...NT-1210 Unit Name Lab l Labs Date 1-l Reading Binary Convert the following decimal numbers to binary equivalents: 89 1011001 776 10110000 Convert the following Binary values to their decimal equivalent: 101_0100L 169 11101010 234 Lab 1-2 Binary Math and Logic Draw the graphical symbol Explain the logical operations (give a truth table) for each: AND OR NOT Lab 1.3 Bit and Byte Structure - (see page 15 of lab manual) How many bits are in a byte? 8 1 Kilobyte is equal to: 1024 55,296 23,552 bytes Kilobytes Megabytes Terabytes 54 Megabyte is equalto: 23 Gigabyte is equalto: 5 Terabyte is equal to 5,120 120MB = 16GB= 125,829,120 16,384 bytes MBytes Lab 1.4 ASCII (See page 20 of Lab manual) 1. Decode the simple numerical sentences into one English paragraph. You may use Google to find an ASCII table. Use the keywords-Binary to text conversion; Hexadecimatto text conversion; ASGllto text conversion-to aid the decoding process: Code"Tvoe ASC llcodes Numeric Message 87 101 1 08 1 08 44 32 116 104 97 116 32 109 97 107 101 115 32 111 117 114 32 49 48 32 110 117 109 98 101 114 32 100 101 99 105 109 97'108 3247 3297 115 99 105 10532115121115116 101 '10932 106 117 11511632114105103104 11633148 Translation Well, that makes our 10 number decimal / ASCII system just right! Lab 1.5 Creating a File System Follow the procedures outlined in the Lab Manual on pages 231o27 Exercise...
Words: 918 - Pages: 4
...NT 1210 Lab 3.1.1, 3.2.1, 3.3.1 The Purpose of Reference Models Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi-Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? The process of marketing the wireless devices would be much slower than if the Wi-Fi Alliance wasn’t governing them. This would impact my personal life or business communications in a big way. The reason is Wi-Fi Alliance certifies the products through pre-standard rules thus insuring the speed of product market and quality. The OSI Reference Model Exercise 3.2.1 Define each layer of the OSI Model and state what each layer provides. Physical – transmission and reception of the unstructured raw bit stream over a physical medium. Carries signals for higher layers and describes the electrical /optical , mechanical and functional interfaces. Data link – Error free transfer of data frames from node to node over the physical layer , allowing the higher layers to assume virtually error –free transmission over the link. Network - is the third layer, which controls the subnet operation by deciding which physical path data should take based on network conditions and priority of service with other factors. Transport - is the fourth layer, which ensures the error-free delivery of messages in sequence and with no losses or duplications. Higher layer protocols are relieved from concerns with data...
Words: 473 - Pages: 2
...Objectives and Assignments Week 7 Instructor: Thomas W. Chappell, PhD. Office Hours (For appointments): Monday, Tuesday, Wednesday, Thursday 3:30 – 6:00 PM Objectives: Complete current week’s assignments submissions Important Notes: Attendance in class is critical to your accomplishments Missing class is missing valuable information that will help you succeed and accomplish your goals Please attend every class for success in your field! Grading Policy: * Please read the last page of your syllabus which will be covered in week one. * Missing labs will be made up at 80% after the first week, 70% the after the second week and 0% the third week. * Quizzes will not be made up. * Students can potentially be dropped by the Dean of Academic Affairs after missing 4 or 5 cumulative classes. * Students who miss three consecutive class will be dropped by the Dean of Academic Affairs * Assignments and Labs will be counted at 0% after three weeks. Course Objectives Covered by This Unit * CO1 Identify the major needs and stakeholders for computer networks and network applications * CO2 Identify the classifications of networks and how they are applied to various types of enterprises * CO3 Compare and contrast the OSI and TCP/IP models and their applications to actual networks * CO4 Explain the functionality and use of typical network protocols * CO5 Analyze...
Words: 799 - Pages: 4
...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...
