SlideShare a Scribd company logo
1 of 15
ECET 375 Week 1 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 1-Questions
1-3: Discuss the relationship between network architecture and
protocol
1-5: Define the following terms: protocol, connection-orientated
protocols, connectionless protocols, and protocol stacks.
1-11: Briefly describe the seven layers of the OSI protocol hierarchy
1-21: List and briefly describe the five basic data communications
network topologies
1-23: Briefly describe the TCP/IP protocol model
Chapter 3-Questions
3-1: In which layer of the OSI protocol hierarchy is the transmission
medium found?
3-2: What are the two general categories of transmission media?
3-3: Define transmission line.
3-4: Describe a transverse electromagnetic wave.
Chapter 3-Problems
3-1: Determine the wavelengths for the electromagnetic waves in free
space with the following frequencies: 1 kHz, 100 kHz, 1 MHz, and 1
GHz
3-2: Determine the wavelengths for the electromagnetic waves in free
space with the following frequencies: 1 cm, 1 m, 10 m, and 1000 m.
3-3: Determine the characteristic for a two-wire parallel transmission
line with an air dielectric and D/r ratio of 8.8.
3-5: Determine the characteristic impedance for a coaxial cable with
inductance L = 0.2 microHenrys/foot and capacitance C=16
picoFarads/foot.
Chapter 4 Problems
4-1: Determine the wavelengths in nanometers, angstroms, and
micrometers for the following frequencies: 3.45 * 1014 Hz, 3.62 *
1014 Hz, 3.21 * 1014 Hz
4-2: Determine the light frequency for the following wavelengths: 670
nm, 7800 angstroms, and 710 nm.
===============================================
ECET 375 Week 1 iLabExploring Internet Standards RS 232
Communication and Connectors
For more course tutorials visit
www.newtonhelp.com
Objective:
In this lab you will explore:
a)Internet RFCs
b)RS-232 Communication data format
c)Cables and Connectors
ECET 375 Week 1 iLab Exploring Internet Standards, RS-232
Communication, and Connectors
Objectives:
During lab we explored Internet RFCs, RS-232 Communication data
format and Cables and Connectors
Results:
This lab was basically a research project to help us understand how
the Internet Standards are created and how to pick the correct
interface material that meets the requirements of any interface. Some
of the topics were also refresher information from other ECET classes
like the ASCII wave forms.
Conclusions:
After you design a system it’s critical to use the correct interface
mediums and material types that meet your requirements. Picking
materials that cover data rate or frequency values beyond your
requirement will have an adverse cost effect on your final design.
Keeping up with technology and standards is important in
engineering. Before you pick materials for your design, complete your
research to insure you take advantage of standards and material types
that meet your requirements but do not exceed them. Balance the
quality of these materials with your projects budget and you’ll be
successful.
===============================================
ECET 375 Week 2 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 2: 10, 11, 12, 16, 17
Chapter 5: 1, 2, 5, 8
Chapter 6: 3, 5
Chapter 13: 2, 5, 7, 12, 13, 19
===============================================
ECET 375 Week 2 iLab Calculating Spectrum and Linear
Filtering in MatLab
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 2 iLab Calculating Spectrum and Linear Filtering in
MatLab
Objectives
This lab is intended to explore signal spectrums and filtering
operations using MatLab. Running pre-written MatLab scripts and
altering these codes to perform specific tasks will be necessary to
develop the appropriate displays. Calculation of a signal spectrum
using the SigSpec.m file, and altering this file to display different
types of signals including Cosine, AM, and Square waves will help to
explore signal characteristics and display MatLab functionality. Using
a second per-written file (LinFiltering.m) and MatLab, displaying
how filtering can affect a signal, will be used to describe this process
and how the resulting signal changes.
Results
During the exploration of this lab, the MatLab program was used to
run specific functions containing the code necessary for appropriate
signal plotting. These plots were created for the cosine, the AM, the
square wave, using random information and breaking down a sound
file (.wav). For each of these signals a MatLab plot was acquired, and
used for analysis. Additionally, running the LinFiltering.m file in
MatLab allowed the explanation of filtering to be shown in a plot.
These plots were created for both the time and frequency domain, and
