Lab 10 Networking Essay

590 words - 3 pages

Lab 10 Networking
1. Describe the following network Models.
A. Peer-to-Peer: Two or more PCs are connected and share resources without being on separate servers.
i. Client/Server: What is a client? A computer, program or process that makes requests for information from another computer.
ii. What is a Server? The computer on which a program runs which then gives certain kinds of service to clients.
2. What is a computer modem and what does it do? The device is short for modulator-demodulator a modem or program that enables a computer to transmit data over for example telephone or cable lines. Computer information is stored digitally whereas information transmitted over telephone lines is transmitted in the form of analog waves
3. What is networking protocol?
A network protocol defines rules and conventions for ...view middle of the document...

5. Record the information for the following.
1. Physical Address: 12-21-00-82-AE-12
2. IPV4 Address: 192.168.1.7<Preferred>
3. Subnet Mask: 255.255.255.0
4. Gateway: 192.168.1.1
5. DHCP Servers: 192.168.1.1
6. DNS Servers: 192.168.1.1
6. Describe and tell purpose of the following.
7. Physical Address: is a binary number in the form of logical high and low states on an address bus that corresponds to a particular cell of primary storage (also called main memory) or to a particular register in a memory-mapped I/O input/output device.
8. 2. IPV4 Address-internet protocol version 4 it is underlying technology that makes it possible for us to connect our devices to the web. Whenever a device access the internet on a PC, mac, smartphone or other device.
9. 3. Subnet Mask-is a binary pattern that is stored in client machine server or router it is matched with the IP address of a packet to determine which network segment the packet is destined for.
10. 4. gateway- is a node router in a computer network a key stopping point for data on its way to or from other networks.
11. 5. DHCP server- Dynamic Host Configuration protocol is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers ie a scope configured for a given network DHCP assigns an IP address.
12. 6. DNS server-DNS server is a server software program that performs Domain Name Services (DNS). This involves taking a full host name such as 'www.vicomsoft.com' or a domain name such as 'vicomsoft.com' and returning the corresponding Internet Protocol (IP) address such as 195.224.81.4
6. The ping command is used to call through the network to another PC if they are communicating with each other, to share information after power, after giving the ping command and its response is REQUEST TIME OUT means not find communication with another computer.

Other Papers Like Lab 10 Networking

Lab 7 Essay

323 words - 2 pages Antonio Johnson Class: Access Security Unit: IS3230 September 25, 2014 Lab 2 Design Infrastructure Access Controls for a Network Diagram Lab 2 Answers 1. To check it there I any malware, updates where it be made, and to know if any other viruses are the system or application 2. help to cut down storage and backup cost, to meet legal regulatory requirements for retrieving specific information within a set timeframe. Data strategies

Course Project Essay

1993 words - 8 pages NETW240 Week 4 Lab: TCP/IP LAN Networking Lab Scenario Launching Your Lab The status of your Lab is displayed at the top of the left navigation column. Click the Start Lab Now button. A progress bar displays while the lab is being initialized. During this time you can view items under the Content area of the left navigation bar. When Initialization is complete, the status changes to In Progress. The clock starts and a lab

Syllabus It/205

2472 words - 10 pages computer. 10/20 30 Week Four: Telecommunication, the Internet, and Wireless Technology Details Due Points Objectives 4.1 Identify the principal components of telecommunications networks and key networking technologies. 4.2 Explain how the Internet and Internet technology work and how they support communication and e-business. 4.3 Identify the principal technologies and standards for wireless networking, communication, and Internet access

Lab#1 Assesment Hands-on Steps

2986 words - 12 pages “Student Landing” VSCL workstation Note: The other virtual machines used in this environment require as much as 10 minutes to load in the background. Take this time before continuing to review the deliverables and assessment worksheet for this lab as answers to these questions may be found during the hands-on portion of this lab. The next steps help familiarize you with the applications available in the VSCL environment. You will open several

Case Study - Homenet-Solved

1716 words - 7 pages . Even though the lab will be housed in an existing facility, we must include the opportunity cost of not using the space in an alternative way. The opportunity cost of the lab space increases selling, general, and administrative expenses from $2,8 million to $3 million. 4. Research and Development In year 0, Linksys will spend $5 million on design and engineering, together with 50 * $200000 = $10 million on software, for a total of $15

