SlideShare a Scribd company logo
1 of 16
ECET 375 Week 1 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 1-Questions
1-3: Discuss the relationship between network architecture and protocol
1-5: Define the following terms: protocol, connection-orientated
protocols, connectionless protocols, and protocol stacks.
1-11: Briefly describe the seven layers of the OSI protocol hierarchy
1-21: List and briefly describe the five basic data communications
network topologies
1-23: Briefly describe the TCP/IP protocol model
Chapter 3-Questions
3-1 : In which layer of the OSI protocol hierarchy is the transmission
medium found?
3-2 : What are the two general categories of transmission media?
3-3 : Define transmission line.
3-4 : Describe a transverse electromagnetic wave.
Chapter 3-Problems
3-1 : Determine the wavelengths for the electromagnetic waves in free
space with the following frequencies: 1 kHz, 100 kHz, 1 MHz, and 1
GHz
3-2 : Determine the wavelengths for the electromagnetic waves in free
space with the following frequencies: 1 cm, 1 m, 10 m, and 1000 m.
3-3 : Determine the characteristic for a two-wire parallel transmission
line with an air dielectric and D/r ratio of 8.8.
3-5: Determine the characteristic impedance for a coaxial cable with
inductance L = 0.2 microHenrys/foot and capacitance C=16
picoFarads/foot.
Chapter 4 Problems
4-1 : Determine the wavelengths in nanometers, angstroms, and
micrometers for the following frequencies: 3.45 * 1014 Hz, 3.62 * 1014
Hz, 3.21 * 1014 Hz
4-2 : Determine the light frequency for the following wavelengths: 670
nm, 7800 angstroms, and 710 nm.
------------------------------------
ECET 375 Week 1 iLabExploring Internet Standards RS 232
Communication and Connectors
For more course tutorials visit
www.newtonhelp.com
Objective:
In this lab you will explore:
a)Internet RFCs
b) RS-232 Communication data format
c)Cables and Connectors
ECET 375 Week 1 iLab Exploring Internet Standards, RS-232
Communication, and Connectors
Objectives:
During lab we explored Internet RFCs, RS-232 Communication data
format and Cables and Connectors
Results:
This lab was basically a research project to help us understand how the
Internet Standards are created and how to pick the correct interface
material that meets the requirements of any interface. Some of the topics
were also refresher information from other ECET classes like the ASCII
wave forms.
Conclusions:
After you design a system it’s critical to use the correct interface
mediums and material types that meet your requirements. Picking
materials that cover data rate or frequency values beyond your
requirement will have an adverse cost effect on your final design.
Keeping up with technology and standards is important in engineering.
Before you pick materials for your design, complete your research to
insure you take advantage of standards and material types that meet your
requirements but do not exceed them. Balance the quality of these
materials with your projects budget and you’ll be successful.
------------------------------------
ECET 375 Week 2 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 2: 10, 11, 12, 16, 17
Chapter 5: 1, 2, 5, 8
Chapter 6: 3, 5
Chapter 13: 2, 5, 7, 12, 13, 19
------------------------------------
ECET 375 Week 2 iLab Calculating Spectrum and Linear
Filtering in MatLab
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 2 iLab Calculating Spectrum and Linear Filtering in
MatLab
Objectives
This lab is intended to explore signal spectrums and filtering operations
using MatLab. Running pre-written MatLab scripts and altering these
codes to perform specific tasks will be necessary to develop the
appropriate displays. Calculation of a signal spectrum using the
SigSpec.m file, and altering this file to display different types of signals
including Cosine, AM, and Square waves will help to explore signal
characteristics and display MatLab functionality. Using a second per-
written file (LinFiltering.m) and MatLab, displaying how filtering can
affect a signal, will be used to describe this process and how the
resulting signal changes.
Results
During the exploration of this lab, the MatLab program was used to run
specific functions containing the code necessary for appropriate signal
plotting. These plots were created for the cosine, the AM, the square
wave, using random information and breaking down a sound file (.wav).
For each of these signals a MatLab plot was acquired, and used for
analysis. Additionally, running the LinFiltering.m file in MatLab
allowed the explanation of filtering to be shown in a plot. These plots
were created for both the time and frequency domain, and successfully
