Nt1210 Lab 7

In: Other Topics

Submitted By tots7099
Words 321
Pages 2
Chapter 7 Lab 7.1.1 Why is it impractical for an organization to own the entirety of a WAN? There are no limitations on WANs so they can be custom built for the size of the organization. Why is it favorable for an organization to maintain ownership of the entirety of the LAN? Because the purpose of organizational expansion. Table 7-1 WAN Physical Media MediaInfrastructureSummary UTPPhone linesThe quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. CoaxialTelevision cableCoaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. Fiber-opticConnecting networks between buildings.Uses a customized infrastructure to run dedicated connections; this is a costly option. Electric power linesThe bulk transfer of electrical energy.This type of media can be used with broadband over power lines (BPL), making use of the extensive infrastructure in place already. Lab 7.1 Review 1.How can cables like UTP and coaxial cable be used for long-distance communication in a WAN infrastructure? Where are these cables used most often? The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. It uses most popular in school network. Coaxial can support great cable lengths between network devices. Coaxial cable has been popular in school networks, especially linear bus networks. Lab 7.2.1 What are the benefits of using a dedicated leased line? What are the limitations of using a dedicated leased line? Leased line have many advantages such as high speeds, fast uploads, good reliability, and better…...

Similar Documents

Nt1210 Lab 1 Reviews

...NT1210 INTRODUCTION TO COMPUTER DATA LAB 1.1: READING BINARY Exercise: 1.1.1 Create a mapping for decimal number 2931. 10^3 | 10^2 | 10^1 | 10^0 | 1000 | 100 | 10 | 1 | 2 | 9 | 3 | 1 | x | x | x | = 2931 = 2931 x | 2000 + | 900 + | 30 + | 1 | Exercise: 1.1.2 Create a mapping for binary number 110 subscript 2. 2^2 | 2^1 | 2^0 | 4 | 2 | 1 | x | x | x | 1 | 1 | = 6 = 6 0 | 4 + | 2 + | 0 | Exercise: 1.1.3 Create a mapping for binary number 11 subscript 2. 2^1 | 2^0 | 2 | 1 | x | x | 1 | = 3 = 3 1 | 2 + | 1 + | Exercise 1.1.4: Create an expanded mapping for binary number 10010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 | 1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.5: Create an expanded mapping for the binary number 11100010 subscript 2. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 1 | 1 | 1 | 0 | 0 | 0 | 1 | = 226 = 226 0 | 128 + | 64 + | 32 + | 0 + | 0 + | 0 + | 2 + | 0 | Exercise 1.1.6: Create a binary conversion for the decimal value 156. 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 | 16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | = 10011100 = 10011100 x | 1 | 0 | 0 | 1 | 1 | 1 | 0 | 0 | 128+ | 0+ |......

Words: 800 - Pages: 4

Nt1210 Lab 3

...NT1210 Lab 3.1 3.1.1 You wouldn’t be able to communicate with other devices. You would have to go back to hardline phone and using mail service. No more on the go communications. 3.1.2 The OSI model. It actually shows the process. 3.1.3 Physical, Data, Link, Network, Transport, Session and Presentation. 3.1.4 If its too general the reader wont understand completely. And if its too focused or granular on details it will bore the reader. 3.2.1 Physical – Device Data Link – Physical address Network – Path determination Transport – End to end connections Session – internet Presentation – typing data Application – games, downloads ApplicationPresentationSession | Data | Transport | Segment | Network | Packet | Data Link | Frame | Physical | Bit | 3.2.2 3.2.3 First the receiving computer synchronizes with the digital signal by reading binary numbers. After synchronizing is complete and it gets the whole frame and passes it to the layer above it which is the Data Link layer. Second the Data Link layer will do a Cyclic Redundancy Check (CRC) on the frame. Checking for errors and then strip off any information or header which was put on by the remote systems Data Link layer and pass the rest to the Network layer. Third the Network layer checks the IP address and if it matches the Network layer header is stripped off from the packet and passed to the Transport layer. Fourth the......

