SlideShare a Scribd company logo
1 of 23
HS1011 Data Communication and Networks 13
August 2015
HS1011 Data Communication and Networks 13
August 2015
HOLMES
INSTITUTE
FACULTY OF HIGHER
EDUCATION
HS1011 Data Communication and Networks
Tutorial/Lab Activity Week 06 Network Models, Standards and
Protocols
Hands-On Project 1: Identifying the TCP/IP Layers in a Frame
Objective: Capture packets and view the TCP/IP layers in the
frame
Required Tools/Equipment: Your classroom computer with
Wireshark installed
Description: In this project, you capture some frames generated
by your Web browser and examine the captured frames to
identify the TCP/IP layers.
1. Start Wireshark (Use “Wireshark manual” to learn “how to
use wireshark to capture data”) and click Capture Options. In
the Capture Filter text box, type tcp port http(see Figure 1), and
then click Start.
Figure 1: Selecting filtering options
2. Start a Web browser, and open holmes website
(http://www.holmes.edu.au/), exit the browser.
3. In Wireshark, click the Stop the running live capture toolbar
icon to stop the capture. Scroll up to the first packet summary
line, if necessary.
4. Click a packet summary in the top pane with HTTP in the
protocol field and an Info line beginning with GET. In the
middle pane are summaries of each protocol header (see Figure
5-6). You can ignore the first line starting with Frame X (with
X representing the frame number), as it gives information about
the frame, such as the time it arrived, its length, protocols in the
frame, and so forth.
Figure 2: Summary of protocol headers in Wireshark
5. Click to expand the line beginning with Ethernet II. Examine
the information in this header (discussed in more detail in the
following sections). Write which layer of the TCP/IP model the
Ethernet II header represents, and then click again to collapse
this header:
_____________________________________________________
__________________________
6. Click to expand the line beginning with Internet Protocol.
Examine the information in this header (discussed in more
detail in the following sections). Write which layer of the
TCP/IP model the Internet Protocol header represents, and then
click again to collapse this header:
_____________________________________________________
__________________________
7. Click to expand the line beginning with Transmission Control
Protocol. Examine the information in this header (discussed in
more detail in the following sections). Write which layer of the
TCP/IP model the Transmission Control Protocol header
represents, and then click again to collapse this header:
_____________________________________________________
__________________________
8. Click to expand the line beginning with Hypertext Transfer
Protocol, and examine the information. This data portion of the
frame is what a Web server actually sees and responds to. In
this case, the HTTP command is GET, which means HTTP is
requesting a page (or part of a page) from the Web server. Write
which layer of the TCP/IP model the HTTP protocol represents,
and then click again to collapse this header:
_____________________________________________________
__________________________
9. Exit Wireshark and click Quit without Saving when
prompted.
10. Close all open windows, but leave your computer running
for the next project.
Hands-On Project 2: Capturing ARP and ICMP Packets
Objective: Use Wireshark to capture packets created by the
Tracert program.
Required Tools/Equipment: Classroom computers with
Wireshark installed
Description: In this project, you use Wireshark to capture ARP
and ICMP packets generated by the Tracert program.
1. Open a command prompt window.
2. Type arp -d and press Enter to clear your ARP cache.
3. Start Wireshark(Use “Wireshark manual” to learn “how to
use wireshark to capture data”) and click Capture Options. In
the Capture Filter text box, type arp or icmp, and then click
Start.
4. At the command prompt, type tracertbooks.tomsho.comand
press Enter. When Tracert is finished, click theStop the running
live capture toolbar icon in Wireshark to stop the capture. Scroll
to the first packet summary line, if necessary.
5. Find the ARP packets your computer has generated by
looking in the Info column for “Who has A.B.C.D, Tell
192.168.100.XX” (replacing A.B.C.D with the address of your
default gateway and XX with your student number). Click this
packet summary line.
6. Notice that the Dst (for destination) address is ff:ff:ff:ff:ff:ff,
indicating a broadcast. In the middle pane, click to expand the
Ethernet II line. Notice that the Type field is ARP (0x806),
which tells
the Network access layer which Internetwork-layer protocol
should receive the packet. Click again to collapse this line.
7. Click to expand the Address Resolution Protocol (request)
line. Examine the information in the ARP header. The ARP
message has fields to indicate what technology is used in the
Network access layer (Ethernet) and the protocol type that
needs the MAC address (IP, in this case). Click again to
collapse this line.
8. Next, in the top pane, click the ARP reply message
immediately following the ARP request. The Info column
should be similar to “A.B.C.D is at 0A:1B:2C:3D:4E:5F.” The
MAC address in the ARP reply is the MAC address of your
default gateway. Explore the Network access and Internetwork
headers for this frame. (Note: You might also find an ARP
request and ARP reply for your DNS server if it's in the same
network as your computer.)
9. In the top pane, click the first ICMP Echo (ping) request
message from your computer to the destination computer
atbooks.tomsho.com. The IP address should be 67.210.126.125,
but IP addresses can change, so it might be different.
10. In the middle pane, click to expand the Internet Protocol
line. Notice that the value in the Time to live line is 1.
11. In the top pane, click the ICMP Time-to-live exceeded
message that follows the Ping request. This message was
generated by the first router en route tobooks.tomsho.com.
Notice that the source address is the address of your default
gateway.
12. Find the next ICMP Echo (Ping) Request message and view
the TTL value. Tracert sends three Echo Request messages for
each TTL value, so the first three Echo Request messages have
a TTL value of 1. Find the fourth ICMP Echo (Ping) Request
message and view the TTL value, which should be 2. The Time-
to-live exceeded message following it is from the next router
down the line. Tracert follows this pattern until reaching the
destination device (books.tomsho.com).
13. Exit Wireshark, but leave the command prompt window
open if you're continuing to the next project.
Hands-On Project 3: Using the Netstat Program
Objective: Use the Netstat program to view network interface
and IP protocol status and statistics.
Required Tools/Equipment: Your classroom computer
Description: In this project, you use Netstat to view statistics
about your network interface and the IP protocol. Then you
generate traffic with Ping and Tracert to see the statistics of
different packet types change.
1. Open a command prompt window.
2. To display statistics about your Ethernet interface, type
netstat -e and press Enter. These statistics include the number of
bytes and packets received and sent through the Ethernet
interface. If any errors are indicated in the display, you might
have problems with your network connection that are slowing
the network down. If the error packets approach 1% of the total
number of packets, something is probably wrong with your NIC
or physical interface.
3. To see statistics for all protocols, type netstat -s and press
Enter. To limit the display to just IP statistics, type netstat -ps
IP and press Enter.
4. To see your network statistics updated every 5 seconds, type
netstat -ps IP 5 and press Enter. Press Ctrl+C to stop the
program.
5. To display ICMP information, type netstat -ps ICMP and
press Enter. A variety of ICMP message types are displayed
along with how many of each type of message were received
and sent. Most, if not all, will be Echo and Echo Reply
messages.
6. Type ping 5.5.5.5 and press Enter. This command should
generate ICMP Destination Unreachable messages. To see
whether the number of Destination Unreachable messages has
increased, type netstat -ps ICMP and press Enter.
7. The ICMP TTL-Expired messages used in Tracert are called
Time Exceeded messages in Netstat. Type tracert
books.tomsho.comand press Enter. To see whether the number
of Time Exceeded messages has increased, type netstat -ps
ICMP and press Enter.
8. To display your computer's routing table, type netstat -r and
press Enter. Every computer has a routing table it uses to decide
which interface to send packets to. The first entry lists the
network destination as 0.0.0.0, which is the entry for your
default gateway.
9. Leave the command prompt window open for the next
project.
Tutorial/Lab Activity 5 Page 1 of 4
Tutorial/Lab Activity 5 Page 1 of 4
Page 4 of 4
HOLMES
INSTITUTE
FACULTY OF HIGHER
EDUCATION
HS1011 Data Communication and Networks
Tutorial/Lab Activity Week 02
Introduction to Computer Networks
PART I:
Objectives: In this lab you will learn basic network commands
(such as ipconfig, net view, Ping, ARP and so on) which can be
used to check status of a network. Student will also use
Wireshark to capture network data and investigate captured data
to understand practical use of various network terms they learn
from Lecture 1.
Hands-On Project 1: Using Ipconfig, Ping, and ARP
Objective: Use Ipconfig, Ping, and ARP to view and test
network addresses and connectivity.
Required Tools/Equipment: Your classroom computer
Description: In this project, you use command-line tools to view
your network configuration and test your computer's capability
to communicate with other computers. Ipconfig displays the IP
address configuration of your network interfaces. Ping sends a
message to a computer to verify the capability to communicate
with it. ARP displays the MAC (physical) addresses your
computer has discovered.
1. Click Start, type cmd, and press Enter to open a command
prompt window. At the command prompt, type ipconfig and
press Enter. You should see a screen similar to Figure 1,
although the specific numbers you see will vary. Ipconfig lists
the IP address configuration for your network interfaces as well
as other network settings.
Figure 1: IP address configuration for your network
Identify the differences between your screen and Figure 1.
Explain why are they different?
2. To see more details about your network configuration, type
ipconfig /all and press Enter. You can scroll up the command
prompt window to see all the output. Under the heading
“Ethernet adapter Local Area Connection,” find the row labelled
Physical Address (see Figure 2). The number you see in this row
is the MAC address, a 12-digit hexadecimal value. Also, find
the IP address in the IPv4 Address row. Write down these two
addresses:
Figure 2: Using ipconfig /all to list physical (MAC) and IP
addresses
3. Tell your partner what your IP address is and make note of
