Premium Essay

Nt1210 Unit 6 Labs

In: Computers and Technology

Submitted By wwjd0509
Words 469
Pages 2
6.1.1
BSS - A set of STAs (the component that connects to the wireless medium such as a network adapter or NIC) that communicates with each other.
ESS - An Extended Service Set (ESS) is a set of two or more BSSs that form a single sub network.
6.1.2

6.1 review
1. How the service works is that it allows you to connect to the network.
2. Radio frequency is superior because it is fast cause it through a satellite.
3. WLAN is used in home because there easier to maintain and to take care of it I could be private.
6.2.1
The information that it’s giving me is that its showing the wireless networks around my area. A security key.
6.2.2
the information that given on the command line is it shows all your information on the router you have and it shows you in details. Its allows you to see in-depth allowing your to see information on your router.
6.2 review
1. The biggest problem would be collision if multiple routers are using the same channel a common example of this is Comcast routers are set to use a channel close to the signal for the ps3 so you get a depredation of signal and loss of data packets as the connection goes on.
2. If a previously stated standard is not compatible with your adapter you could have issues with your connection not connecting.
6.3.1
For a secure connection
6.3.2
The IP config show you everything you need to know from your IP address and your gateway and basically it shows you your networking.
6.3.3
Event viewer.
6.3 review
1. A guest having access to your network could result in any imaginable results on your network.
2. Setting a MAC filter is a good way to filter who has access to your network.
6.4
6.4.1
An omnidirectional antenna radiates transmissions out and receives transmissions in from all directions, although not equally in all directions. Most of the antennas in this category are thin rods or long flat…...

Similar Documents

Premium Essay

Unit 6 Subnetting Lab 6

...Unit 6 Subnetting Lab 6 Answer the following questions listed. Using the Class B Subnetting Guide, answer the following: Given an IP address of 172.16.8.1 use the guide to get 30 hosts on each of your 2000 networks: 1. What Class is this IP address? B 2. How many bits would you borrow or take? 11 3. What subnet mask would you generate? 255.255.255.224 4. What is the first subnetwork range created? 172.16.0.1 to 172.16.0.30 5. What is the last subnetwork range created? 172.16.255.225 to 172.16.255.254 Given an IP address of 172.16.4.1 use the guide to get 62 hosts on each of your 1000 networks: 6. What Class is this IP address? B 7. How many bits would you borrow or take? 10 8. What subnet mask would you generate? 255.255.255.192 9. What is the first subnetwork range created? 172.16.0.1 to 172.16.0.62 10. What is the last subnetwork range created? 172.16.255.193 to 172.16.255.254 Given an IP address of 172.16.5.1 use the guide to get 100 hosts on each of your 500 networks: 11. What Class is this IP address? B 12. How many bits would you borrow or take? 9 13. What subnet mask would you generate? 255.255.255.128 14. What is the first subnetwork range created? 172.16.0.1 to 172.16.0.126 15. What is the last subnetwork range created? 172.16.255.129 to 172.16.255.254...

Words: 274 - Pages: 2

Premium Essay

Sc4730 Unit 6 Lab

...SC4730 Unit 6 Lab 1. The DC Water and Sewer Authority (DCWASA), collects waste and storm water. Once it collects the waste and storm water it puts it through a nitrification/de-nitrification, effluent filtration, chlorination/de-chlorination and post aeration process. For solid wastes, the treatment includes thickening and dewatering processes and other processes such as screen and de-gritting processes, gravity thickeners, dissolved air flotation thickeners, sludge blending centrifuge dewatering. 2. DC WASA provides training for its employees depending on the expertise in the area they work in. 3. Raw water, waste water and storm water is separated at collection to avoid contamination and overflowing 4. All primary sludge and all of the nitrification and de-nitrification waste active sludge is demolished and also lime stabilized. All waste collected by the District of Columbia sewer system, Virginia and Maryland is delivered to the Blue Plains Advance Wastewater Treatment Plant. 5. Some nontoxic sludge can be used as soil conditioner and also as fuel, since it produces methane gas. 6. Yes, the plant uses a combined sewer overflow system to collect both the waste water and storm water in parts where it’s necessary. 7. One of the challenges of treating waste water is controlling toxic chemicals through special treatments and trying to minimize the amount of nutrients such as phosphorus and nitrogen from leaking into rivers. 8...