successfully showed how a filter can help contain a signal.
Conclusions
After the completion of this lab, the concepts included are starting to
make more sense. Realizing how powerful MatLab can be, and the
functions accomplished by it are astounding. Creating the signal plots,
being able to visually see the intended signals and then manipulating
these signals is a real asset in the learning process. Each signal has its
own characteristics and these characterstics can be contained, soften
the edges, by using different filtering techniques. These filters can
help remove unneeded data, showing the true signal behind it.
===============================================
ECET 375 Week 3 Homework
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 3 Homework
===============================================
ECET 375 Week 3 iLab Exploring A Digital Transmission
System
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 3 iLab Exploring A Digital Transmission System
===============================================
ECET 375 Week 4 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 16
16.2 - What is meant by a primary station? A secondary station?
16.6 – Briefly describe the poll/select line discipline.
16.8 – Briefly describe the sliding window method of flow control.
16.9 – What is the difference between character- and bit oriented
protocols?
===============================================
ECET 375 Week 4 iLab Exploring Internet Protocol
Hierarchy and the Ethernet Layer
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 4 iLab Exploring Internet Protocol Hierarchy and
the Ethernet Layer
Objective:
In this lab, you will explore
a)Internet Protocol Hierarchy
b)ARP protocol and Ethernet Layer operation
Required Equipment:
A PC with Wireshark program installed
Following file: ecet-375WebBrowsing.pcap
Observations:
The captured data was analyzed using Wireshark. This data was
compiled into lists and used to populate data tables.
Conclusion:
The information and techniques are well documented. The lab went as
well as expected. The Wireshark program leaves off the SFD and FCS
from the packet data, otherwise everything went well and as expected.
===============================================
ECET 375 Week 5 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 18:
2) Determine the contents of the length field for MAC frame for the
following conditions:
3) An Ethernet address of 07-01-02-03-04-05 iswhat type of address?
===============================================
ECET 375 Week 5 iLab Exploring Internet Protocol
Hierarchy and the Ethernet Layer
For more course tutorials visit
www.newtonhelp.com
Objectives: This lab was the exploration of the DHCP protocol
operation and the IP protocol operation using Wireshark and two
.PCAP captured files.
Results: The results showed that the DHCP was easy to follow in how
it configured the client for a temporary IP address, along with a lease
time, and also provided header information. The IP protocol provided
details of messages sent such as fragment information and how many
bytes per fragment.
Conclusions:.Wireshark is designed in such a way that makes
following the messages and server feedback readable and easy for
troubleshooting. Although we did no troubleshooting in this lab, the
concept is observable as we studied the details of each packet
===============================================
ECET 375 Week 6 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 20-Questions
Pg-652-654
20-1: What is the primary purpose of using subnetting?
20-2: List and describe several reasons why network designers create
subnetting.
20-3: Explain the differences between default masksandsubnet masks.
20-7: Explain the reasons for using supernetting.
Chapter 20-Problems
20-1: What is the default mask for the network address 139.100.0.0?
a.255.0.0.0
b.255.255.255.0
c.255.255.0.0
d.255.255.255.255
20-2: Using the default mask, how many hosts can the classful
network 109.0.0.0 support?
20-7: How many hosts can be supported on a classful class B network
with the following subnetmask: 255.255.224.0?
20-9: You have a host IP address of 40.150.73.10 and a subnet mask
255.248.0.0:
20-15: Determine the subnet addresses and subnet masks for a
business network with the classful class C address 204.238.7.0 with
six departments having separate subnetworks with the following
numbers of hosts:
20-23: A small business has been assigned a classless network
address 210.38.4.0.
20-24: Determine the following for the network specified in problem
20-23:
Chapter 21-Questions
Pg-700-702
21-3: What is the primary purpose of the address resolution protocol
(ARP)?
Chapter 21-Problems