your partner's IP address. At the command prompt, type ping IP
address and press Enter (replacing IP address with your
partner's IP address). You should see output similar to Figure 3.
Figure 3: Results of the ping command
4. Remember that your computer needs both the destination IP
address and MAC address to communicate with another
computer. You supplied the IP address by typing it at the
command prompt. Your computer discovered the MAC address
of your partner's computer by using Address Resolution
Protocol (ARP). To see this address, type arp -a and
press Enter. The output should be similar to Figure 4. You
might see more lines of output, depending on what other devices
your computer has been communicating with. ARP works
automatically without user intervention.
Figure 4: The arp -a command displays MAC addresses
5. Use the ping command to communicate with other computers
and devices on your network, and use ipconfig /all to find the
addresses of your default gateway (a router in your network)
and your DNS servers. Write the MAC addresses of your default
gateway and your DNS servers:
1. Default gateway: _______________________________
2. DNS servers: ___________________________________
6. Close all open windows.
PART II:
1. You're the network administrator for a company that has just
expanded from one floor to two floors of a large building, and
the number of workstations you need has doubled from 50 to
100. You're concerned that network performance will suffer if
you add computers to your existing LAN. In addition, new users
will be working in a separate business unit, and there are
reasons to logically separate the two groups of computers. What
type of network should you configure?
a. WAN
b. MAN
c. Internetwork
d. Extended LAN
2. Which of the following best describes a client?
a. A computer's primary role in the network is to give other
computers access to network resources and services.
b. A computer's primary role in the network is to run user
applications and access network resources.
c. It's the software that responds to requests for network
resources.
d. The OS installed on a computer is designed mainly to share
network resources.
3. You work for a small company with four users who need to
share information on their computers. The budget is tight, so the
network must be as inexpensive as possible. What type of
network should you install?
a. Server-based network
b. Peer-to-peer network
c. WPAN
d. Storage area network
4. Which of the following characteristics is associated with a
peer-to-peer network? (Choose all that apply.)
a. Decentralized data storage
b. Inexpensive
c. User-managed resources
d. Centralized control
e. Uses a directory service
5. A device interconnects five computers and a printer in a
single office so that users can share the printer. This
configuration is an example of which of the following?
a. LAN
b. MAN
c. WAN
d. Internetwork
6. At Yavapai College, the Prescott and Prescott Valley
campuses (8 miles apart) have LANs connected via the local
phone company. This configuration is an example of which of
the following? (Choose the best answer.)
a. MAN
b. WPAN
c. WAN
d. SAN
7. You have installed Windows Server 2008 on a new server and
want to centralize user logons and security policies. What type
of software should you install and configure on this server?
a. Naming services
b. Application services
c. Communication services
d. Directory services
8. Peer-to-peer networks aren't suitable in which of the
following situations?
a. Tight security is required.
b. Five or fewer users need network access.
c. Budget is the primary consideration.
d. No one uses the network heavily.
9. Which of the following best describes a storage area
network?
a. Provides a mechanism for users to access a network's storage
resources remotely
b. Uses high-speed networking technologies to give servers fast
access to large amounts of disk storage
c. Is a short-range networking technology designed to connect
personal devices to exchange information
d. Provides secure centralized file storage and sharing and
access to networked printers
10. Why might Windows 7 or Windows Vista require more
RAM or disk space than Windows Server 2008?
a. They need to accommodate handling centralized logon.
b. They include a directory service and a naming service.
c. They run many background networking services.
d. They support a graphics-intensive user interface.
Case Project 1: Networking Gadgets, Inc. currently employs
eight people but plans to hire 10 more in the next four months.
Users will work on multiple projects, and only those users
assigned to a project should have access to the project files.
You're instructed to set up the network to make it easy to
manage and back up yet still provide centralized storage for
project files. Would you choose a peer-to-peer network, a
server-based network, or a combination of both? Why?
E:HolmesHS2011TutorialsHS2011 Tutorial Activity Week
1.docx Page 5 of 2
Tutorial/Lab Activity 2 Page 1 of 6
HS1011 Data Communication and Networks 13 August
2015
HS1011 Data Communication and Networks 13 August
2015
HOLMES
INSTITUTE
FACULTY OF HIGHER
EDUCATION
HS1011 Data Communication and Networks
Tutorial/Lab Activity Week 04 Network Topologies and
Technologies
Hands-On Project 1: Determining and Changing Your Ethernet
Standard
Objective: Determine your Ethernet standard and change your
connection speed to use a different standard.
Required Tools/Equipment: Classroom computers connected to
a classroom hub or switch. The hub or switch and NICs must be
capable of connecting at multiple speeds. For example, if you're
using a 10/100 Mbps switch, and your NICs are capable of
10/100 Mbps, you change the connection speed to the slower
rate. If possible, each student should be assigned a separate
partner. Separate lab computers and a hub or switch can also be
used for this project.
Description: In this project, you view your network connection
properties to see at what speed your NIC is operating. Then you
send a large ping message and note how long the reply takes.
Next, you change the speed, if your NIC driver allows, and
perform the same ping to see whether you can detect a time
difference.
1. Open a command prompt window, and then type ipconfig and
press Enter. Exchange your IP address with your partner and
write down your partner's IP address. Leave the command
prompt window open for later.
_____________________________________________________
__________________________
2. Click the network connection icon in the taskbar and click
Open Network and Sharing Center.
3. In the Network and Sharing Center, click Local Area
Connection to open the Local Area Connection Status dialog
box (see Figure 1).
Figure 1: The Local Area Connection Status dialog box
4. In the Connection section, find the connection speed. Write
down this information and, based on the speed listed, the
Ethernet variety your computer is running:
Connection speed:
_____________________________________________________
__________________________
Ethernet variety:
_____________________________________________________
__________________________
5. At the command prompt, ping your partner by typing ping -l
60000 IPaddress and pressing Enter. The -l 60000 option in the
command specifies that the ping message should be 60000 bytes
instead of the typical length of 32 bytes. Note the time = values
in the ping replies and write them down. For example, yours
might say “time = 2ms,” meaning the reply took 2 milliseconds.
Not all times might be the same. Sometimes the first time is
slower than the rest. Try pinging a few times to get an idea of
the average time.
Ping reply times:
_____________________________________________________
__________________________
6. Click the Properties button, and in the Local Area Connection
Properties dialog box, click Configure.
7. Click the Advanced tab. In the Property list box, click Link
Speed & Duplex (or a similar name). Figure 3-15 shows the
connection options. Not all NICs have the same options, so you
might see different options.
8. The default setting is usually Auto Negotiation. Click 10
Mpbs Half Duplex if this option is available, and then click OK.
If you were able to set this option, what speed and variety of
Ethernet is your computer running now?
Connection speed:
_____________________________________________________
__________________________
Ethernet variety:
_____________________________________________________
__________________________
Figure 2: Settings for the Link Speed & Duplex property
9. After you and your partner have changed the connection
speed to a lower value, repeat the ping command you used in
Step 6. Write down the reply times, and state whether they were
different:
Ping reply times at 10 Mbps:
_____________________________________________________
________________________
10. Figure 3 shows two sets of ping results. The first result was
from two computers connected “Auto Negotiation mode”. The
average reply took <1 ms. The second result was with the same
computers connected at 10 Mbps half-duplex, and the average
reply took =1 ms. Change your connection speed and duplex
mode back to Auto Negotiation, and then close all open
windows. Leave your computer running for the next project.
Figure 3: Ping results at different connection speeds
Hands-On Project 2: Viewing an Ethernet Frame
Objective: Capture packets and examine details of the Ethernet
II frame format.
Required Tools/Equipment: Classroom computers connected to
a classroom hub or switch with Wireshark installed
Description: In this project, you capture some packets and then
examine the frame and protocol headers.
1. Use “Wireshark manual” to learn “how to use wireshark to
capture data” then ---
2. Start Wireshark and click Capture Options. In the Capture
Filter text box, type icmp, and then click Start.
3. Open a command prompt window, and then type ping
IPaddress ( IP address of your peer) and press Enter (replacing
IPaddress with the IP address of another student's computer or
another device on your network).
4. In Wireshark, click the Stop the running live capture toolbar
icon to stop the capture.
5. Click a packet summary in the top pane with ICMP listed in
the protocol field.
6. In the middle pane, click to expand the Ethernet II row. It
should look similar to Figure 4.
Figure 4: An Ethernet II frame in Wireshark
7. Notice the three fields in the Ethernet II frame: Destination,
Source, and Type. The Destination and Source fields are the
destination and source MAC addresses in the frame. In Figure 4,
you see Cisco before the destination address and Vmware before
the source address because Wireshark attempts to resolve the
NIC manufacturer coded in the MAC address's first six digits.
The full MAC address (without manufacturer name) is shown in
parentheses. The Type field has the value 0x800, which
indicates that the protocol in the frame is IP. Click to expand
the Internet Protocol row.
8. Under Internet Protocol, you see details of the IP header,
