Free Essay

Unit 5 Lab 5.1-5.4

In: Computers and Technology

Submitted By tamaram15
Words 1936
Pages 8
Unit 5. LAB 5 Ethernet LANs
LAB 5.1: LAN Standard
Exercise 5.1.1
Briefly define the 802.1 standard: Keeper of the LAN architecture – IEEE standard 802. Describes the 802 family of standards. Describes the LAN Architecture. Defines some useful things, such as the LAN address format, the SNAP protocol, the Playpen Ethertypes, and the OID registration arcs. The higher Layer Interface working group in 802. Defines the bridging and security glue that interconnects the LANs define by the 802 MAC groups.
Exercise 5.1.2
What 802.3 standard originally define PoE functionality? When was the standard enhanced, and what was the new standard name given for the enhancement? The standard that originally defines PoE functionality was the IEEE 802.3af. The new standard is known as IEEE 802.3at it, and it was enhanced in 2012.

Exercise 5.1.3 Complete Table Standard | Cabling | Maximum Length | 10BASE5 | Coaxial(Thicknet) | 500m | 10BASE2 | Coaxial (Thinnet) | 185m | 10BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | 100BASE-FX | Multi-mode fiber optic cable (SC or ST) | 400m | 100BASE-T | UTP (Cat3, 5, 5e, 6) | 100m | 100BASE-T4 | STP Twisted Cable | 100m | 100BASE-TX | Single-mode fiber optic cable | 20km | 1000BASE-LX | SMF and MMF | 550m | 1000BASE-SX | MM fiber-optic | 220m or 550m (dependent upon fiber thickness | 1000BASE-ZX | MM fiber-optic | 550m | 1000BASE-T | UTP (Cat3, 5, 5e, 6) | 100m |

Exercise 5.1.4
What does the numeric prefix before BASE in the Ethernet standards define? What does the inclusion of a postfix of – T imply? The numeric prefix means the number of Mbps transmission speeds the Ethernet standard supports. T implies twisted pair.

LAB 5.2: MAC and IP Addresses
Exercise 5.2.1
Why must a MAC address have unique for every NIC produced? What effect will it have on the network if two devices from two different manufactures share the last 24-bits of their MAC addresses? Like your mailing address at home, your computer's NIC has a unique address. This address must be unique in the entire world. Otherwise, network traffic couldn't find its way to the right computer.
Exercise 5.2.2
What information about the network connection is given on the Support tab of the status window?
The IP address information, subnet mask, and default gateway.
Exercise 5.2.3
What is the physical address (MAC address) of the NIC (or network adapter) for this connection?
Physical Address: 20-7C-8F-1F-DC-68
Exercise 5.2.4
Who is the manufacturer for your NIC? What information is given about the manufacturer?
Here are the results of your search through the public section of the IEEE Standards OUI database report for 20-7C-8F:

20-7C-8F (hex) Quanta Microsystems,Inc. 207C8F (base 16) Quanta Microsystems,Inc. No.5 Lane 91,Dongmei Rd. Hsinchu 300 TAIWAN, PROVINCE OF CHINA Exercise 5.2.5 What is the IP address of your NIC or network adapter? What is the IP address listed for your default gateway? IP address:; Default Gateway: Exercise 5.2.6 What steps are involved and how is each message sent (broadcast to all devices or unicast to single device? Step 1: When a source device wants to communicate with another device, source device checks its Address Resolution Protocol (ARP) cache to find it already has a resolved MAC address of the destination device. If it is there, it will use that address for communication. To view your Local Address Resolution Protocol (ARP) cache, Open Command Prompt and type command "arp -a" (Without double quotes using Windows Operating Systems).
Step 2: If ARP resolution is not there in local cache, the source machine will generate an Address Resolution Protocol (ARP) request message, it puts its own data link layer address as the Sender Hardware Address and its own IP address as the Sender Protocol Address. It fills the destination IP address as the Target Protocol Address. The Target Hardware Address will be left blank, since the machine is trying to find that.
Step 3: The source broadcast the Address Resolution Protocol (ARP) request message to the local network.
Step 4: The message is received by each device on the LAN since it is a broadcast. Each device compare the Target Protocol Address (IP Address of the machine to which the source is trying to communicate) with its own Protocol Address (IP Address). Those who do not match will drop the packet without any action.
Step 5: When the targeted device checks the Target Protocol Address, it will find a match and will generate an Address Resolution Protocol (ARP) reply message. It takes the Sender Hardware Address and the Sender Protocol Address fields from the Address Resolution Protocol (ARP) request message and uses these values for the Targeted Hardware Address and Targeted Protocol Address of the reply message.
Step 6: The destination device will update its Address Resolution Protocol (ARP) cache, since it need to contact the sender machine soon.
Step 7: Destination device send the Address Resolution Protocol (ARP) reply message and it will not be a broadcast, but a unicast.
Step 8: The source machine will process the Address Resolution Protocol (ARP) reply from destination, it store the Sender Hardware Address as the layer 2 address of the destination.
Step 9: The source machine will update its Address Resolution Protocol (ARP) cache with the Sender Hardware Address and Sender Protocol Address it received from the Address Resolution Protocol (ARP) reply message.
Exercise 5.2.7
Exercise 5.2.8
Run the command arp –a again to see the effect it has on the table. What is the IP address that is added? What is the MAC address that was added? Use the –s argument to add a new address to the table to match IP address to the MAC Address 00-AA-00-11-11-11. What command did you use to add the address pair? What is displayed as the type for these pairs?
IP address:; MAC Address: 7c-b2-1b-2d-8e-32arp. Arp –s is the command use to add the address pair.

Exercise 5.2.9
Use the arp –a command to verify that the entry is removed. What command will you use to remove the pairing to MAC address 00-AA-00-11-11-11 that you entered as astatic pair in the table?
-d: deletes the host specific by inter_addr.
LAB 5.3: Finding Network Settings
Exercise 5.3.1
What information is displayed as a result?

Are the entries the same for the IP address and for the default gateway? Yes they are the same.
Exercise 5.3.2
What address is returned as the IP address of localhost? How many times is the ping message sent by default? IP address: The ping message was send 4 times.
Exercise 5.3.3
Ping How much time (in time=part of the output) did it take for the ping to response to come back to the local machine? If there were different values, report the average response time.
At first the request was timed out three times. Packets send 4, packets received 0, lost packets 4. It took 2ms, average time 1ms.
Execute the following command from the command –line interface:
How much time (on average) did it take to get a response from the host? How does this compare to the time it took to get a response from the default gateway? Choose another web address and send a ping command to it. Did the ping command get a response? If so, how long did it take (on average)? What makes a difference in the timing of these messages?
It took on average of 212ms to get a response. It took the default gateway an average of 1ms.
It took on average of 284ms. The reason why some web address takes longer to send a response is how devices they have to go through to get to their destination. Yahoo may be further than Google.
Exercise 5.3.4
Ping –a What is the name of the host for the default gateway? Use this argument to ping localhost. What name does it return? I didn’t get any name for the default gateway. The name return was the localhost computer’s name.
Exercise 5.3.5
Ping –n 6 What is the benefit of being able to send a set of number of ping messages to a host? Pings the local host, this will allow you to see if the computer is able to send information out and receive the information back. Note that this does not send information over a network but may allow you to see if the card is being seen.
Exercise 5.3.6
Tracert How many devices are returned in the path between your machine and the default gateway? 14 devices
Now you will use the tracert command to access to different web host and compare devices returned in the path. Tracert
Host went through 18 devices to get to the local host, while host went through 14 devices to get to the local host. Which the distance between the local host and google is furhter than the distance between yahoo and the local host.
Exercise 5.3.7
Run nestat command (without any arguments) on your machine from the command-line interface. How many active connections are returned? What protocols are in use? TCP protocol.
Open a web browser such as Internet Explorer and enter a destination web address in the address bar. When this page has loaded, run netstat command from the commna-line interface again. How many connections are returned this time? Where did these connections originate?
Netstat will provide all established connections for both network and domain sockets. That means we’ll see not only the connections that are actually working over the network, but also the interprocess communications (which, from a security monitoring standpoint, are not useful). So in the command just illustrated, we have asked netstat to show us all ports (-a)—whether they are listening or actually connected—for TCP (-t) and UDP (-u).
LAB 5.4: Basic Network Troubleshooting
Exercise 5.4.1
What command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. The ping command to get this information. Ping –a and Ping –n.
Exercise 5.4.2
What is the best command to determine whether all the hosts on the local-area network are reachable?
Ping host and then ipconfig/all
Exercise 5.4.3
If your computer is unable to reach the internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping command and tracert command.
Exercise 5.4.4
If your local machine is not connecting to any other host on the network, what two command will give you information on whether your network device is active and the current configuration of your NIC or adapter? Net Stat is a tool that tells you what your machine is connected to at the moment the command is run. This makes it a very useful tool to see if your machine is connecting to servers that you don't know about.