showed how a filter can help contain a signal.
Conclusions
After the completion of this lab, the concepts included are starting to
make more sense. Realizing how powerful MatLab can be, and the
functions accomplished by it are astounding. Creating the signal plots,
being able to visually see the intended signals and then manipulating
these signals is a real asset in the learning process. Each signal has its
own characteristics and these characterstics can be contained, soften the
edges, by using different filtering techniques. These filters can help
remove unneeded data, showing the true signal behind it.
------------------------------------
ECET 375 Week 3 Homework
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 3 Homework
------------------------------------
ECET 375 Week 3 iLab Exploring A Digital Transmission
System
For more course tutorials visit
www.newtonhelp.com
------------------------------------
ECET 375 Week 3 iLab Exploring A Digital Transmission System
ECET 375 Week 4 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 16
16.2 - What is meant by a primary station? A secondary station?
16.6 – Briefly describe the poll/select line discipline.
16.8 – Briefly describe the sliding window method of flow control.
16.9 – What is the difference between character- and bit oriented
protocols?
------------------------------------
ECET 375 Week 4 iLab Exploring Internet Protocol Hierarchy
and the Ethernet Layer
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 4 iLab Exploring Internet Protocol Hierarchy and the
Ethernet Layer
Objective:
In this lab, you will explore
a)Internet Protocol Hierarchy
b) ARP protocol and Ethernet Layer operation
Required Equipment:
A PC with Wireshark program installed
Following file: ecet-375WebBrowsing.pcap
Observations:
The captured data was analyzed using Wireshark. This data was
compiled into lists and used to populate data tables.
Conclusion:
The information and techniques are well documented. The lab went as
well as expected. The Wireshark program leaves off the SFD and FCS
from the packet data, otherwise everything went well and as expected.
------------------------------------
ECET 375 Week 5 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 18:
2) Determine the contents of the length field for MAC frame forthe
following conditions:
3) An Ethernet address of 07-01-02-03-04-05 is what type of address?
------------------------------------
ECET 375 Week 5 iLab Exploring Internet Protocol Hierarchy
and the Ethernet Layer
For more course tutorials visit
www.newtonhelp.com
Objectives: This lab was the exploration of the DHCP protocol operation
and the IP protocol operation using Wireshark and two .PCAP captured
files.
Results: The results showed that the DHCP was easy to follow in how it
configured the client for a temporary IP address, along with a lease time,
and also provided header information. The IP protocol provided details
of messages sent such as fragment information and how many bytes per
fragment.
Conclusions:.Wireshark is designed in such a way that makes following
the messages and server feedback readable and easy for troubleshooting.
Although we did no troubleshooting in this lab, the concept is
observable as we studied the details of each packet
------------------------------------
ECET 375 Week 6 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 20-Questions
Pg-652-654
20-1 : What is the primary purpose of using subnetting?
20-2 : List and describe several reasons why network designers create
subnetting.
20-3 : Explain the differences between default masksandsubnet masks.
20-7: Explain the reasons for using supernetting.
Chapter 20-Problems
20-1: What is the default mask for the network address 139.100.0.0?
a.255.0.0.0
b.255.255.255.0
c.255.255.0.0
d.255.255.255.255
20-2: Using the default mask, how many hosts can the classful network
109.0.0.0 support?
20-7: How many hosts can be supported on a classful class B network
with the following subnetmask: 255.255.224.0?
20-9: You have a host IP address of 40.150.73.10 and a subnet mask
255.248.0.0:
20-15: Determine the subnet addresses and subnet masks for a business
network with the classful class C address 204.238.7.0 with six
departments having separate subnetworks with the following numbers of
hosts:
20-23 : A small business has been assigned a classless network address
210.38.4.0.
20-24 : Determine the following for the network specified in problem 20-
23:
Chapter 21-Questions
Pg-700-702
21-3: What is the primary purpose of the address resolution protocol
(ARP)?
Chapter 21-Problems