including the destination and source IP addresses. Click to
expand the Internet Control Message Protocol row to view
details of the ICMP protocol header. (You learn more about IP-
related protocols later stage of this subject.)
9. Click to expand the Data portion of the frame, and then click
the Data field to see the ICMP message data in hexadecimal in
the bottom pane. The right side of this pane shows the
translation from hexadecimal to ASCII (human-readable
characters); as you can see, it's just portions of the alphabet
repeated. Some Ping programs include more clever data, such as
“Hello, are you there?” The actual data in a ping message
doesn't matter; what matters is that the reply contains the same
data as the ping request.
10. Exit Wireshark and click Quit without Saving when
prompted. Close the command prompt window.
Hands-On Project 2: Designing a physical star topology using
Packet Tracer
Objective: Learning to design a physical network topology
Required Tools/Equipment: Packet tracer only
Description: In this project, you will design physical network
topologies.
1. Open Packet Tracer and design a physical star topology made
of 6 computers and show it to your tutor.
Tutorial/Lab Activity 3 Page 1 of 4
Tutorial/Lab Activity 3 Page 1 of 4
Tutorial/Lab Activity 4 Page 1 of 5
HS1011 Data Communication and Networks 13 August
2015
HS1011 Data Communication and Networks 13 August
2015
HOLMES
INSTITUTE
FACULTY OF HIGHER
EDUCATION
HS1011 Data Communication and Networks
Tutorial/Lab Activity Week 03 Network Hardware Essentials
PART I:
Hands-On Project 1: Recognize basic functionality of network
hardware
Objective: understanding network hardware using a simulated
network
Required Tools/Equipment: Packet Tracer and Lab2.pkt
Description: Identify and label network hardware and
understand their role in a simple network. Use of Trace Route
program (tracert.exe) to lists each router your packets must
travel through between your computer and the destination.
1. Download Lab2.pkt from Blackboard and open it using
packet tracer.
Figure 1: Sample network to identify hardware devices
2. Label all network hardware using appropriate name and write
two functionalities for each.
3. Double click on PC1, find out and write down the IP address
of it. Then double click on PC2 and open command prompt of it
and type “tracert IP address of PC1”. You will see a screenshot
similar to Figure 2. It shows how many routers the packet
passes through before it reaches to PC 1.
4. Now double click on the only router of the network diagram
and open CLI tab to execute commands below. Router>en
Router#sh run
By seeing the output, can you identify the number of interfaces
(port) the router has?
5. Furthermore, can you identify the IP addresses used in the
router interfaces?
Write down your findings for submission.
Hands-On Project 2: Trace Route program to see the travel path
of routers packets
Objective: Use the Trace Route program to see the routers
packets must travel through to get from your computer to a
destination on the Internet.
Required Tools/Equipment: Your classroom computer, Internet
access, and a valid DNS server; no other tools or equipment are
required
Description: The importance of routers is made clear when you
need to access servers on the Internet. The Trace Route program
(tracert.exe) lists each router your packets must travel through
between your computer and an Internet server.
1. Click Start, type cmd, and press Enter to open a command
prompt window.
2. Type tracert www.yahoo.com and press Enter. You should
see output that's similar to Figure 1, but the details will vary,
depending on your location and system’s restriction. In this
output, there are five columns of information. The first column
is just a count of how many routers the packet traversed. The
second, third, and fourth columns show the amount of time in
milliseconds (ms) the router took to respond. Three packets are
sent, so three times are listed. The last column is the router's IP
address or name and IP address.
Figure 1: Output of the Trace Route program
3. You can garner some information about the geography of the
path your packet took by looking at the router's name. For
example, in Figure 1, the domain name of the third router is
yc.edu, which is a router at Yavapai College in Prescott,
Arizona, where this book has been written. The fourth and fifth
routers have the domain name qwest.net, and the router's name
begins with “phn,” which tells you that the router is on Qwest's
network in Phoenix. You get the idea. However, looking up
router names can sometimes make the trace run slowly. To do
the same trace without looking up names, type tracert -
dwww.yahoo.comand press Enter. This time, you should see
only the IP address of each router.
4. Try using Trace Route to determine the path packets take to
other destinations.
Trybooks.tomsho.com, and for a destination on the East Coast,
trywww.course.com. For a destination in Germany,
trywww.kontron.de. If the trace repeatedly times out (indicated
by an asterisk, *, in the output), press Ctrl+C to stop the trace.
5. Close the command prompt window.
6. You can also find tools that show you the route on a map.
Start your Web browser, and go
towww.yougetsignal.com/tools/visual-tracert. In the Remote
Address text box, type any of the destinations in Step 4 or any
other address you like. This online tool attempts to map out the
path your packets take to get to their destination. Try to trace
your current IP by clicking “Use Current IP > Host Trace”. A
screenshot I shown in Figure 2 to help you.
Figure 2: A screen of the tool of trace route map
7. Exit your Web browser.
Tutorial/Lab Activity 2 Page 1 of 3
Tutorial/Lab Activity 2 Page 1 of 3
Tutorial/Lab Activity 3 Page 4 of 4
HOLMES
INSTITUTE
FACULTY OF HIGHER
EDUCATION
HS1011 Data Communication and Networks
Tutorial/Lab Activity Week 05 Network Media
Case Project 1: During the design of most real-world networks,
you'll discover that using more than one type of networking
medium is common. The usual reasons for needing more than
one type of medium include the following:
· Two or more areas must be interconnected, and the distance
separating them is greater than the maximum segment length for
the type of medium used in (or best suited for) each area.
· A connection must pass through a high-interference
environment (across some large transformers, near heavy-duty
electrical motors, and so on). Failure to use a different type of
medium increases the risk of impeding data flow. This reason is
especially common for choosing fiber-optic cable or wireless in
many networks, particularly when connecting floors in an office
building and the only available pathway is the elevator shaft.
· Certain parts of an internetwork might have to carry more
traffic than other parts. Typically, the segment where traffic
aggregates is the backbone, a common cable segment that
interconnects subsidiary networks. (Think of a tree trunk as the
backbone and its major branches as cable segments.) Often, a
higher-capacity cable is used for a backbone (for example,
fiber-optic cable or Cat 6 cable rated for Gigabit Ethernet),
along with a higher-speed networking technology for
attachments to the backbone. This arrangement means outlying
segments might use conventional 10 or 100 Mbps Ethernet, and
the backbone uses 1 Gbps or 10 Gbps Ethernet.
Using this information, suggest solutions that involve at least
two types, if possible, of networking media to address the
following problems:
1. XYZ Corp. is planning a new network. Engineers in the
design shop must have connections to accountants and
salespeople in the front office, but all routes between the two
areas must traverse the shop floor, where arc welders and metal-
stamping equipment create potent amounts of EMI and RFI.
Given that both the design shop and front office use 10BaseT
(twisted-pair Ethernet), how might you interconnect these two
areas? What medium guarantees immunity from interference?
2. After the front-office network at XYZ Corp. is set up, an
accountant realizes that if the loading dock connected to the
network, dock workers could log incoming and outgoing
shipments and keep the inventory more current. Even though the
loading dock is nowhere near the shop floor, the dock is 1100
feet from the front office. What kinds of cable will work to
make this connection? What kind would you choose and why?
3. ABC Company occupies three floors in a 10-story building,
where the elevator shaft provides the only path to all three
floors. In addition, users on the ninth and tenth floors must
access a collection of servers on the eighth floor. Explain what
kind of connections would work in the elevator shaft. If more
than one choice is possible, pick the best option and explain the
reasons for your choice. Assuming that inter floor connections
might someday need to run at much higher speeds, re-evaluate
your choice. What's the best type of medium for open ended
bandwidth needs? Explain your answer.
4. Very Big ISP (VBISP) Corporation wants to increase the
bandwidth it can access at its downtown location in New York
City. The distance between locations is about 20 miles, and the
bandwidth needed between locations is at least 50 Mbps. What
media types could work to provide this connection?
5. Following a year of major sales increases in the Pacific Rim,
MarTexCo decides to open a second plant in Malaysia. The
company wants the new plant to be able to access the
headquarters database in Des Moines, Iowa, in real time, but
long-haul telephone connections aren't possible, owing to the
lack of communications infrastructure at the Malaysia location.
What kind of wireless networking alternative makes the most
sense when considering network links that span an appreciable
portion of the globe? Explain why laying cable might not be
feasible.
Case Project 2: TVBCA has just occupied a historic building in
downtown Pittsburgh in which 15 employees will work. Because
of codes for historic buildings, TVBCA isn't permitted to run
cables inside walls or ceilings.
Required result: Employees must be able to share files and
printers, as in a typical LAN environment, without using cables.
Optional desired results: Employees must be able to use their
laptops and move freely throughout the office while maintaining
a network connection. Because of the size of some computer-
aided design (CAD) files employees use frequently, data
transfer speeds should be more than 20 Mbps. Proposed
solution: Install an 802.11n wireless access point and configure
each computer and laptop with a wireless network card. Which
of the following results does the proposed solution deliver?
Explain your answer.
a. The proposed solution delivers the required result and both
optional desired results.
b. The proposed solution delivers the required result and only
one of the two optional desired results.
c. The proposed solution delivers the required result but neither
optional desired result.
d. The proposed solution does not deliver the required result.

