media access control #5 WAN wide area network #7 Topology- the architecture of a network #9 D. token-ring hub #11 hub- broadcasts the data it receives t oall devices connected to its ports Switch- forwards a fram it receives directly out the port associated with its destination address #13 A. frame size #15 64 and 1518 bytes #17 organizationally unique identifier- the first 6 digits of an address which are used to indicate the vendor of the network interface. #19 a. 00-C0-4F-49-68-AB:
Words: 678 - Pages: 3
hardware design, there are two main problems. 1. Lack of adequate protection between its commercial division and the rest because of the absence of an extra firewall. 2. DD Santa Ana has direct access without firewall authentication to AS’s network. Firstly, lack of protection between its commercial business division and the rest leads to the exposure of the uncertainties of the internet. Lack of firewall in this case is leaving the clients confidential information, statistics, budgets, deadlines
Words: 928 - Pages: 4
targeted network. There are various levels of these probes where some are very easy to detect and stop while others can be a little more difficult to find and require special tools and knowledge. The purpose of this report is to help one gain a more clear understanding of what port scans and ping sweeps are, what they do, and whether they are something to worry about or not. Port scans are a simple method used to help discover ports that are available and running on a particular target network. Once
Words: 674 - Pages: 3
4B Lab 8.4 1.What extra parameters are necessary in the network command when using OSPF, as compared with RIP, RIPv2, and EIGRP? Router(config)#router ospf process-number 2. What is the purpose of areas in OSPF? An area defines the confines within which LSAs are contained. 3. What is the purpose of the DR? On broadcast, multiaccess networks, OSPF elects a DR, which acts as a central point for LSAs. On multiaccess networks such as Ethernet, OSPF routers elect a DR and establish adjacencies
Words: 356 - Pages: 2
become a real challenge for network administrators as well as network design planners to ensure their respective networks are protected from external attacks resulting in loss of website availability, confidential data, and internal processes critical to mission objectives. Cyber-attacks can cost companies large sums of unrecoverable revenue associated with site downtime and possible compromise of sensitive confidential data. It is imperative today’s corporate network is configured and prepared to
Words: 735 - Pages: 3
NT1210 Lab 5.3 Finding Network Settings Exercise 5.3.1 For this exercise, you will release your IP address using ipconfig. This is a beneficial tool for troubleshooting your own local network and correcting any problems with the assignment of IP addresses. This exercise requires that you have DHCP in use for assigning IP addresses, which is a typical default setting. To begin, you should type the command ipconfig at the command-line interface and press Enter. Record the information it presents
Words: 861 - Pages: 4
recent years, in twenty-first Century, the society presented a number of important features of digital, network and information technology, it is a network as the core of the information age. To realize the information, we must rely on the perfect network, because the network will be very rapid transmission of information, and to improve the network will have to improve the construction of the network Ip address database. Because the Internet is based on the Ip address, each Ip has its physical location
Words: 336 - Pages: 2
through Ethernet. Each device will have its own IP assigned. The router’s private IP address will be 172.16.0.1, the two tablets that are connected wirelessly will be 172.16.0.2 and 172.16.0.3, the phone will be 172.16.0.4, the office computer will be 172.16.0.5, the PS4 connected will be 172.16.0.6, the PC will be 172.16.0.7 and the Roku box in the master room will be 172.16.0.8. We will be making sure that our home network is secure as well; to do that we will be changing the username and password
Words: 420 - Pages: 2
256 networks and the most significant bits are 0000. Class B: The second of the address classes, which is responsible for the value ranges of IP from 128-191. It also has 65,534 hosts and 65,536 networks. The most significant bits are 1000 and it is also a common class among most IP addresses. Class C: the third of the address classes, which is responsible for the value ranges of IP from 192-223 the most significant bits are 1100. It only has 254 hosts but it also has 16,177,216 networks since
Words: 639 - Pages: 3
Router 1 R1(config)#router rip R1(config-router)#network 192.168.10.1 R1(config-router)#network 10.0.0.0 R1(config-router)#exit Router 2 R2(config)#router rip R2(config-router)#network 10.0.0.0 R2(config-router)#exit R2(config)#router ospf 1 R2(config-router)#network 192.168.20.0 0.0.0.255 area 0 R2(config-router)#network 20.0.0.0 0.255.255.255 area 0 R2(config-router)#exit Router 3 R3(config)#router ospf 1 R3(config-router)#network 20.0.0.0
Words: 532 - Pages: 3