Free Essay

Nt1230

In:

Submitted By buttahdot
Words 703
Pages 3
5.1.1 Defines LAN address format, snap protocol an the LAN Architecture bridging and management.
5.1.2 802.3a. 2003. Poe standard provided up to 15.4 watts of DC power to each device IEEE 802.3at. 2009 also known as Poe plus provides up to 25 watts DC power. Standard | cabling | Max lenght | 10 base 5 | Coaxial (thicknet) | 500m | 10 base2 | Coaxial (thinnet) | 185m | 10 base T | Utp(cat3,5,5e,6) | 100m | 100 base fx | Fiber | 400m | 100 base t | Utp (2pr cat 5e) | 100m | 100 base t4 | Utp cat 5 | 100m | 100 base tx | Fiber | 400m | 1000 base lx | Fiber | 550m | 1000 base sx | Mmfiber | 220m or 550 | 1000 base zx | Sm fiber | 100km | 1000 basse t | Utp (4prs cat5) | 100m | | | |

5.1.4 Postfix of T is the cable type.

5.2.1 the mac address must be unique for each nic produced because the LAN uses it to figure out what NIC gets the packets its sending. If two devices from different manufactures share the last 24 bits of there mac address are on the same network the network won’t be able to tell what device gets the packets. This will cause confusion on the network and most likely cause errors.
5.2.2 the information that is given the support tab of the status window is the address type, IP address subnet mask and default gateway
5.2.3 the MAC address of the NIC for this connection is 00-0C-29-A3-43-72
5.2.4 Lot8, jalan Hi- tech 2/ Kulim Kedah 0900 , Mylaysia
5.2.5 10.59.112.1
5.2.6
Step 1: When a source device wants to communicate with another device, source device checks its Address Resolution Protocol (ARP) cache to find it already has a resolved MAC Address of the designation device. If it is there, it will use that MAC Address for communication. To view your Local ARP cache, Open Command Prompt and type command “arp-a” Step 2: If ARP resolution is not there in local cache, the source machine will generate an ARP request message, it puts its own data link layer address as the Sender Hardware Address and its own IPv4 Address as the Sender Protocol Address. It fills the destination IPv4 Address as the Target Protocol Address. The Target Hardware Address will be left blank, since the machine is trying to find that. Step 3: The source broadcast the ARP request message to the local network. Step 4: The message is received by each device on the LAN since it is a broadcast. Each device compare the Target Protocol Address (IPv4 Address of the machine to which the source is trying to communicate) with its own Protocol Address (IPv4 Address). Those who do not match will drop the packet without any action. Step 5: When the targeted device checks the Target Protocol Address, it will find a match and will generate an ARP reply message. It takes the Sender Hardware Address and the Sender Protocol Address fields from the ARP request message and uses these values for the Targeted Hardware Address and Targeted Protocol Address of the reply message. Step 6: The destination device will update its ARP cache, since it need to contact the sender machine soon. Step 7: Destination device send the ARP reply message and it will NOT be a broadcast, but a unicast. Step 8: The source machine will process the ARP reply from destination, it store the Sender Hardware Address as the layer 2 address of the destination. Step 9: The source machine will update its ARP cache with the Sender Hardware Address and Sender Protocol Address it received from the ARP.

5.2.7

5.2.8

5.2.9 arp –d

Introduction to Networking NT1210

Chapter 5 Lab

Dantae’ Martin

Continues for 0 more pages »

"NT1210 Chapter 5.2.6" StudyMode.com. 05 2014. 2014. 05 2014 <http://www.studymode.com/course-notes/Nt1210-Chapter-5-2-6-51961673.html>.
MLA 7
"NT1210 Chapter 5.2.6." StudyMode.com. StudyMode.com, 05 2014. Web. 05 2014. <http://www.studymode.com/course-notes/Nt1210-Chapter-5-2-6-51961673.html>.