More Related Content

Similar to HS1011 Data Communication and Networks 13 August 2015 HS101.docx

Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docxWireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docxambersalomon88660
 
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
Wireshark Lab  Getting Started v6.0  Supplement to Co.docxWireshark Lab  Getting Started v6.0  Supplement to Co.docx
Wireshark Lab Getting Started v6.0 Supplement to Co.docxambersalomon88660
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerSorath Asnani
 
NETW250 Week 3 iLab Observing VoIP Protocols Using Wireshar.docx
NETW250 Week 3 iLab Observing VoIP Protocols Using Wireshar.docxNETW250 Week 3 iLab Observing VoIP Protocols Using Wireshar.docx
NETW250 Week 3 iLab Observing VoIP Protocols Using Wireshar.docxrosemarybdodson23141
 
Arp fainal 000 Computer Networking
Arp fainal 000 Computer Networking Arp fainal 000 Computer Networking
Arp fainal 000 Computer Networking Md Sagor Sarkar
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manualJaya Prasanna
 
Culturally Responsive Literacy Resources Template Part 1.docx
Culturally Responsive Literacy Resources Template Part 1.docxCulturally Responsive Literacy Resources Template Part 1.docx
Culturally Responsive Literacy Resources Template Part 1.docxdorishigh
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docxalanfhall8953
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorialpinck2329
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkIJARIIT
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gvvgy_a
 
basic concepts of networking.ppt
basic concepts of networking.pptbasic concepts of networking.ppt
basic concepts of networking.pptImXaib
 

Similar to HS1011 Data Communication and Networks 13 August 2015 HS101.docx (20)

Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docxWireshark Lab Ethernet and ARP v7.0  Supplement to Comp.docx
Wireshark Lab Ethernet and ARP v7.0 Supplement to Comp.docx
 
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
Wireshark Lab  Getting Started v6.0  Supplement to Co.docxWireshark Lab  Getting Started v6.0  Supplement to Co.docx
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
opnet lab report
opnet lab reportopnet lab report
opnet lab report
 
Step by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet TracerStep by Step guide to set up a simple network in Packet Tracer
Step by Step guide to set up a simple network in Packet Tracer
 
NETW250 Week 3 iLab Observing VoIP Protocols Using Wireshar.docx
NETW250 Week 3 iLab Observing VoIP Protocols Using Wireshar.docxNETW250 Week 3 iLab Observing VoIP Protocols Using Wireshar.docx
NETW250 Week 3 iLab Observing VoIP Protocols Using Wireshar.docx
 
Arp fainal 000 Computer Networking
Arp fainal 000 Computer Networking Arp fainal 000 Computer Networking
Arp fainal 000 Computer Networking
 
Wireshark
Wireshark Wireshark
Wireshark
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 
Culturally Responsive Literacy Resources Template Part 1.docx
Culturally Responsive Literacy Resources Template Part 1.docxCulturally Responsive Literacy Resources Template Part 1.docx
Culturally Responsive Literacy Resources Template Part 1.docx
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0  Supplement to Computer Networking.docxWireshark Lab TCP v6.0  Supplement to Computer Networking.docx
Wireshark Lab TCP v6.0 Supplement to Computer Networking.docx
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorial
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wireshark
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gv
 
basic concepts of networking.ppt
basic concepts of networking.pptbasic concepts of networking.ppt
basic concepts of networking.ppt
 

More from adampcarr67227

You are a project manager and believe that your initiative would be .docx
You are a project manager and believe that your initiative would be .docxYou are a project manager and believe that your initiative would be .docx
You are a project manager and believe that your initiative would be .docxadampcarr67227
 
You are a project manager at a food agricultural organization and yo.docx
You are a project manager at a food agricultural organization and yo.docxYou are a project manager at a food agricultural organization and yo.docx
You are a project manager at a food agricultural organization and yo.docxadampcarr67227
 
You are a nursing educator and you are given an assignment to teach .docx
You are a nursing educator and you are given an assignment to teach .docxYou are a nursing educator and you are given an assignment to teach .docx
You are a nursing educator and you are given an assignment to teach .docxadampcarr67227
 
You are a paralegal working at law office of James Adams, Esq. On No.docx
You are a paralegal working at law office of James Adams, Esq. On No.docxYou are a paralegal working at law office of James Adams, Esq. On No.docx
You are a paralegal working at law office of James Adams, Esq. On No.docxadampcarr67227
 
you are a paralegal working at the law office of Smith & Smith. The .docx
you are a paralegal working at the law office of Smith & Smith. The .docxyou are a paralegal working at the law office of Smith & Smith. The .docx
you are a paralegal working at the law office of Smith & Smith. The .docxadampcarr67227
 
You are a police officer who has been selected to participate in a p.docx
You are a police officer who has been selected to participate in a p.docxYou are a police officer who has been selected to participate in a p.docx
You are a police officer who has been selected to participate in a p.docxadampcarr67227
 
You are a newly-minted, tax-paying and law-abiding, permanent res.docx
You are a newly-minted, tax-paying and law-abiding, permanent res.docxYou are a newly-minted, tax-paying and law-abiding, permanent res.docx
You are a newly-minted, tax-paying and law-abiding, permanent res.docxadampcarr67227
 
You are a new university police chief in a medium-sized city, an.docx
You are a new university police chief in a medium-sized city, an.docxYou are a new university police chief in a medium-sized city, an.docx
You are a new university police chief in a medium-sized city, an.docxadampcarr67227
 
You are a native speaker of French living in a mainly English speaki.docx
You are a native speaker of French living in a mainly English speaki.docxYou are a native speaker of French living in a mainly English speaki.docx
You are a native speaker of French living in a mainly English speaki.docxadampcarr67227
 
You are a new high school teacher, and have been captured at the end.docx
You are a new high school teacher, and have been captured at the end.docxYou are a new high school teacher, and have been captured at the end.docx
You are a new high school teacher, and have been captured at the end.docxadampcarr67227
 