Similar Documents

Premium Essay

Nt1230 Lab 5

...LAB 5 WORKSHEET WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC) Exercise 5.1 Installing Internet Information Server Overview Because this is only a test deployment, you will be using a Windows 7 computer to function as the web server. In Exercise 5.1 you install Internet Information Services on your workstation and configure it to host two web sites. Completion time 10 minutes 19. Take a screen shot of the Internet Information Services (IIS) Manager console, showing the new site you created, by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. Exercise 5.2 Testing IIS Connectivity Overview In Exercise 5.2, you test the functionality of the web server you just installed. Completion time 20 minutes Question 1 What is the result, and what does the result indicate? The result displays IIS7 welcome page it indicates the the web browser connects to the IIS page created earlier Question 2 What is the result, and what does it indicate? Same result as previous question it indicates that this is a local intranet page and not an internet page Question 3 What is the result? Screen stating web page not found Question 4 What is the result? Same result as before Question 5 List three possible reasons......

Words: 1208 - Pages: 5

Free Essay

Lab 5

...Lab 5.1 The Condition | True or False | attAverage >= verizonAverage | True | tmobileAverage == 868 | True | verizonAverage < sprintAverage | False | sprintAverage != attAverage | True | Lab 5.2 The Condition | Expected Output | If tmobileAverage > 800 AND verizonAverage> 800 ThenDisplay “Both have average downloadrates over 800”ElseDisplay “One or both of the averagesare less”End If | Both average download Rates over 800 | If sprintAverage == 800 ThenDisplay “Sprints download rate is 800”End If | No display | If attAverage >= 1300 OR tmobileAverage>=900Display “Select either carrier”End If | Select either carrier | Lab 5.3 Main Module() //Declare variables on the next 3 lines Declare Integer testScore = 0 Declare String category = “ “ Declare String interview = “ “ //Make Module calls and pass necessary variables on the next 4 lines Call getScore(testScore) Call employCat(testScore, category) Call interviewPoss(testScore, interview) Call displayInfo(testScore, category, interview) End Main Module getScore(Integer Ref testScore) //Ask user to test score Display “Please enter test score” Input testScore End Module Module employCat(Integer testScore, String ref category) //Determine what employment category they are in based on their test score //Similar to if the score is less than 60, then category is “No” //Otherwise, if score is less than 70, then category is “Maybe” //…and so on if testScore => 85 then Set...