21-3: Determine the contents of the first byte of an IP header if the IP
protocol is IPv4 and the header has 40 bytes of options.
21-6: Determine the length of an ICMP data field for Ethernet frame
that is carrying an IP datagram with a 28-byte header and an eight-
byte ICMP header and the Ethernet data field is 600 bytes long.
21-7: Use the following network analyzer display of an ARP packet to
answer the following questions:
0000 00 07 08 00 06 04 00 02 00 00 BD 41 2A 1C C1 98
0010 A0 14 00 00 40 A3 B1 CC C1 98 0F 10
21-8: Use the following network analyzer display of an IP packet to
answer the following questions:
0000 45 28 13 82 01 A2 21 34 F3 01 43 A1 C0 99 4A 01
0010 99 4A 0C -- -- -- -- -- -- -- -- -- -- -- -- --
21-11: A maximum-length data gram carrying 65,536 bytes can be
transported over a WAN with a maximum packet length of 292 bytes,
which includes the 20-byte IP header. Determine…
===============================================
ECET 375 Week 6 iLab Exploring Internet Protocol
Hierarchy and Ethernet Layers
For more course tutorials visit
www.newtonhelp.com
Objectives
The purpose of these lab procedures is to visually see how the Ping
and Traceroute Applications work. This will be done using WireShark
and a precaptured file “ecet-375RemotePingTracert.pcap”. The use of
IP and ICMP protocols in diagnostic testing will be accomplished by
writing the command in the DOS Prompt and captured in the
WireShark program (already done for us). This file will be analyzed,
depicting which packets do what and the time taken between specific
packets.
Results
During the exploration of this lab, the WireShark program was used
to analyze a pre-captured internet session. Examining the “Ping”
ofwww.iana.org is the basis of the first procedure. Determining which
packets are DNS query’s and which packets are DNS responses as
well as the actual IP address for this link is accomplished in the first
few steps. With the ICMP protocol, knowing that there are four
requests and four echo responses, these packets are found and
documented. Additionally, the times between request and reply are
found and recorded with the help of the “Set Time Reference
(Toggle)” within the WireShark program.
The next procedure, Traceroute, also deals with a Dos command of
“tracert” and is done on the same address of www.iana.org . The
packets that take care of the DNS query for an IP address for the site
are discovered and documented, as well as the number of HOPs
performed on the investigated trace. Similar to the “Ping” procedure,
the time between the requests and the error responses are discovered
using the “Set Time Reference (Toggle)” with 3 requests and
responses per HOP.
Conclusions
After completing this lab and seeing how these investigative tools can
help in the diagnostic of a communication network, it is realized the
importance of applications like these. In my profession I have used
the “PING” command to see if a specific computer in the domain is
“alive” and communicating. The Traceroute command is new and can
be just as useful. Using the Traceroute application to ensure
communications through all routers and switches is occurring and in a
timely fashion can prove to be very useful in discovering issues to
come.
===============================================
ECET 375 Week 7 Homework
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 7 Homework
===============================================
ECET 375 Week 7 iLab Exploring TCP UDP Communication
in the Internet
For more course tutorials visit
www.newtonhelp.com
Discussion:
TCP (Transport Control Protocol) and UDP (User Datagram Protocol)
operate at the Transport layer of the Internet Protocol Hierarchy. They
deliver information between Internet applications. To identify the
applications running on a host, Internet transport layer uses port
numbers, each a sixteen-bit number expressed as a decimal number
(e.g. 80). Each host interface on the Internet is uniquely identified by
an IP address, a 32-bit number usually expressed in dotted decimal
notation (e.g.192.168.1.45). TCP and UDP combine data from
multiple applications into a single outgoing connection at a source
host. This process is called multiplexing. These protocols, at a
destination host, separate data arriving at an incoming connection
destined for different applications. This process is called
demultiplexing. TCP is connection oriented and has many other
features geared towards providing reliable communication, flow
control and congestion control. UDP is connectionless and does not
have these features.
In this lab, you will analyze pre-captured Wireshark files to explore
features of TCP and UDP protocols and their differences.

