... 2. Connect the other end of your network cable to the hub provided by the instructor. Answer the following questions: a. What is the purpose of the hub? b. What is the topology you are creating? 3. Turn on the hub and verify that a link light is illuminated both on the computer’s network interface card (NIC) and the network hub. If not, check with the instructor. Answer the question: a. What does the link light indicate? 4. On the workstation, open a command prompt by clicking START> RUN and type CMD. 5. Next, type the IPCONFIG/ALL command to determine current TCP/IP settings for clients on a network. Record the following: a. Your computer’s IP address b. Classmate’s IP address connected with your hub 6. Next, use the PING command to verify network connectivity between clients. Type PING XX.XX.XX.XX at the command prompt where XX.XX.XX.XX is the IP address that you recorded in Step 5b. 7. You will receive ICMP replies from your classmate’s computer illustrating that your computers are connected and communicating. If not, you can check with your instructor. 8. Now, unplug your network cable from the hub and repeat Step 6. What was the result? 9. Unplug your cable from the ITT computer. Replace the ITT UTP cable to the ITT computer to restore the connection with the ITT network. Verify that the link light is active on the ITT computer. On the ITT computer, verify that you can connect to the Internet. If not, restart the system...
Words: 401 - Pages: 2
...of the following commands would be part of a complete RIP Version 2 configuration on Router2, with which Router2 advertises out all interfaces, and about all routes? a. router rip b. router rip 3 c. network 9.0.0.0 d. version 2 e. network 10.0.0.0 f. network 10.1.1.1 g. network 10.1.1.2 h. network 11.0.0.0 i. network 11.1.1.2 6. Which of the following network commands, following a router rip command, would cause RIP to send updates out two interfaces whose IP addresses are 10.1.2.1 and 10.1.1.1, mask 255.255.255.0? a. network 10.0.0.0 b. network 10.1.1.0 10.1.2.0 c. network 10.1.1.1 10.1.2.1 d. network 10.1.0.0 2550.255.0.0 e. network 10 f. You cannot do this with only one network command 7. What command(s) list(s) information identifying the neighboring routers that are sending routing information to a particular router? a. show ip b. show ip protocol c. show ip routing-protocols d. show ip route e. show ip route neighbor f. show ip route received 8. Review the snippet from a show ip route...
Words: 1957 - Pages: 8
...IP Address Class: Class A: class A addresses are assigned to networks with a very large number of hosts. The high-order bit in a class A address is always set to zero. Class A permit up to 126 networks by using the first octet of the address for the network identification. Class B: class B address is designated for mid-sized corporations and ISPs. They allow 16, 384 networks by using the first two octets of the address for network identification. The first two bits of the first octet are fixed to 1.0. Class C: is designated for small offices and home offices. They allow for approximately 2 million networks by using the first three octets of the address for network identification. The three bits are fixed to 1 1 0. Class D: were reserved for multicasting purposes. The addresses begin with an octet in the 224-239 range. RFC 1918 IP addresses are used for private networks without concern for potential addressing conflicts with other networks. It has specify ranges of IP address that can never be routable on the global internet. RFC 1918 IP address ranges: 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255...
Words: 275 - Pages: 2
...with sequence numbers 2000, 3000, 4000, and 5000. PC1 does not receive an acknowledgment within its current timeout value for this connection. What should PC1 do next? a. Increase its window to 5000 or more segments b. Send the next segment, with sequence number 6000 c. Resend the segment whose sequence number was 5000 d. Resend all four previously sent segments 2. Which of the following are not features of a protocol that is considered to match OSI Layer 4? e. Error recovery f. Flow control g. Segmenting of application data h. Conversion from binary to ASCII 3. Which of the following header fields identify which TCP/IP application gets data received by the computer? i. Ethernet Type j. SNAP Protocol Type k. IP Protocol Field l. TCP Port Number m. UDP Port Number n. Application ID 4. Which of the following are not typical functions of TCP? o. Windowing p. Error recovery q. Multiplexing using port numbers r. Routing s. Encryption t. Ordered data transfer 5. Which of the following functions is performed by both TCP and UDP? u. Windowing v. Error recovery w. Multiplexing using port numbers x. Routing y. Encryption z. Ordered data transfer 6. What do you call data that includes the Layer 4 protocol header, and data given to Layer 4 by the upper layers, not including any headers...