Words: 483 - Pages: 2

Nt1210 Lab 1.1

...Lab 1.1 1.1.1 10⁰ 10⁰ 10¹ 10¹ 10² 10² 10³ 10³ 1 1 10 10 100 100 1000 1000 2931 2931 30 30 1 1 2000 2000 900 900 2 2 1 1 3 3 9 9 X X X X 1.1.2 2² 2¹ 2º 4 2 1 1 1 X X X 0 0 1 1 5 5 4 4 0 0 1 1 1.1.3 2² 2¹ 2º 4 2 1 0 0 X X X 1 1 1 1 3 3 0 0 2 2 1 1 1.1.4 24 2³ 2² 2¹ 2º 16 8 4 2 1 1 1 0 0 0 0 1 1 0 0 X X X X X 0 0 2 2 16 16 18 18 0 0 0 0 1.1.5 27 26 25 24 2³ 2² 2¹ 2º 128 64 32 16 8 4 2 1 1 1 1 1 1 1 0 0 0 0 0 0 1 1 0 0 X X X X X X X X 226 226 128 128 64 64 32 32 0 0 0 0 0 0 2 2 0 0 1.1.6 28 28 156 156 28 28 28 28 12 12 4 4 0 0 0 0 ˅ ˅ ˅ ˅ ˅ ˅ ˅ ˅ 27 26 25 24 2³ 2² 2¹ 2º 128 64 32 16 8 4 2 1 10011100 10011100 1 1 0 0 0 0 1 1 1 1 1 1 0 0 0 0 X X X X ...

Words: 739 - Pages: 3

Nt1210 Lab 3

...Lab 3.1 Network Reference Models Exercise 3.1.1: What would happen if wireless devices were not governed by the Wi- Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? If wireless devices had no governance or set of rules to abide by, it would greatly impact everything we do day to day. Think of the hidden security that we have now with wireless. If that was gone it would be easier for someone to acquire your information, such as your social security number, your bank account information. What the Wi-Fi Alliance does is gives us piece of mind. How many people today know about the Wi-Fi Alliance? I believe, unfortunately, not enough people. Exercise 3.1.2: Give another example of a model that is used to visualize something that is difficult to observe or perceive. How does the model make it easier to understand? My example is Mind Mapping. With Mind Mapping it’s very easy to collaborate all your ideas, thoughts, notes, and references all in one place. I think it would be easier to show someone what it is you’re talking about. And by adding all your information into the Mind Map, it’s very easy to explain to someone (like a Lab Partner) where you’re coming from and how you’re seeing the issue or problem at hand. Exercise 3.1.3: Based on what you already know about networks, what are the different layers you think would be necessary for communication to be mapped to a model?...

Words: 1701 - Pages: 7

Nt1210 Lab 3

...Schwarz NT1210 1/14/15 Lab 3 Lab 3.1 The network reference models refer to the TCP and the OSI models of communication between machine and server. The TCP model has a 5 layer process, whereas the OSI model has a 7 layer process. Each is important for sending and receiving data throughout the network. Lab 3.2 The OSI reference model is a networking model that serves as communication between a client and server. This is a 7 layer process. The first layer is the physical layer in which you have the physical connection type. The second layer is the data link which contains the actual data being sent. The third layer is the network layer that grabs the IP address of the receiver. The fourth layer transports the data from one client to another. The fifth layer sets up which software should run the data. The sixth layer determines how the data is presented. The seventh layer opens the application that the data is displayed on. Lab 3.3 The TCP model is exactly the same thing as the OSI model except for the fact that the last 3 layers are shown as 1. The first layer is the physical layer in which you have the physical connection type. The second layer is the data link which contains the actual data being sent. The third layer is the network layer that grabs the IP address of the receiver. The fourth layer transports the data from sender to receiver. The fifth layer sets up which software should run the data, determines how its presented and loads the proper application. Lab......

Words: 343 - Pages: 2

Nt1210 Lab

...Fredrick Donaldson January 1, 2015 Introduction to Networking Chapter 1 Lab 1:1:1 Reading Binary 1) The mapping of 2931 should contain the values 2, 9, 3, and 1 in the lower-digits places and 2000, 900, 30, and 1 in the bottom boxes. The place values are the same regardless, so the only change is the addition of 103 as the leftmost digit value. 2 | 9 | 3 | 1 | 2,000 | 900 | 30 | 1 | Exercise 1.1.2 The mapping of 1102 will have 1, 1, and 0 in the lower bit values and 4, 2, and 0 in the bottom bits, for a sum of 6. 1 | 1 | 0 | 4 | 2 | 0 | Exercise1.1.3 The mapping of 112 will have a leading 0 to fit the mapping, which does not affect the results. The lower bits will have leading 0s and then 1 and 1 in the rightmost bits. This results in all 0s at the bottom, with 2 and 1 in the rightmost bits, for a sum of 3. 0 | 0 | 1 | 1 | 0 | 0 |...

