Premium Essay

Nt1210 Intro to Networking

In:

Submitted By Dafupunkya
Words 1421
Pages 6
NT1210
Unit 1 HomeWork
Assignment 1:
1. Which of the following is true about 1 bit?
a. Can represent decimal values 0 through 9

2. How many bits are in a byte? ____8_____

3. Fill out the following Chart Term | Size(Bytes) | Size(2n Bytes) | Rounded Size (Bytes) | Kilobyte | 1024 | 2 10 | 1000 | Megabyte | 1,048,576 | 2 20 | 1,000,000 | Gigabyte | 1,073,741,824 | 2 30 | 1,000,000,000 | Terabyte | 1,099,511,627,776 | 2 40 | 1,000,000,000,000 |

4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.)
b. Used for long-term memory
d. Connects to the CPU over a bus using a cable

5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter?
a. The CPU tells the RAM which address holds the data that the CPU wants to read.

6. Define Character set: A list of all the characters on a computer with matching binary values ex: a = 110001 in ASCII which uses a 7bit code.

7. Character encoding scheme is another name for character set? a. True

8 & 9. Complete the following Decimal to binary chart.

Decimal | Binary | | Decimal | Binary | 193 | 11000001 | | 255 | 1111111 | 52 | 00110100 | | 19 | 10011 | 50 | 110010 | | 172 | 10101100 | 170 | 10101010 | | 14 | 1110 | 6 | 110 (binary) | | 0 | 0000 |

10. Which of the following answers best describes how RAM (capacitor) physically writes a binary 0 or 1?
a. Using an electrical charge

11. A single hexadecimal digit is equivalent to ____4____ binary digits.

12. Complete the following to Decimal to binary to hexadecimal chart.

Decimal | Binary | Hex | 8 | 1000 | 8 | 15 | 1111 | F | 10 | 1010 | A |

13. Complete the AND/OR logic table for the

Similar Documents

Free Essay

Nt1210 Intro to Networking 4.3

...NT1210 Lab 4.3 Cabling exploration Exercise 4.3.1 Use your textbook and Internet research to complete the comparison in Table 4-3. Cite the sources from which you retrieved the information to complete the comparison. UTP-Defines a cable that can carry data up to 100 Mbps. The signaling frequency of this cable is up to 100 MHz. Cheapest form of cable available for networking purposes. Easy to handle and install. Highly prone to external interference like EMI and RFI. Highly prone to crosstalk. Unable to provide secured transmission of data. Coaxial (Thinnet) 185m 100 Mbps Low Uses thin cabling, low hardware costs Difficult to troubleshoot, difficult to maintain. Coaxial (Thicknet) 500m 100 Mbps directly connects computers and it costs more. Multimode cables are less expensive to operate, install and maintain than single-mode cables. However, they are much more limited in both speed and distance. For instance, the maximum speed of a multimode cable is 10GB, but only up to a distance of 300 meters. Up to 2 kilometers, it is only capable of transmitting at 100Mbit. Beyond that, its transfer speed becomes negligible. This limitation is negated by the fact that its maximum speed is sufficient for the environment that it is most often used in. Singlemode cable provides less signal attenuation, higher transmissions speeds, and up to 50 times greater transmission distance than multimode cable. Singlemode cable can transmit data at terabits per second over 100km without requiring...

Words: 866 - Pages: 4

Premium Essay

Nt1210 Intro to Networking 5.2

...NT1210 MAC and IP Addresses Exercise 5.2.1 Why must a MAC address be unique for every NIC produced? What effect will it have on the network if two devices from two different manufacturers share the last 24 bits of their MAC addresses? Explain your answer. Use your textbook and the Internet to research your answer. Think of it as your address or phone at your home it has to be unique. Has to be unique so the entire world can see it. So the network traffic couldn’t find its way to the right PC. Exercise 5.2.2 What information about the network connection is given on the Support tab of the status window? Gives you the IP address, Subnet Mask and default gateway. Exercise 5.2.3 What is the physical address (the MAC address) of the NIC (or network adapter) for this connection? Physical Address: ‎00-1E-65-DC-C4-DA. Exercise 5.2.4 You can determine the manufacturer of your NIC using the first six characters of your MAC address. To do this, you must search the IEEE records database for the unique OUI. You can access the IEEE database at this address: http://standards.ieee.org/develop/regauth/oui/public.html. On this page, you should locate the search box and enter the first three bytes of your MAC address separated by hyphens (such as “00-0C-44”), and then click the Search button. Who is the manufacturer for your NIC? What information is given about the manufacturer? You can see an example record returned from this site in Figure 5-5. MAC Address/OUI Vendor {Company}...

