For more course tutorials visit
www.tutorialrank.com
Chapter 1-Questions
1-3: Discuss the relationship between network architecture and protocol
1-5: Define the following terms: protocol, connection-orientated protocols, connectionless protocols, and protocol stacks.
1-11: Briefly describe the seven layers of the OSI protocol hierarchy
1. ECET 375 Week 1 Homework
For more course tutorials visit
www.tutorialrank.com
Chapter 1-Questions
1-3: Discuss the relationship between network architecture and protocol
1-5: Define the following terms: protocol, connection-orientated
protocols, connectionless protocols, and protocol stacks.
1-11: Briefly describe the seven layers of the OSI protocol hierarchy
1-21: List and briefly describe the five basic data communications
network topologies
1-23: Briefly describe the TCP/IP protocol model
Chapter 3-Questions
3-1: In which layer of the OSI protocol hierarchy is the transmission
medium found?
3-2: What are the two general categories of transmission media?
3-3: Define transmission line.
3-4: Describe a transverse electromagnetic wave.
2. Chapter 3-Problems
3-1: Determine the wavelengths for the electromagnetic waves in free
space with the following frequencies: 1 kHz, 100 kHz, 1 MHz, and 1
GHz
3-2: Determine the wavelengths for the electromagnetic waves in free
space with the following frequencies: 1 cm, 1 m, 10 m, and 1000 m.
3-3: Determine the characteristic for a two-wire parallel transmission
line with an air dielectric and D/r ratio of 8.8.
3-5: Determine the characteristic impedance for a coaxial cable with
inductance L = 0.2 microHenrys/foot and capacitance C=16
picoFarads/foot.
Chapter 4 Problems
4-1: Determine the wavelengths in nanometers, angstroms, and
micrometers for the following frequencies: 3.45 * 1014 Hz, 3.62 *
1014 Hz, 3.21 * 1014 Hz
4-2: Determine the light frequency for the following wavelengths: 670
nm, 7800 angstroms, and 710 nm.
===============================================
ECET 375 Week 1 iLabExploring Internet Standards RS
232 Communication and Connectors
3. For more course tutorials visit
www.tutorialrank.com
Objective:
In this lab you will explore:
a)Internet RFCs
b)RS-232 Communication data format
c)Cables and Connectors
ECET 375 Week 1 iLab Exploring Internet Standards, RS-232
Communication, and Connectors
Objectives:
During lab we explored Internet RFCs, RS-232 Communication data
format and Cables and Connectors
Results:
This lab was basically a research project to help us understand how the
Internet Standards are created and how to pick the correct interface
material that meets the requirements of any interface. Some of the topics
were also refresher information from other ECET classes like the ASCII
wave forms.
Conclusions:
4. After you design a system it’s critical to use the correct interface
mediums and material types that meet your requirements. Picking
materials that cover data rate or frequency values beyond your
requirement will have an adverse cost effect on your final design.
Keeping up with technology and standards is important in engineering.
Before you pick materials for your design, complete your research to
insure you take advantage of standards and material types that meet your
requirements but do not exceed them. Balance the quality of these
materials with your projects budget and you’ll be successful.
===============================================
ECET 375 Week 2 Homework
For more course tutorials visit
www.tutorialrank.com
Chapter 2: 10, 11, 12, 16, 17
Chapter 5: 1, 2, 5, 8
Chapter 6: 3, 5
Chapter 13: 2, 5, 7, 12, 13, 19
5. ===============================================
ECET 375 Week 2 iLab Calculating Spectrum and Linear
Filtering in MatLab
For more course tutorials visit
www.tutorialrank.com
ECET 375 Week 2 iLab Calculating Spectrum and Linear Filtering in
MatLab
Objectives
This lab is intended to explore signal spectrums and filtering operations
using MatLab. Running pre-written MatLab scripts and altering these
codes to perform specific tasks will be necessary to develop the
appropriate displays. Calculation of a signal spectrum using the
SigSpec.m file, and altering this file to display different types of signals
including Cosine, AM, and Square waves will help to explore signal
characteristics and display MatLab functionality. Using a second per-
written file (LinFiltering.m) and MatLab, displaying how filtering can
affect a signal, will be used to describe this process and how the
resulting signal changes.
Results
6. During the exploration of this lab, the MatLab program was used to run
specific functions containing the code necessary for appropriate signal
plotting. These plots were created for the cosine, the AM, the square
wave, using random information and breaking down a sound file (.wav).