Words: 349 - Pages: 2

Nt1210 Lab 5.3

...Adrian Fisher NT1210 Tuesday class Professor K Lab 5.3 Exercise 5.3.1: When I entered the ipconfig/release command I couldn’t see my IP address anymore and when I entered ipconfig/renew my IP address came back up. Everything was the same. Exercise 5.3.2: Exercise 5.3.3: Here’s what happened when I entered command PING 192.168.1.1 Here what happened when I entered command WWW.GOOGLE.COM Exercise 5.3.4: Here’s what happened when I entered command PING –A 192.168.1.1 And this is what happened when I ping the local host in a argument. Exercise 5.3.5: Here’s what happened when I entered the command PING –N 6 192.168.1.1. From what I can gather from my research, being able to to send out a certain number of pings that you desire allows you to further analyze the speed of the ping better and get an average round trip time. Exercise 5.3.6: Here’s what happened when I entered command TRACERT 192.168.1.1. It looks like the trace went through 1 system. When I sent the trace to WWW.GOOGLE.COM the trace went through 14 devices. Here’s what happening. Here’s what happened when I traced WWW.NFL.COM. Exercise 5.3.7: There are 2 active connections and 2 protocols being performed when I ran netstat. Here’s what it looked like. When I ran the netstat after I opened up internet explorer this is what popped up....

Words: 256 - Pages: 2

Nt1210 Lab 1.1

...Unit 1 Lab 1.1: Reading Binary Exercise 1.1.1: Create a mapping for the decimal number 2931 10^3 10^2 10^1 10^0 1,000 100 10 1 *2 *9 *3 *1 2,000 900 30 1 =2931 Exercise 1.1.2 Create a mapping for the binary number 1102 2^2 2^1 2^0 4 2 1 *1 *1 *0 4 + 2 + 0 = =6 Exercise 1.1.3 Create a mapping for the binary number 112 2^1 2^0 2 1 *1 *1 2 + 1 = =3 Exercise 1.1.4 Create an expanded mapping for the binary number 100102 2^4 2^3 2^2 2^1 2^0 16 8 4 2 1 *1 *0 *0 *1 *0 16 + 0 + 0 + 2 + 0 = =18 Exercise 1.1.5 Create an expanded mapping for the binary number 111000102 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 *1 *1 *1 *0 *0 *0 *1 *0 128 + 64 + 32 + 0 + 0 + 0 + 2 + 0 = =226 Exercise 1.1.6 Create a binary conversion for the decimal value 156 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 *1 *0 *0 *1 *1 *1 *0 *0 128 + 0 + 0 + 16 + 8 + 4 + 0 + 0 = =156 Exercise 1.1.7 Create a binary conversion for the decimal value 255 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 *1 *1 *1 *1 *1 *1 *1 *1 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = =255 Exercise 1.1.8 Create a binary conversion for the decimal value 200 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 *1 *1 *0 *0 *1 *0 *0 *0 128 + 64 + 0 + 0 + 8 + 0 + 0 + 0 = =200 Exercise 1.1.9 Using the binary converter document, create a decimal conversion for the binary value 10012. =8 Exercise 1.1.10 Using the binary converter document, create a decimal......