More Related Content

What's hot

02 Network Models(강의용)
02 Network Models(강의용)02 Network Models(강의용)
02 Network Models(강의용)
guestafa80f
 
Network layer Part 3
Network layer Part 3Network layer Part 3
Network layer Part 3
Tutun Juhana
 
Network Models
Network ModelsNetwork Models
Network Models
TechiNerd
 
A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network Topologies
Matthew Wolff
 

What's hot (20)

Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
 
Network Design for a Small & Medium Enterprise
Network Design for a Small & Medium EnterpriseNetwork Design for a Small & Medium Enterprise
Network Design for a Small & Medium Enterprise
 
Computer Network Lab
Computer Network LabComputer Network Lab
Computer Network Lab
 
Mumbai University BE IT Sem 3 Syllabus
Mumbai University BE IT Sem 3 SyllabusMumbai University BE IT Sem 3 Syllabus
Mumbai University BE IT Sem 3 Syllabus
 
Network Design For Alliance Française de Dhaka
Network Design For Alliance Française de DhakaNetwork Design For Alliance Française de Dhaka
Network Design For Alliance Française de Dhaka
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
 
NTC 362 Massive Success / snaptutorial.com
NTC 362 Massive Success / snaptutorial.comNTC 362 Massive Success / snaptutorial.com
NTC 362 Massive Success / snaptutorial.com
 
C n practical file
C n practical fileC n practical file
C n practical file
 
02 Network Models(강의용)
02 Network Models(강의용)02 Network Models(강의용)
02 Network Models(강의용)
 
1.mesh
1.mesh1.mesh
1.mesh
 
Network layer Part 3
Network layer Part 3Network layer Part 3
Network layer Part 3
 
Computer Network Lab
Computer Network LabComputer Network Lab
Computer Network Lab
 
Chap 03
Chap 03Chap 03
Chap 03
 
Network Models
Network ModelsNetwork Models
Network Models
 
Final project report
Final project reportFinal project report
Final project report
 
Lab room topology design with dns server
Lab room topology design with dns serverLab room topology design with dns server
Lab room topology design with dns server
 
A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network Topologies
 
Computer Networks Lab
Computer Networks LabComputer Networks Lab
Computer Networks Lab
 
Application-Aware Acceleration for Wireless Data Networks: Design Elements an...
Application-Aware Acceleration for Wireless Data Networks: Design Elements an...Application-Aware Acceleration for Wireless Data Networks: Design Elements an...
Application-Aware Acceleration for Wireless Data Networks: Design Elements an...
 
Summarizing Software API Usage Examples Using Clustering Techniques
Summarizing Software API Usage Examples Using Clustering TechniquesSummarizing Software API Usage Examples Using Clustering Techniques
Summarizing Software API Usage Examples Using Clustering Techniques
 

Similar to ECET 375 Invent Yourself/newtonhelp.com

The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
dohertyjoetta
 

Similar to ECET 375 Invent Yourself/newtonhelp.com (20)

ECET 375 Entire Course NEW
ECET 375 Entire Course NEWECET 375 Entire Course NEW
ECET 375 Entire Course NEW
 
Ecet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comEcet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.com
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguide
 
NTC 362 Massive Success / snaptutorial...com
NTC 362 Massive Success / snaptutorial...comNTC 362 Massive Success / snaptutorial...com
NTC 362 Massive Success / snaptutorial...com
 
files_1575611773_2100523175.pdf
files_1575611773_2100523175.pdffiles_1575611773_2100523175.pdf
files_1575611773_2100523175.pdf
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
Mis 589 Success Begins / snaptutorial.com
Mis 589  Success Begins / snaptutorial.comMis 589  Success Begins / snaptutorial.com
Mis 589 Success Begins / snaptutorial.com
 
Mis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comMis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.com
 
Group_1__Assignment_Case_Study_.pdf.pdf
Group_1__Assignment_Case_Study_.pdf.pdfGroup_1__Assignment_Case_Study_.pdf.pdf
Group_1__Assignment_Case_Study_.pdf.pdf
 
ECET 380 Success Begins/Newtonhelp.com
ECET 380 Success Begins/Newtonhelp.comECET 380 Success Begins/Newtonhelp.com
ECET 380 Success Begins/Newtonhelp.com
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorial
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Significance
SignificanceSignificance
Significance
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
 
CN_lecture1.ppt
CN_lecture1.pptCN_lecture1.ppt
CN_lecture1.ppt
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

