...BVBCET Department of Information Science & Engineering, BVBCET Hubballi COMPUTER NETWORKING LAB Mahantesh Patil 2BV14IS410 Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET LAB-01 List the hardware components 1) Difference between switch and Hub: 2) Difference between SWITCH and ROUTER 3) Differences between Router and Gateway 4) What is the Difference between Subnetting and Supernetting? HARDWARE COMPONENTS Cables: 1|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable, Twisted pair cable. RJ-45 The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way. 2|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET SWITCHES: Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports. NIC(NETWORK INTERFACE CARD) A network card, network adapter, or NIC is a piece...
Words: 3647 - Pages: 15
...Parentheses of math equation 4. Node on a network? A generic term for any networking device that sits on the end of links, for the purpose of both connection links to create physical paths and to make decisions about how to forward data through the network 5. Topology-bus 6. Identify protocol and web address Protocol- set of rules that different devices and/or software must follow so that the network work correctly Web address- text that identifies details about one object in a network so that a client can request that object from a serve. An informal term for URL. 7. Basic to every networking standard A document that details information about some technology or protocol related to networking and that document has been passed through a review and approval process that certifies the document as a standard (pg.106) 8. Why is TCP/IP divided into layers Makes it easier for humans to understand and makes it easier to divide the work among different products (pg.110) 9. What layer of OSI model is responsible for encryption The presentation layer (6th layer) 10. Electrical circuit closed A complete loop of material over which electricity can flow 11. Networking coding scheme Is a technique which can be used to improve a network's throughput, efficiency and scalability, as well as resilience to attacks and eavesdropping* 12. Full duplex A networking link that allows bits to be sent in both directions and at the same time2 ...
Words: 1388 - Pages: 6
...GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERsity | Assignment 01 | Advanced Network and Security | | ICT/12/0121 WMIL Wasalage | 9/23/2013 | | Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Abstract This document contains a detailed explanation about the ISO OSI Reference Model used in networking and it also contains details about the networking devices used in setting up LANs & WANs. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Acknowledgement I would like to express my special thanks of gratitude to Mrs. Punsisi Premaratne who gave me this opportunity to do this project in the networking field. Secondly i would like to thank my parents and friends who helped me a lot in finalizing this project within the limited time frame. Table of Contents Abstract 01 Acknowledgement 02 Table of Content 03 List of Figures 04 1.0 Introduction to ISO OSI Reference Model 05 1.1 Physical Layer 07 1.2 Data Link Layer 08 1.3 Network Layer 10 1.4 Transport Layer 11 ...
Words: 5991 - Pages: 24
...NETW-202 Introduction to Networking with Lab Final Exam Answers Follow Link Below To Get Tutorial https://homeworklance.com/downloads/netw-202-introduction-to-networking-with-lab-final-exam-answers/ NETW-202 Introduction to Networking with Lab Final Exam Answers 1. (TCO 5) _____ is a network-scanning technique used to identify which host IP addresses are operational. (Points : 5) 2. (TCO 5) _____ create(s) noise that interferes with information being transmitted across unshielded copper cabling. (Points : 5) 3. (TCO 5) _____ is used in Ethernet where some pairs of twisted-pair wires are crossed, when comparing the RJ-45 connectors on either end of the cable. These 10BASE-T and 100BASE-T cables connect the pair at pins 1 and 2 on each end to pins 3 and 6 on the other end. (Points : 5) 4. (TCO 5) _____ is a general term referring to any energy signal on a transmission medium that is not part of the signal used to transmit data over that medium. (Points : 5) 5. (TCO 5) _____ are a collection of data that establishes a reference for network performance and behavior over a period of time. (Points : 5) 6. (TCO 5) The ______ provides a physical connection to the network (from the network end (Telco, ISP) of the user-to-network equipment), forwards traffic, and provides a clocking signal used to synchronize data transmission. (Points : 5) 7. (TCO 5) The _______ command will bring up a router interface. (Points : 5) 8. (TCO 5) A(n) _____ is an interference...
