Premium Essay

Lab 5 It220

In:

Submitted By Dozier97
Words 845
Pages 4
LAB 5
IT220
Exercise 5.1.1 * The 802.1 standard defines the 802 family of standards, describes the local area network, and defines the LAN address format.
Exercise 5.1.2 * The 802.3af standard originally defined PoE functionality. The standard was enhanced in the year 2009, the name of it is 802.3at.
Exercise 5.1.3 * 500 meters * 185 meters * 100 meters * Fiber Optic * UTP, 100 Meters * UTP, 100 Meters * Multi-Mode-Fiber Optic, 550 Meters * Single Mode- Fiber Optic * UTP 4 Pairs, 100 Meters
Exercise 5.1.4 * The numeric prefix before BASE means the speed in Mbps. The inclusion of a postfix of -T means that the cable is a twisted pair standard.
Lab 5.1 Review 1. The maximum speed of traffic would be between 10Mbps, and 100Mbps because they would have to negotiate the amount of bandwidth to send the node in between the two different network standards. 2. It is possible by also using a negotiation to uphold the maximum speed of the lesser UTP wire for example if Cat3 and Cat5e had to negotiate the Cat5e would have to meet Cat3’s standard maximum speed.

Exercise 5.2.1 * A MAC address must be unique for every NIC card produced because they are being compared to all other unicast MAC addresses in the same LAN. The effect would be that the MAC address would be duplicated.
Exercise 5.2.2 * It gives information on the connection its physical address and DHCP status.

Exercise 5.2.3 * The physical address for this connection is 00-0C-29-45-A4-2E.
Exercise 5.2.4 * The manufacturer for my NIC is VMware. The information given is the address of the manufacturer.
Exercise 5.2.5 * The IP address of my NIC card is 192.168.80.147. The address listed for the default gateway is 192.168.80.2.

Exercise 5.2.6 * The steps involved are checking if the source devices wants to

Similar Documents

Free Essay

Itt It220 Lab 5

...40.) 802.11b: NETGEAR ANT24O5 5dBi Omni-Directional 802.11 22.99 http://www.compuplus.com/ D-Link ANT24-0600 - Antenna - 802.11 b/g - indoor - 6 dBi – directional 14.99 http://www.amazon.com/D-Link-ANT24-0600-Antenna-802-11-directional/dp/B00064AW62 802.11a: TRENDNET TEW-AI75OB DUAL-BAND 802.11A/G 7/5DBI ANTENNA (TEWAI75OB) 23.65 http://www.beachaudio.com/Trendware/Tew-Ai75ob-p-89924.html?utm_source=froogle&utm_medium=cpc&utm_campaign=tew-ai75ob&utm_content=atr Outdoor Pannel Antenna 23DBI 802.11A Directional 152.00 http://www.amazon.com/Outdoor-Pannel-Antenna-802-11A-Directional/dp/B0016HM8VA 802.11g: PROSAFE™ 9 DBI OMNI-DIRECTIONAL ANTENNA ANT2409 129.99 http://www.netgear.com/products/business/access-points-wireless-controllers/antennas-cables/ANT2409.aspx Sewell Part #: SW-6130 Mfg Part #: TEW-OA24D 164.95 http://sewelldirect.com/trendnet-802-11g-wireless-WLAN-24dBi-outdoor-antenna.asp?source=froogle&utm_source=Froogle&utm_medium=cse&cvsfa=1306&cvsfe=2&cvsfhu=53572d36313330 802.11n: CP TECH OAN-2151 Omni-directional Antenna $64.24 http://www.buy.com/prod/cp-tech-oan-2151-omni-directional-antenna-15-dbi-n-type/q/loc/101/210878384.html Netgear ProSafe ANT224D10 2X2 Indoor/Outdoor 10 dBi Directional Antenna, RoHS Compliant, P/N: ANT224D10-10000S. $230 http://www.axiontech.com/prdt.php?item=90457 41.) I would look around and see what other wireless devices, cordless phones, Bluetooth devices and the such to...

Words: 353 - Pages: 2

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18