HS1011 Data Communication and Networks 13 August 2015
HS1011 Data Communication and Networks 13 August 2015
HOLMES
INSTITUTE
FACULTY OF HIGHER
EDUCATION
HS1011 Data Communication and Networks
Tutorial/Lab Activity Week 06 Network Models, Standards and Protocols
Hands-On Project 1: Identifying the TCP/IP Layers in a Frame
Objective: Capture packets and view the TCP/IP layers in the frame
Required Tools/Equipment: Your classroom computer with Wireshark installed
Description: In this project, you capture some frames generated by your Web browser and examine the captured frames to identify the TCP/IP layers.
1. Start Wireshark (Use “Wireshark manual” to learn “how to use wireshark to capture data”) and click Capture Options. In the Capture Filter text box, type tcp port http(see Figure 1), and then click Start.
Figure 1: Selecting filtering options
2. Start a Web browser, and open holmes website (http://www.holmes.edu.au/), exit the browser.
3. In Wireshark, click the Stop the running live capture toolbar icon to stop the capture. Scroll up to the first packet summary line, if necessary.
4. Click a packet summary in the top pane with HTTP in the protocol field and an Info line beginning with GET. In the middle pane are summaries of each protocol header (see Figure 5-6). You can ignore the first line starting with Frame X (with X representing the frame number), as it gives information about the frame, such as the time it arrived, its length, protocols in the frame, and so forth.
Figure 2: Summary of protocol headers in Wireshark
5. Click to expand the line beginning with Ethernet II. Examine the information in this header (discussed in more detail in the following sections). Write which layer of the TCP/IP model the Ethernet II header represents, and then click again to collapse this header:
_______________________________________________________________________________
6. Click to expand the line beginning with Internet Protocol. Examine the information in this header (discussed in more detail in the following sections). Write which layer of the TCP/IP model the Internet Protocol header represents, and then click again to collapse this header:
_______________________________________________________________________________
7. Click to expand the line beginning with Transmission Control Protocol. Examine the information in this header (discussed in more detail in the following sections). Write which layer of the TCP/IP model the Transmission Control Protocol header represents, and then click again to collapse this header:
_______________________________________________________________________________
8. Click to expand the line beginning with Hypertext Transfer Protocol, and examine the information. This data portion of the frame is what a Web server actually sees and responds to. In this case, the HTTP command is GET, which means HTTP is requesting a page (or part of a page) from the Web server. Write .
HS1011 Data Communication and Networks 13 August 2015 HS101.docx
1. HS1011 Data Communication and Networks 13
August 2015
HS1011 Data Communication and Networks 13
August 2015
HOLMES
INSTITUTE
FACULTY OF HIGHER
EDUCATION
HS1011 Data Communication and Networks
Tutorial/Lab Activity Week 06 Network Models, Standards and
Protocols
Hands-On Project 1: Identifying the TCP/IP Layers in a Frame
Objective: Capture packets and view the TCP/IP layers in the
frame
Required Tools/Equipment: Your classroom computer with
Wireshark installed
Description: In this project, you capture some frames generated
by your Web browser and examine the captured frames to
identify the TCP/IP layers.
1. Start Wireshark (Use “Wireshark manual” to learn “how to
use wireshark to capture data”) and click Capture Options. In
the Capture Filter text box, type tcp port http(see Figure 1), and
then click Start.
Figure 1: Selecting filtering options
2. Start a Web browser, and open holmes website
2. (http://www.holmes.edu.au/), exit the browser.
3. In Wireshark, click the Stop the running live capture toolbar
icon to stop the capture. Scroll up to the first packet summary
line, if necessary.
4. Click a packet summary in the top pane with HTTP in the
protocol field and an Info line beginning with GET. In the
middle pane are summaries of each protocol header (see Figure
5-6). You can ignore the first line starting with Frame X (with
X representing the frame number), as it gives information about
the frame, such as the time it arrived, its length, protocols in the
frame, and so forth.