Words: 288 - Pages: 2

Free Essay

Unit 5 Assignment 5.1 Eigrp vs Ospf

...Unit 5 Assignment 1: Cisco Networks EIGRP versus OSPF EIGRP: Enhanced Interior Gateway Routing Protocol Is another routing protocol just like RIP and OSPF. EIGRP converges very quickly and it takes about the same time or not less than OSPF takes to converge, but without the negatives of OSPF. EIGRP’s benefit requires much less processing time, memory and less design than say OSPF. The downside with EIGRP is that it is Cisco-proprietary, so if an internet work areas uses non-Cisco routers it cannot be used on those routers. EIGRP is neither distance-vector nor link-state. Sometimes Cisco refers to EIGRP as an enhanced distance vector protocol but in some cases calls it a balanced hybrid routing protocol. EIGRP has some similarities to routing protocols but the differences far outweigh them. OSPF: Open Shortest Path First Is a link-state routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC 2328for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC 5340 . OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks. IS-IS, another link-state dynamic routing protocol, is more common in large service provider networks. The most widely used exterior gateway protocol is the Border Gateway Protocol (BGP), the principal routing protocol between......

Words: 269 - Pages: 2

Premium Essay

Lab 5 It220

...LAB 5 IT220 Exercise 5.1.1 * The 802.1 standard defines the 802 family of standards, describes the local area network, and defines the LAN address format. Exercise 5.1.2 * The 802.3af standard originally defined PoE functionality. The standard was enhanced in the year 2009, the name of it is 802.3at. Exercise 5.1.3 * 500 meters * 185 meters * 100 meters * Fiber Optic * UTP, 100 Meters * UTP, 100 Meters * Multi-Mode-Fiber Optic, 550 Meters * Single Mode- Fiber Optic * UTP 4 Pairs, 100 Meters Exercise 5.1.4 * The numeric prefix before BASE means the speed in Mbps. The inclusion of a postfix of -T means that the cable is a twisted pair standard. Lab 5.1 Review 1. The maximum speed of traffic would be between 10Mbps, and 100Mbps because they would have to negotiate the amount of bandwidth to send the node in between the two different network standards. 2. It is possible by also using a negotiation to uphold the maximum speed of the lesser UTP wire for example if Cat3 and Cat5e had to negotiate the Cat5e would have to meet Cat3’s standard maximum speed. Exercise 5.2.1 * A MAC address must be unique for every NIC card produced because they are being compared to all other unicast MAC addresses in the same LAN. The effect would be that the MAC address would be duplicated. Exercise 5.2.2 * It gives information on the connection its physical address and DHCP status. Exercise 5.2.3 * The......

Words: 845 - Pages: 4

Premium Essay

Computer Os and Matienance Lab 1.1 & 5.1

...Report on Computer OS and Maintenance - Seminar One This report documents the Lab Project assignments given for week one. These assignments cover chapters one, three, five, and six of the Managing and Troubleshooting PCs Exam 220-801 book. This report also provides a brief summary of what information was learned. Table of Contents Page 1.1 Lab Exercise 1.1…………………….……………………………………… 4-5 1.2 Lab Exercise 5.1………………………………………….………………… 5-6 2 SUMMARY OF SEMINAR 1.......................................................................... 6 • Lab Exercise 1.1 If you have access to the Internet, do some searching on computer certifications. Make a personal certification tree or pathway that maps out a series of certifications to pursue that might interest you. Which certifications would be useful if you want to be a graphic designer, for example? What if you want to create computer games? I am interested in Video Game Design. Here is a certification pathway showing the types of certifications I would need to be successful in this field: Certificate in Game Design Includes classes for the following subjects  Game theory  Game genres  Design principles  3-D graphics programming  Character animation  Game engine architectures Java C++ Flash Bachelors Degree in Computer Programming Includes classes for......