21-3: Determine the contents of the first byte of an IP header if the IP
protocol is IPv4 and the header has 40 bytes of options.
21-6 : Determine the length of an ICMP data field for Ethernet frame that
is carrying an IP datagram with a 28-byte header and an eight-byte
ICMP header and the Ethernet data field is 600 bytes long.
21-7 : Use the following network analyzer display of an ARP packet to
answer the following questions:
0000 00 07 08 00 06 04 00 02 00 00 BD 41 2A 1C C1 98
0010 A0 14 00 00 40 A3 B1 CC C1 98 0F 10
21-8 : Use the following network analyzer display of an IP packet to
answer the following questions:
0000 45 28 13 82 01 A2 21 34 F3 01 43 A1 C0 99 4A 01
0010 99 4A 0C -- -- -- -- -- -- -- -- -- -- -- -- --
21-11: A maximum-length data gram carrying 65,536 bytes can be
transported over a WAN with a maximum packet length of 292 bytes,
which includes the 20-byte IP header. Determine…
------------------------------------
ECET 375 Week 6 iLab Exploring Internet Protocol Hierarchy
and Ethernet Layers
For more course tutorials visit
www.newtonhelp.com
Objectives
The purpose of these lab procedures is to visually see how the Ping and
Traceroute Applications work. This will be done using WireShark and a
precaptured file “ecet-375RemotePingTracert.pcap”. The use of IP and
ICMP protocols in diagnostic testing will be accomplished by writing
the command in the DOS Prompt and captured in the WireShark
program (already done for us). This file will be analyzed, depicting
which packets do what and the time taken between specific packets.
Results
During the exploration of this lab, the WireShark program was used to
analyze a pre-captured internet session. Examining the “Ping”
ofwww.iana.org is the basis of the first procedure. Determining which
packets are DNS query’s and which packets are DNS responses as well
as the actual IP address for this link is accomplished in the first few
steps. With the ICMP protocol, knowing that there are four requests and
four echo responses, these packets are found and documented.
Additionally, the times between request and reply are found and
recorded with the help of the “Set Time Reference (Toggle)” within the
WireShark program.
The next procedure, Traceroute, also deals with a Dos command of
“tracert” and is done on the same address of www.iana.org . The packets
that take care of the DNS query for an IP address for the site are
discovered and documented, as well as the number of HOPs performed
on the investigated trace. Similar to the “Ping” procedure, the time
between the requests and the error responses are discovered using the
“Set Time Reference (Toggle)” with 3 requests and responses per HOP.
Conclusions
After completing this lab and seeing how these investigative tools can
help in the diagnostic of a communication network, it is realized the
importance of applications like these. In my profession I have used the
“PING” command to see if a specific computer in the domain is “alive”
and communicating. The Traceroute command is new and can be just as
useful. Using the Traceroute application to ensure communications
through all routers and switches is occurring and in a timely fashion can
prove to be very useful in discovering issues to come.
------------------------------------
ECET 375 Week 7 Homework
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 7 Homework
------------------------------------
ECET 375 Week 7 iLab Exploring TCP UDP Communication in
the Internet
For more course tutorials visit
www.newtonhelp.com
Discussion:
TCP (Transport Control Protocol) and UDP (User Datagram Protocol)
operate at the Transport layer of the Internet Protocol Hierarchy. They
deliver information between Internet applications. To identify the
applications running on a host, Internet transport layer uses port
numbers, each a sixteen-bit number expressed as a decimal number (e.g.
80). Each host interface on the Internet is uniquely identified by an IP
address, a 32-bit number usually expressed in dotted decimal notation
(e.g.192.168.1.45). TCP and UDP combine data from multiple
applications into a single outgoing connection at a source host. This
process is called multiplexing. These protocols, at a destination host,
separate data arriving at an incoming connection destined for different
applications. This process is called demultiplexing. TCP is connection
oriented and has many other features geared towards providing reliable
communication, flow control and congestion control. UDP is
connectionless and does not have these features.
In this lab, you will analyze pre-captured Wireshark files to explore
features of TCP and UDP protocols and their differences.