For each of these signals a MatLab plot was acquired, and used for
analysis. Additionally, running the LinFiltering.m file in MatLab
allowed the explanation of filtering to be shown in a plot. These plots
were created for both the time and frequency domain, and successfully
showed how a filter can help contain a signal.
Conclusions
After the completion of this lab, the concepts included are starting to
make more sense. Realizing how powerful MatLab can be, and the
functions accomplished by it are astounding. Creating the signal plots,
being able to visually see the intended signals and then manipulating
these signals is a real asset in the learning process. Each signal has its
own characteristics and these characterstics can be contained, soften the
edges, by using different filtering techniques. These filters can help
remove unneeded data, showing the true signal behind it.
===============================================
ECET 375 Week 3 Homework
For more course tutorials visit
www.tutorialrank.com
7. ECET 375 Week 3 Homework
===============================================
ECET 375 Week 3 iLab Exploring A Digital Transmission
System
For more course tutorials visit
www.tutorialrank.com
ECET 375 Week 3 iLab Exploring A Digital Transmission System
===============================================
ECET 375 Week 4 Homework
For more course tutorials visit
www.tutorialrank.com
8. Chapter 16
16.2 - What is meant by a primary station? A secondary station?
16.6 – Briefly describe the poll/select line discipline.
16.8 – Briefly describe the sliding window method of flow control.
16.9 – What is the difference between character- and bit oriented
protocols?
===============================================
ECET 375 Week 4 iLab Exploring Internet Protocol
Hierarchy and the Ethernet Layer
For more course tutorials visit
www.tutorialrank.com
ECET 375 Week 4 iLab Exploring Internet Protocol Hierarchy and the
Ethernet Layer
Objective:
9. In this lab, you will explore
a)Internet Protocol Hierarchy
b)ARP protocol and Ethernet Layer operation
Required Equipment:
A PC with Wireshark program installed
Following file: ecet-375WebBrowsing.pcap
Observations:
The captured data was analyzed using Wireshark. This data was
compiled into lists and used to populate data tables.
Conclusion:
The information and techniques are well documented. The lab went as
well as expected. The Wireshark program leaves off the SFD and FCS
from the packet data, otherwise everything went well and as expected.
===============================================
ECET 375 Week 5 Homework
For more course tutorials visit
10. www.tutorialrank.com
Chapter 18:
2) Determine the contents of the length field for MAC frame for the
following conditions:
3) An Ethernet address of 07-01-02-03-04-05 iswhat type of address?
===============================================
ECET 375 Week 5 iLab Exploring Internet Protocol
Hierarchy and the Ethernet Layer
For more course tutorials visit
www.tutorialrank.com
Objectives: This lab was the exploration of the DHCP protocol operation
and the IP protocol operation using Wireshark and two .PCAP captured
files.
11. Results: The results showed that the DHCP was easy to follow in how it
configured the client for a temporary IP address, along with a lease time,
and also provided header information. The IP protocol provided details
of messages sent such as fragment information and how many bytes per
fragment.
Conclusions:.Wireshark is designed in such a way that makes following
the messages and server feedback readable and easy for troubleshooting.
Although we did no troubleshooting in this lab, the concept is
observable as we studied the details of each packet
===============================================
ECET 375 Week 6 Homework
For more course tutorials visit
www.tutorialrank.com
Chapter 20-Questions
Pg-652-654
20-1: What is the primary purpose of using subnetting?
12. 20-2: List and describe several reasons why network designers create
subnetting.
20-3: Explain the differences between default masksandsubnet masks.
20-7: Explain the reasons for using supernetting.
Chapter 20-Problems
20-1: What is the default mask for the network address 139.100.0.0?
a.255.0.0.0
b.255.255.255.0
c.255.255.0.0
d.255.255.255.255
20-2: Using the default mask, how many hosts can the classful network
109.0.0.0 support?
20-7: How many hosts can be supported on a classful class B network
with the following subnetmask: 255.255.224.0?
20-9: You have a host IP address of 40.150.73.10 and a subnet mask
255.248.0.0:
20-15: Determine the subnet addresses and subnet masks for a business
network with the classful class C address 204.238.7.0 with six
departments having separate subnetworks with the following numbers of
hosts:
20-23: A small business has been assigned a classless network address
210.38.4.0.