Words: 613 - Pages: 3

Free Essay

Nt1210(17) Labs 5.1 - 5.3

...5.1.1 The IEEE 802.1standard concerns with the standards and recommendations in the of architecture and internetworking of local area networks (LANs) and metropolitan area networks (MANs), security, network management, and protocol issues above the Data Link Layer. 5.1.2 The original 802.3 standard that defined PoE is IEEE 802.3af. The standard was enhanced in 2009 and give the new standard name 802.3af PoE+. 5.1.3 Standard | Cabling | Maximum Length | 10BASE5 | Coaxial (thicknet) | 500m | 10BASE2 | Coaxial(thinnet) | 200m | 10BASE-T | UTP (cat3, 5, 5e, 6) | 100-150m | 100BASE-FX | Fiber optic | 400m | 100BASE-T | UTP or optical fiber | 100m | 100BASE-T4 | UTP (cat3, 5, 5e, 6) | 100m | 100BASE-TX | UTP (cat3, 5, 5e, 6) | 100m | 1000BASE-LX | MM Fiber optic | 550m | 1000BASE-SX | MM Fiber optic | 220m or 550m (depends upon fiber thickness) | 1000BASE-ZX | SM fiber optic | 100km | 1000BASE-T | UTP (Cat5) | 100m | 5.1.4 The numeric prefix before BASE in the Ethernet standards defines the transmission speed. The postfix –T implies twisted pair. 5.2.1 A MAC address must be unique for every NIC produced because switches forward frames based on their destination MAC address and if more than one NIC in the same LAN were to have the same MAC address (including the last 24 bits in the MAC address) then the switches would be confused as to which NIC would get the frame. 5.2.2 Connection-specific DNS Suffix: Description: Dell Wireless 1705...

Words: 656 - Pages: 3

Premium Essay

Nt1230 Lab 5

...LAB 5 NT1230 5.1 5.2 Question 2 The result was “ this page can not displayed” Question 3 Intranet explorer could not open the page. Question 4 Page still could not be open. Question 5 •Make sure the web address http://ip_address is correct. •Look for the page with your search engine. •Refresh the page in a few minutes Question 6 It is important to clean caches before retesting the web server so it does not open the same cache if there was an error Question 7 The firewall was not letting it open till firewall was turned off Question 8 By testing on other sites with the firewall also turned off and on Question 9 You should not leave your firewall off because it protects your pc 5.3 Question 10 We allowed to open port 80 on HTTP Question 11 Port 4444 is not open 5.4 Question 12 (1) Use good anti virus softwares - To prevent computer from Viruses & other attacks. (2) Be aware of Phising & other social engineering tricks Question 13 The action are what differ from social to security Question 14 The rule we applied in exercise 13.3 applies only to Domain type network by default. So this rule allow connection to intranet inside your network only and will block all incoming connections from outside Public, Private. Question 15 The list was sorted by Domain profile rules. Question 16 On Profile page. Unchecking the Domain and Private checkboxes will prevent client access to the intranet website Question 17 The......

Words: 293 - Pages: 2

Free Essay

Et1220 Unit 5 Lab Report

...the counter Test Procedure: 4. Record the observed values from Lab 5 Table 5-1. Record the state number, the value of QDQCQBQA, the hexadecimal and decimal values. StateNumber | DataLine 7 | DataLine 6 | DataLine 5 | DataLine 4 | Hexadecimal | Decimal | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 1 | 1 | 2 | 0 | 0 | 1 | 0 | 2 | 2 | 3 | 0 | 0 | 1 | 1 | 3 | 3 | 4 | 0 | 1 | 0 | 0 | 4 | 4 | 5 | 0 | 1 | 0 | 1 | 5 | 5 | 6 | 0 | 1 | 1 | 0 | 6 | 6 | 7 | 0 | 1 | 1 | 1 | 7 | 7 | 8 | 1 | 0 | 0 | 0 | 8 | 8 | 9 | 1 | 0 | 0 | 1 | 9 | 9 | 10 | 1 | 0 | 1 | 0 | A | 10 | 11 | 1 | 0 | 1 | 1 | B | 11 | 12 | 1 | 1 | 0 | 0 | C | 12 | 13 | 1 | 1 | 0 | 1 | D | 13 | 14 | 1 | 1 | 1 | 0 | E | 14 | 15 | 1 | 1 | 1 | 1 | F | 15 | | | | | | | | | | | | | | | ------------------------------------------------- Part 2- Implement Synchronous Counters Theory: 5. What makes a counter synchronous? Because its clock is applied to each of the flip-flops. 6. What is the purpose of the ~U/D control signal for the 74191 Synchronous Counter? when low, counts up, when high, counts down Test Procedure: 7. Provide the wiring diagram that converts this Mod16 counter into a Mod 10 counter. Us Microsoft Paint to draw the wire connections. ------------------------------------------------- Part 3- Semiconductor Memory Theory: 8. Using Lab Figure 5-7, which memory cells are addressed if 1001 is applied to A0-A3? the......