Words: 8529 - Pages: 35
...Question and Problems Section 5-2 1. What are the four layers of the TCP/IP model? I. Application II. Transport III. Internet IV. Network Interface 2. Which layer of the TCP/IP model processes request from host to make sure a connection is made to the appropriate port? • Application Layer 3. What are well known ports? • Ports Reserved by I.C.A.N.N. (Internet Corporation for Assigned Names and Numbers) 4. Identify the port number for the following applications. a. Telnet-Port 23 b. HTTP-Port 80 c. FTP-Port 20 and 21 d. DNS-Port 53 e. DHCP-Port 67 and 68 5. Define the purpose of a connection orientated protocol. Give an example. • Establishes a network connection. • Example: connection orientated protocol manages the delivery of data and terminates the connection to transport control protocol. 6. What three packets are exchanged between two hosts when establishing the TCP connection? I. Syn II. Syn Ack III. Ack 7. What is the purpose of the sequence number (SEQ=) in TCP data packets? • Used to keep track of data packets being transmitted between host 1 and host 2. 8. Explain how the host knows whether a data packet was not received. • Host one will received a message from host two, indicating that data packet was not received. 9. Describe how a TCP connection is terminated. • The host sends a (FIN) Finish packet to the other connection. The receiving host then sends a FIN packet back to host one, indicating the data...
Words: 744 - Pages: 3
...Attach simulated cables. * Use the simulation interface to identify where simulated cables connect to the computer. You have been hired as a network technician for a small corporate network. Today is your first day on the job and you need to familiarize yourself with the network. A new employee will work in Office 2 and you need to complete the workstation in the office. Complete the following tasks in Office 2: * Add the monitor to the office (next to the computer). * Use the DVI-D cable to connect the monitor to the computer. * Connect the power cord to the monitor and plug in the monitor. * Add the mouse to the office, and connect the mouse's USB cable to a USB port on the computer. * Add the keyboard to the office, and connect the keyboard's USB cable to a USB port on the computer. * Turn on the monitor and the computer. Tip: Click the following button shown in Office 2 to go to the workstation: | | Watch the preceding demonstration to see how to complete any of these tasks. Once you have completed all of the assigned tasks, feel free to explore the hardware and operating system interfaces within the lab. Click the Done button when you are finished. In order to get a...
Words: 11760 - Pages: 48
...TCP/IP Protocol Suite Brad Kauble Benjamin Miller Networking 101 Section 104 November 20, 2013 In the world of the Internet and data networking, applications need a way to transfer information form one user to another, anywhere, anytime in a manner that does not disrupt the applications usefulness. Devices connected to a network use multiple applications simultaneously that send and receive information. That data cannot just be sent across the network with any hope of getting to its destination in any recognizable state if it were not for the Transport layer. The Transport layer divides the data into manageable pieces, packaging and addressing them so they will arrive at their proper destination and then reassembling the pieces into the original signal or stream. This paper will observe the part the Transport layer plays in application data encapsulating for use by the Network layer; how it allows simultaneous communication of multiple applications on a single host device while ensuring reliable data delivery to the right application correcting errors if required. The Transport layer is layer 4 in the Open Systems Interconnection (OSI) Model and layer 2 in the Transmission Control Protocol/Internet Protocol (TCP/IP) Model. The Transport layer is needed to track individual conversations, segment, manage and reassemble data packets, identify sending and receiving applications, perform flow control between end users, enable error recovery and initiate and terminate sessions...
Words: 1829 - Pages: 8
...performed first 4. What is a node on a network? A: Any device connected to a network. 5. Which of these following physical topologies has the inherent weakness of a single point of failure? A: Star Topology 6. What is the protocol for internet? What are the parts of a web address? A: HTTP7890-= 7. What is basic to every networking standard? A: IEEE 8. Why is the TCP/IP model divided into layers? A: For Troubleshooting and Teaching 9. Which layer of the OSI model (shown below) is responsible for encryption and compression? A: “OSI-7”, “TCP/IP-5” 10. What is a closed electrical circuit? A: A circuitry running currency from – to +. 11. What is a network encoding scheme? A: A Character Set 12. What causes full duplex to transmit and receive simultaneously? A: 4 wires, one pair dedicated to transmit and another to receive data at the same time. 13. Max cable length for cat-5? A: 100m or 328ft 14. What is 802.3? What is 802.11? A: 802.3= Ethernet, 802.11= Wi-Fi 15. What is meant by Ethernet “bit rate” as defined by IEEE standards? A: How many calculations done per second in the exchange of packets. 16. What is the pin out for a cat-5 cable? A: Wires 1, 2, 3, and 6 17. In wireless networking what is a site survey for? A: To identify RF interference due to wall depth and placement for the best quality of service (QoS). 18. What does the Wi-Fi Alliance do? A: The Wi-Fi Alliance is a trade association that promotes Wireless...
