...Adrian Fisher NT1210 Tuesday class Professor K Lab 5.3 Exercise 5.3.1: When I entered the ipconfig/release command I couldn’t see my IP address anymore and when I entered ipconfig/renew my IP address came back up. Everything was the same. Exercise 5.3.2: Exercise 5.3.3: Here’s what happened when I entered command PING 192.168.1.1 Here what happened when I entered command WWW.GOOGLE.COM Exercise 5.3.4: Here’s what happened when I entered command PING –A 192.168.1.1 And this is what happened when I ping the local host in a argument. Exercise 5.3.5: Here’s what happened when I entered the command PING –N 6 192.168.1.1. From what I can gather from my research, being able to to send out a certain number of pings that you desire allows you to further analyze the speed of the ping better and get an average round trip time. Exercise 5.3.6: Here’s what happened when I entered command TRACERT 192.168.1.1. It looks like the trace went through 1 system. When I sent the trace to WWW.GOOGLE.COM the trace went through 14 devices. Here’s what happening. Here’s what happened when I traced WWW.NFL.COM. Exercise 5.3.7: There are 2 active connections and 2 protocols being performed when I ran netstat. Here’s what it looked like. When I ran the netstat after I opened up internet explorer this is what popped...
Words: 256 - Pages: 2
...Schwarz NT1210 1/14/15 Lab 3 Lab 3.1 The network reference models refer to the TCP and the OSI models of communication between machine and server. The TCP model has a 5 layer process, whereas the OSI model has a 7 layer process. Each is important for sending and receiving data throughout the network. Lab 3.2 The OSI reference model is a networking model that serves as communication between a client and server. This is a 7 layer process. The first layer is the physical layer in which you have the physical connection type. The second layer is the data link which contains the actual data being sent. The third layer is the network layer that grabs the IP address of the receiver. The fourth layer transports the data from one client to another. The fifth layer sets up which software should run the data. The sixth layer determines how the data is presented. The seventh layer opens the application that the data is displayed on. Lab 3.3 The TCP model is exactly the same thing as the OSI model except for the fact that the last 3 layers are shown as 1. The first layer is the physical layer in which you have the physical connection type. The second layer is the data link which contains the actual data being sent. The third layer is the network layer that grabs the IP address of the receiver. The fourth layer transports the data from sender to receiver. The fifth layer sets up which software should run the data, determines how its presented and loads the proper application. Lab 3.4 ...
Words: 343 - Pages: 2
...NT1210 Lab 3.1 3.1.1 You wouldn’t be able to communicate with other devices. You would have to go back to hardline phone and using mail service. No more on the go communications. 3.1.2 The OSI model. It actually shows the process. 3.1.3 Physical, Data, Link, Network, Transport, Session and Presentation. 3.1.4 If its too general the reader wont understand completely. And if its too focused or granular on details it will bore the reader. 3.2.1 Physical – Device Data Link – Physical address Network – Path determination Transport – End to end connections Session – internet Presentation – typing data Application – games, downloads ApplicationPresentationSession | Data | Transport | Segment | Network | Packet | Data Link | Frame | Physical | Bit | 3.2.2 3.2.3 First the receiving computer synchronizes with the digital signal by reading binary numbers. After synchronizing is complete and it gets the whole frame and passes it to the layer above it which is the Data Link layer. Second the Data Link layer will do a Cyclic Redundancy Check (CRC) on the frame. Checking for errors and then strip off any information or header which was put on by the remote systems Data Link layer and pass the rest to the Network layer. Third the Network layer checks the IP address and if it matches the Network layer header is stripped off from the packet and passed to the Transport layer. Fourth the Transport...