Words: 426 - Pages: 2

Free Essay

Nt1210 Unit 1 Lab 1.1

...| 0____ | | 4+ | 2 + | 0 = | 6 | 1.1.3 21↓ | 20↓ | | 2X | 1X | | 1____ | 1____ | | 2 + | 1 = | 3 | 1.1.4 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | 16X | 8X | 4X | 2X | 1X | | 1____ | 0____ | 0____ | 1____ | 0____ | | 16 + | 0 + | 0 + | 2 + | 0 = | 18 | 1.1.5 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | 128X | 64X | 32X | 16X | 8X | 4X | 2X | 1X | | 1____ | 1____ | 1____ | 0____ | 0____ | 0____ | 1____ | 0____ | | 128 + | 64 + | 32 + | 0 + | 0 + | 0 + | 2 + | 0 = | 226 | 1.1.6 156 | 28 | 28 | 28 | 12 | 4 | 0 | 0 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 0 | 0 | 1 | 1 | 1 | 0 | 0 = | 10011100 | 128 + | 0 + | 0 + | 16 + | 8 + | 4 + | 0 + | 0 = | 156 | 1.1.7 255 | 127 | 63 | 31 | 15 | 7 | 3 | 1 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 11111111 | 128 + | 64 + | 21 + | 16 + | 8 + | 4 + | 2 + | 1 = | 255 | 1.1.8 200 | 72 | 8 | 8 | 8 | 0 | 0 | 0 | | 27↓ | 26↓ | 25↓ | 24↓ | 23↓ | 22↓ | 21↓ | 20↓ | | v | v | v | v | v | v | v | v | | 128x | 64x | 32x | 16x | 8x | 4x | 2x | 1x | | 1 | 1 | 0 | 0 | 1 | 0 | 0 | 1 | 11001001 | 128 + | 64 + | 0 + | 0 + | 8 + | 0 + | 0 + | 1 = | 255 | 1.1.10 | 2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0...

Words: 552 - Pages: 3

Free Essay

Unit 6 Lab 2

...Unit 6 Lab 6.2 1. What are the available Password Policy options that could be enforced to improve security in a Group Policy? * Enforce password history: * Maximum password age * Minimum password age * Minimum password length * Passwords should always meet complexity requirements 2. How could you se security permissions and user access rights on a home computer using Windows XP Professional or similar that is not a member of the domain? Security permissions and user access can still be managed locally on the computer with local groups and applying the proper permissions to local users on the computer. Local group policies can also be managed. 3. Why is the use of different password policy options available and why is it important to implement complexity and length requirements? There are different policy options to have different options for companies to use, if it were all the same then hackers would know exactly what to look for, in this case it can be vary. It is important implement complexity and length requirements to secure and assure the company that proper passwords are being used to prevent easy hacking access for hackers. 4. Microsoft defines user rights in two types of categories: Logon rights and privileges. Explain the difference of the two from an access control perspective. Log on rights manage and control who can log in to a specific computer. Privileges determine what the user can access one they log in, they go hand and hand. ...

Words: 657 - Pages: 3

Free Essay

Nt1210 Lab 6. 1-4

...Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. It has a very very short range and is unable to penetrate walls and other objects. 3. It is able to maintain connection anywhere in the house it is setup in without the need of trailing a connection cable like wired connections so you get a tradeoff of speed vs versatility Lab 6.2 Review 1. The biggest problem would be collision if multiple routers are using the same channel a common example of this is Comcast routers are set to use a channel close to the signal for the ps3 so you get a depredation of signal and loss of data packets as the connection goes on. 2. If a previously stated standard is not compatible with your adapter you could have issues with your connection not connecting Lab 6.3 Review 1. Um well I could write a book but simply a guest having access to your network could result in any imaginable results on your network to name a few rootkits,Trojan droppers, Remote Access Terminals, Keyloggers, Viruse’s. 2. Setting a MAC filter is a good way to filter who has access to your network its simply like saying Fred has access to the building with his fingerprint being scanned by a biometric scanner. Although this can be spoofed by spoofing your mac but you would still have to find out which macs are allowed and have to make sure the mac your spoofing is not connected so that you do not receive a duplicate error. Lab Review 6...

