...CN LAB REPORT Dept. of ISE, BVBCET Department of Information Science & Engineering, BVBCET Hubballi COMPUTER NETWORKING LAB Mahantesh Patil 2BV14IS410 Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET LAB-01 List the hardware components 1) Difference between switch and Hub: 2) Difference between SWITCH and ROUTER 3) Differences between Router and Gateway 4) What is the Difference between Subnetting and Supernetting? HARDWARE COMPONENTS Cables: 1|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable, Twisted pair cable. RJ-45 The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way. 2|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET SWITCHES: Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports. NIC(NETWORK INTERFACE CARD) A network card, network...
Words: 3647 - Pages: 15
...NETW310 Week 5 Lab Report To complete your Week 5 Lab Report, answer all of the questions below. Create your report using the template starting on page 2 and submit it to the Week 5 Dropbox by the due date. NETW310 11/25/2014 Lab #5, Wireshark Introduction Lab Lab Report Each answer is worth seven points. Use a red colored font for you answers. Place the answers below the questions. 1. Is Wireshark open-source or proprietary? Open Source 2. What is seen in each of the three panes that display the packets seen on a local area network? The List Pane shows the packets that have been captured. The Tree View Pane shows the protocols in the packet. The Byte View Pane shows the raw data . 3. What does a display filter do? Allow you to define what packets are displayed in the filter pane 4. What does the protocol column show? The Highest Level Protocol in the frame 5. How do you expand the details in a layer of the packet in the middle frame? By pressing the plus sign in the upper left hand corner 6. Capture files have what file name extension? .pcap 7. The time column shows what? It shows the time relative to the first packet in increasing order. 8. When you right click on something in one of the panes what happens? A set of options appear that can be apllied to the packet 9. How is a display filter removed? Select clear in the top toolbar 10. When a filter is correct what color is the background of the filter window?...
Words: 271 - Pages: 2
...Lesson 2 Lab Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the protocols that are used in it. This lab is important to the student because it takes the student through a thought experiment about how data would pass thorough the TCP/IP Model down from the computer and up through the destination computer. By doing this thought experiment the student will come to better understand how different protocols work together to accomplish a specific task. Materials • Word processing document • Textbook Do the Lab Follow Protocols through the Layers of the TCP/IP Model 1. Read though the section of this lesson titled “How the Layers Work Together.” 2. Carefully study Figure 2-11. [pic] 3. In a word processing document, list the layers of the TCP/IP Model and then the protocols that the discussion you read says are used on each layer to move the data from one location on the network to another. The following is what your answer should look like: • Application layer: HTTP • Transport layer: TCP • Internet layer: IP • Network Interface layer: Ethernet 4. List the protocols as they correspond to the TCP/IP Model...
Words: 791 - Pages: 4
...Lab #10 Securing the Network with an Intrusion Detection System (IDS) Introduction Nearly every day there are reports of information security breaches and resulting monetary losses in the news. Businesses and governments have increased their security budgets and undertaken measures to minimize the loss from security breaches. While cyberlaws act as a broad deterrent, internal controls are needed to secure networks from malicious activity. Internal controls traditionally fall into two major categories: prevention and detection. Intrusion prevention systems (IPS) block the IP traffic based on the filtering criteria that the information systems security practitioner must configure. Typically, the LAN-to-WAN domain and Internet ingress/egress point is the primary location for IPS devices. Second to that would be internal networks that have or require the highest level of security and protection from unauthorized access. If you can prevent the IP packets from entering the network or LAN segment, then a remote attacker can’t do any damage. A host-based intrusion detection system (IDS) is installed on a host machine, such as a server, and monitors traffic to and from the server and other items on the system. A network-based IDS deals with traffic to and from the network and does not have access to directly interface with the host. Intrusion detection systems are alert-driven, but they require the information systems security practitioner to configure them properly. An IDS provides...