Words: 725 - Pages: 3

Premium Essay

Nt1210 Intro to Networking 3.2

...NT1210 Lab 3.2. The OSI reference Model Exercise 3.2.1 Using Figure 3-1, define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or Internet research to support your answer. The Physical layer is something simple like wiring, fiber and network cards. Devices that allow communication between the OSI networks. Data link layer is the Ethernet, among other protocols; we're keeping this simple remember. The most important take-away from layer 2 is that you should understand what a bridge is. Switches, as they're called nowadays, are bridges. Network layer is an IP address because you're dealing with layer 3 and "packets" instead of layer 2's "frames." IP is part of layer 3, along with some routing protocols, and ARP (Address Resolution Protocol). Transport layer handles messaging units which is also called packets. When you're talking about specific protocols, like TCP, they're "segments" or "datagrams" in UDP. This layer is responsible for getting the entire message to keep track of fragmentation. Session layer is Network Basic Input/output System model allowing applications on separate computers to communicate over a local area network. The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets. Presentation uses Secure Sockets Layer which provides a secure connection between internet browsers and...

Words: 597 - Pages: 3

Premium Essay

Nt1210 Intro to Networking 5.1

...NT1210 Lab 5.1 LAN Standards Exercise 5.1.1 The IEEE standards cover more than just Ethernet. The 802.3 standard actually builds upon the 802.1 network architecture standard from IEEE. Briefly define the 802.1 standard and what it provides. Use your textbook and the Internet to research your answer. IEEE 802.1 Working Group (IEEE 802.1) is an IEEE Standards Association (IEEE-SA) group established to ensure network management and monitoring capabilities in networks developed according to IEEE 802 standards. Exercise 5.1.2 The 802.3 family of standards has the format 802.3x where x is a sequence of letters specifying the new standards added to the 802.3 base standard. One of the enhancements to Ethernet is Power over Ethernet (PoE), in which Ethernet cable can provide power to remote, low-power devices that are not near an electrical outlet. What 802.3 standard originally defined PoE functionality? When was the standard enhanced, and what was the new standard name given for the enhancement? Use your textbook and the Internet to research your answer. 802.3 standard originally came about in June 2003 then designated IEEE 802.3at was released in 2009 and this provided for several enhancements to the original IEEE 802.3af specification. Some devices include powering IP telephones, wireless LAN access points, webcams, Ethernet hubs and switches. Exercise 5.1.3 Complete Table 5-1 by researching the various Ethernet standards and their associated properties. You can use your...

Words: 460 - Pages: 2

Premium Essay

Nt1210 Intro to Networking Lab 5.4

...NT1210 Lab 5.4 Basic Network Troubleshooting Exercise 5.4.1 If you needed to determine the computer name used for node E on the network (starting from node A), what command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. I already have the IP Addresses for all the workstations a simple Ping command in CMD will work. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping –a 192.168.1.5 to retrieve the information we need. Exercise 5.4.2 What is the best (easiest and most efficient) command to determine whether all the hosts on the local-area network are reachable? You can assume that you are starting from computer A. List the command sequence(s) you would need to enter to test this functionality. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping 192.168.1.5, Ping 192.168.1.4, and Ping 192.168.1.3, Ping 192.168.1.6, and Ping 192.168.1.2. This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping 192.168.1.4 Exercise...

