SlideShare a Scribd company logo
ECET 375 Week 1 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 1-Questions
1-3: Discuss the relationship between network architecture and
protocol
1-5: Define the following terms: protocol, connection-orientated
protocols, connectionless protocols, and protocol stacks.
1-11: Briefly describe the seven layers of the OSI protocol hierarchy
1-21: List and briefly describe the five basic data communications
network topologies
1-23: Briefly describe the TCP/IP protocol model
Chapter 3-Questions
3-1: In which layer of the OSI protocol hierarchy is the transmission
medium found?
3-2: What are the two general categories of transmission media?
3-3: Define transmission line.
3-4: Describe a transverse electromagnetic wave.
Chapter 3-Problems
3-1: Determine the wavelengths for the electromagnetic waves in free
space with the following frequencies: 1 kHz, 100 kHz, 1 MHz, and 1
GHz
3-2: Determine the wavelengths for the electromagnetic waves in free
space with the following frequencies: 1 cm, 1 m, 10 m, and 1000 m.
3-3: Determine the characteristic for a two-wire parallel transmission
line with an air dielectric and D/r ratio of 8.8.
3-5: Determine the characteristic impedance for a coaxial cable with
inductance L = 0.2 microHenrys/foot and capacitance C=16
picoFarads/foot.
Chapter 4 Problems
4-1: Determine the wavelengths in nanometers, angstroms, and
micrometers for the following frequencies: 3.45 * 1014 Hz, 3.62 *
1014 Hz, 3.21 * 1014 Hz
4-2: Determine the light frequency for the following wavelengths: 670
nm, 7800 angstroms, and 710 nm.
===============================================
ECET 375 Week 1 iLabExploring Internet Standards RS 232
Communication and Connectors
For more course tutorials visit
www.newtonhelp.com
Objective:
In this lab you will explore:
a)Internet RFCs
b)RS-232 Communication data format
c)Cables and Connectors
ECET 375 Week 1 iLab Exploring Internet Standards, RS-232
Communication, and Connectors
Objectives:
During lab we explored Internet RFCs, RS-232 Communication data
format and Cables and Connectors
Results:
This lab was basically a research project to help us understand how
the Internet Standards are created and how to pick the correct
interface material that meets the requirements of any interface. Some
of the topics were also refresher information from other ECET classes
like the ASCII wave forms.
Conclusions:
After you design a system it’s critical to use the correct interface
mediums and material types that meet your requirements. Picking
materials that cover data rate or frequency values beyond your
requirement will have an adverse cost effect on your final design.
Keeping up with technology and standards is important in
engineering. Before you pick materials for your design, complete your
research to insure you take advantage of standards and material types
that meet your requirements but do not exceed them. Balance the
quality of these materials with your projects budget and you’ll be
successful.
===============================================
ECET 375 Week 2 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 2: 10, 11, 12, 16, 17
Chapter 5: 1, 2, 5, 8
Chapter 6: 3, 5
Chapter 13: 2, 5, 7, 12, 13, 19
===============================================
ECET 375 Week 2 iLab Calculating Spectrum and Linear
Filtering in MatLab
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 2 iLab Calculating Spectrum and Linear Filtering in
MatLab
Objectives
This lab is intended to explore signal spectrums and filtering
operations using MatLab. Running pre-written MatLab scripts and
altering these codes to perform specific tasks will be necessary to
develop the appropriate displays. Calculation of a signal spectrum
using the SigSpec.m file, and altering this file to display different
types of signals including Cosine, AM, and Square waves will help to
explore signal characteristics and display MatLab functionality. Using
a second per-written file (LinFiltering.m) and MatLab, displaying
how filtering can affect a signal, will be used to describe this process
and how the resulting signal changes.
Results
During the exploration of this lab, the MatLab program was used to
run specific functions containing the code necessary for appropriate
signal plotting. These plots were created for the cosine, the AM, the
square wave, using random information and breaking down a sound
file (.wav). For each of these signals a MatLab plot was acquired, and
used for analysis. Additionally, running the LinFiltering.m file in
MatLab allowed the explanation of filtering to be shown in a plot.
These plots were created for both the time and frequency domain, and