Words: 1163 - Pages: 5
...2.2 Networking Networking Infrastructure has changed dynamically from the dialup connection to the fast broadband connection, but the logical protocols necessary for routing traffic and interacting with applications haven't changed as dramatically and dynamically. 2.2.1 Sockets “Socket is used to send and receive data”.A socket is one end of a communication channel between two processes that want to talk to each other. A network connection (or interprocess communication channel) has two sockets, one for each end of the channel. A network connection is established by one socket making a connection with another socket, the listening socket, which is listening for incoming connections. A socket address is the combination of the IP address...
Words: 759 - Pages: 4
...1. What is a byte? 8 bits 2. When using a truth table, 1 and 0 equal __False____. 3. What do parentheses do in mathematical equations? Indicate what operations do to first 4. What is a node on a network? Hardware connected to the network 5. Which physical topology has the inherent weakness of a single point of failure? Star 6. In a Web address, which part identifies the protocol being used? HTTP 7. What is basic to every networking standard? (Hint: relates to Documentation) Beyond the ideas in a standard, people must agree to a particular version of document 8. Why is the TCP/IP model divided into layers? The layers make TCP/IP easier for humans to understand what TCP/IP does. It also makes it easier to divide the work among different products. * - write protocols, - create standards, - how networks work 9. Which layer of the OSI model is responsible for encryption and compression? Presentation Layer 10. What does the following graphic illustrate? Simple Direct Current being used 11. What is a network encoding scheme? In networking, the encoding scheme defines the electrical equivalent: the electricity that means a 1 or a 0. *Interpreted between nodes 12. What causes full duplex to transmit and receive simultaneously? With full duplex, both endpoints can send at the same time, enabled because the endpoints use multiple wire pairs. Using multiple pairs allows multiple electrical circuits, so the encoders/decoders do not get confused. *for wires ...
Words: 1474 - Pages: 6
...Computer network From Wikipedia, the free encyclopedia "Computer networks" redirects here. For the periodical, see Computer Networks (journal). "Datacom" redirects here. For other uses, see Datacom (disambiguation). Network science Theory · History Graph · Complex network · Contagion Small-world · Scale-free · Community structure · Percolation · Evolution · Controllability · Topology · Graph drawing · Social capital · Link analysis · Optimization Reciprocity · Closure · Homophily Transitivity · Preferential attachment Balance · Network effect · Influence Types of Networks Information · Telecommunication Social · Biological · Neural · Semantic Random · Dependency · Flow Graphs Vertex · Edge · Component Directed · Multigraph · Bipartite Weighted · Hypergraph · Random Cycle · Loop · Path Neighborhood · Clique · Complete · Cut Data structure · Adjacency list & matrix Incidence list & matrix Metrics and Algorithms Centrality · Degree · Betweenness Closeness · PageRank · Motif Clustering · Degree distribution · Assortativity · Distance · Modularity Models Random · Erdős–Rényi Barabási–Albert · Watts–Strogatz ERGM · Epidemic · Hierarchical Browse Topics · Software · Network scientists Graph theory · Network theory v t e A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources...