ECET 375 Invent Yourself/newtonhelp.com

  • 1. ECET 375 Week 1 Homework For more course tutorials visit www.newtonhelp.com Chapter 1-Questions 1-3: Discuss the relationship between network architecture and protocol 1-5: Define the following terms: protocol, connection-orientated protocols, connectionless protocols, and protocol stacks. 1-11: Briefly describe the seven layers of the OSI protocol hierarchy 1-21: List and briefly describe the five basic data communications network topologies 1-23: Briefly describe the TCP/IP protocol model Chapter 3-Questions 3-1: In which layer of the OSI protocol hierarchy is the transmission medium found?
  • 2. 3-2: What are the two general categories of transmission media? 3-3: Define transmission line. 3-4: Describe a transverse electromagnetic wave. Chapter 3-Problems 3-1: Determine the wavelengths for the electromagnetic waves in free space with the following frequencies: 1 kHz, 100 kHz, 1 MHz, and 1 GHz 3-2: Determine the wavelengths for the electromagnetic waves in free space with the following frequencies: 1 cm, 1 m, 10 m, and 1000 m. 3-3: Determine the characteristic for a two-wire parallel transmission line with an air dielectric and D/r ratio of 8.8. 3-5: Determine the characteristic impedance for a coaxial cable with inductance L = 0.2 microHenrys/foot and capacitance C=16 picoFarads/foot. Chapter 4 Problems
  • 3. 4-1: Determine the wavelengths in nanometers, angstroms, and micrometers for the following frequencies: 3.45 * 1014 Hz, 3.62 * 1014 Hz, 3.21 * 1014 Hz 4-2: Determine the light frequency for the following wavelengths: 670 nm, 7800 angstroms, and 710 nm. =============================================== ECET 375 Week 1 iLabExploring Internet Standards RS 232 Communication and Connectors For more course tutorials visit www.newtonhelp.com Objective: In this lab you will explore: a)Internet RFCs b)RS-232 Communication data format c)Cables and Connectors
  • 4. ECET 375 Week 1 iLab Exploring Internet Standards, RS-232 Communication, and Connectors Objectives: During lab we explored Internet RFCs, RS-232 Communication data format and Cables and Connectors Results: This lab was basically a research project to help us understand how the Internet Standards are created and how to pick the correct interface material that meets the requirements of any interface. Some of the topics were also refresher information from other ECET classes like the ASCII wave forms. Conclusions: After you design a system it’s critical to use the correct interface mediums and material types that meet your requirements. Picking materials that cover data rate or frequency values beyond your requirement will have an adverse cost effect on your final design. Keeping up with technology and standards is important in engineering. Before you pick materials for your design, complete your research to insure you take advantage of standards and material types that meet your requirements but do not exceed them. Balance the quality of these materials with your projects budget and you’ll be successful. =============================================== ECET 375 Week 2 Homework
  • 5. For more course tutorials visit www.newtonhelp.com Chapter 2: 10, 11, 12, 16, 17 Chapter 5: 1, 2, 5, 8 Chapter 6: 3, 5 Chapter 13: 2, 5, 7, 12, 13, 19 =============================================== ECET 375 Week 2 iLab Calculating Spectrum and Linear Filtering in MatLab For more course tutorials visit www.newtonhelp.com ECET 375 Week 2 iLab Calculating Spectrum and Linear Filtering in MatLab Objectives This lab is intended to explore signal spectrums and filtering operations using MatLab. Running pre-written MatLab scripts and altering these codes to perform specific tasks will be necessary to develop the appropriate displays. Calculation of a signal spectrum using the SigSpec.m file, and altering this file to display different
  • 6. types of signals including Cosine, AM, and Square waves will help to explore signal characteristics and display MatLab functionality. Using a second per-written file (LinFiltering.m) and MatLab, displaying how filtering can affect a signal, will be used to describe this process and how the resulting signal changes. Results During the exploration of this lab, the MatLab program was used to run specific functions containing the code necessary for appropriate signal plotting. These plots were created for the cosine, the AM, the square wave, using random information and breaking down a sound file (.wav). For each of these signals a MatLab plot was acquired, and used for analysis. Additionally, running the LinFiltering.m file in MatLab allowed the explanation of filtering to be shown in a plot. These plots were created for both the time and frequency domain, and successfully showed how a filter can help contain a signal. Conclusions After the completion of this lab, the concepts included are starting to make more sense. Realizing how powerful MatLab can be, and the functions accomplished by it are astounding. Creating the signal plots, being able to visually see the intended signals and then manipulating these signals is a real asset in the learning process. Each signal has its own characteristics and these characterstics can be contained, soften the edges, by using different filtering techniques. These filters can help remove unneeded data, showing the true signal behind it. =============================================== ECET 375 Week 3 Homework