successfully showed how a filter can help contain a signal.
Conclusions
After the completion of this lab, the concepts included are starting to
make more sense. Realizing how powerful MatLab can be, and the
functions accomplished by it are astounding. Creating the signal plots,
being able to visually see the intended signals and then manipulating
these signals is a real asset in the learning process. Each signal has its
own characteristics and these characterstics can be contained, soften
the edges, by using different filtering techniques. These filters can
help remove unneeded data, showing the true signal behind it.
===============================================
ECET 375 Week 3 Homework
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 3 Homework
===============================================
ECET 375 Week 3 iLab Exploring A Digital Transmission
System
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 3 iLab Exploring A Digital Transmission System
===============================================
ECET 375 Week 4 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 16
16.2 - What is meant by a primary station? A secondary station?
16.6 – Briefly describe the poll/select line discipline.
16.8 – Briefly describe the sliding window method of flow control.
16.9 – What is the difference between character- and bit oriented
protocols?
===============================================
ECET 375 Week 4 iLab Exploring Internet Protocol
Hierarchy and the Ethernet Layer
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 4 iLab Exploring Internet Protocol Hierarchy and
the Ethernet Layer
Objective:
In this lab, you will explore
a)Internet Protocol Hierarchy
b)ARP protocol and Ethernet Layer operation
Required Equipment:
A PC with Wireshark program installed
Following file: ecet-375WebBrowsing.pcap
Observations:
The captured data was analyzed using Wireshark. This data was
compiled into lists and used to populate data tables.
Conclusion:
The information and techniques are well documented. The lab went as
well as expected. The Wireshark program leaves off the SFD and FCS
from the packet data, otherwise everything went well and as expected.
===============================================
ECET 375 Week 5 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 18:
2) Determine the contents of the length field for MAC frame for the
following conditions:
3) An Ethernet address of 07-01-02-03-04-05 iswhat type of address?
===============================================
ECET 375 Week 5 iLab Exploring Internet Protocol
Hierarchy and the Ethernet Layer
For more course tutorials visit
www.newtonhelp.com
Objectives: This lab was the exploration of the DHCP protocol
operation and the IP protocol operation using Wireshark and two
.PCAP captured files.
Results: The results showed that the DHCP was easy to follow in how
it configured the client for a temporary IP address, along with a lease
time, and also provided header information. The IP protocol provided
details of messages sent such as fragment information and how many
bytes per fragment.
Conclusions:.Wireshark is designed in such a way that makes
following the messages and server feedback readable and easy for
troubleshooting. Although we did no troubleshooting in this lab, the
concept is observable as we studied the details of each packet
===============================================
ECET 375 Week 6 Homework
For more course tutorials visit
www.newtonhelp.com
Chapter 20-Questions
Pg-652-654
20-1: What is the primary purpose of using subnetting?
20-2: List and describe several reasons why network designers create
subnetting.
20-3: Explain the differences between default masksandsubnet masks.
20-7: Explain the reasons for using supernetting.
Chapter 20-Problems
20-1: What is the default mask for the network address 139.100.0.0?
a.255.0.0.0
b.255.255.255.0
c.255.255.0.0
d.255.255.255.255
20-2: Using the default mask, how many hosts can the classful
network 109.0.0.0 support?
20-7: How many hosts can be supported on a classful class B network
with the following subnetmask: 255.255.224.0?
20-9: You have a host IP address of 40.150.73.10 and a subnet mask
255.248.0.0:
20-15: Determine the subnet addresses and subnet masks for a
business network with the classful class C address 204.238.7.0 with
six departments having separate subnetworks with the following
numbers of hosts:
20-23: A small business has been assigned a classless network
address 210.38.4.0.
20-24: Determine the following for the network specified in problem
20-23:
Chapter 21-Questions
Pg-700-702
21-3: What is the primary purpose of the address resolution protocol
(ARP)?
Chapter 21-Problems