Words: 3209 - Pages: 13
...Fall 2015 Analytical Chemistry I Quantitative Analysis Chem 341WI 4 Credit Hrs | Instruction Mode: L (lab) and P (class) Professor Andrew Holder holdera@umkc.edu • SCB 113 • 816-235-2293 • 913-543-3709 (fax) Office Hours: T/Th 1:00-4:00, 5:00 – 7:30 Lecture: T/Th 4PM | Labs: T/Th 1PM (AFT), 5PM (EVE) Credit: Lab + Lecture = 4 credits | Format: Lab + Lecture (P) Lecture / Class Policies and Procedures Correspondence with UMKC Student Learning Outcomes Scientific Reasoning & Quantitative Analysis * Apply principles/methods of sciencea, mathb, statisticsc and logicd to solve problems and draw logical inferences. * Chpt 3: Experimental Error (c) * Chpt 4: Statistics (c) * Chpt 6: Chemical Equilibrium (a, b, d, e, f) * Chpt 7: Activity & Systematic Trtmnt, (a, d, e, h) * Chpt 8: Monoprotic Acid-Base Equil., * Chpt 9: Polyprotic Acid-Base Equil. (a, d, e, g, h) * Develop quantitative literacy enabling comprehensione and evaluationf of info in broad contexts. * Chpt 3: Experimental Error, Chpt 4: Statistics (f) * Chpt 5: Quality Assurance and Calibration Methods (c) * Understand methodsg/principlesh of scientific discovery and their application * Sxn 0-2: The Analytical Chemist’s Job (g, h) * Sxn 0-3: General Stages in a Chemical Analysis (g, h) * Chpt 2: Tools of the Trade (g) * Carrying out laboratory analyses (g, h) ...
Words: 4091 - Pages: 17
...Major Milestones of the Telecommunications Industry 1837 Samuel Morse invents the telegraph - The information age began with the telegraph, which was invented by Samuel F.B. Morse in 1837. This was the first instrument to transform information into electrical form and transmit it reliably over long distances. The earliest form of electrical communication, the original Morse telegraph of 1837 did not use a key and sounder. Instead it was a device designed to print patterns at a distance. 1858 Transoceanic telegraph cable is laid – The transoceanic telegraph cable is an undersea cable running under the Atlantic Ocean used for telegraph communications. The first communications occurred August 16, 1858, reducing the communication time between North America and Europe from ten days, the time it took to deliver a message by ship, to a matter of minutes. 1876 Alexander Graham Bell invents the telephone - The telegraph was followed by Alexander Graham Bell's invention of the telephone in 1876. The magneto-telephone was one of the first telephones on which both transmission and reception were done with the same instrument. 1885 - Incorporation of the American Telephone and Telegraph company (AT&T). After its incorporation in 1885, the American Telephone and Telegraph company dominated the telecommunications market. 1888 - Heinrich Hertz discovers the electromagnetic wave 1895 - Marconi begins experimenting with wireless telegraph 1901 Guglielmo Marconi invented the radio—the...
Words: 727 - Pages: 3
...Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your handy drive before use to reduce the risk of any virus outbreak. 9. The Management is not responsible for any loss of data or personal belongings regardless of the cause. 10. No moving or unplugging of any equipment in the labs. 11. No pornographic and offensive images & videos. 12. No games (both computer and physical). 13. No...
Words: 413 - Pages: 2
...Computer Lab Rules & Regulations Swinburne University computing facilities may only be used by current Swinburne students and staff. Swinburne identity card must be presented upon request. The computing facilities should only be used for educational and research purposes. The following rules and regulations apply to all lab computers on campus. Lab Rules & Regulations 1. The computer lab provided by the University is solely for educational and research activities. Students are prohibited from using the lab for any other reasons. 2. Students must have a valid student ID card to use the computer labs. 3. Students must abide by all rules and regulations, such as those shown on booking sheets, computer screens, and notices near the computers or on the wall. 4. Two-hour Usage Rule: When the lab is full and students are waiting for a vacant computer, the two-hour rule will apply. Students will be limited to 2 hours on the computer per session. 5. All users must abide by the license requirements of any software or resources being used on the computer. 6. The downloading of non-coursework related materials is strictly prohibited on the campus network as it uses much of the network bandwidth, thus slowing down all internet access. 7. All personal data must be saved on a floppy disk, handy drive or on your Home drive. Do not save personal data on the computer hard drive. 8. Please be reminded to scan your handy...