Figure 2: Summary of protocol headers in Wireshark
5. Click to expand the line beginning with Ethernet II. Examine
the information in this header (discussed in more detail in the
following sections). Write which layer of the TCP/IP model the
Ethernet II header represents, and then click again to collapse
this header:
_____________________________________________________
__________________________
6. Click to expand the line beginning with Internet Protocol.
Examine the information in this header (discussed in more
detail in the following sections). Write which layer of the
TCP/IP model the Internet Protocol header represents, and then
click again to collapse this header:
_____________________________________________________
__________________________
7. Click to expand the line beginning with Transmission Control
Protocol. Examine the information in this header (discussed in
more detail in the following sections). Write which layer of the
TCP/IP model the Transmission Control Protocol header
3. represents, and then click again to collapse this header:
_____________________________________________________
__________________________
8. Click to expand the line beginning with Hypertext Transfer
Protocol, and examine the information. This data portion of the
frame is what a Web server actually sees and responds to. In
this case, the HTTP command is GET, which means HTTP is
requesting a page (or part of a page) from the Web server. Write
which layer of the TCP/IP model the HTTP protocol represents,
and then click again to collapse this header:
_____________________________________________________
__________________________
9. Exit Wireshark and click Quit without Saving when
prompted.
10. Close all open windows, but leave your computer running
for the next project.
Hands-On Project 2: Capturing ARP and ICMP Packets
Objective: Use Wireshark to capture packets created by the
Tracert program.
Required Tools/Equipment: Classroom computers with
Wireshark installed
Description: In this project, you use Wireshark to capture ARP
and ICMP packets generated by the Tracert program.
1. Open a command prompt window.
2. Type arp -d and press Enter to clear your ARP cache.
3. Start Wireshark(Use “Wireshark manual” to learn “how to
use wireshark to capture data”) and click Capture Options. In
the Capture Filter text box, type arp or icmp, and then click
Start.
4. At the command prompt, type tracertbooks.tomsho.comand
4. press Enter. When Tracert is finished, click theStop the running
live capture toolbar icon in Wireshark to stop the capture. Scroll
to the first packet summary line, if necessary.
5. Find the ARP packets your computer has generated by
looking in the Info column for “Who has A.B.C.D, Tell
192.168.100.XX” (replacing A.B.C.D with the address of your
default gateway and XX with your student number). Click this
packet summary line.
6. Notice that the Dst (for destination) address is ff:ff:ff:ff:ff:ff,
indicating a broadcast. In the middle pane, click to expand the
Ethernet II line. Notice that the Type field is ARP (0x806),
which tells
the Network access layer which Internetwork-layer protocol
should receive the packet. Click again to collapse this line.
7. Click to expand the Address Resolution Protocol (request)
line. Examine the information in the ARP header. The ARP
message has fields to indicate what technology is used in the
Network access layer (Ethernet) and the protocol type that
needs the MAC address (IP, in this case). Click again to
collapse this line.
8. Next, in the top pane, click the ARP reply message
immediately following the ARP request. The Info column
should be similar to “A.B.C.D is at 0A:1B:2C:3D:4E:5F.” The
MAC address in the ARP reply is the MAC address of your
default gateway. Explore the Network access and Internetwork
headers for this frame. (Note: You might also find an ARP
request and ARP reply for your DNS server if it's in the same
network as your computer.)
9. In the top pane, click the first ICMP Echo (ping) request
message from your computer to the destination computer
atbooks.tomsho.com. The IP address should be 67.210.126.125,
but IP addresses can change, so it might be different.
10. In the middle pane, click to expand the Internet Protocol
line. Notice that the value in the Time to live line is 1.
11. In the top pane, click the ICMP Time-to-live exceeded
message that follows the Ping request. This message was
5. generated by the first router en route tobooks.tomsho.com.
Notice that the source address is the address of your default
gateway.
12. Find the next ICMP Echo (Ping) Request message and view
the TTL value. Tracert sends three Echo Request messages for
each TTL value, so the first three Echo Request messages have
a TTL value of 1. Find the fourth ICMP Echo (Ping) Request
message and view the TTL value, which should be 2. The Time-
to-live exceeded message following it is from the next router
down the line. Tracert follows this pattern until reaching the
destination device (books.tomsho.com).
13. Exit Wireshark, but leave the command prompt window
open if you're continuing to the next project.
Hands-On Project 3: Using the Netstat Program
Objective: Use the Netstat program to view network interface
and IP protocol status and statistics.
Required Tools/Equipment: Your classroom computer
Description: In this project, you use Netstat to view statistics
about your network interface and the IP protocol. Then you
generate traffic with Ping and Tracert to see the statistics of
different packet types change.