21-3: Determine the contents of the first byte of an IP header if the IP
protocol is IPv4 and the header has 40 bytes of options.
21-6: Determine the length of an ICMP data field for Ethernet frame
that is carrying an IP datagram with a 28-byte header and an eight-
byte ICMP header and the Ethernet data field is 600 bytes long.
21-7: Use the following network analyzer display of an ARP packet to
answer the following questions:
0000 00 07 08 00 06 04 00 02 00 00 BD 41 2A 1C C1 98
0010 A0 14 00 00 40 A3 B1 CC C1 98 0F 10
21-8: Use the following network analyzer display of an IP packet to
answer the following questions:
0000 45 28 13 82 01 A2 21 34 F3 01 43 A1 C0 99 4A 01
0010 99 4A 0C -- -- -- -- -- -- -- -- -- -- -- -- --
21-11: A maximum-length data gram carrying 65,536 bytes can be
transported over a WAN with a maximum packet length of 292 bytes,
which includes the 20-byte IP header. Determine…
===============================================
ECET 375 Week 6 iLab Exploring Internet Protocol
Hierarchy and Ethernet Layers
For more course tutorials visit
www.newtonhelp.com
Objectives
The purpose of these lab procedures is to visually see how the Ping
and Traceroute Applications work. This will be done using WireShark
and a precaptured file “ecet-375RemotePingTracert.pcap”. The use of
IP and ICMP protocols in diagnostic testing will be accomplished by
writing the command in the DOS Prompt and captured in the
WireShark program (already done for us). This file will be analyzed,
depicting which packets do what and the time taken between specific
packets.
Results
During the exploration of this lab, the WireShark program was used
to analyze a pre-captured internet session. Examining the “Ping”
ofwww.iana.org is the basis of the first procedure. Determining which
packets are DNS query’s and which packets are DNS responses as
well as the actual IP address for this link is accomplished in the first
few steps. With the ICMP protocol, knowing that there are four
requests and four echo responses, these packets are found and
documented. Additionally, the times between request and reply are
found and recorded with the help of the “Set Time Reference
(Toggle)” within the WireShark program.
The next procedure, Traceroute, also deals with a Dos command of
“tracert” and is done on the same address of www.iana.org . The
packets that take care of the DNS query for an IP address for the site
are discovered and documented, as well as the number of HOPs
performed on the investigated trace. Similar to the “Ping” procedure,
the time between the requests and the error responses are discovered
using the “Set Time Reference (Toggle)” with 3 requests and
responses per HOP.
Conclusions
After completing this lab and seeing how these investigative tools can
help in the diagnostic of a communication network, it is realized the
importance of applications like these. In my profession I have used
the “PING” command to see if a specific computer in the domain is
“alive” and communicating. The Traceroute command is new and can
be just as useful. Using the Traceroute application to ensure
communications through all routers and switches is occurring and in a
timely fashion can prove to be very useful in discovering issues to
come.
===============================================
ECET 375 Week 7 Homework
For more course tutorials visit
www.newtonhelp.com
ECET 375 Week 7 Homework
===============================================
ECET 375 Week 7 iLab Exploring TCP UDP Communication
in the Internet
For more course tutorials visit
www.newtonhelp.com
Discussion:
TCP (Transport Control Protocol) and UDP (User Datagram Protocol)
operate at the Transport layer of the Internet Protocol Hierarchy. They
deliver information between Internet applications. To identify the
applications running on a host, Internet transport layer uses port
numbers, each a sixteen-bit number expressed as a decimal number
(e.g. 80). Each host interface on the Internet is uniquely identified by
an IP address, a 32-bit number usually expressed in dotted decimal
notation (e.g.192.168.1.45). TCP and UDP combine data from
multiple applications into a single outgoing connection at a source
host. This process is called multiplexing. These protocols, at a
destination host, separate data arriving at an incoming connection
destined for different applications. This process is called
demultiplexing. TCP is connection oriented and has many other
features geared towards providing reliable communication, flow
control and congestion control. UDP is connectionless and does not
have these features.
In this lab, you will analyze pre-captured Wireshark files to explore
features of TCP and UDP protocols and their differences.