Words: 393 - Pages: 2

Free Essay

Nt1210 Lab

...Fredrick Donaldson January 1, 2015 Introduction to Networking Chapter 1 Lab 1:1:1 Reading Binary 1) The mapping of 2931 should contain the values 2, 9, 3, and 1 in the lower-digits places and 2000, 900, 30, and 1 in the bottom boxes. The place values are the same regardless, so the only change is the addition of 103 as the leftmost digit value. 2 | 9 | 3 | 1 | 2,000 | 900 | 30 | 1 | Exercise 1.1.2 The mapping of 1102 will have 1, 1, and 0 in the lower bit values and 4, 2, and 0 in the bottom bits, for a sum of 6. 1 | 1 | 0 | 4 | 2 | 0 | Exercise1.1.3 The mapping of 112 will have a leading 0 to fit the mapping, which does not affect the results. The lower bits will have leading 0s and then 1 and 1 in the rightmost bits. This results in all 0s at the bottom, with 2 and 1 in the rightmost bits, for a sum of 3. 0 | 0 | 1 | 1 | 0 | 0 |...

Words: 349 - Pages: 2

Premium Essay

Nt1210 Unit 6 Labs

...6.1.1 BSS - A set of STAs (the component that connects to the wireless medium such as a network adapter or NIC) that communicates with each other. ESS - An Extended Service Set (ESS) is a set of two or more BSSs that form a single sub network. 6.1.2 6.1 review 1. How the service works is that it allows you to connect to the network. 2. Radio frequency is superior because it is fast cause it through a satellite.  3. WLAN is used in home because there easier to maintain and to take care of it I could be private. 6.2.1 The information that it’s giving me is that its showing the wireless networks around my area. A security key. 6.2.2 the information that given on the command line is it shows all your information on the router you have and it shows you in details. Its allows you to see in-depth allowing your to see information on your router. 6.2 review 1. The biggest problem would be collision if multiple routers are using the same channel a common example of this is Comcast routers are set to use a channel close to the signal for the ps3 so you get a depredation of signal and loss of data packets as the connection goes on. 2. If a previously stated standard is not compatible with your adapter you could have issues with your connection not connecting. 6.3.1 For a secure connection 6.3.2 The IP config show you everything you need to know from your IP address and your gateway and basically it shows you your networking. 6.3.3 Event viewer. 6.3 review 1. A......

Words: 469 - Pages: 2

Premium Essay

Nt1210 Lab 5.3

...Adrian Fisher NT1210 Tuesday class Professor K Lab 5.3 Exercise 5.3.1: When I entered the ipconfig/release command I couldn’t see my IP address anymore and when I entered ipconfig/renew my IP address came back up. Everything was the same. Exercise 5.3.2: Exercise 5.3.3: Here’s what happened when I entered command PING 192.168.1.1 Here what happened when I entered command WWW.GOOGLE.COM Exercise 5.3.4: Here’s what happened when I entered command PING –A 192.168.1.1 And this is what happened when I ping the local host in a argument. Exercise 5.3.5: Here’s what happened when I entered the command PING –N 6 192.168.1.1. From what I can gather from my research, being able to to send out a certain number of pings that you desire allows you to further analyze the speed of the ping better and get an average round trip time. Exercise 5.3.6: Here’s what happened when I entered command TRACERT 192.168.1.1. It looks like the trace went through 1 system. When I sent the trace to WWW.GOOGLE.COM the trace went through 14 devices. Here’s what happening. Here’s what happened when I traced WWW.NFL.COM. Exercise 5.3.7: There are 2 active connections and 2 protocols being performed when I ran netstat. Here’s what it looked like. When I ran the netstat after I opened up internet explorer this is what popped up....