Words: 797 - Pages: 4
...Before the eighties, computers were large and bulky. IBM and a couple of companies were leading the way towards a smaller PC and mainframes. Intel (which started in the mid-sixties) was starting their own revolution which was making a difference in the burgeoning computer environment. Microsoft and Apple were not yet there, but the biggest thing is that there was no internet. Not like we know it today. No IP Addresses as well. In the seventies, there was a beginning to networking and the IP Addresses. IP Addresses were created as the original Internet routing scheme during this period. The IEEE (The Institute of Electrical and Electronic Engineers) was instrumental in the creation of the five (5) IP Classes. As a matter of fact, these classes weren’t created to meet the needs of an ever expanding Internet. When the IEEE proposed these classes, each of the 5 classes was designed for a specific purpose. For example, Class A (0000) was designed to meet the needs of large networks. This is the reason why this class will only support 126 networks. But each network can support 16,777,214 hosts. Class B (1000) was designed for medium-sized networks. This class will support 16,384 networks and is limited to 65,534 hosts per network. Class C (1100) supports 2,097,152 networks but only 254 hosts per network. In the eighties, things started to happen. Network classes were introduced more, but subnet masks were not available as yet. It wasn’t until the nineties that subnet masks...
Words: 1232 - Pages: 5
...IP Addressing and Routing Problem 1: Default Gateway on PC3 is wrong The default-gateway on PC3 was set to 192.168.1.15. The proper default-gateway is 192.168.1.1. This causes PC3 to be unable to communicate past R3 effectively cutting PC3 out of the network. Changing the default-gateway to 192.168.1.1 brings PC3 into the network and allows communication to and from all other devices. Problem 2: R2’s S0/0/1 is set as a passive interface Since the interface is set to passive it does not send RIPv2 updates over that interface causing R1 to be unable to learn its route. This causes all traffic from R1 destined for R2 to be routed through R3 before going to R2. This problem cause no communication problems with the current topology, but could cause a system breakdown if the serial connection between R2 and R3 goes down. Problem 3: The mask of R2’s Fa0/0 is wrong The current mask is 255.255.255.224 and the proper mask is 255.255.255.240. Although the IP of R2 and PC2 both fall into the same subnet of the current mask no connection problems occur, but if additional PC’s were added and given an IP address within the same mask as PC2 communication problems may arise if that IP is outside the mask on R2. EIGRP Serial Configuration I S3 - FA0/0 and S0/0/1 S5 - This is the autonomous system number. This number must match the configured autonomous system number configured on any neighboring EIGRP devices. S6 - This will enable EIGRP on R2’s Fa0/0 and S0/0/1 S8 - Yes there is...
Words: 1198 - Pages: 5
...1 routing analysis 3 Step 2. Again on each PC, ping the IP address of each PC’s respective default gateway. Record whether the ping worked or not in Table 5. Each ping to the PC has worked to the default gateway. Step 3. From each PC, ping the IP address of the other three PCs. Record the results of each ping in Table 6 with a check mark for a successful ping and an X for a failed ping. None of the PC’s pinged to the other pc’s. Step 5. From each router’s user mode command prompt, ping the IP addresses of each other router. Make notes about which IP addresses can be pinged from each router. Each router has pinged the other routers IP’s on the common LAN subnet but none of the pings worked from a router to each others routers. Step 6. Use the show ip route and show ip routes ospf commands to examine each router’s routing tables. Do any of the four routers know any routes other than connected routes? Do any of the routers know any OSPF-learned routes? None of the routers have any OSPF routes. This is one of the reasons why the PC’s cant ping the other routers. Step 7. From each router, use the show ip ospf neighbor command to discover with which other routers each router has formed a neighbor relationship. List the router pairs that have formed any kind of neighbor relationship on the lines below. None of the routers have OSPf neighbor relationships with the other routers. Step 8. From each router, use the show ip ospf interface command to list the interfaces on which OSPF...
Words: 795 - Pages: 4
...IP Networking Assignment 1.1 Chapter 1 1. The TCP/IP networking model is a model of networking functions that are separated into different layers. Each layer performs a specific function that effects the layer above and below it. We use the TCP/IP model to troubleshoot a computer that is experiencing network issues. 2. There are seven different layers in an OSI model. Layer 1 (Physical layer): the physical characteristics of a computer such as connectors and pins. Layer 2 (Data Link): defines the internet protocols and the format of a header and trailer that allows devices to send and receive data successfully. Layer 3 (Network): routing IP packets and IP addressing. Layer 4 (Transport): data delivery from one computer to another. Layer 5 (Session): User communicating with the computer. Layer 6 (Presentation): defining data formats such as text files (.txt) and picture files (JPEG). Layer 7 (Application): support for applications such email and internet explorer. 3. The difference between same layer and adjacent layer interactions is that same layer deals with two computers, while adjacent with just one computer. 4. Encapsulation is the process of placing data into a header and footer. Decapsulation is the process of removing data from a header and footer. Chapter 2 1. There are five different types of Ethernet which are 10Base2, 10Base5, 10Base-T, 100Base-TX, and 1000Base-T. Also there are many different types of topologies such as bus, star, mesh, extended star...