1. Open a command prompt window.
2. To display statistics about your Ethernet interface, type
netstat -e and press Enter. These statistics include the number of
bytes and packets received and sent through the Ethernet
interface. If any errors are indicated in the display, you might
have problems with your network connection that are slowing
the network down. If the error packets approach 1% of the total
number of packets, something is probably wrong with your NIC
or physical interface.
3. To see statistics for all protocols, type netstat -s and press
Enter. To limit the display to just IP statistics, type netstat -ps
IP and press Enter.
6. 4. To see your network statistics updated every 5 seconds, type
netstat -ps IP 5 and press Enter. Press Ctrl+C to stop the
program.
5. To display ICMP information, type netstat -ps ICMP and
press Enter. A variety of ICMP message types are displayed
along with how many of each type of message were received
and sent. Most, if not all, will be Echo and Echo Reply
messages.
6. Type ping 5.5.5.5 and press Enter. This command should
generate ICMP Destination Unreachable messages. To see
whether the number of Destination Unreachable messages has
increased, type netstat -ps ICMP and press Enter.
7. The ICMP TTL-Expired messages used in Tracert are called
Time Exceeded messages in Netstat. Type tracert
books.tomsho.comand press Enter. To see whether the number
of Time Exceeded messages has increased, type netstat -ps
ICMP and press Enter.
8. To display your computer's routing table, type netstat -r and
press Enter. Every computer has a routing table it uses to decide
which interface to send packets to. The first entry lists the
network destination as 0.0.0.0, which is the entry for your
default gateway.
9. Leave the command prompt window open for the next
project.
Tutorial/Lab Activity 5 Page 1 of 4
Tutorial/Lab Activity 5 Page 1 of 4
Page 4 of 4
HOLMES
INSTITUTE
FACULTY OF HIGHER
EDUCATION
7. HS1011 Data Communication and Networks
Tutorial/Lab Activity Week 02
Introduction to Computer Networks
PART I:
Objectives: In this lab you will learn basic network commands
(such as ipconfig, net view, Ping, ARP and so on) which can be
used to check status of a network. Student will also use
Wireshark to capture network data and investigate captured data
to understand practical use of various network terms they learn
from Lecture 1.
Hands-On Project 1: Using Ipconfig, Ping, and ARP
Objective: Use Ipconfig, Ping, and ARP to view and test
network addresses and connectivity.
Required Tools/Equipment: Your classroom computer
Description: In this project, you use command-line tools to view
your network configuration and test your computer's capability
to communicate with other computers. Ipconfig displays the IP
address configuration of your network interfaces. Ping sends a
message to a computer to verify the capability to communicate
with it. ARP displays the MAC (physical) addresses your
computer has discovered.
1. Click Start, type cmd, and press Enter to open a command
prompt window. At the command prompt, type ipconfig and
press Enter. You should see a screen similar to Figure 1,
although the specific numbers you see will vary. Ipconfig lists
the IP address configuration for your network interfaces as well
as other network settings.
Figure 1: IP address configuration for your network
8. Identify the differences between your screen and Figure 1.
Explain why are they different?
2. To see more details about your network configuration, type
ipconfig /all and press Enter. You can scroll up the command
prompt window to see all the output. Under the heading
“Ethernet adapter Local Area Connection,” find the row labelled
Physical Address (see Figure 2). The number you see in this row
is the MAC address, a 12-digit hexadecimal value. Also, find
the IP address in the IPv4 Address row. Write down these two
addresses:
Figure 2: Using ipconfig /all to list physical (MAC) and IP
addresses
3. Tell your partner what your IP address is and make note of
your partner's IP address. At the command prompt, type ping IP
address and press Enter (replacing IP address with your
partner's IP address). You should see output similar to Figure 3.
Figure 3: Results of the ping command
4. Remember that your computer needs both the destination IP
address and MAC address to communicate with another
computer. You supplied the IP address by typing it at the
command prompt. Your computer discovered the MAC address
of your partner's computer by using Address Resolution
Protocol (ARP). To see this address, type arp -a and
press Enter. The output should be similar to Figure 4. You
might see more lines of output, depending on what other devices
your computer has been communicating with. ARP works
automatically without user intervention.