More Related Content

What's hot

Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
CSCJournals
 
Network Design for a Small & Medium Enterprise
Network Design for a Small & Medium EnterpriseNetwork Design for a Small & Medium Enterprise
Network Design for a Small & Medium Enterprise
Thamalsha Wijayarathna
 
Computer Network Lab
Computer Network LabComputer Network Lab
Computer Network Lab
AfsanaAkterRubi
 
Mumbai University BE IT Sem 3 Syllabus
Mumbai University BE IT Sem 3 SyllabusMumbai University BE IT Sem 3 Syllabus
Mumbai University BE IT Sem 3 Syllabus
techscio
 
Network Design For Alliance Française de Dhaka
Network Design For Alliance Française de DhakaNetwork Design For Alliance Française de Dhaka
Network Design For Alliance Française de Dhaka
MD. Naimur Rahman
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
vaidheeswari
 
NTC 362 Massive Success / snaptutorial.com
NTC 362 Massive Success / snaptutorial.comNTC 362 Massive Success / snaptutorial.com
NTC 362 Massive Success / snaptutorial.com
donaldzs17
 
C n practical file
C n practical fileC n practical file
C n practical file
Soumya Behera
 
02 Network Models(강의용)
02 Network Models(강의용)02 Network Models(강의용)
02 Network Models(강의용)guestafa80f
 
1.mesh
1.mesh1.mesh
Network layer Part 3
Network layer Part 3Network layer Part 3
Network layer Part 3Tutun Juhana
 
Computer Network Lab
Computer Network LabComputer Network Lab
Computer Network Lab
AfsanaAkterRubi
 
Chap 03
Chap 03Chap 03
Chap 03
IGNOU
 
Network Models
Network ModelsNetwork Models
Network ModelsTechiNerd
 
Final project report
Final project reportFinal project report
Final project report
RaziaSultanaHimu
 
Lab room topology design with dns server
Lab room topology design with dns serverLab room topology design with dns server
Lab room topology design with dns server
kona paul
 
A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesMatthew Wolff
 
Computer Networks Lab
Computer Networks LabComputer Networks Lab
Computer Networks Lab
AfsanaAkterRubi
 
Application-Aware Acceleration for Wireless Data Networks: Design Elements an...
Application-Aware Acceleration for Wireless Data Networks: Design Elements an...Application-Aware Acceleration for Wireless Data Networks: Design Elements an...
Application-Aware Acceleration for Wireless Data Networks: Design Elements an...
Zhenyun Zhuang
 
Summarizing Software API Usage Examples Using Clustering Techniques
Summarizing Software API Usage Examples Using Clustering TechniquesSummarizing Software API Usage Examples Using Clustering Techniques
Summarizing Software API Usage Examples Using Clustering Techniques
Nikos Katirtzis
 

What's hot (20)

Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
Enhance the Security and Performance of IP over Ethernet Networks by Reductio...
 
Network Design for a Small & Medium Enterprise
Network Design for a Small & Medium EnterpriseNetwork Design for a Small & Medium Enterprise
Network Design for a Small & Medium Enterprise
 
Computer Network Lab
Computer Network LabComputer Network Lab
Computer Network Lab
 
Mumbai University BE IT Sem 3 Syllabus
Mumbai University BE IT Sem 3 SyllabusMumbai University BE IT Sem 3 Syllabus
Mumbai University BE IT Sem 3 Syllabus
 
Network Design For Alliance Française de Dhaka
Network Design For Alliance Française de DhakaNetwork Design For Alliance Française de Dhaka
Network Design For Alliance Française de Dhaka
 
Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
 
NTC 362 Massive Success / snaptutorial.com
NTC 362 Massive Success / snaptutorial.comNTC 362 Massive Success / snaptutorial.com
NTC 362 Massive Success / snaptutorial.com
 
C n practical file
C n practical fileC n practical file
C n practical file
 
02 Network Models(강의용)
02 Network Models(강의용)02 Network Models(강의용)
02 Network Models(강의용)
 
1.mesh
1.mesh1.mesh
1.mesh
 
Network layer Part 3
Network layer Part 3Network layer Part 3
Network layer Part 3
 
Computer Network Lab
Computer Network LabComputer Network Lab
Computer Network Lab
 
Chap 03
Chap 03Chap 03
Chap 03
 
Network Models
Network ModelsNetwork Models
Network Models
 
Final project report
Final project reportFinal project report
Final project report
 
Lab room topology design with dns server
Lab room topology design with dns serverLab room topology design with dns server
Lab room topology design with dns server
 
A Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network TopologiesA Comprehensive Guide To Internet Protocols and Network Topologies
A Comprehensive Guide To Internet Protocols and Network Topologies
 
Computer Networks Lab
Computer Networks LabComputer Networks Lab
Computer Networks Lab
 
Application-Aware Acceleration for Wireless Data Networks: Design Elements an...
Application-Aware Acceleration for Wireless Data Networks: Design Elements an...Application-Aware Acceleration for Wireless Data Networks: Design Elements an...
Application-Aware Acceleration for Wireless Data Networks: Design Elements an...
 