Words: 7339 - Pages: 30
...the acronym WAN. Wide Area Network Section 1-2: 6. Define the term protocol. Set of rules established for users to exchange information. 7. Define the term topology. Architecture of a network. 8. Define the term deterministic. Access to the network is provided at fixed time intervals 9. A disadvantage of the token-ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding a Token-ring hub (A hub that manages the passing of the token in a Token-Ring network.) 10. State the network topology being used in the following figures (Bus, Star, Ring, or Mesh). a. Mesh b. Bus c. Ring d. Star 11. What is the difference between a hub and a switch? Hub – Broadcasts data it receives to all devices connected to its ports. Switch – Establishes a direct connection from the sender to the destination without passing the data traffic to other networking devices. Section 1-3: 12. Define the acronym CSMA/CD and the protocol that uses CSMA/CD. Carrier Sense Multiple Access with Collision Detection, The networking protocol Ethernet. 13. What information is not included in an Ethernet frame? a. Frame size 14. What is the minimum size of the data payload in an Ethernet frame? 46 bytes The data being transmitted, followed by the pad that is used to bring the total number of bytes up to the minimum of 46 if the data field...
Words: 1934 - Pages: 8
...are many networking devices like • Router • Switch • NIC • Media • Hub b) Discuss the functionalities of the devices. Router: Move router gadgets packets of information between systems. The router, in at least two systems, typically two LAN or WAN LAN or is connected to the system provider. Router is located in the assembly point of the two or more of the system in the passage. Switch: electrical switch is a segment that can be transferred from the next transmitter in the electrical circuit breaking prevention or down. The device of switches, specifically, for example, whether the input switch is operated, body weight, and can be developed using the detected temperature and current, the circuit can be designed by moving the problem It can be processed into human administrator to control. NIC: As network interface card (NIC) is able to associate with the system, is a computer circuit board or card has been inserted into the computer. Media: There are different types of cables, systems engineer / chief...
Words: 2126 - Pages: 9
...organization established by Dr. Riordan has received a number of patents. The patents relate with developing polymers into high tensile strength plastic substrates. During 1992 Dr. Riordan bought a fan manufacturing facility in Pontiac, Michigan. During 1993, he developed into the plastic beverage storage units. For the plastic beverage storage units manufacturing, he bought one more manufacturing facility in Albany, Georgia. During 2000, Dr. Riordan developed to another country to Hangzhou, China. The Albany factory manufactures the plastic beverage storage units. The Pontiac factory manufactures the customized plastic parts. China plant manufactures the plastic fan parts. The company’s Research and Development is carried out at the corporation head office in San Jose. The main clients are automobile parts producers, aircraft manufacturers, the Department of Defense, beverage producers and bottlers, and appliance producers (UOPX, 2004). Current Systems Each factory is currently using various telecommunication systems. The head office in San Jose has 35 IP telephones. Additionally they use a VOIP/Data router; two 24 port switches Cisco 5950, 24 Port Hub Linksys EF2H24, Ethernet 100 base T as well as a WIN network Server. The Albany factory using a Kentrox Datasmart 658 CSU/DSU links to the head office. They are also using a Cisco Router 1750, two 24 port 100 Mbps Nortel Baystack 45024T Enet Switch, as well as a 48 port Patch Panels which links the 20 Compaq Presario computer...
Words: 2515 - Pages: 11
...NT1210 - Final Exam Study Sheet 1. A byte is a group of 8 bits (a “word”) 2. When using a truth table, 1 and 0 equal false. 3. Parentheses in mathematical ensure that whatever operation is inside the parentheses is performed first. 4. Any device connected to a network is a node on a network. 5. Which physical topologies has the inherent weakness of a single point of failure? Star 6. In this sample Web address, which part identifies the protocol being used? http 7. What is basic to every networking standard? Documentation of ideas that all network users must agree to use 8. Why is the TCP/IP model divided into layers? To make it easier to understand how networks work To make it easier to write protocols for networks . To make it easier to create standards for networks 9. Which layer of the OSI model (shown below) is responsible for encryption and compression? Presentation 10. What does the following graphic illustrate? A. How to connect a car battery B. A diagram of atomic particles *C. A closed electrical circuit * D. An open electrical circuit 11. A network encoding scheme is the way the keys on a keyboard are interpreted by the CPU as letters. 12. What causes full duplex to transmit and receive simultaneously? There are four wires: one wire pair for receiving and another for transmitting. 13. Based on the other entries in the table, complete the missing cell in the table below: Cable Type |...
Words: 1256 - Pages: 6