...Unit 3 Lab 3.1 3.1.1 Unless everyone had the same of everything there wouldn’t be a way to connect all of them together. It would be difficult to send information to others or to stay in contact with family and friends. There wouldn’t be pictures you could share, it would change everything drastically. 3.1.2 Microscope. It allows us to study a variety of things that we cannot see with our naked eyes. Without the microscope we wouldn’t be knowledgeable about diseases or anything else you can’t see with your eyes. 3.1.3 The Transport and Network layer would be necessary for communication to be mapped. 3.1.4 If a model was to general it would be to basic to understand more advanced communications and it wouldn’t have good detail. However if it was too focused on individual detail it would be running more actions than necessary and would run slower. Lab 3.3 3.3.1 The OSI is the perfect model and adds an extra 2 layers the TCP/IP doesn’t do by itself. 3.3.2 Layers in TCP/IP * Application * Transport * Network * Data Link * Physical 3.3.3 * IP-Internet Protocol (Routes data packets form any host to any other host. Any device to another device) * TCP-Transmission Control Protocol (It segments large data into smaller chunks and it guarantees delivery of data using error recovery) * UDP-User Datagram Protocol (Connectionless, faster but less secure than TCP/IP and does not guarantee delivery) Lab 3.4 3.4.1 It works because it’s a small...
Words: 280 - Pages: 2
...ITT Networking Standards & Protocols Midterm | Term First Both Sides How many bits are in a gigabyte?1 billion | Click to flip | | 50 terms Terms | Definitions | How many bits are in a gigabyte? | 1 billion | How many bits are in a megabyte? | 1 million | Convert 00101010 to decimal. | 42 | What is the difference between a sector and a track? | A sector is part of a track | How many bits are in one hexadecimal digit? | 4 | How are voice communications converted to digital signals? | Audio is sampled at a high rate which is converted to binary numbers | What does it mean to compress a video file? | To decrease file size | In this url, http://www.example.com/page2, which part is the web page, which part is the server name and which part is the protocol? | web page: page2 server: www.example.com protocol: http | What makes up the internet core? | Many separate small and large networks | What manages computer peripherals devices? | Device Drivers | What physical network topology has the inherent weakness of a single point failure? | Star Network | What is a networking standard? | Details of what a networking technology does, and how it does it | What is a de facto standard and what stanards-setting body creates them? | An informal standard, no company governs them | What are some reasons TCP/IP model is divided into layers? | Troubleshooting, Creation of network standards and protocols | Why is the TCP/IP model considered an "open"...
Words: 772 - Pages: 4
...Network Solutions, Inc. 1134 Owings Mills Road Owings Mills, Md. 21117 410-555-4466 – Phone 410-555-4467 – Fax Network Solutions, Inc. 897 Getty Road Gettysburg, PA 17325 717-555-3344 - Phone 717-555-3345 – Fax Retail/Wholesale Sales P.O. Box 555 Atlanta, Georgia 27462-555 Dear Prospective Client, Network Solutions, Inc. was founded in 2000 with their first location starting in Owings Mills Maryland. Our company serves many businesses including, schools, nonprofit agencies, municipalities, counties and other businesses in almost every sector. As the demand for technology increased Network Solutions, Inc. decided to expand their services into Pennsylvania. In 2006 Network Solutions, Inc. opened another location in Gettysburg Pennsylvania. Now serving two states with over 75 employees Network Solutions, Inc. is becoming one of the biggest IT Companies around. Network Solutions, Inc. is committed to providing complete technology solutions to help organizations define and maintain an information management system that will allow them to operate more efficiently. The staff at Network Solutions, Inc. is specifically trained to evaluate technology challenges and develop efficient and effective solutions that also support a client's new or existing process. The staff at Network solutions, Inc. will build upon their experience and expertise by developing relationships and partnerships with organizations to accomplish this goal. Network Solutions, Inc. offers a wide variety services...
Words: 311 - Pages: 2
...How many bits are in a gigabyte? 1 billion How many bits are in a megabyte? 1 million Convert 00101010 to decimal. 42 What is the difference between a sector and a track? A sector is part of a track How many bits are in one hexadecimal digit? 4 How are voice communications converted to digital signals? Audio is sampled at a high rate which is converted to binary numbers What does it mean to compress a video file? To decrease file size In this url, http://www.example.com/page2, which part is the web page, which part is the server name and which part is the protocol? web page: page2 server: www.example.com protocol: http What makes up the internet core? Many separate small and large networks What manages computer peripherals devices? Device Drivers What physical network topology has the inherent weakness of a single point failure? Star Network What is a networking standard? Details of what a networking technology does, and how it does it What is a de facto standard and what stanards-setting body creates them? An informal standard, no company governs them What are some reasons TCP/IP model is divided into layers? Troubleshooting, Creation of network standards and protocols Why is the TCP/IP model considered an "open" networking model? It's not owned by any specific organization what do routers in a network do? Mave data between LANs by linking them to WANs What is encapsulation? A way to cross data over a any network link In a...