Similar Documents

Premium Essay

Nt1230

...NT1230 6/29/15 NT1230 – UNIT 1. EXERCISE 1. UPGRADING TO:   Valerie Bernier, Dentist RE:   Can I upgrade the office? Hello Ms. Bernier, Thank you for writing to me with detailed information about your computer’s operating system configuration. I am assuming that your present operating system (Windows XP) runs on 32-bit (x86) computers. I am also assuming that each of your machines have 16 GB of available hard disk space. From your systems’ configuration, it looks like your machines meet the minimum hardware requirements for an upgrade to Windows 7. For a 32-bit computer, the system needs to have the following configurations to meet the requirements for Windows 7 upgrade: Processor speed : 1 GHz or faster System Memory : 1 GB Available hard disk space : 16 GB Hardware compatibility with Windows 7 : DirectX 9 graphics adapter with WDDM 1.0 or higher driver From the information you have shared with me, it seems like your machines meet almost all the requirements to upgrade your operating system to Windows 7 Professional. With Windows 7 Professional, you will be able to participate in a Windows Server domain, it also allows you to increase your random access memory (RAM) up to 192 GB. Other add-ons that come with Windows 7 Professional are location aware printing, file system encryption, and the ability to back-up to a network location. You should note that you are upgrading from Windows XP to Windows 7 Professional, you may probably experience hardware...

Words: 385 - Pages: 2

Premium Essay

Nt1230

...NT1230 Fill-in the blank question 1-10 p. 144 Pg 1 Disk Redundancy Research Pg 2 1. By default, Windows 7 standers users are permitted to install Plug and Play devices only if their drivers are digitally signed. 2. The debilitating condition in which files are stored as clusters scattered all over a disk is called fragmentation. 3. The file system included in Windows 7 that is specifically designed for on flash drives called eXfat. 4. Technically speaking, you create partitions on basic disks and volumes on dynamic disks. 5. In windows 7, the Fat32 file system is limited to volumes no larger than 32 GB. 6. The digital signature of a driver consists of a Checksum that is appended to the driver itself before publication. 7. To create a fourth primary partition on a basic disk, you must use the Disk Part utility. 8. To extend or shrink a partition on a basic disk, you must be a member of the Administrators or Backup Operators group. 9. The default partition style used by windows 7 on anx86 computer is MBR. 10. All digital signed drivers have undergone Windows Hardware Quality Lab testing. 1. RAID stands for, Redundant Array of Independent Disks. 2. We would RAID when we need to combining several hard disk drives into one logical unit. 3. A. RAID 0 is stripping it divides the information onto 2 or more hard drives speeding up the input and output of the device, B. RAID 1 is mirroring it provides redundancy...

Words: 466 - Pages: 2

Premium Essay

Nt1230

...Chapter 2 NT1230 10/3/2014 1. When was the first major standard describing a structured cabling system released?      c. 1995 2. What doe EIA and TIA stand for?      i. EIA – Electronics Industries Alliance      ii. TIA – Telecommunications Industry Association   3. What are the three parts of the EIA/TIA 568-B standard?      i. EIA/TIA-568-B.1: Commercial Cabling Standard, Master Document      ii. EIA/TIA-568-B.2: Twisted-pair Media      iii. EIA/TIA-568-B.3: Optical Fiber Cabling Standard 4. Identify the six subsystems of a structured cabling system.      i. Building Entrance (Also called (EF) Entrance Facilities)      ii. Equipment Room (ER)      iii. Telecommunications Closet (Also called (TR) Telecommunications Room or (TE) Telecommunications Enclosure)      iv. Backbone Cabling      v. Horizontal Cabling      vi. Work Area 5. Which subsystem does permanent networking cabling within a building belong to?      i. Backbone Cabling 6. What is a cross-connect?      i. Cross-connect – A space where you are going to take one or multiple cables and connect them to one or more cables or equipment. 7. What is the main cross-connect?      i. Main Cross-Connect (MC) – Usually connects two or more buildings and is typically the central telecommunications connection point for a campus or building. It is also called the Main Distribution Frame (MDF) or Main Equipment Room. The MC connects to telco, an ISP, and so...

