...Address Class Historical Significance of the address classes: Class A: the first of the address classes, which is responsible for the value ranges of IP from 0-126 and also has 16,177,214 hosts. It also has 256 networks and the most significant bits are 0000. Class B: The second of the address classes, which is responsible for the value ranges of IP from 128-191. It also has 65,534 hosts and 65,536 networks. The most significant bits are 1000 and it is also a common class among most IP addresses. Class C: the third of the address classes, which is responsible for the value ranges of IP from 192-223 the most significant bits are 1100. It only has 254 hosts but it also has 16,177,216 networks since a lot of people have their IP addresses starting with 192.xxx.xxx.xx. Class D: the fourth of the address classes, which is responsible for the value ranges of IP from 224-239. Its most significant bits are 1110, and it does not have any networks or hosts because this class is rarely considered since the start of IP addresses don’t often start with 224 and above. Class E: the fifth of the address classes, which is responsible for the value ranges of IP from 240 and above. The significant bits of this class are 1111 and just as Class D does not have any hosts or networks, the same is with this class since IP addresses do not go above 192 usually. http://www.inetdaemon.com/tutorials/internet/ip/addresses/classful.shtml Address space A: the value range is from 0-126 so that means...
Words: 639 - Pages: 3
...1. What three numbering systems are used in computing? Decimal, Binary and Hexadecimal 2. What is the BASE of Decimal? How many characters? 10 is the base of Decimal and its 10 characters. 3. What is the base of Binary? How many characters? 2 is the base of Decimal and its 2 characters 4. What number system is used for everyday math? Decimal 5. What number system is used to store data by computers? Binary 0 and 1 6. List the decimal to binary conversion methods. Binary conversion charts methods and Division by 2 methods 7. Practice Decimal to Binary conversion. 47÷ 2 = 23 with a reminder of 1 23 ÷2 = 11 with a reminder of 1 11 ÷ 2 = 5 with a reminder of 1 5 ÷ 2 = 2 with a reminder of 1 2 ÷ 2 = 2 with a reminder of 0 1 ÷ 2 = 1 with a reminder of 1 the Binary will be 101111 8. State the powers of 2 from exponent 0 through 7. 27 26 25 24 23 22 21 20 9. What method can be used for Binary to Decimal conversion? The conversion charts methods. 10. Practice Binary to Decimal conversion. 10011 24 23 22 21 20 16 8 4 2 1 1 0 0 1 1 16 0 0 2 1 16 + 2 + 1 = 19 11. State the basic units of measurements for bytes...
Words: 576 - Pages: 3
...Juan J. Morales Network Infrastructure Professor Lambert DB – 2 1 - Explain the concept of a server role in detail. List some of the available server roles, and demonstrate how to configure them. Follow this by a demonstration of adding Windows Server 2008 features how do these features benefit and administrator? A server role is a software program included in a server software that performs a specific function, some of this server roles are as follows. * DNS Server – Provide the IP name resolution to a network * DHCP Server - Provides an Internet Protocol (IP) host with its IP address and other related and configuration information such as the subnet mask and default gateway. Just to name a few. From server manager in the left-hand pane, double-click the Roles node. In the right-hand pane, click add role, and click next to bypass the welcome screen. The add roles wizard windows appears, select the role and click next follow the prompts for the selected role to be install. It makes the management of the server more manageable and integrity of the network. 2 - The installation of Windows Server 2008 can be done in many different methods, list and explain each method in detail. Follow this by stepping through the actual process of this installation of those methods? Minimum Requirement for Installing Windows 2008 Processor 1.4GB – 64 – Bit Rams Minimum 512 MB, Maximum 32 GB Hard disk Requirement Minimum: 32 GB 1. Insert a bootable Windows Server...
Words: 457 - Pages: 2
...Chapter 7 Key Terms Switched circuit: a circuit created by the phone company in reaction to signaling.(the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished. Dedicated circuit: Reserved for a specific use. In communications, a dedicated channel is a line reserved exclusively for one type of communication Circuit switching: A type of communications in which a dedicated channel (or circuit) is established for the duration of a transmission. The most ubiquitous circuit-switching network is the telephone system, which links together wire segments to create a single unbroken line for each telephone call. Packet switching: Refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination. Leased line: A permanent telephone connection between two points set up by a telecommunications common carrier. Typically, leased lines are used by businesses to connect geographically distant offices. Time-division multiplexing: a type of multiplexing that combines data streams by assigning each stream a different time slot in a set. TDM repeatedly transmits a fixed sequence of time slots over a single transmission channel. T-carrier system: the name of the combination of different physical line standards(DSO, DSI, DS3 and others), plus circuits switches that use time division multiplexing...