9. Figure 4: The arp -a command displays MAC addresses
5. Use the ping command to communicate with other computers
and devices on your network, and use ipconfig /all to find the
addresses of your default gateway (a router in your network)
and your DNS servers. Write the MAC addresses of your default
gateway and your DNS servers:
1. Default gateway: _______________________________
2. DNS servers: ___________________________________
6. Close all open windows.
PART II:
1. You're the network administrator for a company that has just
expanded from one floor to two floors of a large building, and
the number of workstations you need has doubled from 50 to
100. You're concerned that network performance will suffer if
you add computers to your existing LAN. In addition, new users
will be working in a separate business unit, and there are
reasons to logically separate the two groups of computers. What
type of network should you configure?
a. WAN
b. MAN
c. Internetwork
d. Extended LAN
2. Which of the following best describes a client?
a. A computer's primary role in the network is to give other
computers access to network resources and services.
b. A computer's primary role in the network is to run user
applications and access network resources.
c. It's the software that responds to requests for network
resources.
d. The OS installed on a computer is designed mainly to share
network resources.
10. 3. You work for a small company with four users who need to
share information on their computers. The budget is tight, so the
network must be as inexpensive as possible. What type of
network should you install?
a. Server-based network
b. Peer-to-peer network
c. WPAN
d. Storage area network
4. Which of the following characteristics is associated with a
peer-to-peer network? (Choose all that apply.)
a. Decentralized data storage
b. Inexpensive
c. User-managed resources
d. Centralized control
e. Uses a directory service
5. A device interconnects five computers and a printer in a
single office so that users can share the printer. This
configuration is an example of which of the following?
a. LAN
b. MAN
c. WAN
d. Internetwork
6. At Yavapai College, the Prescott and Prescott Valley
campuses (8 miles apart) have LANs connected via the local
phone company. This configuration is an example of which of
the following? (Choose the best answer.)
a. MAN
b. WPAN
c. WAN
d. SAN
11. 7. You have installed Windows Server 2008 on a new server and
want to centralize user logons and security policies. What type
of software should you install and configure on this server?
a. Naming services
b. Application services
c. Communication services
d. Directory services
8. Peer-to-peer networks aren't suitable in which of the
following situations?
a. Tight security is required.
b. Five or fewer users need network access.
c. Budget is the primary consideration.
d. No one uses the network heavily.
9. Which of the following best describes a storage area
network?
a. Provides a mechanism for users to access a network's storage
resources remotely
b. Uses high-speed networking technologies to give servers fast
access to large amounts of disk storage
c. Is a short-range networking technology designed to connect
personal devices to exchange information
d. Provides secure centralized file storage and sharing and
access to networked printers
10. Why might Windows 7 or Windows Vista require more
RAM or disk space than Windows Server 2008?
a. They need to accommodate handling centralized logon.
b. They include a directory service and a naming service.
c. They run many background networking services.
d. They support a graphics-intensive user interface.
Case Project 1: Networking Gadgets, Inc. currently employs
eight people but plans to hire 10 more in the next four months.
Users will work on multiple projects, and only those users
assigned to a project should have access to the project files.
12. You're instructed to set up the network to make it easy to
manage and back up yet still provide centralized storage for
project files. Would you choose a peer-to-peer network, a
server-based network, or a combination of both? Why?
E:HolmesHS2011TutorialsHS2011 Tutorial Activity Week
1.docx Page 5 of 2
Tutorial/Lab Activity 2 Page 1 of 6
HS1011 Data Communication and Networks 13 August
2015
HS1011 Data Communication and Networks 13 August
2015
HOLMES
INSTITUTE
FACULTY OF HIGHER
EDUCATION
HS1011 Data Communication and Networks
Tutorial/Lab Activity Week 04 Network Topologies and
Technologies
Hands-On Project 1: Determining and Changing Your Ethernet
Standard
Objective: Determine your Ethernet standard and change your
connection speed to use a different standard.
Required Tools/Equipment: Classroom computers connected to
a classroom hub or switch. The hub or switch and NICs must be
capable of connecting at multiple speeds. For example, if you're
using a 10/100 Mbps switch, and your NICs are capable of
10/100 Mbps, you change the connection speed to the slower
rate. If possible, each student should be assigned a separate
partner. Separate lab computers and a hub or switch can also be
used for this project.
13. Description: In this project, you view your network connection
properties to see at what speed your NIC is operating. Then you
send a large ping message and note how long the reply takes.
Next, you change the speed, if your NIC driver allows, and
perform the same ping to see whether you can detect a time
difference.
1. Open a command prompt window, and then type ipconfig and
press Enter. Exchange your IP address with your partner and
write down your partner's IP address. Leave the command
prompt window open for later.
_____________________________________________________
__________________________
2. Click the network connection icon in the taskbar and click
Open Network and Sharing Center.