13. 20-24: Determine the following for the network specified in problem 20-
23:
Chapter 21-Questions
Pg-700-702
21-3: What is the primary purpose of the address resolution protocol
(ARP)?
Chapter 21-Problems
21-3: Determine the contents of the first byte of an IP header if the IP
protocol is IPv4 and the header has 40 bytes of options.
21-6: Determine the length of an ICMP data field for Ethernet frame that
is carrying an IP datagram with a 28-byte header and an eight-byte
ICMP header and the Ethernet data field is 600 bytes long.
21-7: Use the following network analyzer display of an ARP packet to
answer the following questions:
0000 00 07 08 00 06 04 00 02 00 00 BD 41 2A 1C C1 98
0010 A0 14 00 00 40 A3 B1 CC C1 98 0F 10
21-8: Use the following network analyzer display of an IP packet to
answer the following questions:
0000 45 28 13 82 01 A2 21 34 F3 01 43 A1 C0 99 4A 01
0010 99 4A 0C -- -- -- -- -- -- -- -- -- -- -- -- --
14. 21-11: A maximum-length data gram carrying 65,536 bytes can be
transported over a WAN with a maximum packet length of 292 bytes,
which includes the 20-byte IP header. Determine…
===============================================
ECET 375 Week 6 iLab Exploring Internet Protocol
Hierarchy and Ethernet Layers
For more course tutorials visit
www.tutorialrank.com
Objectives
The purpose of these lab procedures is to visually see how the Ping and
Traceroute Applications work. This will be done using WireShark and a
precaptured file “ecet-375RemotePingTracert.pcap”. The use of IP and
ICMP protocols in diagnostic testing will be accomplished by writing
the command in the DOS Prompt and captured in the WireShark
program (already done for us). This file will be analyzed, depicting
which packets do what and the time taken between specific packets.
Results
15. During the exploration of this lab, the WireShark program was used to
analyze a pre-captured internet session. Examining the “Ping”
ofwww.iana.org is the basis of the first procedure. Determining which
packets are DNS query’s and which packets are DNS responses as well
as the actual IP address for this link is accomplished in the first few
steps. With the ICMP protocol, knowing that there are four requests and
four echo responses, these packets are found and documented.
Additionally, the times between request and reply are found and
recorded with the help of the “Set Time Reference (Toggle)” within the
WireShark program.
The next procedure, Traceroute, also deals with a Dos command of
“tracert” and is done on the same address of www.iana.org . The packets
that take care of the DNS query for an IP address for the site are
discovered and documented, as well as the number of HOPs performed
on the investigated trace. Similar to the “Ping” procedure, the time
between the requests and the error responses are discovered using the
“Set Time Reference (Toggle)” with 3 requests and responses per HOP.
Conclusions
After completing this lab and seeing how these investigative tools can
help in the diagnostic of a communication network, it is realized the
importance of applications like these. In my profession I have used the
“PING” command to see if a specific computer in the domain is “alive”
and communicating. The Traceroute command is new and can be just as
useful. Using the Traceroute application to ensure communications
through all routers and switches is occurring and in a timely fashion can
prove to be very useful in discovering issues to come.
===============================================
16. ECET 375 Week 7 Homework
For more course tutorials visit
www.tutorialrank.com
ECET 375 Week 7 Homework
===============================================
ECET 375 Week 7 iLab Exploring TCP UDP
Communication in the Internet
For more course tutorials visit
www.tutorialrank.com
Discussion:
TCP (Transport Control Protocol) and UDP (User Datagram Protocol)
operate at the Transport layer of the Internet Protocol Hierarchy. They
deliver information between Internet applications. To identify the
applications running on a host, Internet transport layer uses port
17. numbers, each a sixteen-bit number expressed as a decimal number (e.g.
80). Each host interface on the Internet is uniquely identified by an IP
address, a 32-bit number usually expressed in dotted decimal notation
(e.g.192.168.1.45). TCP and UDP combine data from multiple
applications into a single outgoing connection at a source host. This
process is called multiplexing. These protocols, at a destination host,
separate data arriving at an incoming connection destined for different
applications. This process is called demultiplexing. TCP is connection
oriented and has many other features geared towards providing reliable
communication, flow control and congestion control. UDP is
connectionless and does not have these features.
In this lab, you will analyze pre-captured Wireshark files to explore
features of TCP and UDP protocols and their differences.
===============================================