Words: 483 - Pages: 2
...Lab 4 NT1210 Cristian Randle Lab 4.1: Copper Cabling 4.1.1: So that NIC’s on different ISP providers can communicate to each other. 4.1.2: The copper wiring is used to power appliances and other devices so it has a high capacity for transmitting electricity. 4.1.3: More expensive shielded cables cause far less interference. Steel reinforced concrete, radio transmitters. 4.1.4: Category | Maximum Speed | Application | 1 | 1 Mbps | Telephone cabling (POTS) | 2 | 4 Mbps | Token Ring | 3 | 10 Mbps | Token Rink | 4 | 16 Mbps | Token Ring Networks | 5 | 100 Mbps | Ethernet, Fast Ethernet, Token Ring | 5e | 1Gbps | Ethernet, Fast Ethernet, Gigabit Ethernet | 6 | 10 Gbps | GigabitEthernet, 10G Ethernet | 6a | 10 Gbps | GigabitEthernet, 10G Ethernet | 4.1.5: 4.1.6: Plastic jacket, metallic shield, dielectric insulator and center core. 4.1.7: Only good under 100 meters 4.1.8: Both straight and crossover cables 4.1.9: S2 to G is too far away to work. Fiber optics would be needed. 4.1.10: Multi-meter: It can be used to locate the failure of electrical system and the defective parts. Tone generator: It acts as a testing device for informational signals that come handy when dealing with telephone systems. Pair Scanner: Identifies connection hosts on a subnet. Time Domain Reflectometer: Locate and identify faults in all types of metallic cables Lab 4.1 review: 1. Less confusion, need only one type of cable easier to install, less time consuming...
Words: 739 - Pages: 3
...Lab 1.1 1.1.1 10⁰ 10⁰ 10¹ 10¹ 10² 10² 10³ 10³ 1 1 10 10 100 100 1000 1000 2931 2931 30 30 1 1 2000 2000 900 900 2 2 1 1 3 3 9 9 X X X X 1.1.2 2² 2¹ 2º 4 2 1 1 1 X X X 0 0 1 1 5 5 4 4 0 0 1 1 1.1.3 2² 2¹ 2º 4 2 1 0 0 X X X 1 1 1 1 3 3 0 0 2 2 1 1 1.1.4 24 2³ 2² 2¹ 2º 16 8 4 2 1 1 1 0 0 0 0 1 1 0 0 X X X X X 0 0 2 2 16 16 18 18 0 0 0 0 1.1.5 27 26 25 24 2³ 2² 2¹ 2º 128 64 32 16 8 4 2 1 1 1 1 1 1 1 0 0 0 0 0 0 1 1 0 0 X X X X X X X X 226 226 128 128 64 64 32 32 0 0 0 0 0 0 2 2 0 0 1.1.6 28 28 156 156 28 28 28 28 12 12 4 4 0 0 0 0 ˅ ˅ ˅ ˅ ˅ ˅ ˅ ˅ 27 26 25 24 2³ 2² 2¹ 2º 128 64 32 16 8 4 2 1 10011100 10011100 1 1 0 0 0 0 1 1 1 1 1 1 0 0 0 0 X X X X ...
Words: 739 - Pages: 3
...1. There are no limitations on WAN’s so they can be custom built for the size of the organization. 2. For the purpose of organizational expansion. 7.1.2: 1. The longer the distance the more chances that you have for signal loss and lack of signal strength. 7.1.3: Media | Infrastructure | Summary | UTP | Phone Lines | Is not suitable for sending data | Coaxial | Television Cable | Supports 10 to 100Mbps and is relatively inexpensive, although more costly than UTP. | Fiber-Optic | Fiber-Optic Cable | Uses a customized infrastructure to run dedicated connections; This is a costly option | Electric Power Lines | Power Lines | This can be used with Broadband over power lines (BPL), making use of the extensive infrastructure in place already. | 7.1.4: Media | Summary | Satellite | Transmits from ground to space then back to where the transmission is required to be sent | WiMAX ( Worldwide Interoperability for Microwave Access) | Used for transmitting a wireless network that could be many miles wide. | HSPA+ (Evolved High-Speed Packet Access) | Used for telecom companies to transfer from towers at 4G speeds. | Radio Frequency | Uses radio waves to transmit information | 7.2.1: A leased line is also referred to as a dedicated line, because it is dedicated to the two locations it is connecting to. Data and information are transmitted without the use of the internet. This makes the connection secure, and files sent over the connection are safe from...