Words: 4400 - Pages: 18
...Casey Alexander Unit 2 Assignment 2 Multiple choice 1) C 11) A 2) B 12) A, D 3) B, D 13) B 4) C, D 14) C 5) A 15) A, D 6) D 16)D 7) C 17)D 8) C 18)D 9) A, C, D 19) A 10) C, D 20) B Key terms 1) Computer networking – A combination of many components that work together so that many different devices can communicate. 2) Computer network - A combination of many components that work together so that many different devices can communicate. 3) Application – Software that performs some useful function for a user. 4) Email - Electronic mail. An application in which the user can type text and attach other files to create the electronic equivalent of a postal letter, and send the email to another person using his or her email address. 5) Voice call – A more modern term for a telephone call that emphasizes the fact that the traffic flows between the endpoints is voice. 6) Video frame – A grid of pixel locations of a chosen width by height that contains the light/colors to...
Words: 402 - Pages: 2
...NT1210 Introduction to Networking Introduction to Computer Networking 1 Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks and how they are applied to various types of enterprises. Explain the functionality and use of typical network protocols. Use preferred techniques and necessary tools to troubleshoot common network problems. 2 Objectives Define a computer network. Identify the primary needs for computer networks and network applications. Draw the four major physical network topologies: bus, star, ring, and mesh. 3 Computer Networking Use large variety of components that must work together. Move bits from one device to another. Bit: Smallest unit of data, binary 1 or 0. Focuses on copying bits on one device to another. Computing devices include computers, gaming systems, televisions, phones, tablets, GPS navigation systems, watches, etc. 4 Defining a Network with User Applications Examples: Digital advertising, online/video games, text messages, websites, social media, and email. Network diagrams often use cloud to identify what part of network to ignore for a particular discussion. LAN vs WAN 5 Defining a Network with User Applications Computer Networks: Cloud Representing Hidden Parts of the Network 6 Figure 2-1 An Informal General Definition of a Computer Network Telecom: Short for telephone communications ...
Words: 4305 - Pages: 18
...John Holbrook Step by Step Installation of a Secure Linux Web, DNS and Mail Server Feb 10, 2004 GIAC GSEC Practical – Version 1.4b, Option 1 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46. 1 Table of Contents Abstract................................. Introduction.........................................................................................................................4 Current Setup..................................................................................................................4 Reasons for new install ..................................................................................................4 Sudo...............................................................................................................................5 Security Comparison of Redhat 9.0 and Openna 1.0..........................................................7 Default Installed Services...............................................................................................7 Configuration Notes............................................................................................................8 The New Setup...............................................................................................................8 Layers of Protection........................................................................................................9 Verifying Integrity of Downloaded Files.................................
Words: 16169 - Pages: 65
...Unit 9. Exercise 1. Print Server Assignment Requirements Respond to the following email: -- FROM: Rebop Pakulah, Acme Engineering Company RE: Printers are multiplying like rabbits. Hello most esteemed US computer guru, Thank you for setting up our branch office in the US. However, our data center has a problem. It seems that everyone there is in love with Office Depot and has a printer on their desk. We employ 150 people. This is too many printers. The ink is so expensive. I hear many people come in of Saturdays and print baseball schedules, shopping list, and photos of their family. What can you suggest to help me? Thank you! From: AA To Rebop Pakulah Hello Rebop; glad to hear your company has increased in employees and volume. Rebop I cannot believe almost every user in cubicle has their own printer. This must stagnate your network, not to mention office expenses for toner and repair calls. Here is what I am suggesting for your 150 employees; you should have 3 multipurpose printers HP4555mfp printers. Then perhaps keep about 10 small HP printers that may belong to your admin staff, such as HR, Recievers, accounts payable team, and those employees that use a printer for 75% percent of their duties. All of these printers would be added to the network server, the subnet, gateway, and IP would be assigned to each printer. After that rules can be added to these printers, such as standard settings, if a user needed to use a portrait printer setting...