Words: 256 - Pages: 2

Premium Essay

Nt1210 Unit 5

...LAN Standards Kevin Nguyen David Beitl Luis Benitez NT1210 1/25/2015 5.1.1 802.1 standard is basically that it handles the architecture, security, management and internetworking of LAN, MAN, WAN standardized by IEEE 802. 5.1.2 What 802.3 standard originally defined PoE functionality? The IEEE 802.3af standard When was the standard enhanced, and what was the new standard name given for the enhancement? It was changed in 2009 and it was called IEEE 802.3at 5.1.3 Ethernet Standards Standard | Speed | Segment Length | Cable | 10Base5 | 10Mbps | 500m | Rg-8 or RG-11 Coaxial | 10Base2 | 10Mbps | 185m | RG-58 A/U or RG-58 C/U Coaxial | 10Base-T | 10Mbps | 100m | Cat 3 or better UTP | 100Base-T | 100Mbps | 100m | Cat 5 UTP or STP | 100Base-TX | 100Mbps | 100m | Cat 5 UTP or STP | 100Base-FX | 100Mbps | 2km | 2-pair 850 nm Multimode optic fibers | 1000Base-T | 1Gbps | 100m | 4-pair, Cat 5 or Cat 5e | 1000Base-SX | 1Gbps | 550m (multimode) | 2-pair fiber optic | 5.1.4 What does the numeric prefix before BASE the Ethernet standards? It denotes its maximum data transmission rate What does the inclusion of the postfix of –T imply? A reference to the twisted pair cable needed for this standard. Lab 5.1 Review 1. What would the maximum speed of traffic be from a node in network A to a node in network B? 10 Mbps 2. How is it possible for a network to uphold a maximum speed when it allows different categories of UTP wire......

Words: 359 - Pages: 2

Free Essay

Nt1210 Unit 4 Labs

...Unit 4 Labs SJR Exercise 4.1.1 So that each piece of equipment work together on a network work to together properly. Exercise 4.1.2 Because the voltage uses to transmit data only needs to be high enough for the receiver to detect it. Exercise 4.1.3 Shielded copper cables would be used where there is a possibility of more electric interference. To help prevent this interference with the cables. Exercise 4.1.4 Category | Maximum Speed | Application | 1 | - | Telephone cabling (POTS) | 2 | 4Mbps | Token Ring | 3 | 4Mbps | Can be used for telephones | 4 | 16Mbps | Fast Token Ring | 5 | 1Gbps | Desktop cabling | 5e | 1Gbps | Gigabit Ethernet | 6 | 10Gbps | Multi gigabit Ethernet | 6a | 10Gbps | Multi gigabit Ethernet | Exercise 4.1.5 Exercise 4.1.6 Coaxial cable has a copper core with an inner dielectric insulator, a woven copper shield, and an outer plastic sheath for protection. Exercise 4.1.7 Not to go over the length of 85-90 meters between any given connection. Exercise 4.1.8 Straight through cabling. Exercise 4.1.9 No, S1-S2 and S2-G. Fiber Optics should be used in these cases. Exercise 4.1.10 Multimeter – Measures voltage, current, and resistance. Tone Generator - A signal generator used to generate an audio-frequency signal suitable for signaling purposes or for testing audio-frequency equipment. Pair Scanner – An Ethernet cable tester Time Domain Reflectometer - An electronic instrument that uses time-domain......

Words: 636 - Pages: 3

Free Essay

Nt1210 Unit 4 Labs

...Unit 4 Labs SJR Exercise 4.1.1 So that each piece of equipment work together on a network work to together properly. Exercise 4.1.2 Because the voltage uses to transmit data only needs to be high enough for the receiver to detect it. Exercise 4.1.3 Shielded copper cables would be used where there is a possibility of more electric interference. To help prevent this interference with the cables. Exercise 4.1.4 Category | Maximum Speed | Application | 1 | - | Telephone cabling (POTS) | 2 | 4Mbps | Token Ring | 3 | 4Mbps | Can be used for telephones | 4 | 16Mbps | Fast Token Ring | 5 | 1Gbps | Desktop cabling | 5e | 1Gbps | Gigabit Ethernet | 6 | 10Gbps | Multi gigabit Ethernet | 6a | 10Gbps | Multi gigabit Ethernet | Exercise 4.1.5 Exercise 4.1.6 Coaxial cable has a copper core with an inner dielectric insulator, a woven copper shield, and an outer plastic sheath for protection. Exercise 4.1.7 Not to go over the length of 85-90 meters between any given connection. Exercise 4.1.8 Straight through cabling. Exercise 4.1.9 No, S1-S2 and S2-G. Fiber Optics should be used in these cases. Exercise 4.1.10 Multimeter – Measures voltage, current, and resistance. Tone Generator - A signal generator used to generate an audio-frequency signal suitable for signaling purposes or for testing audio-frequency equipment. Pair Scanner – An Ethernet cable tester Time Domain Reflectometer - An electronic instrument that uses time-domain......