Words: 551 - Pages: 3
...Unit 2 Lab 2.1.1 Computer networking is possible by combining all elements together. Media, so that communication is possible between two or more devices. Software, hardware, and user interface to make the communication happen within the network; signal is necessary to transmit information from one device to another. Pattern protocols permit a more standardize way to put everything together to create a networking possibility. Timing so that you can synchronize the frame of reference between all devices in the network. Without all these elements together networking cannot exist. 2.1.2 Network interface is a network-specific software that communicates with the network-specific device driver and the IP layer to provide the IP layer with a consistent interface to all network adapters that might be present. The IP layer selects the appropriate network interface based on destination address of the transmitted packed. Each network interface has a network address. Network interface layer is responsible for adding or removing any link layer protocol header required to deliver a message to its destination. 2.1.3 Internet Gateway Device, Discovery, and Control Client, RIP Listener. Simple TCP/IP services and uPnP user interface. 2.1.4 True democracy. Each PC on the network is equal to the other PC; so they can communicate with each other directly. They don’t have a centralized PC monitoring and controlling the communication network. Every PC shares files and resources...
Words: 349 - Pages: 2
...2 2 1 1 3 3 9 9 104 103 102 101 1000 100 10 1 1 1 30 30 2000 2000 900 900 2931 2931 + + + 22 21 20 4 2 1 1 1 0 6 6 4 + 2 + 0 21 20 2 0 1 1 2 2 0 24 23 22 21 20 16 8 4 2 1 18 18 1 0 0 1 0 16 + 0 + 0 + 2 + 0 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 1 1 0 0 0 1 0 226 226 128 + 64 + 32 + 0 + 0 + 0 + 2 + 0 156 100 100 36 4 4 1 1 0 28 27 26 25 ...
Words: 454 - Pages: 2
...Exercise 1.1.1 “2931” 2000 + 900 + 30 + 1 = 2931 Exercise 1.1.2 “110^2 2^2 2^1 2^0 4 2 1 X X X 1 1 0 4 + 2 + 0 + 6 Exercise 1.1.3 “11^2” 2^1 2^0 2 1 X X 1 1 2 + 1 = 3 Exercise 1.1.4 “10010^2” 2^4 2^3 2^2 2^1 2^0 16 8 4 2 1 X X X X X 1 0 0 1 0 16 + 2 = 18 Exercise 1.1.5 “11100010^2” 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 X X X X X X X X 1 1 1 0 0 0 1 0 128 + 64 + 32 + 2 = 226 Exercise 1.1.6 “156” 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 X X X X X X X X 1 0 0 1 1 1 0 0 128 + 16 + 8 + 4 = 156 Exercise 1.1.7 “255” 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 X X X X X X X X 1 1 1 1 1 1 1 1 128 + 64 + 32 + 1 6 + 8 + 4 + 2 + 1 = 255. Exercise 1.1.8 “200” 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 X X X X X X X X 1 1 0 0 1 0 0 0 128 + 68 + 8 = 200 Exercise 1.1.9 “1001^2” Exercise...
Words: 627 - Pages: 3
...Chapter 7 Lab 7.1.1 Why is it impractical for an organization to own the entirety of a WAN? There are no limitations on WANs so they can be custom built for the size of the organization. Why is it favorable for an organization to maintain ownership of the entirety of the LAN? Because the purpose of organizational expansion. Table 7-1 WAN Physical Media MediaInfrastructureSummary UTPPhone linesThe quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. CoaxialTelevision cableCoaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. Fiber-opticConnecting networks between buildings.Uses a customized infrastructure to run dedicated connections; this is a costly option. Electric power linesThe bulk transfer of electrical energy.This type of media can be used with broadband over power lines (BPL), making use of the extensive infrastructure in place already. Lab 7.1 Review 1.How can cables like UTP and coaxial cable be used for long-distance communication in a WAN infrastructure? Where are these cables used most often? The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. It uses most popular...
Words: 321 - Pages: 2
...NT1210 Lab 5.4 Basic Network Troubleshooting Exercise 5.4.1 If you needed to determine the computer name used for node E on the network (starting from node A), what command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. I already have the IP Addresses for all the workstations a simple Ping command in CMD will work. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping –a 192.168.1.5 to retrieve the information we need. Exercise 5.4.2 What is the best (easiest and most efficient) command to determine whether all the hosts on the local-area network are reachable? You can assume that you are starting from computer A. List the command sequence(s) you would need to enter to test this functionality. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping 192.168.1.5, Ping 192.168.1.4, and Ping 192.168.1.3, Ping 192.168.1.6, and Ping 192.168.1.2. This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping 192.168.1.4 Exercise...