Words: 745 - Pages: 3
...LAB 5 IT220 Exercise 5.1.1 * The 802.1 standard defines the 802 family of standards, describes the local area network, and defines the LAN address format. Exercise 5.1.2 * The 802.3af standard originally defined PoE functionality. The standard was enhanced in the year 2009, the name of it is 802.3at. Exercise 5.1.3 * 500 meters * 185 meters * 100 meters * Fiber Optic * UTP, 100 Meters * UTP, 100 Meters * Multi-Mode-Fiber Optic, 550 Meters * Single Mode- Fiber Optic * UTP 4 Pairs, 100 Meters Exercise 5.1.4 * The numeric prefix before BASE means the speed in Mbps. The inclusion of a postfix of -T means that the cable is a twisted pair standard. Lab 5.1 Review 1. The maximum speed of traffic would be between 10Mbps, and 100Mbps because they would have to negotiate the amount of bandwidth to send the node in between the two different network standards. 2. It is possible by also using a negotiation to uphold the maximum speed of the lesser UTP wire for example if Cat3 and Cat5e had to negotiate the Cat5e would have to meet Cat3’s standard maximum speed. Exercise 5.2.1 * A MAC address must be unique for every NIC card produced because they are being compared to all other unicast MAC addresses in the same LAN. The effect would be that the MAC address would be duplicated. Exercise 5.2.2 * It gives information on the connection its physical address and DHCP status. Exercise 5.2.3 * The physical...
Words: 845 - Pages: 4
...Lab 5.2 5.2.1 A MAC address is unique to every NIC because it is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies. The effect of two different manufactures with the same LAST 24 bits of their MAC address would be nothing. The reason for this is because the first 24 bit would be specific for each individual manufacture and even if the last bits are the same the MAC address will still be different because the first 24 bits are going to be different. 5.2.2 This tab breaks down all the different Network Connection Details. The information that is given in this window is connection specific, description, physical address, DHCP enabled, IPv4 Address, IPv4 Sub Lease obtain, Lease Expires, IPv4 default gateway, DHCP server, DNS server, IPv4 WINS, IPv6 Default gateway, IPv6 DNS server. 5.2.3 The MAC Address for this NIC card is B8-AC-6F-21-E9-EF 5.2.4 B8-AC-6F Dell Inc, Dell Inc One Dell Way, MS RR5-45 Round Rock TX 78748 United States. 5.2.5 IPv4 Address - 10.18.108.103 IPv4 Default Gateway - 10.18.110.1 IPv4 Sub Mask - 255.255.252 5.2.6 The ARP Request and an ARP Replay, these messages allow a simple enchant, with the Request as a question and the Replay as the answer. "Hey if your IP address is X, tell me your MAC address' "I am IP address X, and this is my MAC address" 5.2.7 Interface: 10.18.108.103 ---OXD ...
Words: 407 - Pages: 2
...1. What is a routing table? Routing tables consist of being used to route data to a specific path and also keeps track of the routes for where the data can travel to. 2. What is the most common static route used in a host computer? The most common static route used in a host computer is the default gateway. 3. What command is used to view a PC computers routing table? The command to used to view a pc computer routing table is netstat –r. 4. What is meant by a 0.0.0.0 network address entry with a subnet mask of 0.0.0.0 in a PC’s routing table? It’s the default routing table path for data. 5. What is the 127.0.0.1 IP address and what is it used for? It is known as a loopback to the host computer. This mean the data is routed directly back to the source which is known as the network interface card. 7. What is the difference between a routers running configuration and startup configuration? The difference between running configuration and startup is that in config doesn’t show what is currently saved in the routers nonvolatile memory whereas startup shows the saved configuration in the nonvolatile memory. 8. What is the router command used to view the routes entered into the router’s routing table? The command to use in order to see the routes entered into the routers routing table is show ip route. 9. What is the router command used to configure a static route for a router? The command you would use is ip route in order to configure the router. 14. What...