Words: 726 - Pages: 3
...3 factors that could affect splicing performance: Cleaving is a major factor in splicing fiber optic cables, and it is necessary to use a good cleaver to do this with. Cleanliness is another factor that will affect splicing performance; the glass core must be cleaned prior to putting it in the connector because dust will play a factor in the performance of the splice. And using different brand of fiber cables can play a major factor in the overall performance of the splice. It can make it difficult to join the two cables together. The way to help reduce these factors is to ensure that you are using the proper splicing practices. (Fiber Optic Splicing) 3 intrinsic factors that can affect connection performance: Intrinsic factors are things that you cannot control during the splicing and connection process such as: Numerical Aperture mismatch, this is caused by the differences in the fiber itself and is nothing that you can control. Reflection loss is another factor that you cannot control because it is again based on the type of fiber optic cable you use for the splice. Refractive index profile distance is also a factor that is affects connection performance and it also caused by the cable manufacture and not something that you have done during the splicing process. The way to avoid all of this is to use the same type of fiber to do the splice if at all possible. (Intrinsic and Extrinsic factors) 3 extrinsic factors that affect connection performance: Extrinsic factors that...
Words: 412 - Pages: 2
...Abstract:-The fourth generation of mobile networks will truly turn the current mobile phone networks, in to end to end IP based networks, couple this with the arrival of IPv6, every device in the world will have a unique IP address, which will allow full IP based communications from a mobile device, right to the core of the internet, and back out again. If 4G is implemented correctly, it will truly harmonize global roaming, super high speed connectivity, and transparent end user performance on every mobile communications device in the world. 4G is set to deliver 100mbps to a roaming mobile device globally, and up to 1gbps to a stationary device. With this in mind, it allows for video conferencing, streaming picture perfect video and much more. It won’t be just the phone networks that need to evolve, the increased traffic load on the internet as a whole (imagine having 1 billion 100mb nodes attached to a network over night) will need to expand, with faster backbones and oceanic links requiring major upgrade. 4G won’t happen overnight, it is estimated that it will be implemented by 2012, and if done correctly, should takeoff rather quickly. 4G networks i.e. Next Generation Networks (NGNs) are becoming fast and very cost-effective solutions for those wanting an IP built high-speed data capacities in the mobile network. Some possible standards for the 4G system are 802.20, Wi-MAX (802.16), HSDPA, TDD UMTS, UMTS and future versions of UMTS. The design is that 4G will be based on OFDM...
Words: 3876 - Pages: 16
...TB 11-5800-229-10 TECHNICAL BULLETIN SYSTEM OVERVIEW GUIDE WARFIGHTER INFORMATION NETWORK - TACTICAL (WIN-T) INCREMENT 2 FInal Draft DISTRIBUTION STATEMENT C: Distribution authorized to U.S. Government Agencies and their contractors. This publication is required for administrative and operational purposes. This determination was made on 15 March 2011. Other requests for this document must be referred to Commander, U.S. Army CECOM Life Cycle Management Command (LCMC), ATTN: AMSEL-LCL-ECM, Aberdeen Proving Ground, MD 21005-1846. WARNING: This document contains technical data whose export is restricted by the Arms Export Control Act (Title 22, U.S.C., Sec 2751, et. seq.) or the Export Administration Act of 1979, as amended, Title 50A, U.S.C., App. Violations of these export laws are subject to severe criminal penalties. Disseminate in accordance with provisions of DoD Directive 5230.25.. DESTRUCTION NOTICE - Destroy by any method that will prevent disclosure of contents or reconstruction of the document. HEADQUARTERS, DEPARTMENT OF THE ARMY 15 JUNE 2012 TB 11-5800-229-10 LIST OF EFFECTIVE PAGES/WORK PACKAGES NOTE: The portion of text affected by the change is indicated by a vertical bar in the outer margins of the page. Changes to illustrations are indicated by a vertical bar adjacent to the title. Zero (0) in the “Change No.” column indicates an original page or work package. Date of issue for the original manual is: Original: 15 June 2012 TOTAL...