Summarizing Software API Usage Examples Using Clustering Techniques
Summarizing Software API Usage Examples Using Clustering TechniquesSummarizing Software API Usage Examples Using Clustering Techniques
Summarizing Software API Usage Examples Using Clustering Techniques
 

Similar to ECET 375 Invent Yourself/newtonhelp.com

ECET 375 Entire Course NEW
ECET 375 Entire Course NEWECET 375 Entire Course NEW
ECET 375 Entire Course NEW
shyamuopuop
 
Ecet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comEcet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.com
HarrisGeorgx
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguide
Yahye159
 
NTC 362 Massive Success / snaptutorial...com
NTC 362 Massive Success / snaptutorial...comNTC 362 Massive Success / snaptutorial...com
NTC 362 Massive Success / snaptutorial...com
donaldzs25
 
files_1575611773_2100523175.pdf
files_1575611773_2100523175.pdffiles_1575611773_2100523175.pdf
files_1575611773_2100523175.pdf
beherapravat936
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
Hansa Edirisinghe
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
Shakib Ansaar
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
Anil Kumar
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
Kavitabani1
 
Mis 589 Success Begins / snaptutorial.com
Mis 589  Success Begins / snaptutorial.comMis 589  Success Begins / snaptutorial.com
Mis 589 Success Begins / snaptutorial.com
WilliamsTaylor44
 
Mis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comMis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.com
Stephenson185
 
Group_1__Assignment_Case_Study_.pdf.pdf
Group_1__Assignment_Case_Study_.pdf.pdfGroup_1__Assignment_Case_Study_.pdf.pdf
Group_1__Assignment_Case_Study_.pdf.pdf
MainaliSabin
 
ECET 380 Success Begins/Newtonhelp.com
ECET 380 Success Begins/Newtonhelp.comECET 380 Success Begins/Newtonhelp.com
ECET 380 Success Begins/Newtonhelp.com
ledlang2
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorial
pinck2329
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
dohertyjoetta
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
Rohan Reddy
 
Significance
SignificanceSignificance
Significance
Julie May
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
nudicixox
 
CN_lecture1.ppt
CN_lecture1.pptCN_lecture1.ppt
CN_lecture1.ppt
rajucs
 

Similar to ECET 375 Invent Yourself/newtonhelp.com (20)

ECET 375 Entire Course NEW
ECET 375 Entire Course NEWECET 375 Entire Course NEW
ECET 375 Entire Course NEW
 
Ecet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.comEcet 375 Massive Success / snaptutorial.com
Ecet 375 Massive Success / snaptutorial.com
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguide
 
NTC 362 Massive Success / snaptutorial...com
NTC 362 Massive Success / snaptutorial...comNTC 362 Massive Success / snaptutorial...com
NTC 362 Massive Success / snaptutorial...com
 
files_1575611773_2100523175.pdf
files_1575611773_2100523175.pdffiles_1575611773_2100523175.pdf
files_1575611773_2100523175.pdf
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
Mis 589 Success Begins / snaptutorial.com
Mis 589  Success Begins / snaptutorial.comMis 589  Success Begins / snaptutorial.com
Mis 589 Success Begins / snaptutorial.com
 
Mis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comMis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.com
 
Group_1__Assignment_Case_Study_.pdf.pdf
Group_1__Assignment_Case_Study_.pdf.pdfGroup_1__Assignment_Case_Study_.pdf.pdf
Group_1__Assignment_Case_Study_.pdf.pdf
 
ECET 380 Success Begins/Newtonhelp.com
ECET 380 Success Begins/Newtonhelp.comECET 380 Success Begins/Newtonhelp.com
ECET 380 Success Begins/Newtonhelp.com
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorial
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Significance
SignificanceSignificance
Significance
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
 