You are a member of the Human Resource Department of a medium-sized .docx
You are a member of the Human Resource Department of a medium-sized .docxYou are a member of the Human Resource Department of a medium-sized .docx
You are a member of the Human Resource Department of a medium-sized .docxadampcarr67227
 
You are a network analyst on the fly-away team for the FBIs cyberse.docx
You are a network analyst on the fly-away team for the FBIs cyberse.docxYou are a network analyst on the fly-away team for the FBIs cyberse.docx
You are a network analyst on the fly-away team for the FBIs cyberse.docxadampcarr67227
 
You are a member of the senior management staff at XYZ Corporation. .docx
You are a member of the senior management staff at XYZ Corporation. .docxYou are a member of the senior management staff at XYZ Corporation. .docx
You are a member of the senior management staff at XYZ Corporation. .docxadampcarr67227
 
You are a member of the senior hospital administration. You become a.docx
You are a member of the senior hospital administration. You become a.docxYou are a member of the senior hospital administration. You become a.docx
You are a member of the senior hospital administration. You become a.docxadampcarr67227
 
YOU ARE A MEMBER OF THE SENIOR HOSPITAL ADMINISTRATI.docx
YOU ARE A MEMBER OF THE SENIOR HOSPITAL ADMINISTRATI.docxYOU ARE A MEMBER OF THE SENIOR HOSPITAL ADMINISTRATI.docx
YOU ARE A MEMBER OF THE SENIOR HOSPITAL ADMINISTRATI.docxadampcarr67227
 
You are a member of the Human Resource Department of a medium-si.docx
You are a member of the Human Resource Department of a medium-si.docxYou are a member of the Human Resource Department of a medium-si.docx
You are a member of the Human Resource Department of a medium-si.docxadampcarr67227
 
You are a member of the American Indian tribe. Think about how your .docx
You are a member of the American Indian tribe. Think about how your .docxYou are a member of the American Indian tribe. Think about how your .docx
You are a member of the American Indian tribe. Think about how your .docxadampcarr67227
 
You are a juvenile justice consultant creating a proposal that w.docx
You are a juvenile justice consultant creating a proposal that w.docxYou are a juvenile justice consultant creating a proposal that w.docx
You are a juvenile justice consultant creating a proposal that w.docxadampcarr67227
 
You are a journalist and you have been sent off to write a story abo.docx
You are a journalist and you have been sent off to write a story abo.docxYou are a journalist and you have been sent off to write a story abo.docx
You are a journalist and you have been sent off to write a story abo.docxadampcarr67227
 
You are a juvenile court probation officer. You have a choice of.docx
You are a juvenile court probation officer. You have a choice of.docxYou are a juvenile court probation officer. You have a choice of.docx
You are a juvenile court probation officer. You have a choice of.docxadampcarr67227
 

More from adampcarr67227 (20)

You are a project manager and believe that your initiative would be .docx
You are a project manager and believe that your initiative would be .docxYou are a project manager and believe that your initiative would be .docx
You are a project manager and believe that your initiative would be .docx
 
You are a project manager at a food agricultural organization and yo.docx
You are a project manager at a food agricultural organization and yo.docxYou are a project manager at a food agricultural organization and yo.docx
You are a project manager at a food agricultural organization and yo.docx
 
You are a nursing educator and you are given an assignment to teach .docx
You are a nursing educator and you are given an assignment to teach .docxYou are a nursing educator and you are given an assignment to teach .docx
You are a nursing educator and you are given an assignment to teach .docx
 
You are a paralegal working at law office of James Adams, Esq. On No.docx
You are a paralegal working at law office of James Adams, Esq. On No.docxYou are a paralegal working at law office of James Adams, Esq. On No.docx
You are a paralegal working at law office of James Adams, Esq. On No.docx
 
you are a paralegal working at the law office of Smith & Smith. The .docx
you are a paralegal working at the law office of Smith & Smith. The .docxyou are a paralegal working at the law office of Smith & Smith. The .docx
you are a paralegal working at the law office of Smith & Smith. The .docx
 
You are a police officer who has been selected to participate in a p.docx
You are a police officer who has been selected to participate in a p.docxYou are a police officer who has been selected to participate in a p.docx
You are a police officer who has been selected to participate in a p.docx
 
You are a newly-minted, tax-paying and law-abiding, permanent res.docx
You are a newly-minted, tax-paying and law-abiding, permanent res.docxYou are a newly-minted, tax-paying and law-abiding, permanent res.docx
You are a newly-minted, tax-paying and law-abiding, permanent res.docx
 
You are a new university police chief in a medium-sized city, an.docx
You are a new university police chief in a medium-sized city, an.docxYou are a new university police chief in a medium-sized city, an.docx
You are a new university police chief in a medium-sized city, an.docx
 
You are a native speaker of French living in a mainly English speaki.docx
You are a native speaker of French living in a mainly English speaki.docxYou are a native speaker of French living in a mainly English speaki.docx
You are a native speaker of French living in a mainly English speaki.docx
 
You are a new high school teacher, and have been captured at the end.docx
You are a new high school teacher, and have been captured at the end.docxYou are a new high school teacher, and have been captured at the end.docx
You are a new high school teacher, and have been captured at the end.docx
 
You are a member of the Human Resource Department of a medium-sized .docx
You are a member of the Human Resource Department of a medium-sized .docxYou are a member of the Human Resource Department of a medium-sized .docx
You are a member of the Human Resource Department of a medium-sized .docx
 
You are a network analyst on the fly-away team for the FBIs cyberse.docx
You are a network analyst on the fly-away team for the FBIs cyberse.docxYou are a network analyst on the fly-away team for the FBIs cyberse.docx
You are a network analyst on the fly-away team for the FBIs cyberse.docx
 
You are a member of the senior management staff at XYZ Corporation. .docx
You are a member of the senior management staff at XYZ Corporation. .docxYou are a member of the senior management staff at XYZ Corporation. .docx
You are a member of the senior management staff at XYZ Corporation. .docx
 
You are a member of the senior hospital administration. You become a.docx
You are a member of the senior hospital administration. You become a.docxYou are a member of the senior hospital administration. You become a.docx
You are a member of the senior hospital administration. You become a.docx
 
YOU ARE A MEMBER OF THE SENIOR HOSPITAL ADMINISTRATI.docx
YOU ARE A MEMBER OF THE SENIOR HOSPITAL ADMINISTRATI.docxYOU ARE A MEMBER OF THE SENIOR HOSPITAL ADMINISTRATI.docx
YOU ARE A MEMBER OF THE SENIOR HOSPITAL ADMINISTRATI.docx
 
You are a member of the Human Resource Department of a medium-si.docx
You are a member of the Human Resource Department of a medium-si.docxYou are a member of the Human Resource Department of a medium-si.docx
You are a member of the Human Resource Department of a medium-si.docx
 
You are a member of the American Indian tribe. Think about how your .docx
You are a member of the American Indian tribe. Think about how your .docxYou are a member of the American Indian tribe. Think about how your .docx
You are a member of the American Indian tribe. Think about how your .docx
 
You are a juvenile justice consultant creating a proposal that w.docx
You are a juvenile justice consultant creating a proposal that w.docxYou are a juvenile justice consultant creating a proposal that w.docx
You are a juvenile justice consultant creating a proposal that w.docx
 
You are a journalist and you have been sent off to write a story abo.docx
You are a journalist and you have been sent off to write a story abo.docxYou are a journalist and you have been sent off to write a story abo.docx
You are a journalist and you have been sent off to write a story abo.docx
 
You are a juvenile court probation officer. You have a choice of.docx
You are a juvenile court probation officer. You have a choice of.docxYou are a juvenile court probation officer. You have a choice of.docx
You are a juvenile court probation officer. You have a choice of.docx
 