Words: 335 - Pages: 2
...mobile phone. The original iPhone had a 3.5 inch screen at 320 X480 and 163ppi, a quad-band 2G edge data radio, 802.1b.g Wi-Fi, Bluetooth 2.0 EDR, and a 2 megapixel camera. the iPhone was powered by an ARM-based Samsung 1176 Z-S processor and power VR MBX lite 3D graphics, 128 megabytes of random access memory(RAM), as well as four or eight gigabytes of NAND flash storage, and also could sync to iTunes. The iPhone software was very impressive, Apple used a full version of Safari, based on the exact same web kit HTML rendering engine that powered the desktop version on the Mac. Apple also created the best mobile YouTube and maps implementation ever seen on mobile. Unfortunately the original iPhone didn’t have CDMA and EVDO rev A network compatibility. That meant it couldn’t work on two of the U.S. big four carriers, Verizon and Sprint. This actually didn’t matter; because the original iPhone was exclusive to AT&T. In addition to no hardware keyboard or stylus, the iPhone also didn’t have a...
Words: 821 - Pages: 4
...1. A network design customer has a goal of 99.80 percent uptime. How much downtime will be permitted in hours per week? How much downtime will be permitted in minutes per day and seconds per hour? Which values are acceptable in which circumstances? Ans: To compute the uptime/downtime is to take in concern merely the number of minutes before now passed for up-to-date month and existing year which is possibly what we need to find. A typical MTBF goal for a network that's extremely relied upon is 4000 hours. In different words, the network mustn't fail additional typically than once each 4000 hours or 166.67 days. A usual MTTR aim is one hour. In another sense the network failure ought to be fastened among one hour. I calculated downtime ratio by dividing occupied time into quantity of downtime. The summation of that number would be the ratio of downtime. Downtime for 99.8 percentile would be: Availability = MTBF / (MTBF + MTTR) SLA level of 99.8 % uptime/availability gives following periods of potential downtime/unavailability: * Daily: 2m 52.8s * Weekly: 20m 9.6s * Monthly: 1h 27m 39.5s 2. Assume you are in New York City in the United States and you are downloading a 100-KB web page from a server in Cape Town, South Africa. Assume that the bandwidth between the two cities is 1 Gbps. Which type of delay will be more significant, propagation delay or transmission delay? Defend your answer. Ans: Delay is pertinent for every data transmission expertise but...
Words: 1445 - Pages: 6
...Running head: Cyber Security Securing Networks Wagner, Juan ISSC342 ABSTRACT As our dependency on technology grows so does the need to protect the data contained in them. We live in a world where digital imaginary data has become just as important if not more than actual physical work these machines perform. One of the biggest jobs for any respectable firm is the ability to protect its information from the unrelenting attacks by hackers, insiders, social engineers and software exploits. this is an on going struggle that will never end. The reality is there is no way to fully and completely protect a network. The second best thing we can do as IT professionals is ensure protocols that have resulted in having a more secure network are being met. Since most of the errors in the world are human errors we must take extra consideration when securing a network. Computers don't make mistakes only people make mistakes. Finally as professionals we must do our job in researching new exploits, tools and reasons why someone would want to perform a cyber attack on said company. INTRODUCTION In the IT world knowledge is power, and there is much to be learned if a corporation is to be able to perform at an AAA level. There are many things that can go wrong in regards to intellectual property. Some of those things are certificates, classification of data, and how computing devices are used. In conjunction with the material professionals also should be actively researching...
Words: 1917 - Pages: 8
...Everything comes with a cost no matter what we try to do, altering an organization’s network topology is not without challenges. A common belief among IT admins is that network topology is an impossible task. Admittedly, the task can be difficult. Changing the network topology would entail pinpointing specific connections between devices and changing aspects such as server IPs, server domain names, and client domain names. Furthermore, changing aspects of the network topology may even affect the connectivity of the whole network. “Lost productivity was the biggest cost driver of successful phishing attacks, whereas clean up and incident response accounted for most of the costs of remediating malware attacks, according to Ponemon’s report, The Cost of Phishing & Value of Employee Training. For the report, Ponemon surveyed 377 IT security employees at a range of organizations.” Another example is a performed action (which the attacker persuades the victim to perform it) for a PayPal user is submitting his/her login credentials to a fake website that looks similar to...
Words: 526 - Pages: 3
...in researching 1) Developing a search strategy showed me how to organize my material and stay on topic. It also introduce me to key concepts which I have been using in my classes when studying and taking notes. Ironically I found using this method at work as well. Recently I found a solution to an ongoing network problem and my manager approached me asking me to fully research the resolution draft an email and send it out to the entire team.By using the search strategy I was able to gather the correct information that was needed to draft the email and send it to my team. 2)The Boolean operator AND OR NOT stuck in my head the most. I learned that this method is the main component to an effective statement and to broaden or narrow your search. When I use to search google without using the Boolean operator I always wondered why the search engine always gave me along list of searchs that didnt really relate to what I was looking up. By using this method I was able to get the exact results that I wanted and as I mention above this method was also used when I did my initial search statement for the email I sent to my colleagues on how to properly resolve the network issue. 3)Lastly the most important component of a research project is to cite the resources appropiately. In this course i was introduce to several styles of citing. There are different citing styles for different documentation styles. I had to go back and really study this method thoroughly as suggested by...