More Related Content

What's hot

What's hot (18)

TCP IP Addressing
TCP IP AddressingTCP IP Addressing
TCP IP Addressing
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Classful and classless addressing
Classful and classless addressingClassful and classless addressing
Classful and classless addressing
 
Network Layer Part 1
Network Layer Part 1Network Layer Part 1
Network Layer Part 1
 
IP Address
IP AddressIP Address
IP Address
 
CN Unit 3
CN Unit 3 CN Unit 3
CN Unit 3
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
IPv4
IPv4IPv4
IPv4
 
Network layer Part 3
Network layer Part 3Network layer Part 3
Network layer Part 3
 
Ecet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.comEcet 465  Enthusiastic Study / snaptutorial.com
Ecet 465  Enthusiastic Study / snaptutorial.com
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
About ip address
About ip addressAbout ip address
About ip address
 
Ex 1 chapter06-i-pv4-tony_chen
Ex 1 chapter06-i-pv4-tony_chenEx 1 chapter06-i-pv4-tony_chen
Ex 1 chapter06-i-pv4-tony_chen
 

Similar to ECET 375 Success Begins/Newtonhelp.com

ECET 375 Entire Course NEW
ECET 375 Entire Course NEWECET 375 Entire Course NEW
ECET 375 Entire Course NEWshyamuopuop
 
Ecet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comEcet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comHarrisGeorgx
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorialpinck2329
 
Ecet 465 Success Begins / snaptutorial.com
Ecet 465   Success Begins / snaptutorial.comEcet 465   Success Begins / snaptutorial.com
Ecet 465 Success Begins / snaptutorial.comWilliamsTaylorzo
 
ECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comsholingarjosh104
 
Ecet 465 Massive Success / snaptutorial.com
Ecet 465  Massive Success / snaptutorial.comEcet 465  Massive Success / snaptutorial.com
Ecet 465 Massive Success / snaptutorial.comHarrisGeorgz
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address SchemeErin Rivera
 
Tutorial&info,networks basics
Tutorial&info,networks basicsTutorial&info,networks basics
Tutorial&info,networks basicsIT Tech
 
Network Analysis using Wireshark 5: display filters
Network Analysis using Wireshark 5: display filtersNetwork Analysis using Wireshark 5: display filters
Network Analysis using Wireshark 5: display filtersYoram Orzach
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguideYahye159
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachIJERA Editor
 
Experiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cnExperiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cnHusainGadiwala1
 
Netfilter: Making large iptables rulesets scale
Netfilter: Making large iptables rulesets scaleNetfilter: Making large iptables rulesets scale
Netfilter: Making large iptables rulesets scalebrouer
 

Similar to ECET 375 Success Begins/Newtonhelp.com (20)

ECET 375 Entire Course NEW
ECET 375 Entire Course NEWECET 375 Entire Course NEW
ECET 375 Entire Course NEW
 
Ecet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comEcet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.com
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorial
 
Ecet 465 Success Begins / snaptutorial.com
Ecet 465   Success Begins / snaptutorial.comEcet 465   Success Begins / snaptutorial.com
Ecet 465 Success Begins / snaptutorial.com
 
ECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.comECET 465 Technology levels--snaptutorial.com
ECET 465 Technology levels--snaptutorial.com
 
Ecet 465 Massive Success / snaptutorial.com
Ecet 465  Massive Success / snaptutorial.comEcet 465  Massive Success / snaptutorial.com
Ecet 465 Massive Success / snaptutorial.com
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
Research_Paper (3)
Research_Paper (3)Research_Paper (3)
Research_Paper (3)
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 
NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
 
Tutorial&info,networks basics
Tutorial&info,networks basicsTutorial&info,networks basics
Tutorial&info,networks basics
 
Network Analysis using Wireshark 5: display filters
Network Analysis using Wireshark 5: display filtersNetwork Analysis using Wireshark 5: display filters
Network Analysis using Wireshark 5: display filters
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguide
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
Experiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cnExperiment no. 1,2 and assignment no.1 cn
Experiment no. 1,2 and assignment no.1 cn
 
Netfilter: Making large iptables rulesets scale
Netfilter: Making large iptables rulesets scaleNetfilter: Making large iptables rulesets scale
Netfilter: Making large iptables rulesets scale
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