Words: 344 - Pages: 2

Premium Essay

Nt1210 Intro to Networking Lab 2.2

...Exdahellilvn NT1210 Lab 2.2 Networking drives Exercise 2.2.1 If an organization has 30 users, each with his or her own PC, what is the comparative cost of buying a $120 printer for each user versus the cost of buying a single, higher-capacity $500 printer that can be used by the entire office? What is the drawback to having only a single printer? What is the cost of having two additional backup printers for the office compared to having individual printers? How many shared printers can be purchased and still be less expensive than individual printers? It would cost $3,900 if each user had their own printer V.S. buying a high capacity single printer for $500. On top of that if ink cartridges cost around $32.00 dollars apiece for each printer cartridge. It would cost a total of $960 for ink cartridges for all 30 printers. If a single printer was connected to a single workstation then it would be only tied to that workstation. No other users would be able to use printer connected to the workstation. The cost of having two backup printers would depend on what type of printers. There are two known types of printers one LaserJet or standard color ink printers. LaserJet printers can run around $500 each V.S. $120-$150 for a standard color printer. Still the cost of having two additional backup printers is less than having each workstation have their own. You can buy up to four printers costing $500 apiece and still come out money ahead. Even if you spent $100 dollars on LaserJet...

Words: 838 - Pages: 4

Premium Essay

Nt1210 Intro to Networking Lab 2.3

...NT1210 Lab 2.3 Network types and Topolgies Exercise 2.3.1 Briefly define LAN, MAN, PAN, and WAN. What is the critical distinction for these networks? LAN=Local Area Network. Which is a computer network that links devices within a building or group of adjacent buildings MAN=Short for Metropolitan Area Network, a data network designed for a town or city. In terms of geographic breadth, MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs). MANs are usually characterized by very high-speed connections using fiber optical cable or other digital media. WAN=Wide Area Network. A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet. PAN=PAN is short for Personal Area Network Based on the electric-field transmission medium,  is an IBM technology that allows individuals to exchange data with a simple touch or grasp, such as a handshake. A PAN user is equipped with a receiver and a transmitter, which constantly sends infinitesimal data-carrying currents -- in the 0.1-1 MHz band -- through the body and picks up currents when in very close range with another device or individual carrying a transmitter. Exercise 2.3.2 Briefly define...

Words: 1082 - Pages: 5

Premium Essay

Nt1210 Intro to Networking Lab 4.1

...NT1210 Lab 4.1 Copper Cabling Exercise 4.1.1 Why are standards so important for NICs, connectors, and media? Use your textbook and Internet research to justify your answer. Simple because Stability, Consistency, Minimization of packet errors. Exercise 4.1.2 The voltage for registering a bit of 1 on Ethernet can be as low as 2.5 volts or even 1 volt. Why is this so low when the capacity for transmitting electricity on the copper wire is so high? Use your textbook and Internet research to support your answer. Because the voltage (or current) used to transmit data needs only be high enough for the receiver to detect it. Making the voltage (much) higher would make the receiver electronics more difficult. Exercise 4.1.3 What are some applications of shielded copper cable? Why is the more expensive shielded cable used in these situations? Use your textbook or Internet research to support your answer. The extra covering in shielded twisted pair wiring protects the transmission line from electromagnetic interference leaking into or out of the cable. STP cabling often is used in Ethernet networks, especially fast data rate Ethernets. Exercise 4.1.4 Complete the entries in Table 4-1. Use your textbook and Internet research to compose your answer. The common connector for interfacing UTP wires to a computer for networking is the Registered Jack 45 (RJ-45) interface. This uses eight copper wires (four twisted pairs) to complete the connec- tion between interfaces. The pinout...

Words: 721 - Pages: 3

Premium Essay

Nt1210 Intro to Networking Lab 5.3

...NT1210 Lab 5.3 Finding Network Settings Exercise 5.3.1 For this exercise, you will release your IP address using ipconfig. This is a beneficial tool for troubleshooting your own local network and correcting any problems with the assignment of IP addresses. This exercise requires that you have DHCP in use for assigning IP addresses, which is a typical default setting. To begin, you should type the command ipconfig at the command-line interface and press Enter. Record the information it presents for the IP address and default gateway; you can ignore the rest of the information for now. When you have completed this, type the following command to release the IP address: Ipconfig /release To renew your lease on the IP address for your network card or adapter, you will use the following command: Ipconfig /renew This will create a new lease on an IP address for your network card or adapter. When the command to renew the IP address is complete, you should compare the result to the initial run of ipconfig and compare the results. Are the entries the same for the IP address and for the default gateway. Exercise 5.3.2 You can use the ping command on your local machine. This does not send traffic out onto the network, but it is an effective means of making sure that your network adapter is functional. To ping the local host, use the following command: Ping localhost What address is returned as the IP address of localhost? How many times is the ping message sent by default...