Words: 337 - Pages: 2
...How would one counter an active attack? b) Give examples of two possible scenarios when one cannot be absolutely certain that an adversary is launching a modification-of-message attack or denial-of-service attack, even when the proper security protections are in place. Explain your answer. c) How could traffic analysis jeopardize security? Give an example to illustrate your answer. Question 2 (a) Is it likely to achieve perfect security for a network (i.e. to have a network that will never fail in terms of security) in the real business world? Give three possible reasons to substantiate your answer. (b) The computing speed is much faster these days compared to that some years back. On the other hand, old algorithms and systems are still in use. Give three reasons to explain this situation. Question 3 a) (i) Explain Security Services and Security Mechanisms. (ii) Suppose the main threat of a network is replay attack. Does the use of confidentiality services protect the network against such attack? Explain your answer. (iii) Is it always the case that only one mechanism can be used to achieve the provision of a particular service? Give an example to illustrate and explain the answer. (b) Explain how the following services ensure security of the systems or of data transfers and give possible example or scenario for each: i) Message authentication ii) Non- repudiation iii) Confidentiality ...
Words: 284 - Pages: 2
...Case Study 1: Harriet’s Fruit and Chocolate Company Daniel Michovich Dr. Otto CIS532: Network Architecture and Analysis January 26, 2013 Mission Statement: Striving to be number one fruit and chocolate industry area wide. Introduction “Harriet’s Fruit and Chocolate Company was established in 1935 in the Pacific Northwest of the United States to ship gift baskets of locally grown peaches and pears to customers in the United States (Oppenheimer, 2011)” In regards to the physical infrastructure of Harriet’s Fruit and Chocolate Company, my investigation will reveal many important aspects to aid in the planning of the network design. First, I will determine the number of buildings to be used, as well as the distance between them and what equipment they will contain such as wiring closets or computer rooms and the current network devices. Determining the distance will help in the cabling design and wiring as well as the selection of technologies and devices to meet the design goals. My investigation will further reveal any architectural or environmental constraints, such as tall trees within the path that power lines may travel, that will assist in decisions such as whether wireless technologies are feasible as well as if there are any impediments to communications or installation, to include all hazards. Infrastructure architecture consists of the hardware, software, and telecommunications equipment that, when...
Words: 1326 - Pages: 6
...| | |The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed | |over several machines | | | | | |[pic] | |Bot | | | | | |[pic] | |Distributed denial of service ...
Words: 2882 - Pages: 12
...customer an opportunity to decide if they want the products or not. iPremier Company iPremier is one of the top retail business that sell the luxury items, profiting $2.1 million on sales $32millions in 2006. Since then sale has grown over 20% annually. There was a decrease, but everything works itself out. Upper management describes working at iPremier as intense. .Qdata is the company that host iPremier computer equipment and provided connectivity to the internet (Austin and Murray, 2007). Although Qdata offers monitoring of website for customer and network operation, they had not invested in advanced technology and was not able to keep staff. During 75-minute attack how well did they iPremier perform. What would you have done differently if you was Bob Turley Bob Turley is new Chief Information Officer and is currently in New York on business. AT 4.31 am he received a call, from the network been hack and wired email received with just the word “Ha”. The site was a DoS attack coming from about 30 locations, the purpose of the attack was an attempt to make the computer unavailable. iPremier was not ready for such an attached and didn’t have anything in order which would help them with such an attacked. The situation was poorly handled, and Bob did not contact anyone higher up to let them know what was going on. He didn’t know who to contact, whether to call police or FBI or who to contact at...
Words: 967 - Pages: 4
... | |*Document Date: |[2013-05-20] | | T&A Handbook [pic] Update Notes |Date |Version |Description |Author | |2013-05-20 |V1 |T&A Handbook |Elham Kalantari | Contents 1 Introduction 3 2 T&A Interfaces 3 2-1 Source Availability 3 2-2 Dashboards 4 2-2-1 General Information 4 2-2-2 Over Time Mode 5 2-2-3 Over Network Elements Mode 9 2-2-4 Dashboards Contextual Menu 9 3 Examples 10 Introduction This document will guide you through the Trending&Aggregation (T&A) user interfaces. Some examples are available at the end. T& A Interfaces 2-1 Source Availability [pic] : This icon allows the visualization of source file availability. By clicking on it, below window appears. [pic] :...
Words: 1080 - Pages: 5
...afford to spend and if anyone is technical in the company or are they going to need some outside help to keep up maintenance after the system is in place. (this can add to the cost of the system) My next step would be to start asking some questions about the law firm. I would like to know what the law firm is in charge of doing. Criminal, civil, family or so on; I think this would give me a better understanding of some of the information I may be working with along the way. As a law firm I am sure they spend a lot of time in the courtrooms and in their home offices so other questions I would ask is if they have cell phones and laptops that will need to access information on the network; this will help in a couple of areas, firstly in deciding if we should consider cloud computing or a private network and secondly, how to set up files access and permissions by departments and depending on size of company, maybe servers. Being a law firm a big consideration would have to be security of the information they access and ways of accessing this information. I would like to talk with the employees also, just to get an idea...
Words: 500 - Pages: 2