3. In the Network and Sharing Center, click Local Area
Connection to open the Local Area Connection Status dialog
box (see Figure 1).
Figure 1: The Local Area Connection Status dialog box
4. In the Connection section, find the connection speed. Write
down this information and, based on the speed listed, the
Ethernet variety your computer is running:
Connection speed:
_____________________________________________________
__________________________
Ethernet variety:
_____________________________________________________
__________________________
5. At the command prompt, ping your partner by typing ping -l
60000 IPaddress and pressing Enter. The -l 60000 option in the
command specifies that the ping message should be 60000 bytes
14. instead of the typical length of 32 bytes. Note the time = values
in the ping replies and write them down. For example, yours
might say “time = 2ms,” meaning the reply took 2 milliseconds.
Not all times might be the same. Sometimes the first time is
slower than the rest. Try pinging a few times to get an idea of
the average time.
Ping reply times:
_____________________________________________________
__________________________
6. Click the Properties button, and in the Local Area Connection
Properties dialog box, click Configure.
7. Click the Advanced tab. In the Property list box, click Link
Speed & Duplex (or a similar name). Figure 3-15 shows the
connection options. Not all NICs have the same options, so you
might see different options.
8. The default setting is usually Auto Negotiation. Click 10
Mpbs Half Duplex if this option is available, and then click OK.
If you were able to set this option, what speed and variety of
Ethernet is your computer running now?
Connection speed:
_____________________________________________________
__________________________
Ethernet variety:
_____________________________________________________
__________________________
Figure 2: Settings for the Link Speed & Duplex property
9. After you and your partner have changed the connection
speed to a lower value, repeat the ping command you used in
Step 6. Write down the reply times, and state whether they were
15. different:
Ping reply times at 10 Mbps:
_____________________________________________________
________________________
10. Figure 3 shows two sets of ping results. The first result was
from two computers connected “Auto Negotiation mode”. The
average reply took <1 ms. The second result was with the same
computers connected at 10 Mbps half-duplex, and the average
reply took =1 ms. Change your connection speed and duplex
mode back to Auto Negotiation, and then close all open
windows. Leave your computer running for the next project.
Figure 3: Ping results at different connection speeds
Hands-On Project 2: Viewing an Ethernet Frame
Objective: Capture packets and examine details of the Ethernet
II frame format.
Required Tools/Equipment: Classroom computers connected to
a classroom hub or switch with Wireshark installed
Description: In this project, you capture some packets and then
examine the frame and protocol headers.
1. Use “Wireshark manual” to learn “how to use wireshark to
capture data” then ---
2. Start Wireshark and click Capture Options. In the Capture
Filter text box, type icmp, and then click Start.
3. Open a command prompt window, and then type ping
IPaddress ( IP address of your peer) and press Enter (replacing
IPaddress with the IP address of another student's computer or
another device on your network).
4. In Wireshark, click the Stop the running live capture toolbar
icon to stop the capture.
5. Click a packet summary in the top pane with ICMP listed in
the protocol field.
6. In the middle pane, click to expand the Ethernet II row. It
16. should look similar to Figure 4.
Figure 4: An Ethernet II frame in Wireshark
7. Notice the three fields in the Ethernet II frame: Destination,
Source, and Type. The Destination and Source fields are the
destination and source MAC addresses in the frame. In Figure 4,
you see Cisco before the destination address and Vmware before
the source address because Wireshark attempts to resolve the
NIC manufacturer coded in the MAC address's first six digits.
The full MAC address (without manufacturer name) is shown in
parentheses. The Type field has the value 0x800, which
indicates that the protocol in the frame is IP. Click to expand
the Internet Protocol row.
8. Under Internet Protocol, you see details of the IP header,
including the destination and source IP addresses. Click to
expand the Internet Control Message Protocol row to view
details of the ICMP protocol header. (You learn more about IP-
related protocols later stage of this subject.)
9. Click to expand the Data portion of the frame, and then click
the Data field to see the ICMP message data in hexadecimal in
the bottom pane. The right side of this pane shows the
translation from hexadecimal to ASCII (human-readable
characters); as you can see, it's just portions of the alphabet
repeated. Some Ping programs include more clever data, such as
“Hello, are you there?” The actual data in a ping message
doesn't matter; what matters is that the reply contains the same
data as the ping request.
10. Exit Wireshark and click Quit without Saving when
prompted. Close the command prompt window.