Words: 2495 - Pages: 10
...1. What are the layers of the TCP/IP model? Application Layer Transport Layer Network Layer Network Access Layer 2. Which layer of the TCP/IP model processes requests from hosts to make sure a connection is made to the appropriate port? Application Layer 3. What are well – known ports? Ports reserved by ICANN 4. Identify the port numbers for the following applications. a. Telnet: 23 b. HTTP: 80 c. FTP: 20, 21 d. DNS: 25 e. DHCP: 67, 68 5. Define the purpose of a connection oriented protocol. Establishes a network connection, manages the delivery of data, and terminates the connection. (TCP) 6. What three packets are exchanged between two hosts when establishing a TCP connection? SYN SYN ACK ACK 7. What is the purpose of a sequence number (SEQ=) in TCP data packets? To initiate the TCP handshake 8. Explain how a host knows whether a data packet was not received. Host responds with ACK packet 9. Describe how TCP connection is terminated? Host A sends Host B a FIN packet indicating the connection has been terminated. 10. What is a connectionless protocol? UDP(User Datagram Protocol) 11. What is the purpose of the Internet layer in the TCP/IP protocol suite? Used for addressing and routing the data packets. 12. What is the purpose of an ARP request? Asking which network has an IP address 13. What is the purpose of an ARP reply? The protocol that contains the hardware address for a destination host 14. What important networking-troubleshooting...
Words: 524 - Pages: 3
...Erick Dinzey ITT-220 Mr. Falaise HW 1 Pgs. 43-47 All Questions Questions and Problems: Section 1-1: 1. State whether the following network descriptions are describing a MAN, WAN, or LAN: a. LAN b. MAN c. WAN 2. Expand the acronym NIC. Network Interface Card 3. Expand the acronym MAC. Media Access Control 4. Expand the acronym LAN. Local Area Network 5. Expand the acronym WAN. Wide Area Network Section 1-2: 6. Define the term protocol. Set of rules established for users to exchange information. 7. Define the term topology. Architecture of a network. 8. Define the term deterministic. Access to the network is provided at fixed time intervals 9. A disadvantage of the token-ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding a Token-ring hub (A hub that manages the passing of the token in a Token-Ring network.) 10. State the network topology being used in the following figures (Bus, Star, Ring, or Mesh). a. Mesh b. Bus c. Ring d. Star 11. What is the difference between a hub and a switch? Hub – Broadcasts data it receives to all devices connected to its ports. Switch – Establishes a direct connection from the sender to the destination without passing the data traffic to other networking devices. Section 1-3: 12. Define the acronym CSMA/CD and the protocol that uses CSMA/CD. ...
Words: 1934 - Pages: 8
...Assignment 2.1 Chapter 5 1-37 odd | | | | * What are the four layers of the TCP/IP model? Application layer, Transport layer, Internet layer, and Network Interface layer. * What are well-known ports? Ports reserved by ICANN (1 – 1023) * Define the purpose of a connection oriented protocol. It establishes a connection, manages the delivery of data, and terminates the connection. * What is the purpose of a sequence number (SEQ=) in TCP data packets? The sequence number is used to keep track of the data packets being transferred from host A to host B. * Describe how a TCP connection is terminated. The Host B sends a FIN (finish) packet to host A. Host A then sends an ACK packet acknowledging the reception of the FIN packet. Host A sends a FIN packet, then Host B responds with an ACK packet. * What is the purpose of the Internet layer in the TCP/IP protocol suite? Defines the protocol used for addressing and routing data packets. * What is the purpose of an ARP reply? The protocol that contains the hardware address for the destination host. * When is IGMP used? It’s used to control the flow of data in the network, for reporting errors, and for preforming diagnostics. * Convert the following 8-bit binary number to decimal: 10010011. 147. * Convert the following 8-bit number to decimal: 1111100. 252. * Convert the number 192 to its binary equivalent. 11000000. * Convert the number 96 to its binary equivalent. 01100000...
Words: 343 - Pages: 2
...Assignment 9.1: Chapter 12 1. List five advantages of an optical communications link. • Enormous Bandwidths • Low transmission loss • Immunity to cross talk • Electrical Isolation • Small size and weight 2. Define refractive index • Ratio of the speed of light in free space to its speed in a given material. 3. What are the commonly used wavelengths in fiber optic systems? • Dense Wavelength division Multiplexing. 4. What are the typical core/cladding sizes (in microns) for multimode fiber? • The two types of fiber are multimode and single mode. Within these categories, fibers are identified by their core and cladding diameters expressed in microns (one millionth of a meter), e.g. 50/125 micron multimode fiber. • Most fibers are 125 microns in outside diameter - a micron is one one-millionth of a meter and 125 microns is 0.005 inches- a bit larger than the typical human hair. 5. Define mode field diameter. • The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting (AAA) framework for applications such as network access or IP mobility. 6. What are the four factors that contribute to attenuation? • Scattering • Absorption • Macrobending • Microbending 7. What are the three types of dispersion? • Modal dispersion • Chromatic dispersion • Polarization mode dispersion 8. What is a dispersion compensating fiber? • A fiber that acts like an equalizer, negative dispersion canceling positive dispersion. 9. What is a...