Words: 636 - Pages: 3

Free Essay

Nt1210 Unit 3 Lab 3.3

...service may use the User Datagram Protocol (UDP), which provides a connectionless datagram service that emphasizes reduced latency over reliability. The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768. UDP uses a simple connectionless transmission model with a minimum of protocol mechanism. It has no handshaking dialogues, and thus exposes any unreliability of the underlying network protocol to the user's program. There is no guarantee of delivery, ordering, or duplicate protection. UDP provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram. Lab 3.3 review 1. UDP is a connectionless protocol, unlike TCP, so there is no feedback on whether a packet was received. When would this type of protocol be useful and what is the benefit of using it? Use your textbook and Internet research to draw your conclusions. UDP can be very useful in certain situations, and it enjoys one key advantage over TCP - speed. The reliability features built into TCP can be expensive in terms of overhead at execution time. Therefore, many applications find UDP well-suited for their needs, for the following reasons: No connection establishment 2. HTTP is the common protocol used to retrieve web resources in a web browser. This runs over TCP/IP networks using TCP. What characteristics of......

Words: 691 - Pages: 3

Premium Essay

Networking Labs for Unit 6

...Brandon Hellbach Unit 6 Labs Lab 6.1: Wireless Broadcast Domains Exercise 6.1.1 – A Basic Service Set does exactly what its name says; basic wireless service, one and only one AP creates the wireless LAN. Extended Service Set extends the wireless functions of a Basic Service Set. The difference is that in a BBS uses one AP to create one wireless LAN while an ESS uses more than one AP to create one wireless LAN. Exercise 6.1.2 – IEEE 802.11 Standards Standard | Frequency (GHz) | Maximum Transmission Rate (Mbps) | Standard Indoor Transmission Range (m) | Standard Outdoor Transmission Range (m) | 802.11a | 5 | 54 | 40 | 100 | 802.11b | 2.4 | 11 | 70 | 150 | 802.11g | 2.4 | 54 | 38 | 140 | 802.11n | 2.4 or 2.5 | 600 | 75 | | Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. Infrared has a very short range and cannot penetrate walls and other objects making radio frequency superior. 3. Although WLANs have a lower speed they are more convenient than wired LANs. So the trade-off is speed for convenience of not having wires everywhere which is why WLANs are more common in households. Lab 6.2: Identifying WLANs Exercise 6.2.1 - What information about the wireless networks is available using the utility? The utility provides the name, signal strength, and MAC address of the available wireless networks. What information is given on the wireless networks with the......

Words: 574 - Pages: 3

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they......

Words: 16182 - Pages: 65

Free Essay

Nt1210 Lab 4

...Lab 4 NT1210 Cristian Randle Lab 4.1: Copper Cabling 4.1.1: So that NIC’s on different ISP providers can communicate to each other. 4.1.2: The copper wiring is used to power appliances and other devices so it has a high capacity for transmitting electricity. 4.1.3: More expensive shielded cables cause far less interference. Steel reinforced concrete, radio transmitters. 4.1.4: Category | Maximum Speed | Application | 1 | 1 Mbps | Telephone cabling (POTS) | 2 | 4 Mbps | Token Ring | 3 | 10 Mbps | Token Rink | 4 | 16 Mbps | Token Ring Networks | 5 | 100 Mbps | Ethernet, Fast Ethernet, Token Ring | 5e | 1Gbps | Ethernet, Fast Ethernet, Gigabit Ethernet | 6 | 10 Gbps | GigabitEthernet, 10G Ethernet | 6a | 10 Gbps | GigabitEthernet, 10G Ethernet | 4.1.5: 4.1.6: Plastic jacket, metallic shield, dielectric insulator and center core. 4.1.7: Only good under 100 meters 4.1.8: Both straight and crossover cables 4.1.9: S2 to G is too far away to work. Fiber optics would be needed. 4.1.10: Multi-meter: It can be used to locate the failure of electrical system and the defective parts. Tone generator: It acts as a testing device for informational signals that come handy when dealing with telephone systems. Pair Scanner: Identifies connection hosts on a subnet. Time Domain Reflectometer: Locate and identify faults in all types of metallic cables Lab 4.1 review: 1. Less confusion, need only one type of cable easier to install, less time......

Words: 739 - Pages: 3

Lifestyle | Joseph Mascolo | └ TV, audio e video