Words: 861 - Pages: 4

Free Essay

Nt1210 Intro to Networking Lab 3.3

...NT1210 Lab 3.3: the TCP/IP Model Exercise 3.3.1 Using your textbook and Internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? Applications, Transport, Network, Network Interface this the TCP/IP model. A huge difference is that TCP/IP model uses 4 major layers instead of 7 layers to OSI model. OSI Model is Applications, Presentation, Session, Transport, Network, Data Link and Physical composed to 7 layers. OSI was developed as theoretical model, while TCP/IP was more practical model. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model Transport layers: The Internet Protocol (IP), Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). These core protocols support many other protocols, to perform a variety of functions at each of the TCP/IP model layers. Still others enable user applications to function. Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and function of each of these. Use your textbook and Internet research to support your answer. TCP (Transmission Control Protocol) Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. User Datagram Protocol a connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery services...

Words: 331 - Pages: 2

Free Essay

Nt1210 Intro to Networking Lab 4.2

...NT1210 Lab 4.2: Fiber-optic Cables Exercise 4.2.1 The light in an SMF cable travels down the center of the fiber parallel to the direction of the fiber in a single path. Can this type of cable be used to transmit and receive bits simultaneously, or does it require one fiber for transmitting and one for receiving? Justify your answer using your textbook and Internet research. No it cannot transmit and simultaneously receive bits with a single cable. A second cable would be needed for sending bits back. In this case you would need two cables one send bits and second cable receiving bits. Exercise 4.2.2 What characteristics of fiber-optic cables allow them to be used over longer distances with less risk than copper cable? The core in single-mode fiber is only approximately 10 times larger than the wavelength of the light it is carrying. This leaves very little room for the light to bounce around. As a result the data carrying light pulses in single-mode fiber are essentially transmitted in a straight line through the core. Electromagnetic immunity including non-conductivity, Security considerations, decreased attenuation and increased transmission distance, Increased bandwidth potential, Small diameter and weight Long term economics Exercise 4.2.3 MMF distances can still far exceed copper cable, but MMF cannot match the distance available from the more expensive SMF. What is the reason for the distance limitation with the use of MMF? Multimode cables are less expensive...

Words: 333 - Pages: 2

Premium Essay

Nt1210Lab2.4

...ITT TECHNICAL INSTITUTE NT1210 INTRO TO NETWORKING Salem, Oregon. Exercise 2.4.1 Record the steps that you take, and copy the output from the command into your lab report. The utility (ipconfig) allows you to get the IP address information of a Windows computer. It also allows some control over active TCP/IP connections. ipconfig is an alternative to the older 'winipcfg' utility. The output of the default command contains the IP address, network mask and gateway for all physical and virtual network adapters. 'ipconfig' supports several command line options as described below. The command "ipconfig /?" displays the set of available options. Windows Command Line Step1 [pic] Step2 [pic] Step2 type ipconfig [pic] Lab2.4 Review 1 what common information was given by the operating systems? With windows ipconfig we have the IP address IPv4 10.162.108.99. Step2. With Fedora Linux ifconfig we have the Inet addr 10.251.209.100. From table 2-16 at the Lab manual. Therefore we see that the common info is the IP address. 2 outside of networking, is there a benefit to knowing how to access the command line interface of an operating system? You can used the command line interface of an operanting system in your personnal area network (PAN) at your home. You can used it at other computer systems outside the school’s network. 3 Some network devices do not have a convenient graphical user interface or gui for you to explore their...