Words: 877 - Pages: 4
...40.) 802.11b: NETGEAR ANT24O5 5dBi Omni-Directional 802.11 22.99 http://www.compuplus.com/ D-Link ANT24-0600 - Antenna - 802.11 b/g - indoor - 6 dBi – directional 14.99 http://www.amazon.com/D-Link-ANT24-0600-Antenna-802-11-directional/dp/B00064AW62 802.11a: TRENDNET TEW-AI75OB DUAL-BAND 802.11A/G 7/5DBI ANTENNA (TEWAI75OB) 23.65 http://www.beachaudio.com/Trendware/Tew-Ai75ob-p-89924.html?utm_source=froogle&utm_medium=cpc&utm_campaign=tew-ai75ob&utm_content=atr Outdoor Pannel Antenna 23DBI 802.11A Directional 152.00 http://www.amazon.com/Outdoor-Pannel-Antenna-802-11A-Directional/dp/B0016HM8VA 802.11g: PROSAFE™ 9 DBI OMNI-DIRECTIONAL ANTENNA ANT2409 129.99 http://www.netgear.com/products/business/access-points-wireless-controllers/antennas-cables/ANT2409.aspx Sewell Part #: SW-6130 Mfg Part #: TEW-OA24D 164.95 http://sewelldirect.com/trendnet-802-11g-wireless-WLAN-24dBi-outdoor-antenna.asp?source=froogle&utm_source=Froogle&utm_medium=cse&cvsfa=1306&cvsfe=2&cvsfhu=53572d36313330 802.11n: CP TECH OAN-2151 Omni-directional Antenna $64.24 http://www.buy.com/prod/cp-tech-oan-2151-omni-directional-antenna-15-dbi-n-type/q/loc/101/210878384.html Netgear ProSafe ANT224D10 2X2 Indoor/Outdoor 10 dBi Directional Antenna, RoHS Compliant, P/N: ANT224D10-10000S. $230 http://www.axiontech.com/prdt.php?item=90457 41.) I would look around and see what other wireless devices, cordless phones, Bluetooth devices and the such to...
Words: 353 - Pages: 2
...Harry lary IT220 Chapter 11 pg 443-444 # 1-39 odd 1. List two advantages of wireless networking. 3. What is an ad hoc network? 5. What are the four physical layer technologies being used in 802.11 wireless networking? 7. Define a pseudorandom sequence as it applies to FHSS. 9. What is the frequency range used by 802.11a, and what modulation technique is used? 11. Define MIMO as it applies to 802.11n. 13. What is the purpose of an access point? 15. What is an association, and what is its purpose? 17. Draw a picture of a point-to-point wireless connection 19. In what frequency band does Bluetooth operate? 21. What is a piconet? 23. What is the purpose of the paging procedure in Bluetooth? 25. What are the three parameters that define an RFID system? Means of powering the tag, Frequency of operation, Communications protocol (also called the air interface protocol) 27. Cite three advantages for using an active RFID tags? 29. What is the WiMax frequency standard for the United States? 3.5 GHz 31. How does WiMax differ from Wi-Fi? Wimax using as a wireless 'MAN' for broad band Internet connection, between 30 and 40 miles Wi-fi using as a wireless 'LAN' to connect access point or PC in network, between 25 and 40 meeter 33. What is the purpose of wireless beacons? Beacon's flexible technology platform is ideally suited for custom applications 35. What is the purpose of WEP...
Words: 324 - Pages: 2
...GE117 Composition I | A 4 credit hour Composition course This course covers phases of the writing process, with special emphasis on the structure of writing and techniques for writing clearly, precisely and persuasively. Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE127 College Mathematics I | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: quadratic, polynomial and radical equations, linear functions and their graphs, systems of linear equations, functions and their properties and triangles and trigonometric functions. Activities will include solving problems and using appropriate technological tools. Prerequisite: GE184 Problem Solving or TB184 Problem Solving or GE150 Survey of the Sciences or equivalent; Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE184 Problem Solving | A 4 credit hour Science course This course introduces students to problem solving techniques and helps them apply the tools of critical reading, analytical thinking and mathematics to help solve problems in practical applications. GE192 College Mathematics II | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: exponential and logarithmic equations and functions, graphs of trigonometric functions, trigonometric equations, polar coordinates, oblique triangles, vectors and sequences. Prerequisite:...
Words: 1186 - Pages: 5
...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...
Words: 4114 - Pages: 17