CN_lecture1.ppt
CN_lecture1.pptCN_lecture1.ppt
CN_lecture1.ppt
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

ECET 375 Invent Yourself/newtonhelp.com

  • 1. ECET 375 Week 1 Homework For more course tutorials visit www.newtonhelp.com Chapter 1-Questions 1-3: Discuss the relationship between network architecture and protocol 1-5: Define the following terms: protocol, connection-orientated protocols, connectionless protocols, and protocol stacks. 1-11: Briefly describe the seven layers of the OSI protocol hierarchy 1-21: List and briefly describe the five basic data communications network topologies 1-23: Briefly describe the TCP/IP protocol model Chapter 3-Questions 3-1: In which layer of the OSI protocol hierarchy is the transmission medium found?
  • 2. 3-2: What are the two general categories of transmission media? 3-3: Define transmission line. 3-4: Describe a transverse electromagnetic wave. Chapter 3-Problems 3-1: Determine the wavelengths for the electromagnetic waves in free space with the following frequencies: 1 kHz, 100 kHz, 1 MHz, and 1 GHz 3-2: Determine the wavelengths for the electromagnetic waves in free space with the following frequencies: 1 cm, 1 m, 10 m, and 1000 m. 3-3: Determine the characteristic for a two-wire parallel transmission line with an air dielectric and D/r ratio of 8.8. 3-5: Determine the characteristic impedance for a coaxial cable with inductance L = 0.2 microHenrys/foot and capacitance C=16 picoFarads/foot. Chapter 4 Problems
  • 3. 4-1: Determine the wavelengths in nanometers, angstroms, and micrometers for the following frequencies: 3.45 * 1014 Hz, 3.62 * 1014 Hz, 3.21 * 1014 Hz 4-2: Determine the light frequency for the following wavelengths: 670 nm, 7800 angstroms, and 710 nm. =============================================== ECET 375 Week 1 iLabExploring Internet Standards RS 232 Communication and Connectors For more course tutorials visit www.newtonhelp.com Objective: In this lab you will explore: a)Internet RFCs b)RS-232 Communication data format c)Cables and Connectors
  • 4. ECET 375 Week 1 iLab Exploring Internet Standards, RS-232 Communication, and Connectors Objectives: During lab we explored Internet RFCs, RS-232 Communication data format and Cables and Connectors Results: This lab was basically a research project to help us understand how the Internet Standards are created and how to pick the correct interface material that meets the requirements of any interface. Some of the topics were also refresher information from other ECET classes like the ASCII wave forms. Conclusions: After you design a system it’s critical to use the correct interface mediums and material types that meet your requirements. Picking materials that cover data rate or frequency values beyond your requirement will have an adverse cost effect on your final design. Keeping up with technology and standards is important in engineering. Before you pick materials for your design, complete your research to insure you take advantage of standards and material types that meet your requirements but do not exceed them. Balance the quality of these materials with your projects budget and you’ll be successful. =============================================== ECET 375 Week 2 Homework
  • 5. For more course tutorials visit www.newtonhelp.com Chapter 2: 10, 11, 12, 16, 17 Chapter 5: 1, 2, 5, 8 Chapter 6: 3, 5 Chapter 13: 2, 5, 7, 12, 13, 19 =============================================== ECET 375 Week 2 iLab Calculating Spectrum and Linear Filtering in MatLab For more course tutorials visit www.newtonhelp.com ECET 375 Week 2 iLab Calculating Spectrum and Linear Filtering in MatLab Objectives This lab is intended to explore signal spectrums and filtering operations using MatLab. Running pre-written MatLab scripts and altering these codes to perform specific tasks will be necessary to develop the appropriate displays. Calculation of a signal spectrum using the SigSpec.m file, and altering this file to display different
  • 6. types of signals including Cosine, AM, and Square waves will help to explore signal characteristics and display MatLab functionality. Using a second per-written file (LinFiltering.m) and MatLab, displaying how filtering can affect a signal, will be used to describe this process and how the resulting signal changes. Results During the exploration of this lab, the MatLab program was used to run specific functions containing the code necessary for appropriate signal plotting. These plots were created for the cosine, the AM, the square wave, using random information and breaking down a sound file (.wav). For each of these signals a MatLab plot was acquired, and used for analysis. Additionally, running the LinFiltering.m file in MatLab allowed the explanation of filtering to be shown