Words: 707 - Pages: 3

Nt1210 Intro to Networking Lab 1.3

...NT1210 Intro to Networking Unit 1 Lab 1.3 Bit Byte Structure exercise 1.3.1 What is the decimal value of Byte 1 by itself? What is the decimal value of Byte 2 by itself? Byte 1 is 6400 and Byte 2 is 233 Exercise 1.3.2 What is the decimal equivalent of the binary sequence in Figure 1-12 (the combined sequence of Byte 1 and Byte 2 as a single decimal value)? How does this compare to the individual values of Byte 1 and Byte 2? The Binary Sequence is 6433 because it is the sum of both values. Exercise 1.3.3 Given a device with a storage capacity of 120 MB, how many bytes can be stored on this device? 1.2x10^8=120,000,000 Bytes Exercise 1.3.4 Given a computer with a disk capacity of 16 GB and a word size of 32 bits, how many words can be stored on the disk? 1.6x10^10=16,000,000,000 Bytes=128,000,000,000 Bits 128,000,000,000/ 32=4,000,000,000 words Exercise 1.3.5 Represent the binary value 110110^2in hexadecimal. Show the steps of conversion that you used. 110110=Two zeros needed to be added to make the value of 8 bits 1101=D 0010=2 Exercise 1.3.6 Represent the hexadecimal value f616 in binary and decimal. Show the steps of conversion that you used. F16 = 11112 and 616 = 01102 when put together the binary value is 111101102 which is equal to 246....

Words: 263 - Pages: 2

Nt1210 Intro to Networking Lab 1.5

...NT1210 Lab 1.5 Exercise 1.5.1 On the desktop of your operating system, create a new folder called Classes. Open the C: drive and locate the path through the subfolders from the root directory C: to get to your Classes folder. This path will differ slightly depending on the operating system. Record the navigation path to get to your new Classes folder. Hint: Most directory structures that include the desktop of a computer involve finding a folder for users and selecting the correct user. C:\Classes Exercise 1.5.2 Open the Classes folder you created and move the myname.txt file to the Networking folder. What has happened to the OS reference to the location of the file myname.txt? What has happened to the physical storage location of myname.txt in memory? C:\Classes\Networking\Myname.txt It changes the file path from C:\Classe\ to C:\Classes\Networking Exercise 1.5.3 Inside the Networking folder, create a new set of folders for your labs and assignments. You should add at least five subfolders. Diagram the hierarchy that now exists from the root Classes folder. C:\Classes\Networking C:\Classes\Networking\Coding C:\Classes\Networking\Homework C:\Classes\Networking\Labs C:\Classes\Networking\Networking C:\Classes\Networking\Vitural Computers exercise 1.5.4 Exercise 1.5.4 Disk fragmentation occurs when files are deleted from memory but that space is not used to store another file. Use the web to identify issues that disk fragmentation can cause for......

Words: 441 - Pages: 2

Nt1210 Intro to Networking Lab 3.3

...NT1210 Lab 3.3: the TCP/IP Model Exercise 3.3.1 Using your textbook and Internet research, create a mapping between the TCP/IP model and the OSI reference model. What are the distinct differences between them? Applications, Transport, Network, Network Interface this the TCP/IP model. A huge difference is that TCP/IP model uses 4 major layers instead of 7 layers to OSI model. OSI Model is Applications, Presentation, Session, Transport, Network, Data Link and Physical composed to 7 layers. OSI was developed as theoretical model, while TCP/IP was more practical model. Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model Transport layers: The Internet Protocol (IP), Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). These core protocols support many other protocols, to perform a variety of functions at each of the TCP/IP model layers. Still others enable user applications to function. Exercise 3.3.3 The most common protocols used from this suite are IP, TCP, and UDP. Briefly describe the purpose and function of each of these. Use your textbook and Internet research to support your answer. TCP (Transmission Control Protocol) Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. User Datagram Protocol a connectionless protocol that, like TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery......

Words: 331 - Pages: 2

Nt1210 Lab 2

...Unit 2 Lab 2.1.1 Computer networking is possible by combining all elements together. Media, so that communication is possible between two or more devices. Software, hardware, and user interface to make the communication happen within the network; signal is necessary to transmit information from one device to another. Pattern protocols permit a more standardize way to put everything together to create a networking possibility. Timing so that you can synchronize the frame of reference between all devices in the network. Without all these elements together networking cannot exist. 2.1.2 Network interface is a network-specific software that communicates with the network-specific device driver and the IP layer to provide the IP layer with a consistent interface to all network adapters that might be present. The IP layer selects the appropriate network interface based on destination address of the transmitted packed. Each network interface has a network address. Network interface layer is responsible for adding or removing any link layer protocol header required to deliver a message to its destination. 2.1.3 Internet Gateway Device, Discovery, and Control Client, RIP Listener. Simple TCP/IP services and uPnP user interface. 2.1.4 True democracy. Each PC on the network is equal to the other PC; so they can communicate with each other directly. They don’t have a centralized PC monitoring and controlling the communication network. Every PC shares files and......