Recently uploaded

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

HS1011 Data Communication and Networks 13 August 2015 HS101.docx

  • 1. HS1011 Data Communication and Networks 13 August 2015 HS1011 Data Communication and Networks 13 August 2015 HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION HS1011 Data Communication and Networks Tutorial/Lab Activity Week 06 Network Models, Standards and Protocols Hands-On Project 1: Identifying the TCP/IP Layers in a Frame Objective: Capture packets and view the TCP/IP layers in the frame Required Tools/Equipment: Your classroom computer with Wireshark installed Description: In this project, you capture some frames generated by your Web browser and examine the captured frames to identify the TCP/IP layers. 1. Start Wireshark (Use “Wireshark manual” to learn “how to use wireshark to capture data”) and click Capture Options. In the Capture Filter text box, type tcp port http(see Figure 1), and then click Start. Figure 1: Selecting filtering options 2. Start a Web browser, and open holmes website
  • 2. (http://www.holmes.edu.au/), exit the browser. 3. In Wireshark, click the Stop the running live capture toolbar icon to stop the capture. Scroll up to the first packet summary line, if necessary. 4. Click a packet summary in the top pane with HTTP in the protocol field and an Info line beginning with GET. In the middle pane are summaries of each protocol header (see Figure 5-6). You can ignore the first line starting with Frame X (with X representing the frame number), as it gives information about the frame, such as the time it arrived, its length, protocols in the frame, and so forth. Figure 2: Summary of protocol headers in Wireshark 5. Click to expand the line beginning with Ethernet II. Examine the information in this header (discussed in more detail in the following sections). Write which layer of the TCP/IP model the Ethernet II header represents, and then click again to collapse this header: _____________________________________________________ __________________________ 6. Click to expand the line beginning with Internet Protocol. Examine the information in this header (discussed in more detail in the following sections). Write which layer of the TCP/IP model the Internet Protocol header represents, and then click again to collapse this header: _____________________________________________________ __________________________ 7. Click to expand the line beginning with Transmission Control Protocol. Examine the information in this header (discussed in more detail in the following sections). Write which layer of the TCP/IP model the Transmission Control Protocol header
  • 3. represents, and then click again to collapse this header: _____________________________________________________ __________________________ 8. Click to expand the line beginning with Hypertext Transfer Protocol, and examine the information. This data portion of the frame is what a Web server actually sees and responds to. In this case, the HTTP command is GET, which means HTTP is requesting a page (or part of a page) from the Web server. Write which layer of the TCP/IP model the HTTP protocol represents, and then click again to collapse this header: _____________________________________________________ __________________________ 9. Exit Wireshark and click Quit without Saving when prompted. 10. Close all open windows, but leave your computer running for the next project. Hands-On Project 2: Capturing ARP and ICMP Packets Objective: Use Wireshark to capture packets created by the Tracert program. Required Tools/Equipment: Classroom computers with Wireshark installed Description: In this project, you use Wireshark to capture ARP and ICMP packets generated by the Tracert program. 1. Open a command prompt window. 2. Type arp -d and press Enter to clear your ARP cache. 3. Start Wireshark(Use “Wireshark manual” to learn “how to use wireshark to capture data”) and click Capture Options. In the Capture Filter text box, type arp or icmp, and then click Start. 4. At the command prompt, type tracertbooks.tomsho.comand
  • 4. press Enter. When Tracert is finished, click theStop the running live capture toolbar icon in Wireshark to stop the capture. Scroll to the first packet summary line, if necessary. 5. Find the ARP packets your computer has generated by looking in the Info column for “Who has A.B.C.D, Tell 192.168.100.XX” (replacing A.B.C.D with the address of your default gateway and XX with your student number). Click this packet summary line. 6. Notice that the Dst (for destination) address is ff:ff:ff:ff:ff:ff, indicating a broadcast. In the middle pane, click to expand the Ethernet II line. Notice that the Type field is ARP (0x806), which tells the Network access layer which Internetwork-layer protocol should receive the packet. Click again to collapse this line. 7. Click to expand the Address Resolution Protocol (request) line. Examine the information in the ARP header. The ARP message has fields to indicate what technology is used in the Network access layer (Ethernet) and the protocol type that needs the MAC address (IP, in this case). Click again to collapse this line. 8. Next, in the top pane, click the ARP reply message immediately following the ARP request. The Info column should be similar to “A.B.C.D is at 0A:1B:2C:3D:4E:5F.” The MAC address in the ARP reply is the MAC address of your default gateway. Explore the Network access and Internetwork headers for this frame. (Note: You might also find an ARP request and ARP reply for your DNS server if it's in the same network as your computer.) 9. In the top pane, click the first ICMP Echo (ping) request message from your computer to the destination computer atbooks.tomsho.com. The IP address should be 67.210.126.125, but IP addresses can change, so it might be different. 10. In the middle pane, click to expand the Internet Protocol line. Notice that the value in the Time to live line is 1. 11. In the top pane, click the ICMP Time-to-live exceeded message that follows the Ping request. This message was
  • 5. generated by the first router en route tobooks.tomsho.com. Notice that the source address is the address of your default gateway. 12. Find the next ICMP Echo (Ping) Request message and view the TTL value. Tracert sends three Echo Request messages for each TTL value, so the first three Echo Request messages have a TTL value of 1. Find the fourth ICMP Echo (Ping) Request message and view the TTL value, which should be 2. The Time- to-live exceeded message following it is from the next router down the line. Tracert follows this pattern until reaching the destination device (books.tomsho.com). 13. Exit Wireshark, but leave the command prompt window open if you're continuing to the next project. Hands-On Project 3: Using the Netstat Program Objective: Use the Netstat program to view network interface and IP protocol status and statistics. Required Tools/Equipment: Your classroom computer Description: In this project, you use Netstat to view statistics about your network interface and the IP protocol. Then you generate traffic with Ping and Tracert to see the statistics of different packet types change. 1. Open a command prompt window. 2. To display statistics about your Ethernet interface, type netstat -e and press Enter. These statistics include the number of bytes and packets received and sent through the Ethernet interface. If any errors are indicated in the display, you might have problems with your network connection that are slowing the network down. If the error packets approach 1% of the total number of packets, something is probably wrong with your NIC or physical interface. 3. To see statistics for all protocols, type netstat -s and press Enter. To limit the display to just IP statistics, type netstat -ps IP and press Enter.
  • 6. 4. To see your network statistics updated every 5 seconds, type netstat -ps IP 5 and press Enter. Press Ctrl+C to stop the program. 5. To display ICMP information, type netstat -ps ICMP and press Enter. A variety of ICMP message types are displayed along with how many of each type of message were received and sent. Most, if not all, will be Echo and Echo Reply messages. 6. Type ping 5.5.5.5 and press Enter. This command should generate ICMP Destination Unreachable messages. To see whether the number of Destination Unreachable messages has increased, type netstat -ps ICMP and press Enter. 7. The ICMP TTL-Expired messages used in Tracert are called Time Exceeded messages in Netstat. Type tracert books.tomsho.comand press Enter. To see whether the number of Time Exceeded messages has increased, type netstat -ps ICMP and press Enter. 8. To display your computer's routing table, type netstat -r and press Enter. Every computer has a routing table it uses to decide which interface to send packets to. The first entry lists the network destination as 0.0.0.0, which is the entry for your default gateway. 9. Leave the command prompt window open for the next project. Tutorial/Lab Activity 5 Page 1 of 4 Tutorial/Lab Activity 5 Page 1 of 4 Page 4 of 4 HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION
  • 7. HS1011 Data Communication and Networks Tutorial/Lab Activity Week 02 Introduction to Computer Networks PART I: Objectives: In this lab you will learn basic network commands (such as ipconfig, net view, Ping, ARP and so on) which can be used to check status of a network. Student will also use Wireshark to capture network data and investigate captured data to understand practical use of various network terms they learn from Lecture 1. Hands-On Project 1: Using Ipconfig, Ping, and ARP Objective: Use Ipconfig, Ping, and ARP to view and test network addresses and connectivity. Required Tools/Equipment: Your classroom computer Description: In this project, you use command-line tools to view your network configuration and test your computer's capability to communicate with other computers. Ipconfig displays the IP address configuration of your network interfaces. Ping sends a message to a computer to verify the capability to communicate with it. ARP displays the MAC (physical) addresses your computer has discovered. 1. Click Start, type cmd, and press Enter to open a command prompt window. At the command prompt, type ipconfig and press Enter. You should see a screen similar to Figure 1, although the specific numbers you see will vary. Ipconfig lists the IP address configuration for your network interfaces as well as other network settings. Figure 1: IP address configuration for your network