Words: 2096 - Pages: 9

Free Essay

Nt1230

...Stephanie McFadden NT1230 Unit 8 Assignment 1 The Just Legal Company in Figmont, Nebraska has acquired a new internet address - www.justafigmont.com. They want to set up a DNS server. What would a basic DNS file look like? Describe the file. The DNS or (Domain Name System) names the number mappings on your computer. For example www.justfigmont.com could be the number 160.92.3.6. This is achieved through the DNS. The DNS is a hierarchy. There are a small number of root domain name servers that are responsible for tracking the top level domains and who are under them. The root domain servers between them know about all the people who have name servers that are authoritative for domains under the root. A basic DNS file may look like this: C:\>nslookup Default Server: vnsc-bak.sys.gtei.net Address: 4.2.2.2 > set type=mx > bellcs.com Server: vnsc-bak.sys.gtei.net Address: 4.2.2.2 Non-authoritative answer: bellcs.com MX preference = 0, mail exchanger = bellcs.com bellcs.com nameserver = ns2.server766.net bellcs.com nameserver = ns.server766.net bellcs.com internet address = 66.78.26.7 "Setting up a Basic DNS Server for a Domain." Setting up a Basic DNS Server for a Domain. N.p., n.d. Web. 07 Aug. 2015. "Learn Exchange Server 2000: Setting Up DNS for Internet Access." RSS. N.p., n.d. Web. 07 Aug. 2015. Unit 8 Assignment 2 What benefits do you see in moving an organization to an Active Directory environment? Four Benefits of Moving...

Words: 689 - Pages: 3

Premium Essay

Nt1230

...TermPaperWarehouse.com - Free Term Papers, Essays and Research Documents The Research Paper Factory Join Search Browse Saved Papers Home Page » Computers and Technology Future In: Computers and Technology Future Vincent Fernandez April 24, 2013 Mr. Greene NT1230 Lab 5.1 Exercise 5.1.1 Bridges standards which include bridging, spanning tree and others it links many of the other 802 projects. Such as 802.3(Ethernet) 802.11 (Wi-Fi) and 802.1b standards. Exercise 5.1.2 In June 2003, the IEEE approved a standard, IEEE 802.3af, for Power over Ethernet technology. The standard specified a 15.4W maximum power delivery from the network device, also known as power sourcing equipment (PSE), to an end device, also known as a powered device (PD). The average maximum power available to the PD is 12.95W after accounting for cable loss. This expands broader end device coverage such as Cisco IP phone 7941G-GE/7961G-GE/7985G and wireless access points http://www.networkworld.com/details/4681.html 802.3af, also known as Power over Ethernet, defines a way to build Ethernet power-sourcing equipment and powered terminals Exercise 5.1.3 In book Exercise 5.1.4 The numeric prefix before BASE in the Ethernet standards defines the speed of the cable. At the front of each identifier, 10 denote the standard data transfer speed over these media - ten megabits per second. Short for Baseband, this part of the identifier signifies a type of network that...

Words: 560 - Pages: 3

Premium Essay

Nt1230

...Lab 5 worksheet WORKING WITH FIREWALLS, ENCRYPTED FILE SYSTEMS (EFS) AND USER ACCOUNT CONTROL (UAC) |Exercise 5.1 |Installing Internet Information Server | |Overview |Because this is only a test deployment, you will be using a Windows 7 computer to function as the web | | |server. In Exercise 5.1 you install Internet Information Services on your workstation and configure it | | |to host two web sites. | |Completion time |10 minutes | 19. Take a screen shot of the Internet Information Services (IIS) Manager console, showing the new site you created, by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab05_worksheet file in the page provided by pressing Ctrl + V. |Exercise 5.2 |Testing IIS Connectivity | |Overview |In Exercise 5.2, you test the functionality of the web server you just installed. | |Completion time |20 minutes ...

Words: 1126 - Pages: 5

Premium Essay

Nt1230

...Client-Server Networking I_V1.0 Module 2 Analysis Troubleshooting Graphics Drivers The problem is that graphics adapters are much more complex drivers making them more problematic because the device driver is likely to be revised more often, the device driver is less likely to be included with the operating system, and it is more likely to cause compatibility or functionality problems. When you update a device driver in Windows 7 it is not uncommon for new drivers to cause more problems than they solve. If the device involved is a graphics adapter, a bad driver could prevent the system from functioning. To troubleshoot hardware or driver problems, here are some techniques: • Open the Properties sheet for the device and check the Device Status box on the General tab. If the device is malfunctioning, this tab informs you of its status and enables you to launch a troubleshooter. • Open the Device Manager and delete the device entirely. Then restart the system and allow Windows 7 to detect and install the device over again. This process will cause Windows to re-allocate hardware resources to the device, which could resolve the problem if it was caused by a hardware resource conflict. • If the device or driver malfunction prevents the system from running properly, as in the case of a bad graphics driver that prevents an image from appearing on the screen, you can start the computer in Safe Mode by pressing the F8 key as the system starts. Safe Mode loads the operating system...