in a plot. These plots were created for both the time and frequency domain, and successfully showed how a filter can help contain a signal. Conclusions After the completion of this lab, the concepts included are starting to make more sense. Realizing how powerful MatLab can be, and the functions accomplished by it are astounding. Creating the signal plots, being able to visually see the intended signals and then manipulating these signals is a real asset in the learning process. Each signal has its own characteristics and these characterstics can be contained, soften the edges, by using different filtering techniques. These filters can help remove unneeded data, showing the true signal behind it. =============================================== ECET 375 Week 3 Homework
  • 7. For more course tutorials visit www.newtonhelp.com ECET 375 Week 3 Homework =============================================== ECET 375 Week 3 iLab Exploring A Digital Transmission System For more course tutorials visit www.newtonhelp.com ECET 375 Week 3 iLab Exploring A Digital Transmission System =============================================== ECET 375 Week 4 Homework For more course tutorials visit www.newtonhelp.com Chapter 16
  • 8. 16.2 - What is meant by a primary station? A secondary station? 16.6 – Briefly describe the poll/select line discipline. 16.8 – Briefly describe the sliding window method of flow control. 16.9 – What is the difference between character- and bit oriented protocols? =============================================== ECET 375 Week 4 iLab Exploring Internet Protocol Hierarchy and the Ethernet Layer For more course tutorials visit www.newtonhelp.com ECET 375 Week 4 iLab Exploring Internet Protocol Hierarchy and the Ethernet Layer Objective: In this lab, you will explore a)Internet Protocol Hierarchy b)ARP protocol and Ethernet Layer operation Required Equipment: A PC with Wireshark program installed Following file: ecet-375WebBrowsing.pcap
  • 9. Observations: The captured data was analyzed using Wireshark. This data was compiled into lists and used to populate data tables. Conclusion: The information and techniques are well documented. The lab went as well as expected. The Wireshark program leaves off the SFD and FCS from the packet data, otherwise everything went well and as expected. =============================================== ECET 375 Week 5 Homework For more course tutorials visit www.newtonhelp.com Chapter 18: 2) Determine the contents of the length field for MAC frame for the following conditions: 3) An Ethernet address of 07-01-02-03-04-05 iswhat type of address? =============================================== ECET 375 Week 5 iLab Exploring Internet Protocol Hierarchy and the Ethernet Layer
  • 10. For more course tutorials visit www.newtonhelp.com Objectives: This lab was the exploration of the DHCP protocol operation and the IP protocol operation using Wireshark and two .PCAP captured files. Results: The results showed that the DHCP was easy to follow in how it configured the client for a temporary IP address, along with a lease time, and also provided header information. The IP protocol provided details of messages sent such as fragment information and how many bytes per fragment. Conclusions:.Wireshark is designed in such a way that makes following the messages and server feedback readable and easy for troubleshooting. Although we did no troubleshooting in this lab, the concept is observable as we studied the details of each packet =============================================== ECET 375 Week 6 Homework For more course tutorials visit www.newtonhelp.com Chapter 20-Questions
  • 11. Pg-652-654 20-1: What is the primary purpose of using subnetting? 20-2: List and describe several reasons why network designers create subnetting. 20-3: Explain the differences between default masksandsubnet masks. 20-7: Explain the reasons for using supernetting. Chapter 20-Problems 20-1: What is the default mask for the network address 139.100.0.0? a.255.0.0.0 b.255.255.255.0 c.255.255.0.0 d.255.255.255.255 20-2: Using the default mask, how many hosts can the classful network 109.0.0.0 support? 20-7: How many hosts can be supported on a classful class B network with the following subnetmask: 255.255.224.0? 20-9: You have a host IP address of 40.150.73.10 and a subnet mask 255.248.0.0: 20-15: Determine the subnet addresses and subnet masks for a business network with the classful class C address 204.238.7.0 with six departments having separate subnetworks with the following numbers of hosts: 20-23: A small business has been assigned a classless network address 210.38.4.0.