Words: 484 - Pages: 2
...Richard and Juliette Massey. He is a graduate of the public schools of St. Louis, Missouri and attended high school in University City, a suburb of St. Louis. After receiving a Harvard Book Award and a National Achievement Scholarship at University City High School, he entered Princeton University in 1973. There, he encountered his first real introduction to research mathematics in an honor calculus course taught by the late Ralph Fox. He wrote his undergraduate senior thesis, titled "Galois Connections on Local Fields,'' in algebraic number theory, under the direction of the late Bernard Dwork, and graduated from Princeton in 1977 with an A.B. in Mathematics (Magna Cum Laude, Phi Beta Kappa, and Sigma Xi). That same year he was awarded a Bell Labs Cooperative Research Fellowship for minorities to attend graduate school in the department of mathematics at Stanford University. In 1981, he received his Ph.D. degree from Stanford and his thesis, titled "Non-Stationary Queues,'' was directed by Joseph Keller. Dr. William Massey's parents, Juliette and Richard Massey Sr. were both educators; she was from Chattanooga, Tennessee and he was from Charlotte, North Carolina. They met at Lincoln University in Jefferson City, Missouri which became his birthplace. Professor Massey's initial fascination with numbers started when his mother would let him play with plastic numbers and cut up old calendars. His family moved to Saint Louis, Missouri when he was four. There he came of age educationally...
Words: 1118 - Pages: 5
...Alcatel-Lucent is a global telecommunications corporation located in Paris, France. It has, under its wing, Bell Laboratories aka Bell Labs. They were previously known as AT&T Bell Laboratories and Bell Telephone Laboratories is now the research and development subsidiary of the French-owned Alcatel-Lucent. Over the past eight decades, Bell Labs R&D gave birth to new technologies and seminal scientific discoveries. (Alcatel Lucent, para 1) Elisha Grey and Enos N. Barton formed Western Electric Company in 1869. Both of them started a small manufacturing firm based in Cleveland, Ohio which was to become the largest electrical manufacturing company in America. In 1881, Alexander Graham Bell, an extraordinary leader of American Telephone & Telegraph (AT&T), purchased a controlling interest in Western Electric and made it the exclusive developer and manufacturer of all equipments for the Bell telephone companies. Now, the Bell system has provided much telephone services and support to America and Canada in the 1877 to 1984. It was then led by AT&T. In 1898, Compagnie Générale d'Electricité (CGE) was born, founded by a French engineer named Pierre Azaria. It was involved in business with several industries in Germany. Mainly it dabbled in electricity, transportation, electronics and telecommunications. CGE then rose up the ranks and became a leader in digital communications and would be known as well to produce train à grande vitesse – high speed trains in France. In...
Words: 2450 - Pages: 10
...Net-Worm.Win32.Kido.ih Detected | Feb 20 2009 07:04 GMT | Released | Apr 02 2009 16:24 GMT | Published | Feb 20 2009 07:04 GMT | Manual description Auto description This description was created by experts at Kaspersky Lab. It contains the most accurate information available about this program. Manual description Auto description This is a description which has been automatically generated following analysis of this program on a test machine. This description may contain incomplete or inaccurate information. Technical Details Payload Removal instructions Technical Details This network worm spreads via local networks and removable storage media. The program itself is a Windows PE DLL file. The worm components vary in size from 155KB to 165KB. It is packed using UPX. Installation The worm copies its executable file with random names as shown below: %System%\<rnd> %Program Files%\Internet Explorer\<rnd>.dll %Program Files%\Movie Maker\<rnd>.dll %All Users Application Data%\<rnd>.dll %Temp%\<rnd>.dll %Temp%\<rnd>.tmp <rnd> is a random string of symbols. In order to ensure that the worm is launched next time the system is started, it creates a system service which launches the worm’s executable file each time Windows is booted. The following registry key will be created: [HKLM\SYSTEM\CurrentControlSet\Services\netsvcs] ...
Words: 1158 - Pages: 5
...historically the communication industry has overwhelmingly been a monopoly. This was also true in the United States. As AT&T evolved from the late 19th century, except for a year as a nationalized company, existed as a national monopoly. In the so- called Progressive era of the 1910’s, the idea that a natural monopoly would be more efficient and economical than competing systems took hold. The idea of universal service, with rural rates being lower than urban rates (price discrimination). While never a “true” monopoly, with its substantial market share, and restrictions on connecting non-Western Electric equipment to its network, AT&T operated as one. The barriers to entry were primarily economic, the expensive right-of-way access and materials for wired connectivity being first among them. The restriction of un approved devices not being allowed on the AT&T network, limited interconnecting between competitors as well as additional connection & maintenance fees contributed to its dominance. As a monopoly, there were limited phone styles, and little need for deep price reduction through economy of scale or innovation, though state commissions regulated rates. The upside of the additional revenue, Bell Laboratories had been able to fund and develop technologies that are cornerstones of the modern society that are too numerous to mention here. It is debatable if these would have been developed as quickly without this reliable source of research funding....