ECET 375 Success Begins/Newtonhelp.com

  • 1. ECET 375 Week 1 Homework For more course tutorials visit www.newtonhelp.com Chapter 1-Questions 1-3: Discuss the relationship between network architecture and protocol 1-5: Define the following terms: protocol, connection-orientated protocols, connectionless protocols, and protocol stacks. 1-11: Briefly describe the seven layers of the OSI protocol hierarchy 1-21: List and briefly describe the five basic data communications network topologies 1-23: Briefly describe the TCP/IP protocol model Chapter 3-Questions 3-1 : In which layer of the OSI protocol hierarchy is the transmission medium found?
  • 2. 3-2 : What are the two general categories of transmission media? 3-3 : Define transmission line. 3-4 : Describe a transverse electromagnetic wave. Chapter 3-Problems 3-1 : Determine the wavelengths for the electromagnetic waves in free space with the following frequencies: 1 kHz, 100 kHz, 1 MHz, and 1 GHz 3-2 : Determine the wavelengths for the electromagnetic waves in free space with the following frequencies: 1 cm, 1 m, 10 m, and 1000 m. 3-3 : Determine the characteristic for a two-wire parallel transmission line with an air dielectric and D/r ratio of 8.8. 3-5: Determine the characteristic impedance for a coaxial cable with inductance L = 0.2 microHenrys/foot and capacitance C=16 picoFarads/foot. Chapter 4 Problems
  • 3. 4-1 : Determine the wavelengths in nanometers, angstroms, and micrometers for the following frequencies: 3.45 * 1014 Hz, 3.62 * 1014 Hz, 3.21 * 1014 Hz 4-2 : Determine the light frequency for the following wavelengths: 670 nm, 7800 angstroms, and 710 nm. ------------------------------------ ECET 375 Week 1 iLabExploring Internet Standards RS 232 Communication and Connectors For more course tutorials visit www.newtonhelp.com Objective: In this lab you will explore: a)Internet RFCs b) RS-232 Communication data format
  • 4. c)Cables and Connectors ECET 375 Week 1 iLab Exploring Internet Standards, RS-232 Communication, and Connectors Objectives: During lab we explored Internet RFCs, RS-232 Communication data format and Cables and Connectors Results: This lab was basically a research project to help us understand how the Internet Standards are created and how to pick the correct interface material that meets the requirements of any interface. Some of the topics were also refresher information from other ECET classes like the ASCII wave forms. Conclusions: After you design a system it’s critical to use the correct interface mediums and material types that meet your requirements. Picking materials that cover data rate or frequency values beyond your requirement will have an adverse cost effect on your final design. Keeping up with technology and standards is important in engineering. Before you pick materials for your design, complete your research to insure you take advantage of standards and material types that meet your requirements but do not exceed them. Balance the quality of these materials with your projects budget and you’ll be successful. ------------------------------------
  • 5. ECET 375 Week 2 Homework For more course tutorials visit www.newtonhelp.com Chapter 2: 10, 11, 12, 16, 17 Chapter 5: 1, 2, 5, 8 Chapter 6: 3, 5 Chapter 13: 2, 5, 7, 12, 13, 19 ------------------------------------ ECET 375 Week 2 iLab Calculating Spectrum and Linear Filtering in MatLab For more course tutorials visit www.newtonhelp.com ECET 375 Week 2 iLab Calculating Spectrum and Linear Filtering in MatLab Objectives
  • 6. This lab is intended to explore signal spectrums and filtering operations using MatLab. Running pre-written MatLab scripts and altering these codes to perform specific tasks will be necessary to develop the appropriate displays. Calculation of a signal spectrum using the SigSpec.m file, and altering this file to display different types of signals including Cosine, AM, and Square waves will help to explore signal characteristics and display MatLab functionality. Using a second per- written file (LinFiltering.m) and MatLab, displaying how filtering can affect a signal, will be used to describe this process and how the resulting signal changes. Results During the exploration of this lab, the MatLab program was used to run specific functions containing the code necessary for appropriate signal plotting. These plots were created for the cosine, the AM, the square wave, using random information and breaking down a sound file (.wav). For each of these signals a MatLab plot was acquired, and used for analysis. Additionally, running the LinFiltering.m file in MatLab allowed the explanation of filtering to be shown in a plot. These plots were created for both the time and frequency domain, and successfully showed how a filter can help contain a signal. Conclusions After the completion of this lab, the concepts included are starting to make more sense. Realizing how powerful MatLab can be, and the functions accomplished by it are astounding. Creating the signal plots, being able to visually see the intended signals and then manipulating these signals is a real asset in the learning process. Each signal has its own characteristics and these characterstics can be contained, soften the