Words: 272 - Pages: 2

Premium Essay

Nt1230

...Daniel Diaz 6/22/15 Professor Olivier Unit 1 Assignment 1 Voice vs. Data • Cell phones use data networks in order to function in its full potential. Without any network data, you wouldn’t be able to browse the web, view email, applications, etc… Data networks is what makes a smart phone possible. • Landline phones are used by voice networks because it needs to be directly plugged in, in order to function. The voice network for landline phones will always have good signal since is always plugged in. This is why landline use voice networks. • SMS / Text Messages is used with network data. To send out a SMS Text Message you’ll need network coverage. Depending on what type of phone sometimes you don’t need data to send out a text but you do need signal to do so. • Fax Machines uses the voice network in order to function. With voice network you can send out a fax by just dialing the number to your destination. This is how voice network is used with fax machines. • Pagers are used with network data. In order to page someone you’ll need data on the network in order to function. This is why pagers use network data. • VOIP (voice over IP) phones uses voice network to function. Their directly connected to the wall in order to function. This is why VOIP uses voice network. • Skype / Facetime uses network data to function. The application wouldn’t be able to function without...

Words: 291 - Pages: 2

Premium Essay

Nt1230

...Networking Questions 1. How many bytes are in a kb? 1,000 2. Zero 3. Convert 00101011 = 43 4. On graphic what part of drive? Track 5. A single Hexadecimal digit is equivalent to ______ binary positions? = 4 6. How voice communications are converting to digital signals? They are broken into very small samples and then binary values are assigned to them. 7. What does compression to video files? It takes a standard video and stores it as a smaller video file. 8. Protocol – http 9. What does the internet core comprise of? Many separate networks, some small and some large. 10. Which of the following design to specifically manage computer peripheral devices? Device drives. 11. Which of the following physical network topologies? Star 12. What is the networking standard? The details of what a networking technology does and how it works. 13. What standards settings body sets de facto standard. None 14. Why is the TCP/IP model divided into larger segments? All of these are correct. 15. Why the TCP/IP model is considered an “open” networking model? It is not owned by a specific organization. 16. What do routers do in a network? Routers move data between different LANs, often by linking them to WAN lines. 17. What is meant by “encapsulation”? It is a way to address data to cross over any type of network link. 18. In TCP/IP networks, every device must have ______ to be able to transmit or receive data. An IP Address...

Words: 969 - Pages: 4

Premium Essay

Nt1230

...1a. The American Registry for Internet Numbers (ARIN) is the nonprofit corporation responsible for managing Internet number resources IPv4 and IPv6 addresses for Canada, many Caribbean and North Atlantic islands and the United States. Because Internet addresses must be unique and because address space on the Internet is limited, there is a need for some organization to control and allocate address number blocks. IP address management was formerly a responsibility of the IANA, which contracted with Network Solutions Inc. for the actual services. In December 1997, IANA turned this responsibility over to ARIN, which, along with Reseaux IP Europeans (RIPE), APNIC, LACNIC and AfriNIC, now manages the world's Internet address assignments and allocation B. .The Internet Assigned Numbers Authority (IANA) is a department of ICANN responsible for coordinating some of the key elements that keep the Internet running smoothly. Whilst the Internet is renowned for being a worldwide network free from central coordination, there is a technical need for some key parts of the Internet to be globally coordinated, and this coordination role is undertaken by IANA. Specifically, IANA allocates and maintains unique codes and numbering systems that are used in the technical standards (“protocols”) that drive the Internet. IANA’s various activities can be broadly grouped in to three categories:  Domain Names IANA manages the DNS Root, the .int and .arpa domains, and an IDN practices resource. ...