  • 12. 20-24: Determine the following for the network specified in problem 20-23: Chapter 21-Questions Pg-700-702 21-3: What is the primary purpose of the address resolution protocol (ARP)? Chapter 21-Problems 21-3: Determine the contents of the first byte of an IP header if the IP protocol is IPv4 and the header has 40 bytes of options. 21-6: Determine the length of an ICMP data field for Ethernet frame that is carrying an IP datagram with a 28-byte header and an eight- byte ICMP header and the Ethernet data field is 600 bytes long. 21-7: Use the following network analyzer display of an ARP packet to answer the following questions: 0000 00 07 08 00 06 04 00 02 00 00 BD 41 2A 1C C1 98 0010 A0 14 00 00 40 A3 B1 CC C1 98 0F 10 21-8: Use the following network analyzer display of an IP packet to answer the following questions: 0000 45 28 13 82 01 A2 21 34 F3 01 43 A1 C0 99 4A 01 0010 99 4A 0C -- -- -- -- -- -- -- -- -- -- -- -- -- 21-11: A maximum-length data gram carrying 65,536 bytes can be transported over a WAN with a maximum packet length of 292 bytes, which includes the 20-byte IP header. Determine… ===============================================
  • 13. ECET 375 Week 6 iLab Exploring Internet Protocol Hierarchy and Ethernet Layers For more course tutorials visit www.newtonhelp.com Objectives The purpose of these lab procedures is to visually see how the Ping and Traceroute Applications work. This will be done using WireShark and a precaptured file “ecet-375RemotePingTracert.pcap”. The use of IP and ICMP protocols in diagnostic testing will be accomplished by writing the command in the DOS Prompt and captured in the WireShark program (already done for us). This file will be analyzed, depicting which packets do what and the time taken between specific packets. Results During the exploration of this lab, the WireShark program was used to analyze a pre-captured internet session. Examining the “Ping” ofwww.iana.org is the basis of the first procedure. Determining which packets are DNS query’s and which packets are DNS responses as well as the actual IP address for this link is accomplished in the first few steps. With the ICMP protocol, knowing that there are four requests and four echo responses, these packets are found and documented. Additionally, the times between request and reply are found and recorded with the help of the “Set Time Reference (Toggle)” within the WireShark program.
  • 14. The next procedure, Traceroute, also deals with a Dos command of “tracert” and is done on the same address of www.iana.org . The packets that take care of the DNS query for an IP address for the site are discovered and documented, as well as the number of HOPs performed on the investigated trace. Similar to the “Ping” procedure, the time between the requests and the error responses are discovered using the “Set Time Reference (Toggle)” with 3 requests and responses per HOP. Conclusions After completing this lab and seeing how these investigative tools can help in the diagnostic of a communication network, it is realized the importance of applications like these. In my profession I have used the “PING” command to see if a specific computer in the domain is “alive” and communicating. The Traceroute command is new and can be just as useful. Using the Traceroute application to ensure communications through all routers and switches is occurring and in a timely fashion can prove to be very useful in discovering issues to come. =============================================== ECET 375 Week 7 Homework For more course tutorials visit www.newtonhelp.com ECET 375 Week 7 Homework
  • 15. =============================================== ECET 375 Week 7 iLab Exploring TCP UDP Communication in the Internet For more course tutorials visit www.newtonhelp.com Discussion: TCP (Transport Control Protocol) and UDP (User Datagram Protocol) operate at the Transport layer of the Internet Protocol Hierarchy. They deliver information between Internet applications. To identify the applications running on a host, Internet transport layer uses port numbers, each a sixteen-bit number expressed as a decimal number (e.g. 80). Each host interface on the Internet is uniquely identified by an IP address, a 32-bit number usually expressed in dotted decimal notation (e.g.192.168.1.45). TCP and UDP combine data from multiple applications into a single outgoing connection at a source host. This process is called multiplexing. These protocols, at a destination host, separate data arriving at an incoming connection destined for different applications. This process is called demultiplexing. TCP is connection oriented and has many other features geared towards providing reliable communication, flow control and congestion control. UDP is connectionless and does not have these features. In this lab, you will analyze pre-captured Wireshark files to explore features of TCP and UDP protocols and their differences.