Words: 591 - Pages: 3

Free Essay

Pt1420 Lab 5

...PT1420T LAB 5.1 – 5.5 Lab 5.1 attAverage >= verizonAverage TRUE tmobileAverage == 868 TRUE verizonAverage < sprintAverage FALSE sprintAverage != attAverage TRUE Lab 5.2 Expected Output Both have average download rates over 800 Nothing AT&T Lab 5.3 Main Module() //Declare variables Declare Integer testScore = 0 Declare String category = “NO VALUE ” Declare String interview = “NO VALUE ” //Make Module calls and pass necessary variables Call gettestScore() Call employCat() Call interviewPoss() Call displayInfo() End Main Module gettestScore(Integer Ref testScore) //Allows the user to enter the test score Display “Please input test score:” Input gettestScore Display (“The interviewee’s test score is:” , gettestScore) End Module Module employCat (Integer gettestScore, String Ref category) //Determines the employment category If gettestScore >= 85 Then Category = “Definitely” Else If gettestScore > 70 AND testScore =< 84 Then Category = “Likely” Else If gettestScore > 60 AND testScore =< 69 Then Category = “Maybe” Else If gettestScore =< 59 Then Category = “No” End If End Module Module interviewPoss(Integer gettestScore, String Ref interview) //Determine if they qualify for an interview based on their test score //Similar to if the score is less than 60, then interview is “No” //Otherwise, interview is “Yes” If gettestScore <......

Words: 462 - Pages: 2

Premium Essay

Unit 5 Lab 1

...Physical Networking Unit 5 Lab 1 Wired and Wireless Networks The biggest difference between these two types of networks is one uses network cables and one uses radio frequencies. A wired network allows for a faster and more secure connection and can only be used for distances shorter than 2,000 feet. Several other disadvantage of a wired network such as the “need to run cables in difficult environments through walls, floors and ceilings. Cables need to be run from computer to computer and switch to switch. Process can be time consuming. Loose cables likely remain the single most common and annoying source of failure in a wired network.” (PACE University, n.d.) While a wireless network is a very useful and convenient networking device, however these types of networks a lot less secure and transmission speeds can suffer from outside interference. Although wireless networking is a lot more mobile than wired networking the range of the network is usually 150- 300 indoors and up to 1000 feet outdoors depending on the terrain. The cost for wired networking has become rather inexpensive. Ethernet cables, hubs and switches are very inexpensive. Broadband routers cost more, but these are optional components of a wired network, and their higher cost is offset by the benefit of easier installation and built-in security features. The primary parts of a wired network are the cables, network adapters, and routers.......