  • 7. edges, by using different filtering techniques. These filters can help remove unneeded data, showing the true signal behind it. ------------------------------------ ECET 375 Week 3 Homework For more course tutorials visit www.newtonhelp.com ECET 375 Week 3 Homework ------------------------------------ ECET 375 Week 3 iLab Exploring A Digital Transmission System For more course tutorials visit www.newtonhelp.com ------------------------------------ ECET 375 Week 3 iLab Exploring A Digital Transmission System ECET 375 Week 4 Homework
  • 8. For more course tutorials visit www.newtonhelp.com Chapter 16 16.2 - What is meant by a primary station? A secondary station? 16.6 – Briefly describe the poll/select line discipline. 16.8 – Briefly describe the sliding window method of flow control. 16.9 – What is the difference between character- and bit oriented protocols? ------------------------------------ ECET 375 Week 4 iLab Exploring Internet Protocol Hierarchy and the Ethernet Layer For more course tutorials visit www.newtonhelp.com ECET 375 Week 4 iLab Exploring Internet Protocol Hierarchy and the Ethernet Layer Objective: In this lab, you will explore
  • 9. a)Internet Protocol Hierarchy b) ARP protocol and Ethernet Layer operation Required Equipment: A PC with Wireshark program installed Following file: ecet-375WebBrowsing.pcap Observations: The captured data was analyzed using Wireshark. This data was compiled into lists and used to populate data tables. Conclusion: The information and techniques are well documented. The lab went as well as expected. The Wireshark program leaves off the SFD and FCS from the packet data, otherwise everything went well and as expected. ------------------------------------ ECET 375 Week 5 Homework For more course tutorials visit www.newtonhelp.com Chapter 18:
  • 10. 2) Determine the contents of the length field for MAC frame forthe following conditions: 3) An Ethernet address of 07-01-02-03-04-05 is what type of address? ------------------------------------ ECET 375 Week 5 iLab Exploring Internet Protocol Hierarchy and the Ethernet Layer For more course tutorials visit www.newtonhelp.com Objectives: This lab was the exploration of the DHCP protocol operation and the IP protocol operation using Wireshark and two .PCAP captured files. Results: The results showed that the DHCP was easy to follow in how it configured the client for a temporary IP address, along with a lease time, and also provided header information. The IP protocol provided details of messages sent such as fragment information and how many bytes per fragment. Conclusions:.Wireshark is designed in such a way that makes following the messages and server feedback readable and easy for troubleshooting. Although we did no troubleshooting in this lab, the concept is observable as we studied the details of each packet ------------------------------------
  • 11. ECET 375 Week 6 Homework For more course tutorials visit www.newtonhelp.com Chapter 20-Questions Pg-652-654 20-1 : What is the primary purpose of using subnetting? 20-2 : List and describe several reasons why network designers create subnetting. 20-3 : Explain the differences between default masksandsubnet masks. 20-7: Explain the reasons for using supernetting. Chapter 20-Problems 20-1: What is the default mask for the network address 139.100.0.0? a.255.0.0.0 b.255.255.255.0 c.255.255.0.0 d.255.255.255.255 20-2: Using the default mask, how many hosts can the classful network 109.0.0.0 support?
  • 12. 20-7: How many hosts can be supported on a classful class B network with the following subnetmask: 255.255.224.0? 20-9: You have a host IP address of 40.150.73.10 and a subnet mask 255.248.0.0: 20-15: Determine the subnet addresses and subnet masks for a business network with the classful class C address 204.238.7.0 with six departments having separate subnetworks with the following numbers of hosts: 20-23 : A small business has been assigned a classless network address 210.38.4.0. 20-24 : Determine the following for the network specified in problem 20- 23: Chapter 21-Questions Pg-700-702 21-3: What is the primary purpose of the address resolution protocol (ARP)? Chapter 21-Problems 21-3: Determine the contents of the first byte of an IP header if the IP protocol is IPv4 and the header has 40 bytes of options. 21-6 : Determine the length of an ICMP data field for Ethernet frame that is carrying an IP datagram with a 28-byte header and an eight-byte ICMP header and the Ethernet data field is 600 bytes long. 21-7 : Use the following network analyzer display of an ARP packet to answer the following questions: 0000 00 07 08 00 06 04 00 02 00 00 BD 41 2A 1C C1 98