Words: 604 - Pages: 3

Premium Essay

Nt1230

...Cristina Ortega Week 3 Lab 1/09/2015 Professor Yang Lab 3.1 Network Reference Models 3.1.1 1. What would happen if wireless devices were not governed by the WIFI Alliance and each vendor had its own standards and protocol? What impact would this have on your personal life or business communications? If the governed was not WIFI Alliance then each company will lose it customers because if you set a standard in just buying your product then you’re not going to go any farther than just a couple of months in selling them. This will lose interest in buying the product because then I would not know if it is safe or not. Lab 3.1 Review 1 1. Why would a three- layer model of communication that has the layers physical, network, and application be insufficient to adequately describe network communication? 2. What is the history of the OSI reference model? How did it come about and why was it created? ` 3. What is the history of the TCP/ IP model? Why was it created? TCP/IP has two different names that come from. These key protocols two are usually considered the most important. The internet Protocol is the primary OSI network layer protocol that provides addressing, Datagram routing and other functions in a network. They were developed together with TCP/IP providing the mechanism for implanting the internet. Lab 3.2 the OSI Reference Model 3.2.1 Using Figure 3- 1, define each layer of the OSI model in your own words and state what each layer provides. Use...

Words: 609 - Pages: 3

Premium Essay

Nt1230 Syllabus

...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...

Words: 1834 - Pages: 8

Premium Essay

Nt1230 Analisis 1.1

...NT1230 The workstations will require Windows 7 Professional to provide the necessary features needed to satisfy the small businesses needs. Reason number one is the need for backing up the workstations data. With Windows 7 Professional you can backup to the local hard drive (HDD), a DVD, or the network. With home editions you can only backup to the local HDD or to a DVD. With Professional workstations can also be scheduled to automatically backup to the server, which cannot be done with the home versions. The second reason is the ability to encrypt important files. With encryption, even if someone were to take your files, they would not be able to view them without the encryption key. The final reason is that you cannot connect to the server without Professional, Enterprise, or Ultimate. Professional and above are the only versions of Windows 7 capable of connecting to a domain server. Professional is the least costly of the editions that will provide the necessary features, therefore the most cost efficient. A clean install using a migration will be required to upgrade. This is because this is the only way to upgrade from Windows XP to Windows 7. This leaves you with two options: migrate your files to Windows 7 from XP using the built in feature or make sure all files are backed up to the server before the installation. With a migration, all user data and preferences are transferred eliminating the need to manually change the settings on each workstation. Needless to say,...

Words: 338 - Pages: 2

Premium Essay

Nt1230 Project

...Home Hospice Care (HHC) Project May 22, 2015 [pic] This project involves establishing a client-server based network in the Home Hospice Care building along with a wireless network (WLAN). We will be installing a Windows 2012 Server running the required Medical Management software along with a backup solution. The diagram below shows the current floor plan for HHC. It should be noted that more workstations, printers and laptops will be added (see next page). Additionally, wireless access points will be setup in the bullpen areas, designed with limited distance access. Floor Plan of Home Hospice [pic] The above illustration shows the floor plan for HHC. The equipment in the table below is what we’ll be requiring: |Employee Title |Computers | | |Needed | [pic] The table below indicates level of file permissions for the various positions [pic] Network Disaster Recovery Plan (This Draft will be finalized when approved by Management) Home Hospice Care (HHC) Emergency notification contacts |Name |Address |Home Phone |Mobile/Cell Phone | |Office Manager | | | | |Director of Prof Svcs | ...

Words: 1030 - Pages: 5

Premium Essay

Nt1230 Final

...1. Which is an object that is not listed in the library that is included with Windows 7? Movies 2. Designed to replace VB Script for scripting and performing actions at the command line? PowerShell 3. Windows 7 edition that can be added to an Active Directory domain? Windows 7 Professional 4. Replaced the MS-DOS boot disks for fixing and troubleshooting a wide range of boot problems on a Windows Vista or 7 system. Windows PE 5. Series of folders associated with a specific user that contains personal documents, user-specific registry settings, Internet favorites, and other personalized information. User profile 6. What program do you use to determine if your machine can be upgraded to Windows 7? Upgrade Advisor 7. What is the default partition style used in Windows 7? MBR 8. Maximum number of primary partitions that MBR supports. 4 9. What type of volume supports is based on RAID-0? Striped volume 10. The preferred file system used in Windows 7? NTFS 11. Which layer of the OSI model covers the cabling and electrical signaling? Physical 12. Which layer of the OSI model is IPv4 Addressing included? Network 13. What is used to specify which bits of an IPv4 address are used for the network identifier and which bits are used for the host identifier? Subnet mask 14. What address is assigned to a computer that fails to locate a DHCP server? APIPA 15. The process of verifying the identity of the person operating the computer? Authentication 16. Enables users to perform specific...

Words: 842 - Pages: 4