Premium Essay

Nt1310 Unit 3 Assignment 1 Individual Report

Submitted By
Words 1442
Pages 6
Individual Report
1.
A. 158.175.160.0 is assigned to my group, it is a class B of network address. Based on the IP address that have assigned to my group (158.175.160.0) which is a class B IP address, the first pair of octet is for network and the second pair of octet if for the hosts. The number of octets in the network is defined by 214 which means there are total 16384 number of network and for the number of octets in the host is defined by 216 which means there are total 65536 number of hosts. Classful addressing is a system that classified them into 5 classes which is A, B, C, D and E. the most frequently used address is class A, B, and C. For the class D it is for the purpose of Multicast and it is very rare in use, and for class E is …show more content…
Wired local network is a network that pass data using the physical medium which can be a copper wire, twisted pair or fibre optic. While wireless network is a network that pass data using the electromagnetic waves and all the wireless nodes will have their own antenna. The system bandwidth for the wired network is high compare to the wireless network as the frequency spectrum of the electromagnetic waves is very insufficient resource. This sometimes will cause some unstable connection for the network so it is not recommended to use it for a heavy or large local area network. The cost to set up a wired network is lower compare to wireless network as the cable are affordable compare to wireless routers and wireless access points and adapters. The installation for the wired network will have some difficulties and time consuming as time is required to make some cable management whereas wireless network installation is easy and it required less time as it is only required to install some wireless router or access points then let the electromagnetic waves to do the job. The wired local network mobility is limited because it only operate in an area that are covered by the connected system with the wired network. In the other hand the wireless local network is not limited as it can operate in the entire wireless network coverage. On the network coverage extension, for the wired local network it requires hubs and switches for network coverage limit extension. The wireless local …show more content…
The differences between IPv4 and IPv6 are IPv4 addresses are in the form of 32-bit length whereas IPv6 addresses are in the form of 128-bit form. Besides that IPv4 addresses are in the form of binary number which show in decimals form and for IPv6 they are also in binary numbers but it represented in hexadecimals form. For the internet protocol security IPv6 are with build in support while the support of internet protocol security for IPv4 is optional. On the fragmentation side, IPv4 fragmentation is done by the routers and the sender whereas the fragmentation for IPv6 is done by the sender only. On the packet flow identification, IPv4 does not support packet flow identification whereas IPv6 packet flow identification is supported by using the flow label field. IPv4 support checksum while IPv6 does not support checksum. IPv4 uses Address Resolution Protocol to map the IPv4 addresses to MAC address while IPv6 does not uses Address Resolution Protocol, it uses a function which is called Neighbor Discovery Protocol. IPv4 support broadcast messages wheres IPv6 does not support broadcast messages, IPv6 uses multicast IPv6 address for broadcast with it have the same function with IPv4 broadcast messages function. IPv4 addresses requires manual configuration by using IPv4 addresses or using dynamic configuration DHCP whereas IPv6 it does not require manual configuration it will have auto configuration. (Omnisecu.com, 2017). IPv6 does not support the broadcast address because

Similar Documents

Premium Essay

Telecommunications

...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...

Words: 496 - Pages: 2

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10