Words: 315 - Pages: 2

Premium Essay

Lab 5

...Name: Date: Instructor’s Name: Assignment: SCI103 Phase 1 Lab Report Title: Measuring pH Levels Instructions: Enter the Virtual Lab, and conduct the experiments provided before going out into the virtual field for additional research. Please type your answers on this form. When your lab report is complete, submit it to the Submitted Assignments area of the Virtual Classroom. Part I: Answer the following questions while in the Phase 1 lab environment. Section 1: You will be testing 4 known solutions for pH levels using a standard wide-range indicator. Based off of the results obtained in the lab room, fill in the following table: |Solution Number |pH from Lab |Acid, Base or Neutral? |Solution Name (what was in the test tube?) | |Solution 1 |6 |Acid |Pure Water | |Solution 2 |1 |Acid |Lemon Juice | |Solution 3 |12 |Base |Bleach | |Solution 4 |5 |Acid |Coffee | 1. How many drops of wide range indicator will you use for each test, based on industry standards......

Words: 696 - Pages: 3

Premium Essay

Nt1210 Intro to Networking Lab 5.4

...NT1210 Lab 5.4 Basic Network Troubleshooting Exercise 5.4.1 If you needed to determine the computer name used for node E on the network (starting from node A), what command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. I already have the IP Addresses for all the workstations a simple Ping command in CMD will work. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping –a to retrieve the information we need. Exercise 5.4.2 What is the best (easiest and most efficient) command to determine whether all the hosts on the local-area network are reachable? You can assume that you are starting from computer A. List the command sequence(s) you would need to enter to test this functionality. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping, Ping, and Ping, Ping, and Ping This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping Exercise...

Words: 344 - Pages: 2

Premium Essay

Unit 5

...PUBLIC SERVICES LEVEL 3 – 2016 UNIT 5 Part 1 – PHYSICAL PREPARATION NAME: Rohan Monsy (11024319) Unit 5 - Assessment and grading criteria | To achieve a pass grade the evidence must show that the learner is able to: | To achieve a merit grade the evidence must show that, in addition to the pass criteria, the learner is able to: | To achieve a distinction grade the evidence must show that, in addition to the pass and merit criteria, the learner is able to: | P1 describe a fitness assessment for each of the major components of fitness | M1 explain the results of the fitness assessment and measure against relevant public service entrance test | D1 evaluate results of the fitness assessment, analyse strengths and recommend improvements | P2 describe the structure and function of the muscular-skeletal,cardiovascular and respiratory systems | | | P3 undertake a fitness activity,record and identify the short-term effects of exerciseon the major human bodysystems | M2explain the short and long term effects of exerciseon the major human bodysystems | | P4 describe the lifestyle factors that can affect health | M3explain the effects ofidentified lifestyle factors onhealth and fitness, whenapplying for public service and long-term employment | D2Evaluate the effects ofidentified lifestyle factors onhealth and fitness, whenapplying for public service and long-term employment | P5 Provide lifestyle improvement strategies that can have a positive effect on health | M4Explain......

Words: 2802 - Pages: 12

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they......

Words: 16182 - Pages: 65

Free Essay

Lab 5

... c.s. * Prepared slide of mature lily anther (pollen grains), c.s. * Mature pollen * Glass slide * Coverslip * Compound microscope * 0.5% sucrose, in dropping bottle * Prepared slide of lily ovary, c.s megaspore mother cell * Compound microscope * Bean fruits * Soaked bean seeds * Iodine solution(I2KI), in a dropping bottle * Herbarium mount of Capsella, with fruits Procedure: Refer to Biology lab manual, lab 5- pages 3-7. Results: Questions: 1. Gymnosperms | Angiosperms | | | a.cones | flowers | c.Bare, not enclosed; found on scales, leaves or as cones. | Enclosed inside an ovary, usually in a fruit. | b. seed | Endosperm | 2. Pollination is the act of transferring pollen from the male part of a flower to the female part of a flower. Fertilization occurs when the male gamete of any sexually reproducing organism combines with a female gamete to form a zygote. 3. A. receptacle B. c.ovary D. filament E. stigma 4. It is a monocotyledon. 5. A. anther pollen tetrad B. pollen sacs...

Words: 362 - Pages: 2