  • 7. For more course tutorials visit www.newtonhelp.com ECET 375 Week 3 Homework =============================================== ECET 375 Week 3 iLab Exploring A Digital Transmission System For more course tutorials visit www.newtonhelp.com ECET 375 Week 3 iLab Exploring A Digital Transmission System =============================================== ECET 375 Week 4 Homework For more course tutorials visit www.newtonhelp.com Chapter 16
  • 8. 16.2 - What is meant by a primary station? A secondary station? 16.6 – Briefly describe the poll/select line discipline. 16.8 – Briefly describe the sliding window method of flow control. 16.9 – What is the difference between character- and bit oriented protocols? =============================================== ECET 375 Week 4 iLab Exploring Internet Protocol Hierarchy and the Ethernet Layer For more course tutorials visit www.newtonhelp.com ECET 375 Week 4 iLab Exploring Internet Protocol Hierarchy and the Ethernet Layer Objective: In this lab, you will explore a)Internet Protocol Hierarchy b)ARP protocol and Ethernet Layer operation Required Equipment: A PC with Wireshark program installed Following file: ecet-375WebBrowsing.pcap
  • 9. Observations: The captured data was analyzed using Wireshark. This data was compiled into lists and used to populate data tables. Conclusion: The information and techniques are well documented. The lab went as well as expected. The Wireshark program leaves off the SFD and FCS from the packet data, otherwise everything went well and as expected. =============================================== ECET 375 Week 5 Homework For more course tutorials visit www.newtonhelp.com Chapter 18: 2) Determine the contents of the length field for MAC frame for the following conditions: 3) An Ethernet address of 07-01-02-03-04-05 iswhat type of address? =============================================== ECET 375 Week 5 iLab Exploring Internet Protocol Hierarchy and the Ethernet Layer
  • 10. For more course tutorials visit www.newtonhelp.com Objectives: This lab was the exploration of the DHCP protocol operation and the IP protocol operation using Wireshark and two .PCAP captured files. Results: The results showed that the DHCP was easy to follow in how it configured the client for a temporary IP address, along with a lease time, and also provided header information. The IP protocol provided details of messages sent such as fragment information and how many bytes per fragment. Conclusions:.Wireshark is designed in such a way that makes following the messages and server feedback readable and easy for troubleshooting. Although we did no troubleshooting in this lab, the concept is observable as we studied the details of each packet =============================================== ECET 375 Week 6 Homework For more course tutorials visit www.newtonhelp.com Chapter 20-Questions
  • 11. Pg-652-654 20-1: What is the primary purpose of using subnetting? 20-2: List and describe several reasons why network designers create subnetting. 20-3: Explain the differences between default masksandsubnet masks. 20-7: Explain the reasons for using supernetting. Chapter 20-Problems 20-1: What is the default mask for the network address 139.100.0.0? a.255.0.0.0 b.255.255.255.0 c.255.255.0.0 d.255.255.255.255 20-2: Using the default mask, how many hosts can the classful network 109.0.0.0 support? 20-7: How many hosts can be supported on a classful class B network with the following subnetmask: 255.255.224.0? 20-9: You have a host IP address of 40.150.73.10 and a subnet mask 255.248.0.0: 20-15: Determine the subnet addresses and subnet masks for a business network with the classful class C address 204.238.7.0 with six departments having separate subnetworks with the following numbers of hosts: 20-23: A small business has been assigned a classless network address 210.38.4.0.