17. Hands-On Project 2: Designing a physical star topology using
Packet Tracer
Objective: Learning to design a physical network topology
Required Tools/Equipment: Packet tracer only
Description: In this project, you will design physical network
topologies.
1. Open Packet Tracer and design a physical star topology made
of 6 computers and show it to your tutor.
Tutorial/Lab Activity 3 Page 1 of 4
Tutorial/Lab Activity 3 Page 1 of 4
Tutorial/Lab Activity 4 Page 1 of 5
HS1011 Data Communication and Networks 13 August
2015
HS1011 Data Communication and Networks 13 August
2015
HOLMES
INSTITUTE
FACULTY OF HIGHER
EDUCATION
HS1011 Data Communication and Networks
Tutorial/Lab Activity Week 03 Network Hardware Essentials
PART I:
Hands-On Project 1: Recognize basic functionality of network
hardware
Objective: understanding network hardware using a simulated
network
Required Tools/Equipment: Packet Tracer and Lab2.pkt
Description: Identify and label network hardware and
understand their role in a simple network. Use of Trace Route
18. program (tracert.exe) to lists each router your packets must
travel through between your computer and the destination.
1. Download Lab2.pkt from Blackboard and open it using
packet tracer.
Figure 1: Sample network to identify hardware devices
2. Label all network hardware using appropriate name and write
two functionalities for each.
3. Double click on PC1, find out and write down the IP address
of it. Then double click on PC2 and open command prompt of it
and type “tracert IP address of PC1”. You will see a screenshot
similar to Figure 2. It shows how many routers the packet
passes through before it reaches to PC 1.
4. Now double click on the only router of the network diagram
and open CLI tab to execute commands below. Router>en
Router#sh run
By seeing the output, can you identify the number of interfaces
(port) the router has?
5. Furthermore, can you identify the IP addresses used in the
router interfaces?
Write down your findings for submission.
Hands-On Project 2: Trace Route program to see the travel path
of routers packets
Objective: Use the Trace Route program to see the routers
packets must travel through to get from your computer to a
destination on the Internet.
Required Tools/Equipment: Your classroom computer, Internet
access, and a valid DNS server; no other tools or equipment are
required
Description: The importance of routers is made clear when you
need to access servers on the Internet. The Trace Route program
19. (tracert.exe) lists each router your packets must travel through
between your computer and an Internet server.
1. Click Start, type cmd, and press Enter to open a command
prompt window.
2. Type tracert www.yahoo.com and press Enter. You should
see output that's similar to Figure 1, but the details will vary,
depending on your location and system’s restriction. In this
output, there are five columns of information. The first column
is just a count of how many routers the packet traversed. The
second, third, and fourth columns show the amount of time in
milliseconds (ms) the router took to respond. Three packets are
sent, so three times are listed. The last column is the router's IP
address or name and IP address.
Figure 1: Output of the Trace Route program
3. You can garner some information about the geography of the
path your packet took by looking at the router's name. For
example, in Figure 1, the domain name of the third router is
yc.edu, which is a router at Yavapai College in Prescott,
Arizona, where this book has been written. The fourth and fifth
routers have the domain name qwest.net, and the router's name
begins with “phn,” which tells you that the router is on Qwest's
network in Phoenix. You get the idea. However, looking up
router names can sometimes make the trace run slowly. To do
the same trace without looking up names, type tracert -
dwww.yahoo.comand press Enter. This time, you should see
only the IP address of each router.
4. Try using Trace Route to determine the path packets take to
other destinations.
Trybooks.tomsho.com, and for a destination on the East Coast,
trywww.course.com. For a destination in Germany,
20. trywww.kontron.de. If the trace repeatedly times out (indicated
by an asterisk, *, in the output), press Ctrl+C to stop the trace.
5. Close the command prompt window.
6. You can also find tools that show you the route on a map.
Start your Web browser, and go
towww.yougetsignal.com/tools/visual-tracert. In the Remote
Address text box, type any of the destinations in Step 4 or any
other address you like. This online tool attempts to map out the
path your packets take to get to their destination. Try to trace
your current IP by clicking “Use Current IP > Host Trace”. A
screenshot I shown in Figure 2 to help you.