Securing Linux Lab Assignment

2020 words - 9 pages specify it in the [mysqld] section of your my.cnf file: [mysqld] ... skip-networking 9. What two files does sendmail create while processing a message? "df": which stores the body of the message. "qf": which stores the headers and other information. 10. What command can you use locally to find the sendmail’s version number? To find out which version of sendmail is installed on your system, you can try the following commands

Itt 255 Lab 6

3922 words - 16 pages ITT Technical Institute NT2580 Introduction to Information Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1330 Client-Server Networking II or equivalent, NT1430 Linux Networking or equivalent Course Description: This course provides an overview of security challenges and strategies of counter measures in the

Nt1210 Chapter 1

1281 words - 6 pages Lab 1.5: Creating a File System For this lab, you will explore basic memory organization and retrieval in a computer system. This will require the use of a PC with Windows, Linux, or Mac OS. You will be using the GUI for this assignment, so you can choose whichever operating system you prefer to use. You should construct a lab report of the solutions and any supporting work for the assigned exercises throughout the lab. C:\usersr9543350

Nt2580 Unit 1

3775 words - 16 pages NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform

Monopolies

1432 words - 6 pages variability caused by the sampling procedure. If we had polled different residents, we might have gotten a different average social networking hours. In general, the characteristics of the observed distribution (mean, median, variance, range, IQR, etc.), change from sample to sample, and may never exactly match the population quantities. To visualize properties of sampling distributions, we will use the sampling lab, and the very nice website at

Netw 202 Week 2 Lab Report

1358 words - 6 pages NETW202 Professor Mutasem Awwad 01/16/2016 iLab #2, Introduction to Wireshark (This part of the lab is worth 19 points) Lab Report Section I: Watch the video on the iLab page about Wireshark and answer the questions below. 1. Is Wireshark open source or proprietary? What does it mean to be open source versus proprietary in the first place? Give an example of something that is open source versus something that is proprietary in the

Related Essays

Information Systems Security Essay

4584 words - 19 pages 129 131 141 142 130 Learning Objectives 129 Evaluation Criteria and Rubrics LAB #9 ASSESSMENT WORKSHEET 38351_FMxx.indd iv 8/1/12 12:48 PM Contents LAB #10 v Craft an Information Systems Security Policy Introduction Deliverables Hands-On Steps 145 145 146 147 148 149 Learning Objectives and Outcomes 145 Evaluation Criteria and Rubrics LAB #10 ASSESSMENT WORKSHEET 38351_FMxx.indd v 8/1/12 12:48 PM

Nt1210 Final Essay

1170 words - 5 pages | Last Update: 2014-12-11 Nt1210 Mind Maps http://ebookinstitute.net/..../nt1210-mind-maps.pdf Read or Download nt1210 mind maps Online. Also you can search on our online library for related nt1210 mind maps that you needed. You can download PDF Document such nt1210 mind maps for free ... Download Filetype: PDF | Last Update: 2014-12-11 Nt1210 Introduction To Networking Lab Answer http://ebookinstitute.net/..../nt1210-introduction-to-networking

Configuring Network Connections Essay

652 words - 3 pages S.B. Configuring Network Connections Mr. Moses 14 July 2016 Lab 3 worksheet CONFIGURING NETWORK CONNECTIONS Exercise 3.1 | Using the Network and Sharing Center | Overview | On a Windows 7 computer, the Network and Sharing Center provides access to most of the operating system’s networking tools and configuration parameters. In Exercise 3.1, you examine the current Sharing and Discovery settings on one of the computers that will

Nt1210 Essay

266 words - 2 pages Izaak Cook NT 1210 Intro to Networking Unit 1. Lab 1.2: Binary Math and Logic Exercise 1.2.1 1 0 0 1 + 1 1 0 Binary 1111 = 15 Decimal 2. Exercise 1.2.2 1 1 0 1 0 1 Binary 1011 = 11 Decimal 3. Exercise 1.2.3 1 1 1 1 1 1 Binary 1110 = 14 Decimal 4. Exercise 1.2.4 100 2 OR 011 2 = 111 = 7 5. Exercise 1.2.5 111 2 AND 100 2 = 100 = 4 6. Exercise 1.2.6 NOT 1001 2 = 0110 2 = 6 Exercise 1.2.7