This website uses cookies to ensure you have the best experience. Learn more

Fundamentals Of Network Elements Essay

1347 words - 6 pages

Q1: How many LANs and WANs are forming the enterprise network?
LANs: __________ WANs: _____________
Q2: How many subnetworks do you see? Answer: __________ subnetworks
List the subnetworks:
Q3: When PC1 communicates with Server 1, how many data links a message has to go through?
Answer: __________ data links
When PC1 communicates with Server 1, how many physical links a message has to go through?
Answer: __________ physical links
When PC1 communicates with Server 3, how many data links a message has to go through?
Answer: __________ data links
When PC7 communicates with Server 2, how many different routes a message can take?
Answer: __________ ...view middle of the document...

What is the VLAN ID assigned to all switch ports?
Answer: __________
Q19: What are MAC addresses of the first three switch ports?
Q20: Manually translate the three MAC addresses in Q19 into 48-bit binary.
Complete the cabling between nodes as in Figure 1. If there are no serial ports necessary for WAN connections on the router, WAN cards (WICs) have to be installed. The network administrator decided to use the WIC-2T WAN card among many choices.
 Install the WIC-2T WAN network cards to all available router slots.
 Use following cabling to interconnect nodes.
LAN cabling: Use either copper straight-through or copper cross-over cabling.
Straight through cabling is used to connect different devices (ex. PC –switch, switch – router). Connecting similar devices (ex. switch – switch) needs cross-over cabling. Do NOT use the automatically choose connection type option. LAN links are shown in black.
WAN cabling: Serial lines should be used for the WAN connection. Choose the Serial DCE cable option that supports clocking (One end of the WAN connection needs to have clocking to regulate transmission speed). WAN links are shown in red.
 Note: When wrong ports are chosen for cabling, there will be an error message “This cable cannot be connected to the port”. When cabling is correctly done, you should see two small dots in red on both ends of the cable. If you see the dot only on one end of the connection, the cabling is incorrect. The red dots between computers and switches change to green automatically after a while indicating readiness for message exchange. Meanwhile, you will find that any cabling that involves a router port will remain in red. This means that, although the physical connection has been completed, additional router configuration is necessary in order to exchange messages via the router port.
Completing the network cabling, therefore, does not mean that end devices (PC stations and servers) can communicate because routers have not been configured. Switches do not need additional configuration to enable the switch port function. Once cabling is complete, answer following questions:
Questions (Q21-Q31) based on Router R1:
Q21: List all names (identifiers) of LAN and WAN ports (again no worry on VLAN):
LAN (Ethernet)
WAN (Serial)
Q22: How many LAN ports (interfaces) are physically connected? Answer: __________
Q23: What is the name of the LAN port being connected?
Q24: What is the speed of R1’s LAN port? Answer: __________
Q25: What is the MAC address of R1’s LAN port in use? Answer: ______________________
Q26: How many WAN ports (interfaces) are physically connected? Answer: __________
Q27: List the name of the WAN ports being connected.
WAN (Serial)
Q28: Do we know the speed of the WAN ports? Yes [ ], No[ ]
Q29: Does the WAN port...

Other Papers Like Fundamentals Of Network Elements

Kudler Fine Foods Integrative Network Design Project (Part 1)

644 words - 3 pages Kudler Fine Foods Integrative Network Design Project Your Name Here Fundamentals of Networking (NTC/362) June 9, 2013 Daniel Aldama Integrative Network Design Project Kudler Fine Foods currently operate out of three locations with the home office located at La Jolla, CA and two other locations at Del Mar, CA and Encinitas, CA. The three locations are connected via a dedicated T3 which provides a 44.6 MBs connection between all three

The Seven Domains of a Typical It Infrastructure

556 words - 3 pages , availability ensures reliability and timely access to data and resources to authorized individuals. The following should be considered: maintaining backups to replace the failed system, DS to monitor the network traffic and host system activities, and use of certain firewall and router configurations. BIBLIOGRAPHY: Kim, David, and Michael G. Solomon. Fundamentals of Information Systems Security. MA: Jones and Barltlett Learning, 2012. Northrup, Tony. Microsoft Technet.