Figure 2: A screen of the tool of trace route map
7. Exit your Web browser.
Tutorial/Lab Activity 2 Page 1 of 3
Tutorial/Lab Activity 2 Page 1 of 3
Tutorial/Lab Activity 3 Page 4 of 4
HOLMES
INSTITUTE
FACULTY OF HIGHER
EDUCATION
HS1011 Data Communication and Networks
Tutorial/Lab Activity Week 05 Network Media
Case Project 1: During the design of most real-world networks,
you'll discover that using more than one type of networking
medium is common. The usual reasons for needing more than
one type of medium include the following:
21. · Two or more areas must be interconnected, and the distance
separating them is greater than the maximum segment length for
the type of medium used in (or best suited for) each area.
· A connection must pass through a high-interference
environment (across some large transformers, near heavy-duty
electrical motors, and so on). Failure to use a different type of
medium increases the risk of impeding data flow. This reason is
especially common for choosing fiber-optic cable or wireless in
many networks, particularly when connecting floors in an office
building and the only available pathway is the elevator shaft.
· Certain parts of an internetwork might have to carry more
traffic than other parts. Typically, the segment where traffic
aggregates is the backbone, a common cable segment that
interconnects subsidiary networks. (Think of a tree trunk as the
backbone and its major branches as cable segments.) Often, a
higher-capacity cable is used for a backbone (for example,
fiber-optic cable or Cat 6 cable rated for Gigabit Ethernet),
along with a higher-speed networking technology for
attachments to the backbone. This arrangement means outlying
segments might use conventional 10 or 100 Mbps Ethernet, and
the backbone uses 1 Gbps or 10 Gbps Ethernet.
Using this information, suggest solutions that involve at least
two types, if possible, of networking media to address the
following problems:
1. XYZ Corp. is planning a new network. Engineers in the
design shop must have connections to accountants and
salespeople in the front office, but all routes between the two
areas must traverse the shop floor, where arc welders and metal-
stamping equipment create potent amounts of EMI and RFI.
Given that both the design shop and front office use 10BaseT
(twisted-pair Ethernet), how might you interconnect these two
areas? What medium guarantees immunity from interference?
2. After the front-office network at XYZ Corp. is set up, an
accountant realizes that if the loading dock connected to the
network, dock workers could log incoming and outgoing
shipments and keep the inventory more current. Even though the
22. loading dock is nowhere near the shop floor, the dock is 1100
feet from the front office. What kinds of cable will work to
make this connection? What kind would you choose and why?
3. ABC Company occupies three floors in a 10-story building,
where the elevator shaft provides the only path to all three
floors. In addition, users on the ninth and tenth floors must
access a collection of servers on the eighth floor. Explain what
kind of connections would work in the elevator shaft. If more
than one choice is possible, pick the best option and explain the
reasons for your choice. Assuming that inter floor connections
might someday need to run at much higher speeds, re-evaluate
your choice. What's the best type of medium for open ended
bandwidth needs? Explain your answer.
4. Very Big ISP (VBISP) Corporation wants to increase the
bandwidth it can access at its downtown location in New York
City. The distance between locations is about 20 miles, and the
bandwidth needed between locations is at least 50 Mbps. What
media types could work to provide this connection?
5. Following a year of major sales increases in the Pacific Rim,
MarTexCo decides to open a second plant in Malaysia. The
company wants the new plant to be able to access the
headquarters database in Des Moines, Iowa, in real time, but
long-haul telephone connections aren't possible, owing to the
lack of communications infrastructure at the Malaysia location.
What kind of wireless networking alternative makes the most
sense when considering network links that span an appreciable
portion of the globe? Explain why laying cable might not be
feasible.
Case Project 2: TVBCA has just occupied a historic building in
downtown Pittsburgh in which 15 employees will work. Because
of codes for historic buildings, TVBCA isn't permitted to run
cables inside walls or ceilings.
Required result: Employees must be able to share files and
printers, as in a typical LAN environment, without using cables.
Optional desired results: Employees must be able to use their
23. laptops and move freely throughout the office while maintaining
a network connection. Because of the size of some computer-
aided design (CAD) files employees use frequently, data
transfer speeds should be more than 20 Mbps. Proposed
solution: Install an 802.11n wireless access point and configure
each computer and laptop with a wireless network card. Which
of the following results does the proposed solution deliver?
Explain your answer.
a. The proposed solution delivers the required result and both
optional desired results.
b. The proposed solution delivers the required result and only
one of the two optional desired results.
c. The proposed solution delivers the required result but neither
optional desired result.
d. The proposed solution does not deliver the required result.