Words: 319 - Pages: 2
...Unit 1 assignment 1. C 2. All of them are wrong the smallest measurement in the answers is a kilobyte and that is actually 1024 bytes not 106. 3. C 4. A,E 5. A 6. C 7. D 8. A 9. A,B,D 10. A 11. A 12. B,D 13. A,C 14. A,D 15. A 16. D 17. B 18. C 19. C,D 20. A,B Lab 1.1 Exercise 1.1.1 103 > 1000 x 2 = 2000 102 > 100 x 9 = 900 101 > 10 x 3 = 30 100 > 1 x 1 = 1 2931 Exercise 1.1.2 22 > 4 x 1 = 4 21 > 2 x 1 = 2 20 > 1 x 0 = 0 4+2+0= 6 Exercise 1.1.3 21 > 2 x 1 =2 20 > 1 x 1= 1 2+1= 3 Exercise 1.1.4 24 > 16 x 1 = 16 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 16+0+0+2+0=18 Exercise 1.1.5 11100010 27 > 128 x 1 = 128 26 > 64 x 1 = 64 25 > 32 x 1 = 32 24 > 16 x 0 = 0 23 > 8 x 0 = 0 22 > 4 x 0 = 0 21 > 2 x 1 = 2 20 > 1 x 0 = 0 128+64+32+0+0+0+2+0=226 > Exercise 1.1.6 156 156 > 27 > 128 x 1 = 128/ 156-128= 28 28 > 26 > 64 x 0 = 0 28 > 25 > 32 x 0 =0 28 > 24 > 16 x 1 = 16/ 28-16=12 12 > 23 > 8 x 1 = 8/ 12-8=4 4 > 22 > 4 x 1 = 4/ 4-4=0 0 > 21 > 2 x 0 = 0 0 > 20 > 1 x 0 =0 100111002 = 156 Exercise 1.1.7 255 255 > 27 > 128 x 1 = 128/ 255-128=127 127 > 26 > 64 x 1 = 64/ 127-64=63 63 > 25 > 32 x 1 = 32/ 63-32=31 31 > 24 > 16 x 1 = 16/ 31-16=15 15 > 23 > 8 x 1 = 8/ 15-8=7 7 > 22 > 4 x 1 = 4/...
Words: 2960 - Pages: 12
...GS 1145 Strategies Unit 11 Assignment 1 Reflection Kelly S Draney This class has been an eye opener for me in respect that I was a real procrastinator. It has helped to open my eyes to the fact that I need to get my homework done and in on time. With the assignment on scheduling I found that I wasted a lot of time during the day, when I could be getting things done. Breaking down my schedule into blocks showed me that I had a lot of wasted time watching TV when I could be more productive. Having to juggle time for work and school was something I was not accustomed to. I have a greater respect for my students now seeing what they have to go through. The other thing this class helped me with, was learning how to use the Microsoft Office Suites programs better. I had no idea how to use Power Point before this class. Gratefully we were put into small groups to work on these projects. The good thing about these projects was it gave me a chance to learn about Power Point. I was surprised how easy it really is to use. It also helped to learn the different rules about completing a Power Point Presentation. I enjoyed being in your class. I heard a lot of good comments from students who felt you were tough, but fair. You created a fun learning environment in class. I look forward to having you again for an instructor later on in my studies....
Words: 259 - Pages: 2
...Major needs and major stakeholders for computer and network applications Classification of Networks A system convention characterizes standards and contracts for correspondence between network devices. Versatile, few progressions, few elements, high data transfer capacity, CPU power, repetition, port thickness, reasonableness, security highlights The Advantages of using Layer 2 economical, adaptable and versatile, simple to introduce and keep up. Advantages of Ethernet technology Thicknet >(10BASE5)- uses a thicker coaxial link with a transport topology. Thinnet-(>10BASE2) uses a more slender coaxial link with a transport topology. >Ethernet-(10BASE-T) - star topology & UTP cabling >Quick Ethernet (100BASE-T) - convey movement at the ostensible rate of 100 Mbit/s, star topology utilizes UTP .>Gigabit Ethernet (1000BASE-T) - utilizes four sets of Category 5 unshielded contorted pair to accomplish the gigabit information rate of 1000 Mbits/s Define Ethernet concepts Classifiedness- Protection from exposure to unapproved individuals. Confirmation- User names and passwords. Trustworthiness- Maintaining information consistency. Firewalls-an instrument that controls advanced data that comes into and goes out of the system. Antivirus-infection programming intended to recognize and demolish infections. Basic security requirements LAN (Local Area Network)-WLAN (Wireless Area Network)CAN (Campus Area Network)MAN (Metropolitan Area Network)WAN (Wide Area...