Words: 265 - Pages: 2

Free Essay

Wide Area Networking

...Cecilia Lopez Instructor: Ms. Ybarra Intro to Networking NT1210 Wide-Area Networking Unit 7 Lab 7.1: Distance Considerations Exercise 7.1.1 It’s impractical for an organization to own the entirety of a WAN because it would be very expensive for the company to run all the lines necessary and to pay for all the labor to keep the WAN up and running. It is less expensive for an organization to own a LAN so that’s why it is favorable for them to maintain ownership of it. Exercise 7.1.2 The further a signal is transmitted on a LAN lessens the strength of the signal. To transmit signals over a long distance access points are required which also decreases signal strength. Exercise 7.1.3 Media | Infrastructure | Summary | UTP | Phone lines | Uses a customized infrastructure for performing two jobs, one being phone and the other being data transfer | Coaxial | Television cable | This type of media is used for transmission of television from a company to a customers house. | Fiber-optic | Cellular, Broadband | Uses a customized infrastructure to run dedicated connections; this is a costly option | Electric power lines | Electricity, Broadband | This type of media can be used with Broadband over Power Lines (BPL), making use of the extensive infrastructure in place already. | Exercise 7.1.4 Media | Summary | Satellite | Transmits from ground to space then back to where the transmission is required to be sent | WiMAX (Worldwide Interoperability for Microwave...

Words: 743 - Pages: 3

Premium Essay

Microsoft and Vmware Comparison

...NT1210: INTRO TO NETWORKING WEEK 5 ESSAY Microsoft and VMware Comparison Tyler Reed In today’s world of cloud storage, cloud computing, and virtualization; I think it is important to understand what virtualization is before comparing the different options. Virtualization first started in the 1960’s as a way to logically divide the system resources provided by mainframe computers between different applications. It is very important to remember that computer strength and hardware performance wasn’t as strong or efficient when this method was introduced. While today’s smartphones are inherently stronger than the best computer during that time, the base problem still exists. Mainly because of the amount of resources needed to run multiple applications, allow server access to potentially thousands of computers and devices accessing the same computer or hardware. Since the concept’s inception the meaning has broadened into hardware virtualization, mobile virtualization, and desktop virtualization. Virtualization has helped organizations reduce cost and increase efficiency in the data center. New virtualization products allow for different benefits and challenges and must be carefully considered for businesses to realize the long term benefits, such as increasing user productivity and decreasing IT costs. Microsoft has the largest range of desktop virtualization and management products that can be integrated into a flexible solution for many different scenarios. Microsoft...

Words: 502 - Pages: 3

Free Essay

Networking

...NT1210 FINAL PROJECT INTRO TO NETWORKING Computer lab design Item | Qty | Description | Price | Item code | Total | HP All-in-One PC | 32 | 18-5110 (G4B05AA#ABA) AMD Dual-Core Processor E1-2500 (1.40GHz) 4GB DDR3 500GB HDD 18.5" Windows 8.1 | $309.99 | Item#: N82E16883280514 | $9,919.68 | Tri-Band Gigabit Wireless Router | 1 | NETGEAR R8000-100NAS Nighthawk X6 AC3200 | $299.99 | Item#: N82E16833122611 | $299.99 | Laser Printer | 2 | Samsung SL-C1860FW/XAA Up to 19 ppm Color Wireless 802.11b/g/n | $224.99 | Item#: N82E16828112551 | $250.00 | 48-Port Fast Ethernet Smart Switch | 1 | NETGEAR ProSAFE FS750T2NA w/ 2 Gigabit Ports 10/100 Mbps | $214.50 | Item#: N82E16833122082 | $214.50 | Pivot-Plug Surge Protector | 3 | BELKIN BP112230-08 8 Feet 12 Outlets 4320 Joules | $33.99 | Item#: N82E16812107131 | $101.97 | Printer/Fax Stand | 1 | Safco 5206BL Under desk, 1-Shelf, 19w x 16d x 13-1/2h, Black | $56.99 | Item#: N82E16848045141 | $56.99 | Wireless Keyboard and Mouse Combo - Black | 32 | Logitech MK520 2.4GHz | $39.95 | Item #: N82E16823126192 | $1278.40 | Black Cat 6 Network Cable | 8 | Link Depot C6M-25-BKB 25 FT | $7.99 | Item #: N82E16812189032 | $63.92 | | | | | Total | 12,185.45 | Labor charge | $22.00 | 5 Technical assemblers | 20 hrs. | | $2,200 | | | | | Total | 14,385.45 | taxes | $.07 | | | | $.07 | | | | | Total | 15,392.432 | Justification for product necessity. In order to turn this classroom into a computer...

Words: 538 - Pages: 3