyze the current system configuration against the stored composite configuration stored in the database. 8. Log on to a Windows 2000-based computer as a user with administrative privileges. To open the Group Policy console, click Start, click Run and type Gpedit.msc. Click OK. Click the + next to Computer Configuration, then Windows Settings, then Security Settings, and then Local Policies to expand...

Words: 468 - Pages: 2

Netw410 Week 1 Lab

...NETW410 Week 1 Lab Report Your Name NETW410 Professor Douglas Romans Current Date 1/10/2016 Lab #1, Introduction to Visio Lab Report: (70 points) Place the answers below the questions using a red-colored font. Answer in college-level sentences with proper grammar and spelling. Answer each part of the question for full credit. Question 1 (3 points) What is your experience with the Visio software? Have you used it before or is it your first experience with Visio? I do have some experience with Visio but it is extremely limited. At my internship my boss instructed me to make modifications of a Visio document that mapped out our entire building. That’s the extent of my Visio experience outside of installation. Question 2 (3 points) How did you access Visio? How do you feel about the different access methods? Luckily I already had Visio installed on my computer so I used the desktop application. Question 3 (3 points) What version of Visio did you use for this lab? As previously stated I have Visio installed on my computer, it’s Visio Professional 2013. Question 4 (3 points) What file extension does your version of Visio use? Does Visio support other extensions? My version of Visio saves in .vsdx file format. Question 5 (6 points: 3 points for each screenshot and comment) Use this website (http://www.ratemynetworkdiagram.com/index.php?z=1) to find a diagram that you think has good points. Paste a screen shot of the diagram in your lab...

Words: 826 - Pages: 4