  • 13. 0010 A0 14 00 00 40 A3 B1 CC C1 98 0F 10 21-8 : Use the following network analyzer display of an IP packet to answer the following questions: 0000 45 28 13 82 01 A2 21 34 F3 01 43 A1 C0 99 4A 01 0010 99 4A 0C -- -- -- -- -- -- -- -- -- -- -- -- -- 21-11: A maximum-length data gram carrying 65,536 bytes can be transported over a WAN with a maximum packet length of 292 bytes, which includes the 20-byte IP header. Determine… ------------------------------------ ECET 375 Week 6 iLab Exploring Internet Protocol Hierarchy and Ethernet Layers For more course tutorials visit www.newtonhelp.com Objectives The purpose of these lab procedures is to visually see how the Ping and Traceroute Applications work. This will be done using WireShark and a precaptured file “ecet-375RemotePingTracert.pcap”. The use of IP and ICMP protocols in diagnostic testing will be accomplished by writing the command in the DOS Prompt and captured in the WireShark
  • 14. program (already done for us). This file will be analyzed, depicting which packets do what and the time taken between specific packets. Results During the exploration of this lab, the WireShark program was used to analyze a pre-captured internet session. Examining the “Ping” ofwww.iana.org is the basis of the first procedure. Determining which packets are DNS query’s and which packets are DNS responses as well as the actual IP address for this link is accomplished in the first few steps. With the ICMP protocol, knowing that there are four requests and four echo responses, these packets are found and documented. Additionally, the times between request and reply are found and recorded with the help of the “Set Time Reference (Toggle)” within the WireShark program. The next procedure, Traceroute, also deals with a Dos command of “tracert” and is done on the same address of www.iana.org . The packets that take care of the DNS query for an IP address for the site are discovered and documented, as well as the number of HOPs performed on the investigated trace. Similar to the “Ping” procedure, the time between the requests and the error responses are discovered using the “Set Time Reference (Toggle)” with 3 requests and responses per HOP. Conclusions After completing this lab and seeing how these investigative tools can help in the diagnostic of a communication network, it is realized the importance of applications like these. In my profession I have used the “PING” command to see if a specific computer in the domain is “alive” and communicating. The Traceroute command is new and can be just as useful. Using the Traceroute application to ensure communications
  • 15. through all routers and switches is occurring and in a timely fashion can prove to be very useful in discovering issues to come. ------------------------------------ ECET 375 Week 7 Homework For more course tutorials visit www.newtonhelp.com ECET 375 Week 7 Homework ------------------------------------ ECET 375 Week 7 iLab Exploring TCP UDP Communication in the Internet For more course tutorials visit www.newtonhelp.com Discussion: TCP (Transport Control Protocol) and UDP (User Datagram Protocol) operate at the Transport layer of the Internet Protocol Hierarchy. They deliver information between Internet applications. To identify the applications running on a host, Internet transport layer uses port
  • 16. numbers, each a sixteen-bit number expressed as a decimal number (e.g. 80). Each host interface on the Internet is uniquely identified by an IP address, a 32-bit number usually expressed in dotted decimal notation (e.g.192.168.1.45). TCP and UDP combine data from multiple applications into a single outgoing connection at a source host. This process is called multiplexing. These protocols, at a destination host, separate data arriving at an incoming connection destined for different applications. This process is called demultiplexing. TCP is connection oriented and has many other features geared towards providing reliable communication, flow control and congestion control. UDP is connectionless and does not have these features. In this lab, you will analyze pre-captured Wireshark files to explore features of TCP and UDP protocols and their differences.