Words: 488 - Pages: 2
...| | Home | 3D Internet | i3D Advantage | SilverStream | Partners | News | Contact | | SLCN.TV We offer 8 channels of content filmed in Second Life. Weekly live shows include fashion, business, sports, shopping and lifestyle. More information at www.slcn.tv | | empulse GmbH, Cologne, Germany Our Mission is to help our clients to be more successful. We focus on the application of modern internet concepts and technologies to realize outstanding business capabilities for medium to large companies. We offer high quality and result oriented consulting, project management and delivery services to build-up business capabilities as a combination of the right strategy, processes, people and technology.We have successfully completed over 50 projects in tourism, logistics, automotive, financial services and other business domains - the two managing directors alone have 30 years of professional services and IT experience. www.empulse.de | | SL Exchange The premier Second Life®-integrated commerce website featuring real-time shopping, real estate listings, and full-fledged currency exchange. Our core services include the Marketplace, an Auction Block, Real Estate Listings, and a Currency Exchange. To complete your SL Exchange experience, we provide a Forum for discussions and technical help, as well as Member Blogs for those who like to take a peek behind the scenes. www.slexchange.com | | Joysco Studio Joysco is a derivative word derive from the joy of collaboration...
Words: 482 - Pages: 2
...Analysis Abstract Alcatel Lucent Technologies is a builder of network base stations, towers, and end to end networks IP solutions for the construction of 3G/4G wire and wireless technologies. Alcatel-Lucent Technologies have unique research environment; Bell Labs. Employments benefits and multi-cultural environment are key merits at Alcatel-Lucent Technologies. Workforce reduction process and lack of strategic business decision are the main drawbacks of Alcatel-Lucent Technologies. With Nokia acquiring of Alcatel-Lucent Technologies, a new giant company is formed to better compete with infrastructure telecommunications as Cisco, and Ericson. Keywords: Alcatel-Lucent, Bell Labs, Business, Multi-cultural Assignment 1: Business Analysis Alcatel-Lucent is leading converged IP networking, ultra-broadband access, and could technologies company. On November 30, 2006, Alcatel-Lucent Technologies merge occurred by 25-billion-euro balance. It employed about 80,000 people worldwide and has annual revenue of about 16 billion euros. Alcatel-Lucent technologies combined two giant companies - Alcatel and Lucent Technologies. Lucent Technologies was spun off from AT&T while Alcatel parent company was CGE (la Compagnie Générale d’Electricité). Alcatel-Lucent Technologies Business Performance Three factors, either economic, social, or both, impacting the performance of the organization you selected Bell labs innovations have a unique research environment where scientists have...
Words: 825 - Pages: 4
...Unit 1 Research 1 PT1420 In the 1970s the programming language that was most popular was Pascal. Pascal was designed in 1968-69 but published in 1970. Niklaus Wirth created the Pascal language to “1) make available a language suitable for teaching programming as a systematic discipline based on fundamental concepts clearly by the language, and 2) to define a language whose implementations could be both reliable and efficient on then-available computers. In 1972 the C programming language was developed by Dennis Ritchie. C was created to work with the system Unix. “Unix gives C such advanced features as dynamic variables, multitasking, interrupt handling, forking, and strong, low-level, input-output. Because of this, C is very commonly used to program operating systems such as Unix, Windows, the MacOS, and Linux.” In the 1980s the popular programming language was C++. C++ was developed at Bell Laboratories. C++ is a general purpose multi-paradigm spanning compiled language that has both high-level and low-level languages’ features. It was started as an enhancement to the C programming language, Bjarne Stroustrup in 1979. In the 1990s Java was the popular programming language. It was created in 1991 developed by James Gosling at Sun Microsystems and release in 1995. In the 2000s Visual Basic (VB) was popular in the programming world. VB was developed from BASIC which was originally developed in 1964 by John Kemeny and Thomas Kurts. VB is a Microsoft programing language and software...
Words: 261 - Pages: 2