Week 6 Assignment

637 words - 3 pages Homework Assignment NETW 420 February 15, 2014 Professor Viviane Ruiz SNMP stands for Simple Network Management Protocol. SNMP is one example of a management protocol. This is an application layer protocol that helps in administrating and supervising network assets across the web. The SNMP has three key components. They are the managed devices, the agents and the network management system. Show below is the relationship between the

It204Fundamentals of Networking

649 words - 3 pages IT204-1501B-01 Fundamentals Of Networking Phase 1 Individual Project 2/19/15 Modern day lives depend on the network or more specifically the internet. One could find this to be true if one had no access to the internet for one day. Networks at a base level can be explained as two or more electronic devices connected electronically sharing resources to one another. How we classify each network depends on the devices that are connected and

Operating Systems and Network Administration Course

1790 words - 8 pages foundational concepts of operating systems (e.g. storage, memory, CPU cycles). Methodology The course is divided into two integrated components: lecture and lab. Lecture is used to teach ideas, fundamentals, and theory, while lab is used to provide practical experience. The purpose of the lecture portion of the course is to teach the fundamental knowledge of operating systems and networking in the context of administering a network of computers

Quantums Physics Of Monkey Neutrinos

1454 words - 6 pages MULTIPLE CHOICE QUESTIONS (36) 50% of Total Marks Choose the best answer from the responses listed Use the Answer Sheet provided 1. According to the Fundamentals of Strategy textbook, which of the following elements is not found in strategy statements a) Mission b) Experience c) Advantage d) Vision e) Scope 2. A Strategic Business Unit (SBU) is a part of an organisation for which there is a) Senior management with strong links to

Text Questions

534 words - 3 pages all relevant members of your organization in the policy. * Train proactively on the elements of your security policy. * Divide network management into the FCAPS areas. * Take inventory of the network management tools in use and investigate their shortcomings. * Train employees to seek out new and emerging technologies and implement a formal review process. * Invest in training for all levels of IT staff, especially in the areas of new and emerging technologies.

Introduction to Computer

553 words - 3 pages of your team and combine your lists. Consider how each computer is used. How were the tasks the computers perform done before computers? Use PowerPoint to create a group presentation and share your findings with the class. Chapter 2 – Working Together This chapter lists 12 types of Web sites: portal, news, informational, business/marketing, educational, entertainment, advocacy, blog, wiki, online social network, content aggregator, and

Brand Management

561 words - 3 pages Brand Management Fundamentals Brand managers plan, develop, and direct the marketing efforts for a particular brand or product. It is not uncommon for a brand manager to be responsible for coordinating activities of specialists in production, sales, advertising, promotion, research and development, marketing research, purchasing, distribution, package development, and finance.  Brand managers are therefore seen as the key people behind the

Term Paper

601 words - 3 pages Identifying Potential Malicious Attacks, Threats and Vulnerabilities Networking Security Fundamentals – CIS 333 April 29, 2012 Identifying Potential Malicious Attacks, Threats and Vulnerabilities There are a myriad of potential threats and vulnerabilities that leave a system open to malicious attack, anytime you have a computer network that connects to the internet there is a potential for malicious attack so it is important that you know

Operating System Upgrade Implementation Report And Presentation

3995 words - 16 pages Networking Basics: Peer-to-peer vs. server-based networks. (n.d.). Retrieved January 24, 2016, from What is Ethernet? - Definition from (n.d.). Retrieved January 24, 2016, from Fundamentals of Network Security Graphic Symbols

Related Essays

Mis Fnb Project Essay

1396 words - 6 pages Purpose of an ongoing operation is to sustain the business Team continues to perform tasks Page 8 Key Elements of Project Management Project Management Fundamentals Define Plan Establish clear and achievable objectives Develop the specific project management approach Triple Constraints Communicate Keep stakeholders informed Office of the Senior Associate Vice President for Finance Manage Schedule/time, cost

Innovation Management Essay

1505 words - 7 pages •Growth & Complexity •Pervasiveness •Applications & Data •Computer Network Operations •Controls and Environmental Factors •Competitive Considerations •People & Organisations 1 May, 2013 Session 1 - MIS Fundamentals 15 Unit 403–Managing Information Systems Goals of IS Management There are, according to Porter and Millar (1985), five steps that can be taken to exploit opportunities created by the information revolution: •Assess the

Itt 255 Lab 6 Essay

3922 words - 16 pages information systems environment. Topics include definitions of terms, concepts, elements and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Security Syllabus Where Does This Course Belong? This course is required for the associate degree program in Network Systems Administration (NSA). The following

Resource Essay

376 words - 2 pages Resource: Patton-Fuller Community Hospital Virtual Organization Based on Patton-Fuller Community Hospital Network, prepare a 1,500 - to 2,500-word paper including the following: -     Identify network system elements (routers, switches, servers and workstations etc) in use. (10 pts) -     Identify network protocols in use within each of the seven OSI layers. (5 pts) -     Research on networks deployed by other health care organizations and