  • 8. Identify the differences between your screen and Figure 1. Explain why are they different? 2. To see more details about your network configuration, type ipconfig /all and press Enter. You can scroll up the command prompt window to see all the output. Under the heading “Ethernet adapter Local Area Connection,” find the row labelled Physical Address (see Figure 2). The number you see in this row is the MAC address, a 12-digit hexadecimal value. Also, find the IP address in the IPv4 Address row. Write down these two addresses: Figure 2: Using ipconfig /all to list physical (MAC) and IP addresses 3. Tell your partner what your IP address is and make note of your partner's IP address. At the command prompt, type ping IP address and press Enter (replacing IP address with your partner's IP address). You should see output similar to Figure 3. Figure 3: Results of the ping command 4. Remember that your computer needs both the destination IP address and MAC address to communicate with another computer. You supplied the IP address by typing it at the command prompt. Your computer discovered the MAC address of your partner's computer by using Address Resolution Protocol (ARP). To see this address, type arp -a and press Enter. The output should be similar to Figure 4. You might see more lines of output, depending on what other devices your computer has been communicating with. ARP works automatically without user intervention.
  • 9. Figure 4: The arp -a command displays MAC addresses 5. Use the ping command to communicate with other computers and devices on your network, and use ipconfig /all to find the addresses of your default gateway (a router in your network) and your DNS servers. Write the MAC addresses of your default gateway and your DNS servers: 1. Default gateway: _______________________________ 2. DNS servers: ___________________________________ 6. Close all open windows. PART II: 1. You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to your existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure? a. WAN b. MAN c. Internetwork d. Extended LAN 2. Which of the following best describes a client? a. A computer's primary role in the network is to give other computers access to network resources and services. b. A computer's primary role in the network is to run user applications and access network resources. c. It's the software that responds to requests for network resources. d. The OS installed on a computer is designed mainly to share network resources.
  • 10. 3. You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible. What type of network should you install? a. Server-based network b. Peer-to-peer network c. WPAN d. Storage area network 4. Which of the following characteristics is associated with a peer-to-peer network? (Choose all that apply.) a. Decentralized data storage b. Inexpensive c. User-managed resources d. Centralized control e. Uses a directory service 5. A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following? a. LAN b. MAN c. WAN d. Internetwork 6. At Yavapai College, the Prescott and Prescott Valley campuses (8 miles apart) have LANs connected via the local phone company. This configuration is an example of which of the following? (Choose the best answer.) a. MAN b. WPAN c. WAN d. SAN
  • 11. 7. You have installed Windows Server 2008 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server? a. Naming services b. Application services c. Communication services d. Directory services 8. Peer-to-peer networks aren't suitable in which of the following situations? a. Tight security is required. b. Five or fewer users need network access. c. Budget is the primary consideration. d. No one uses the network heavily. 9. Which of the following best describes a storage area network? a. Provides a mechanism for users to access a network's storage resources remotely b. Uses high-speed networking technologies to give servers fast access to large amounts of disk storage c. Is a short-range networking technology designed to connect personal devices to exchange information d. Provides secure centralized file storage and sharing and access to networked printers 10. Why might Windows 7 or Windows Vista require more RAM or disk space than Windows Server 2008? a. They need to accommodate handling centralized logon. b. They include a directory service and a naming service. c. They run many background networking services. d. They support a graphics-intensive user interface. Case Project 1: Networking Gadgets, Inc. currently employs eight people but plans to hire 10 more in the next four months. Users will work on multiple projects, and only those users assigned to a project should have access to the project files.
  • 12. You're instructed to set up the network to make it easy to manage and back up yet still provide centralized storage for project files. Would you choose a peer-to-peer network, a server-based network, or a combination of both? Why? E:HolmesHS2011TutorialsHS2011 Tutorial Activity Week 1.docx Page 5 of 2 Tutorial/Lab Activity 2 Page 1 of 6 HS1011 Data Communication and Networks 13 August 2015 HS1011 Data Communication and Networks 13 August 2015 HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION HS1011 Data Communication and Networks Tutorial/Lab Activity Week 04 Network Topologies and Technologies Hands-On Project 1: Determining and Changing Your Ethernet Standard Objective: Determine your Ethernet standard and change your connection speed to use a different standard. Required Tools/Equipment: Classroom computers connected to a classroom hub or switch. The hub or switch and NICs must be capable of connecting at multiple speeds. For example, if you're using a 10/100 Mbps switch, and your NICs are capable of 10/100 Mbps, you change the connection speed to the slower rate. If possible, each student should be assigned a separate partner. Separate lab computers and a hub or switch can also be used for this project.
  • 13. Description: In this project, you view your network connection properties to see at what speed your NIC is operating. Then you send a large ping message and note how long the reply takes. Next, you change the speed, if your NIC driver allows, and perform the same ping to see whether you can detect a time difference. 1. Open a command prompt window, and then type ipconfig and press Enter. Exchange your IP address with your partner and write down your partner's IP address. Leave the command prompt window open for later. _____________________________________________________ __________________________ 2. Click the network connection icon in the taskbar and click Open Network and Sharing Center. 3. In the Network and Sharing Center, click Local Area Connection to open the Local Area Connection Status dialog box (see Figure 1). Figure 1: The Local Area Connection Status dialog box 4. In the Connection section, find the connection speed. Write down this information and, based on the speed listed, the Ethernet variety your computer is running: Connection speed: _____________________________________________________ __________________________ Ethernet variety: _____________________________________________________ __________________________ 5. At the command prompt, ping your partner by typing ping -l 60000 IPaddress and pressing Enter. The -l 60000 option in the command specifies that the ping message should be 60000 bytes
  • 14. instead of the typical length of 32 bytes. Note the time = values in the ping replies and write them down. For example, yours might say “time = 2ms,” meaning the reply took 2 milliseconds. Not all times might be the same. Sometimes the first time is slower than the rest. Try pinging a few times to get an idea of the average time. Ping reply times: _____________________________________________________ __________________________ 6. Click the Properties button, and in the Local Area Connection Properties dialog box, click Configure. 7. Click the Advanced tab. In the Property list box, click Link Speed & Duplex (or a similar name). Figure 3-15 shows the connection options. Not all NICs have the same options, so you might see different options. 8. The default setting is usually Auto Negotiation. Click 10 Mpbs Half Duplex if this option is available, and then click OK. If you were able to set this option, what speed and variety of Ethernet is your computer running now? Connection speed: _____________________________________________________ __________________________ Ethernet variety: _____________________________________________________ __________________________ Figure 2: Settings for the Link Speed & Duplex property 9. After you and your partner have changed the connection speed to a lower value, repeat the ping command you used in Step 6. Write down the reply times, and state whether they were
  • 15. different: Ping reply times at 10 Mbps: _____________________________________________________ ________________________ 10. Figure 3 shows two sets of ping results. The first result was from two computers connected “Auto Negotiation mode”. The average reply took <1 ms. The second result was with the same computers connected at 10 Mbps half-duplex, and the average reply took =1 ms. Change your connection speed and duplex mode back to Auto Negotiation, and then close all open windows. Leave your computer running for the next project. Figure 3: Ping results at different connection speeds Hands-On Project 2: Viewing an Ethernet Frame Objective: Capture packets and examine details of the Ethernet II frame format. Required Tools/Equipment: Classroom computers connected to a classroom hub or switch with Wireshark installed Description: In this project, you capture some packets and then examine the frame and protocol headers. 1. Use “Wireshark manual” to learn “how to use wireshark to capture data” then --- 2. Start Wireshark and click Capture Options. In the Capture Filter text box, type icmp, and then click Start. 3. Open a command prompt window, and then type ping IPaddress ( IP address of your peer) and press Enter (replacing IPaddress with the IP address of another student's computer or another device on your network). 4. In Wireshark, click the Stop the running live capture toolbar icon to stop the capture. 5. Click a packet summary in the top pane with ICMP listed in the protocol field. 6. In the middle pane, click to expand the Ethernet II row. It
  • 16. should look similar to Figure 4. Figure 4: An Ethernet II frame in Wireshark 7. Notice the three fields in the Ethernet II frame: Destination, Source, and Type. The Destination and Source fields are the destination and source MAC addresses in the frame. In Figure 4, you see Cisco before the destination address and Vmware before the source address because Wireshark attempts to resolve the NIC manufacturer coded in the MAC address's first six digits. The full MAC address (without manufacturer name) is shown in parentheses. The Type field has the value 0x800, which indicates that the protocol in the frame is IP. Click to expand the Internet Protocol row. 8. Under Internet Protocol, you see details of the IP header, including the destination and source IP addresses. Click to expand the Internet Control Message Protocol row to view details of the ICMP protocol header. (You learn more about IP- related protocols later stage of this subject.) 9. Click to expand the Data portion of the frame, and then click the Data field to see the ICMP message data in hexadecimal in the bottom pane. The right side of this pane shows the translation from hexadecimal to ASCII (human-readable characters); as you can see, it's just portions of the alphabet repeated. Some Ping programs include more clever data, such as “Hello, are you there?” The actual data in a ping message doesn't matter; what matters is that the reply contains the same data as the ping request. 10. Exit Wireshark and click Quit without Saving when prompted. Close the command prompt window.