Words: 42929 - Pages: 172
... 6.2.2 the information that given on the command line is it shows all your information on the router you have and it shows you in details. Its allows you to see in-depth allowing your to see information on your router. 6.2 review 1. The biggest problem would be collision if multiple routers are using the same channel a common example of this is Comcast routers are set to use a channel close to the signal for the ps3 so you get a depredation of signal and loss of data packets as the connection goes on. 2. If a previously stated standard is not compatible with your adapter you could have issues with your connection not connecting. 6.3.1 For a secure connection 6.3.2 The IP config show you everything you need to know from your IP address and your gateway and basically it shows you your networking. 6.3.3 Event viewer. 6.3 review 1. A guest having access to your network could result in any imaginable results on your network. 2. Setting a MAC filter is a good way to filter who has access to your network. 6.4 6.4.1 An omnidirectional antenna radiates transmissions out and receives transmissions in from all directions, although not equally in all directions. Most of the antennas in this category are thin rods or long flat...
Words: 469 - Pages: 2
...Smart Business Communications System from Verizon offers everything you need for more secure voice and data networking. Start Your Business the Right Way Whether you are starting up or branching out, the Cisco Smart Business Communications System gives you an affordable, all-in-one solution. Built-in voice, messaging, and mobility features let you stay in touch with local, regional, and overseas suppliers easily and cost-effectively. Wired and wireless data networking supports all your business operations and data needs, enabling you to start your business as a paperless office. Simple, Secure, Complete The Cisco Smart Business Communications System is a complete solution that replaces your traditional telephone system. It also gives you highly secure Internet capabilities with a data network and wireless connectivity to support powerful business applications. Best of all, it’s easy to use. And when you are ready to add new users and new capabilities, the system can easily accommodate changes and upgrades. Hardware to Connect Phones and Computers At the heart of the solution is an intelligent IP network. Cisco offers a suite of proven, industry-leading products for wired and wireless voice and data communications. An all-in-one system combines connections to the public telephone network and the Internet with integrated network security, ports to plug in Cisco Unified IP phones and fax machines — and call processing, voicemail, and automated attendant capabilities. An integrated...
Words: 874 - Pages: 4
...Title: EFFECTS OF E-COMMUNICATION ON CORPORATE ORGANIZATIONS CHAPTER 1 INTRODUCTION Electronic communication otherwise known as E-Communication is a type of communication carried out using electronic media. Such communications allow transmission of message or information using computer systems, fax machine, e-mail, tele and/or video conferencing and satellite network. People can easily share conversation, picture(s), image(s), sound, graphics, maps, interactive software and many other things. Due to electronic technology, jobs, working locations and cultures are changing and therefore people can easily get access to worldwide communication without any physical movement. Experts have defined electronic communication as the transmission of information using advanced techniques such as computer modems, facsimile machines, voice mail, electronic mail, teleconferencing, video cassettes, and private television networks.” 1.1 Background of the Study Communication is said to be the imparting or exchanging of information by speaking, writing, or using some other medium. It could be between two or more persons, human and machines or any other communicable entity. Group communication can be carried out through various means such as smoke signals and drums which was common in ancient Africa, America and parts of Asian, the fixed semaphore in ancient Europe and electronic means which is most prominent, popular and recent. This research details on the effects of communication...
Words: 8745 - Pages: 35
...Hospital Networking Project (Week 3) University of Phoenix CMGT 554/IT INFRASTRUCTURE Patton-Fuller Community Hospital Networking Project Today most new building construction is built with new technology and is not as much concerned with the type of budgets that a hospital muse consider in order to redesign a whole new network structure for the purpose of being more optimal and maintaining standards that keep up with advances in new technology. In most cases, a hospital’s network can transition over time with new technology and evolve into meeting the demands it requires to perform effectively. However, upgrading a hospital’s entire network can often be very expensive to implement and sustain. There may be a case where components or parts are no longer being produced to meet current and future demands. In the last several years, changes in healthcare put a demand on hospitals to maintain their networks with new, more efficient solutions that can enhance performance, keep cost low, but most one that is reliable . The Network architecture at Patton-Fuller hospital was designed for each department to rely on information flow between each department. In other words, if the accounting department needed information from the pharmacy or admissions in order to create invoices or insurance billing, it would be rely on those departments to share real time information through the network. It is important for a facility as large as a hospital to have a Networking system that...
Words: 1533 - Pages: 7