Words: 344 - Pages: 2
...NT1210 Lab 4.2: Fiber-optic Cables Exercise 4.2.1 The light in an SMF cable travels down the center of the fiber parallel to the direction of the fiber in a single path. Can this type of cable be used to transmit and receive bits simultaneously, or does it require one fiber for transmitting and one for receiving? Justify your answer using your textbook and Internet research. No it cannot transmit and simultaneously receive bits with a single cable. A second cable would be needed for sending bits back. In this case you would need two cables one send bits and second cable receiving bits. Exercise 4.2.2 What characteristics of fiber-optic cables allow them to be used over longer distances with less risk than copper cable? The core in single-mode fiber is only approximately 10 times larger than the wavelength of the light it is carrying. This leaves very little room for the light to bounce around. As a result the data carrying light pulses in single-mode fiber are essentially transmitted in a straight line through the core. Electromagnetic immunity including non-conductivity, Security considerations, decreased attenuation and increased transmission distance, Increased bandwidth potential, Small diameter and weight Long term economics Exercise 4.2.3 MMF distances can still far exceed copper cable, but MMF cannot match the distance available from the more expensive SMF. What is the reason for the distance limitation with the use of MMF? Multimode cables are less expensive...
Words: 333 - Pages: 2
...Exdahellilvn NT1210 Lab 2.2 Networking drives Exercise 2.2.1 If an organization has 30 users, each with his or her own PC, what is the comparative cost of buying a $120 printer for each user versus the cost of buying a single, higher-capacity $500 printer that can be used by the entire office? What is the drawback to having only a single printer? What is the cost of having two additional backup printers for the office compared to having individual printers? How many shared printers can be purchased and still be less expensive than individual printers? It would cost $3,900 if each user had their own printer V.S. buying a high capacity single printer for $500. On top of that if ink cartridges cost around $32.00 dollars apiece for each printer cartridge. It would cost a total of $960 for ink cartridges for all 30 printers. If a single printer was connected to a single workstation then it would be only tied to that workstation. No other users would be able to use printer connected to the workstation. The cost of having two backup printers would depend on what type of printers. There are two known types of printers one LaserJet or standard color ink printers. LaserJet printers can run around $500 each V.S. $120-$150 for a standard color printer. Still the cost of having two additional backup printers is less than having each workstation have their own. You can buy up to four printers costing $500 apiece and still come out money ahead. Even if you spent $100 dollars on LaserJet...
Words: 838 - Pages: 4
...NT1210 Lab 3.3: the TCP/IP Model Exercise 3.3.1 Using your textbook and Internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? Applications, Transport, Network, Network Interface this the TCP/IP model. A huge difference is that TCP/IP model uses 4 major layers instead of 7 layers to OSI model. OSI Model is Applications, Presentation, Session, Transport, Network, Data Link and Physical composed to 7 layers. OSI was developed as theoretical model, while TCP/IP was more practical model. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model Transport layers: The Internet Protocol (IP), Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). These core protocols support many other protocols, to perform a variety of functions at each of the TCP/IP model layers. Still others enable user applications to function. Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and function of each of these. Use your textbook and Internet research to support your answer. TCP (Transmission Control Protocol) Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. User Datagram Protocol a connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery services...
Words: 331 - Pages: 2
...NT1210 Lab 2.3 Network types and Topolgies Exercise 2.3.1 Briefly define LAN, MAN, PAN, and WAN. What is the critical distinction for these networks? LAN=Local Area Network. Which is a computer network that links devices within a building or group of adjacent buildings MAN=Short for Metropolitan Area Network, a data network designed for a town or city. In terms of geographic breadth, MANs are larger than local-area networks (LANs), but smaller than wide-area networks (WANs). MANs are usually characterized by very high-speed connections using fiber optical cable or other digital media. WAN=Wide Area Network. A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet. PAN=PAN is short for Personal Area Network Based on the electric-field transmission medium, is an IBM technology that allows individuals to exchange data with a simple touch or grasp, such as a handshake. A PAN user is equipped with a receiver and a transmitter, which constantly sends infinitesimal data-carrying currents -- in the 0.1-1 MHz band -- through the body and picks up currents when in very close range with another device or individual carrying a transmitter. Exercise 2.3.2 Briefly define...
Words: 1082 - Pages: 5