  • 17. Hands-On Project 2: Designing a physical star topology using Packet Tracer Objective: Learning to design a physical network topology Required Tools/Equipment: Packet tracer only Description: In this project, you will design physical network topologies. 1. Open Packet Tracer and design a physical star topology made of 6 computers and show it to your tutor. Tutorial/Lab Activity 3 Page 1 of 4 Tutorial/Lab Activity 3 Page 1 of 4 Tutorial/Lab Activity 4 Page 1 of 5 HS1011 Data Communication and Networks 13 August 2015 HS1011 Data Communication and Networks 13 August 2015 HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION HS1011 Data Communication and Networks Tutorial/Lab Activity Week 03 Network Hardware Essentials PART I: Hands-On Project 1: Recognize basic functionality of network hardware Objective: understanding network hardware using a simulated network Required Tools/Equipment: Packet Tracer and Lab2.pkt Description: Identify and label network hardware and understand their role in a simple network. Use of Trace Route
  • 18. program (tracert.exe) to lists each router your packets must travel through between your computer and the destination. 1. Download Lab2.pkt from Blackboard and open it using packet tracer. Figure 1: Sample network to identify hardware devices 2. Label all network hardware using appropriate name and write two functionalities for each. 3. Double click on PC1, find out and write down the IP address of it. Then double click on PC2 and open command prompt of it and type “tracert IP address of PC1”. You will see a screenshot similar to Figure 2. It shows how many routers the packet passes through before it reaches to PC 1. 4. Now double click on the only router of the network diagram and open CLI tab to execute commands below. Router>en Router#sh run By seeing the output, can you identify the number of interfaces (port) the router has? 5. Furthermore, can you identify the IP addresses used in the router interfaces? Write down your findings for submission. Hands-On Project 2: Trace Route program to see the travel path of routers packets Objective: Use the Trace Route program to see the routers packets must travel through to get from your computer to a destination on the Internet. Required Tools/Equipment: Your classroom computer, Internet access, and a valid DNS server; no other tools or equipment are required Description: The importance of routers is made clear when you need to access servers on the Internet. The Trace Route program
  • 19. (tracert.exe) lists each router your packets must travel through between your computer and an Internet server. 1. Click Start, type cmd, and press Enter to open a command prompt window. 2. Type tracert www.yahoo.com and press Enter. You should see output that's similar to Figure 1, but the details will vary, depending on your location and system’s restriction. In this output, there are five columns of information. The first column is just a count of how many routers the packet traversed. The second, third, and fourth columns show the amount of time in milliseconds (ms) the router took to respond. Three packets are sent, so three times are listed. The last column is the router's IP address or name and IP address. Figure 1: Output of the Trace Route program 3. You can garner some information about the geography of the path your packet took by looking at the router's name. For example, in Figure 1, the domain name of the third router is yc.edu, which is a router at Yavapai College in Prescott, Arizona, where this book has been written. The fourth and fifth routers have the domain name qwest.net, and the router's name begins with “phn,” which tells you that the router is on Qwest's network in Phoenix. You get the idea. However, looking up router names can sometimes make the trace run slowly. To do the same trace without looking up names, type tracert - dwww.yahoo.comand press Enter. This time, you should see only the IP address of each router. 4. Try using Trace Route to determine the path packets take to other destinations. Trybooks.tomsho.com, and for a destination on the East Coast, trywww.course.com. For a destination in Germany,
  • 20. trywww.kontron.de. If the trace repeatedly times out (indicated by an asterisk, *, in the output), press Ctrl+C to stop the trace. 5. Close the command prompt window. 6. You can also find tools that show you the route on a map. Start your Web browser, and go towww.yougetsignal.com/tools/visual-tracert. In the Remote Address text box, type any of the destinations in Step 4 or any other address you like. This online tool attempts to map out the path your packets take to get to their destination. Try to trace your current IP by clicking “Use Current IP > Host Trace”. A screenshot I shown in Figure 2 to help you. Figure 2: A screen of the tool of trace route map 7. Exit your Web browser. Tutorial/Lab Activity 2 Page 1 of 3 Tutorial/Lab Activity 2 Page 1 of 3 Tutorial/Lab Activity 3 Page 4 of 4 HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION HS1011 Data Communication and Networks Tutorial/Lab Activity Week 05 Network Media Case Project 1: During the design of most real-world networks, you'll discover that using more than one type of networking medium is common. The usual reasons for needing more than one type of medium include the following:
  • 21. · Two or more areas must be interconnected, and the distance separating them is greater than the maximum segment length for the type of medium used in (or best suited for) each area. · A connection must pass through a high-interference environment (across some large transformers, near heavy-duty electrical motors, and so on). Failure to use a different type of medium increases the risk of impeding data flow. This reason is especially common for choosing fiber-optic cable or wireless in many networks, particularly when connecting floors in an office building and the only available pathway is the elevator shaft. · Certain parts of an internetwork might have to carry more traffic than other parts. Typically, the segment where traffic aggregates is the backbone, a common cable segment that interconnects subsidiary networks. (Think of a tree trunk as the backbone and its major branches as cable segments.) Often, a higher-capacity cable is used for a backbone (for example, fiber-optic cable or Cat 6 cable rated for Gigabit Ethernet), along with a higher-speed networking technology for attachments to the backbone. This arrangement means outlying segments might use conventional 10 or 100 Mbps Ethernet, and the backbone uses 1 Gbps or 10 Gbps Ethernet. Using this information, suggest solutions that involve at least two types, if possible, of networking media to address the following problems: 1. XYZ Corp. is planning a new network. Engineers in the design shop must have connections to accountants and salespeople in the front office, but all routes between the two areas must traverse the shop floor, where arc welders and metal- stamping equipment create potent amounts of EMI and RFI. Given that both the design shop and front office use 10BaseT (twisted-pair Ethernet), how might you interconnect these two areas? What medium guarantees immunity from interference? 2. After the front-office network at XYZ Corp. is set up, an accountant realizes that if the loading dock connected to the network, dock workers could log incoming and outgoing shipments and keep the inventory more current. Even though the
  • 22. loading dock is nowhere near the shop floor, the dock is 1100 feet from the front office. What kinds of cable will work to make this connection? What kind would you choose and why? 3. ABC Company occupies three floors in a 10-story building, where the elevator shaft provides the only path to all three floors. In addition, users on the ninth and tenth floors must access a collection of servers on the eighth floor. Explain what kind of connections would work in the elevator shaft. If more than one choice is possible, pick the best option and explain the reasons for your choice. Assuming that inter floor connections might someday need to run at much higher speeds, re-evaluate your choice. What's the best type of medium for open ended bandwidth needs? Explain your answer. 4. Very Big ISP (VBISP) Corporation wants to increase the bandwidth it can access at its downtown location in New York City. The distance between locations is about 20 miles, and the bandwidth needed between locations is at least 50 Mbps. What media types could work to provide this connection? 5. Following a year of major sales increases in the Pacific Rim, MarTexCo decides to open a second plant in Malaysia. The company wants the new plant to be able to access the headquarters database in Des Moines, Iowa, in real time, but long-haul telephone connections aren't possible, owing to the lack of communications infrastructure at the Malaysia location. What kind of wireless networking alternative makes the most sense when considering network links that span an appreciable portion of the globe? Explain why laying cable might not be feasible. Case Project 2: TVBCA has just occupied a historic building in downtown Pittsburgh in which 15 employees will work. Because of codes for historic buildings, TVBCA isn't permitted to run cables inside walls or ceilings. Required result: Employees must be able to share files and printers, as in a typical LAN environment, without using cables. Optional desired results: Employees must be able to use their
  • 23. laptops and move freely throughout the office while maintaining a network connection. Because of the size of some computer- aided design (CAD) files employees use frequently, data transfer speeds should be more than 20 Mbps. Proposed solution: Install an 802.11n wireless access point and configure each computer and laptop with a wireless network card. Which of the following results does the proposed solution deliver? Explain your answer. a. The proposed solution delivers the required result and both optional desired results. b. The proposed solution delivers the required result and only one of the two optional desired results. c. The proposed solution delivers the required result but neither optional desired result. d. The proposed solution does not deliver the required result.