  • 12. 20-24: Determine the following for the network specified in problem 20-23: Chapter 21-Questions Pg-700-702 21-3: What is the primary purpose of the address resolution protocol (ARP)? Chapter 21-Problems 21-3: Determine the contents of the first byte of an IP header if the IP protocol is IPv4 and the header has 40 bytes of options. 21-6: Determine the length of an ICMP data field for Ethernet frame that is carrying an IP datagram with a 28-byte header and an eight- byte ICMP header and the Ethernet data field is 600 bytes long. 21-7: Use the following network analyzer display of an ARP packet to answer the following questions: 0000 00 07 08 00 06 04 00 02 00 00 BD 41 2A 1C C1 98 0010 A0 14 00 00 40 A3 B1 CC C1 98 0F 10 21-8: Use the following network analyzer display of an IP packet to answer the following questions: 0000 45 28 13 82 01 A2 21 34 F3 01 43 A1 C0 99 4A 01 0010 99 4A 0C -- -- -- -- -- -- -- -- -- -- -- -- -- 21-11: A maximum-length data gram carrying 65,536 bytes can be transported over a WAN with a maximum packet length of 292 bytes, which includes the 20-byte IP header. Determine… ===============================================
  • 13. ECET 375 Week 6 iLab Exploring Internet Protocol Hierarchy and Ethernet Layers For more course tutorials visit www.newtonhelp.com Objectives The purpose of these lab procedures is to visually see how the Ping and Traceroute Applications work. This will be done using WireShark and a precaptured file “ecet-375RemotePingTracert.pcap”. The use of IP and ICMP protocols in diagnostic testing will be accomplished by writing the command in the DOS Prompt and captured in the WireShark program (already done for us). This file will be analyzed, depicting which packets do what and the time taken between specific packets. Results During the exploration of this lab, the WireShark program was used to analyze a pre-captured internet session. Examining the “Ping” ofwww.iana.org is the basis of the first procedure. Determining which packets are DNS query’s and which packets are DNS responses as well as the actual IP address for this link is accomplished in the first few steps. With the ICMP protocol, knowing that there are four requests and four echo responses, these packets are found and documented. Additionally, the times between request and reply are found and recorded with the help of the “Set Time Reference (Toggle)” within the WireShark program.
  • 14. The next procedure, Traceroute, also deals with a Dos command of “tracert” and is done on the same address of www.iana.org . The packets that take care of the DNS query for an IP address for the site are discovered and documented, as well as the number of HOPs performed on the investigated trace. Similar to the “Ping” procedure, the time between the requests and the error responses are discovered using the “Set Time Reference (Toggle)” with 3 requests and responses per HOP. Conclusions After completing this lab and seeing how these investigative tools can help in the diagnostic of a communication network, it is realized the importance of applications like these. In my profession I have used the “PING” command to see if a specific computer in the domain is “alive” and communicating. The Traceroute command is new and can be just as useful. Using the Traceroute application to ensure communications through all routers and switches is occurring and in a timely fashion can prove to be very useful in discovering issues to come. =============================================== ECET 375 Week 7 Homework For more course tutorials visit www.newtonhelp.com ECET 375 Week 7 Homework
  • 15. =============================================== ECET 375 Week 7 iLab Exploring TCP UDP Communication in the Internet For more course tutorials visit www.newtonhelp.com Discussion: TCP (Transport Control Protocol) and UDP (User Datagram Protocol) operate at the Transport layer of the Internet Protocol Hierarchy. They deliver information between Internet applications. To identify the applications running on a host, Internet transport layer uses port numbers, each a sixteen-bit number expressed as a decimal number (e.g. 80). Each host interface on the Internet is uniquely identified by an IP address, a 32-bit number usually expressed in dotted decimal notation (e.g.192.168.1.45). TCP and UDP combine data from multiple applications into a single outgoing connection at a source host. This process is called multiplexing. These protocols, at a destination host, separate data arriving at an incoming connection destined for different applications. This process is called demultiplexing. TCP is connection oriented and has many other features geared towards providing reliable communication, flow control and congestion control. UDP is connectionless and does not have these features. In this lab, you will analyze pre-captured Wireshark files to explore features of TCP and UDP protocols and their differences.