Premium Essay

It220 Lab 5.2

In:

Submitted By exyyle
Words 407
Pages 2
Lab 5.2
5.2.1
A MAC address is unique to every NIC because it is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies. The effect of two different manufactures with the same LAST 24 bits of their MAC address would be nothing. The reason for this is because the first 24 bit would be specific for each individual manufacture and even if the last bits are the same the MAC address will still be different because the first 24 bits are going to be different.

5.2.2
This tab breaks down all the different Network Connection Details. The information that is given in this window is connection specific, description, physical address, DHCP enabled, IPv4 Address, IPv4 Sub Lease obtain, Lease Expires, IPv4 default gateway, DHCP server, DNS server, IPv4 WINS, IPv6 Default gateway, IPv6 DNS server.

5.2.3
The MAC Address for this NIC card is B8-AC-6F-21-E9-EF

5.2.4
B8-AC-6F
Dell Inc,
Dell Inc
One Dell Way, MS RR5-45
Round Rock TX 78748
United States.

5.2.5
IPv4 Address - 10.18.108.103
IPv4 Default Gateway - 10.18.110.1
IPv4 Sub Mask - 255.255.252

5.2.6
The ARP Request and an ARP Replay, these messages allow a simple enchant, with the Request as a question and the Replay as the answer.
"Hey if your IP address is X, tell me your MAC address'
"I am IP address X, and this is my MAC address"

5.2.7
Interface: 10.18.108.103 ---OXD
Internet Address Physical Address Type
10.18.108.225 00-23-ae-77-4e-86 dynamic

5.2.8
Could not do the arp -s on these computers do to the lack of authority. "The ARP Entry addition failed: The requested operation requires elevation."

Lab Review

1. Dynamic entries are added on a "as needed" basis. The benefit of this is that the dynamic entries left in place are considered

Similar Documents

Premium Essay

Lab 5 It220

...LAB 5 IT220 Exercise 5.1.1 * The 802.1 standard defines the 802 family of standards, describes the local area network, and defines the LAN address format. Exercise 5.1.2 * The 802.3af standard originally defined PoE functionality. The standard was enhanced in the year 2009, the name of it is 802.3at. Exercise 5.1.3 * 500 meters * 185 meters * 100 meters * Fiber Optic * UTP, 100 Meters * UTP, 100 Meters * Multi-Mode-Fiber Optic, 550 Meters * Single Mode- Fiber Optic * UTP 4 Pairs, 100 Meters Exercise 5.1.4 * The numeric prefix before BASE means the speed in Mbps. The inclusion of a postfix of -T means that the cable is a twisted pair standard. Lab 5.1 Review 1. The maximum speed of traffic would be between 10Mbps, and 100Mbps because they would have to negotiate the amount of bandwidth to send the node in between the two different network standards. 2. It is possible by also using a negotiation to uphold the maximum speed of the lesser UTP wire for example if Cat3 and Cat5e had to negotiate the Cat5e would have to meet Cat3’s standard maximum speed. Exercise 5.2.1 * A MAC address must be unique for every NIC card produced because they are being compared to all other unicast MAC addresses in the same LAN. The effect would be that the MAC address would be duplicated. Exercise 5.2.2 * It gives information on the connection its physical address and DHCP status. Exercise 5.2.3 * The physical...

Words: 845 - Pages: 4

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18