Words: 349 - Pages: 2

Nt1210 Lab 1

...Reginald Patton NT1210 Lab 1 1.1 1.1.1. 103 102 101 100 1000 100 10 1 2 9 3 1 2000 + 900 + 30 + 1 = 2931 1.1.2. 22 21 20 4 2 1 1 1 0 4 + 2 + 0 = 6 1.1.3. 21 20 2 1 1 1 2 + 1 = 3 1.1.4. 24 23 22 21 20 16 8 4 2 1 1 0 0 1 0 16 + 0 + 0 + 2 + 0 = 18 1.1.5. 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 1 1 0 0 0 1 0 128 + 64 + 32 + 0 + 0 + 0 + 2 + 0 = 226 1.1.6 156 28 28 28 12 4 0 0 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 0 0 1 1 1 0 0 = 100111002 128 + 0 + 0 16 + 8 + 4 + 0 + 0 = 156 1.1.7. 255 127 63 31 15 7 3 1 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 1 1 1 1 1 1 1 = 11111111 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255 1.1.8. 200 72 8 8 8 0 0 0 ...

Words: 1253 - Pages: 6

Nt1210 Lab 7

...1. There are no limitations on WAN’s so they can be custom built for the size of the organization. 2. For the purpose of organizational expansion. 7.1.2: 1. The longer the distance the more chances that you have for signal loss and lack of signal strength. 7.1.3: Media | Infrastructure | Summary | UTP | Phone Lines | Is not suitable for sending data | Coaxial | Television Cable | Supports 10 to 100Mbps and is relatively inexpensive, although more costly than UTP. | Fiber-Optic | Fiber-Optic Cable | Uses a customized infrastructure to run dedicated connections; This is a costly option | Electric Power Lines | Power Lines | This can be used with Broadband over power lines (BPL), making use of the extensive infrastructure in place already. | 7.1.4: Media | Summary | Satellite | Transmits from ground to space then back to where the transmission is required to be sent | WiMAX ( Worldwide Interoperability for Microwave Access) | Used for transmitting a wireless network that could be many miles wide. | HSPA+ (Evolved High-Speed Packet Access) | Used for telecom companies to transfer from towers at 4G speeds. | Radio Frequency | Uses radio waves to transmit information | 7.2.1: A leased line is also referred to as a dedicated line, because it is dedicated to the two locations it is connecting to. Data and information are transmitted without the use of the internet. This makes the connection secure, and files sent over the connection are safe......

Words: 551 - Pages: 3

Nt1210 Lab 4

...Lab 4 NT1210 Cristian Randle Lab 4.1: Copper Cabling 4.1.1: So that NIC’s on different ISP providers can communicate to each other. 4.1.2: The copper wiring is used to power appliances and other devices so it has a high capacity for transmitting electricity. 4.1.3: More expensive shielded cables cause far less interference. Steel reinforced concrete, radio transmitters. 4.1.4: Category | Maximum Speed | Application | 1 | 1 Mbps | Telephone cabling (POTS) | 2 | 4 Mbps | Token Ring | 3 | 10 Mbps | Token Rink | 4 | 16 Mbps | Token Ring Networks | 5 | 100 Mbps | Ethernet, Fast Ethernet, Token Ring | 5e | 1Gbps | Ethernet, Fast Ethernet, Gigabit Ethernet | 6 | 10 Gbps | GigabitEthernet, 10G Ethernet | 6a | 10 Gbps | GigabitEthernet, 10G Ethernet | 4.1.5: 4.1.6: Plastic jacket, metallic shield, dielectric insulator and center core. 4.1.7: Only good under 100 meters 4.1.8: Both straight and crossover cables 4.1.9: S2 to G is too far away to work. Fiber optics would be needed. 4.1.10: Multi-meter: It can be used to locate the failure of electrical system and the defective parts. Tone generator: It acts as a testing device for informational signals that come handy when dealing with telephone systems. Pair Scanner: Identifies connection hosts on a subnet. Time Domain Reflectometer: Locate and identify faults in all types of metallic cables Lab 4.1 review: 1. Less confusion, need only one type of cable easier to install, less time......

Words: 739 - Pages: 3