Words: 453 - Pages: 2
...Windows 8 is a Microsoft operating system that is designed for home users as well as for business purpose. Its development started even before its predecessor’s release Windows 7 in 2009.Windows 8 is a system that is particularly orientated to touchscreen hardware. There are some important changes and additives that make it look and differently than the users are used to. For example, the Start menu is completely substituted by a Start screen that can be taken away from the desktop easily by touch screen pen and also by just a normal mouse or keyboard key combination. It contains all the important applications also the ones that are active at the moment. All the icons in the old version of the operating system are changed into tiles that can be juggled with. It can stay constantly on the screen or can be hidden.And now the most important that users expect to hear – when will it be available for the public and for what price? The official release date is the 26th of October, 2012. It was preceded by three pre-release editions while still being developed and tested for the period of the 13th of September 2011 until 31st of May 2012. There will be four editions issued on the market – two general editions just for conventional use, one Pro release of Windows most ardent devotees and Enterprise edition which is for business purposes. ² Windows 8 is the current release of the Windows operating system, produced by Microsoft for use on personal computers, including home and business...
Words: 327 - Pages: 2
...WEEK 8, ASSIGNMENT 2Ireti Kayode Strayer University | | CIS 175 Dr. William McConnell12/03/2013 | | | | | Ocper, Inc. Server Proposal Given Ocper, Inc.’s expanding network scenario there is a clear need to maximize the available resources between employees then it is appropriate to add additional servers to facilitate the sharing of files as well as the configuration of remote access services to allow for remote and secure working. In order to complement the existing network scenario this proposal is based around the configuration and deployment of Microsoft Windows Server 2012 as the network operating system. This is a stable and secure server environment which will allow the designated services to be configured and will equally allow for scalability while at the same time decreasing the overall maintenance and administration to support the network and associated servers. Given the size of the current organization and the IT systems at present, Windows Server 2012 Standard edition would be the most appropriate version for deployment as this will also keep the up-front costs down to a minimum – there is no requirement for the Enterprise Edition whose features will not be required in this implementation. One of the critical roles for the new server implementations will be that of a File Server capability – this can be easily configured within the Ocper, Inc. network through a Static IP address being assigned to this machine and then the...
Words: 630 - Pages: 3
...Updating From Microsoft Windows XP to Microsoft Windows 7 A lot of problems can arise when trying to update an older machine such as this from Microsoft Windows XP to Microsoft Windows 7. Microsoft has not made it easy for XP users to move to Win7. You won't be able to run the upgrade disk and have the newer operating system install on top of XP, leaving your data and programs in place. Instead, you have two options: 1. You can do a Clean install, in which you wipe the hard drive clean and install a virgin copy of Windows 7, then reinstall your software and copy your data back to the drive. 2. You can do a Custom install, in which your older setup is squirreled away in a folder called WINDOWS.OLD. This will include your program files, though you won't be able to run your software from there. It will also include data files, but you shouldn't rely on this as your sole backup strategy prior to upgrading. First and foremost When performing and update such as this: make sure that all hardware on the machine that is being updated is compatible and will meet Windows 7's minimum system requirements. A good way to do this is simply to go to the Microsoft website and download the windows 7 advisor at: http://windows.microsoft.com/en-us/windows/downloads/upgrade-advisor. This tool can be very helpful in determining if a system is capable of running windows 7. Some of the Windows 7 system requirements are: * 1 GHz processor (32- or 64-bit) * 1 GB of RAM (32-bit); 2 GB of...
Words: 498 - Pages: 2
...The current architecture of the Riordan Manufacturing Company Inc. Wide Area Network and network security in place requires updated documentation. The purpose of this paper is to gather the existing information into a single format and evaluate the WAN and security documentation for an executive overview. Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. With state-of-the art design capabilities, they create innovative plastic designs that have earned international acclaim. Attention to detail, extreme precision and enthusiastic quality control are the hallmarks of Riordan Manufacturing. With facilities in San Jose, California, Albany, Georgia, Pontiac, Michigan and Hangzhou, China, the company is heavily dependent upon their communication networks. The documentation produced by this analysis will give the management at Riordan Manufacturing an understanding of their networks today, a plan for future upgrades and a baseline to evaluate security. The goal of this exercise is three fold. Our first will be to provide an inventory of the existing network components for Riordan Manufacturing designated by location, review the network security for each site, and our last goal is to document the current security plan for use in future planning. Because of the limited scope of the project, several assumptions must be made. The first assumption is that Riordan Manufacturing has accurate records of the current infrastructure and no changes will...
Words: 11081 - Pages: 45