How many networks will be created using a 255.255.0.0 given a class A IP network (i.e., 10.0.0.0)? 3. What would be the dotted decimal equivalent o the slash notation of /30? 4. What would be the dotted decimal equivalent o the slash notation of /8?NT2640.U3.AS1.IP Subnetting Assignment 5.
DHCP Server 10.10.0.11 | Question 8 | If the answer to #7 was not the IP address of the SEA-SVR1 computer, why might this have happened? It was | Question 9 | What nodes appear underneath the DHCP scope that you created in Exercise 1? Address Pool, Address Leases, Reservations, Scope Options | Question 10 | What appears in the IP address text box?10.10.0.10 the Ip address of the Domain Controller | Question 11 | What value is configured in the DNS Servers: line? 10.10.0.10 | Question 12 | What value is configured in the DNS Servers: line?10.10.0.10 | Question 13 | What is the default location for DHCP server backups? C:\windows\system32\dhcp\backup\ | Question 14 | What IP address is configured on the SEA-SVR2computer?169.254.209.252 | Question 15 | What appears in the IP address text box?10.10.0.55 | Question 16 | From which DHCP server are you receiving an IP
* 253, and 254 6. What organization has been given the responsibility for assigning port numbers, sometimes referred to as “Well Known Ports or Registered Ports”? * Internet Corporation for Assigned Names and Numbers (ICANN) 7. Determine the protocol numbers for the protocol names: Port | Application/Protocol | TCP-23 | Telnet | TCP-443 | HTTPS | UDP-53 | DNS | UDP-123 | Network Time Protocol | TCP-110 | POP 3 | TCP-25 | SMTP | TCP-80 | HTTP | UDP-88 | Kerberos | TCP-22 | SSH | UDP-161 | SNMP | 8. What numeric range is commonly referred to as well-known ports?
In telecom closet 2, from the punch down block, to the switches, to the wall plates, and on to the offices workstation, plus one shared printer, cabling will change to Cat 5e UTP, using 1000 Base-T technology, achieving a throughput of 1000Mbps. A safety feature on Ethernet Lans, is its access method, CSMA/CD. CSMA/CD, means that your NIC checks the network to make sure it is not busy before transmitting, if two nodes do transmit at the same time having a collision, it will send out packets to inform other nodes of a data collision, then the NIC waits for the network to be inactive before retransmitting. On the
Lab 1 INTRODUCING WINDOWS SERVER 2008 NETWORKING |QUESTION 1 |WHAT THREE CATEGORIES OF TASKS ARE LISTED IN THE ICT INTERFACE? | |Question 2 |What is the current time zone configured for this computer? | |Question 3 |Why does a shield icon appear next to the Change date and time button? | |Question 4 |What is the current name of your computer? | |Question 5 |What name is assigned to your computer?
It is smart to design the cabling with a 10:1 ration to support future bandwidth growth 4. What backbone cabling should you use? -UTP, ScTP, STP; 62.5/125 micron or 50/125 micron multimode optical fiber -You can also go with 8.3/125 micron single-mode optical fiber Chapter 5 1. What type of network cable would you use to connect the telecommunications room to the equipment room and what type of media would you specify inside the cable? -All in all, I would use Cat-5e to connect the telecommunication room to the equipment room.
d. The distance between the client device and the AP. 4. An enterprise campus WLAN uses a single 802.11n AP, with 20 clients that all use 802.11n. The AP uses only a single stream, but it does use a double-wide channel, with a maximum data rate for a single transmission of 150 Mbps. The same floor has an Ethernet LAN, with 20 PCs connected using 10BASE-T, UTP cabling.
Question 15 The Wide Area Network (WAN) design below represents what type of fault-tolerant network design? Question 16 Which QoS design consideration is incorrect? Question 17 Which term is best described by the following definition: “Both NICs are active at the same time, and they each have their own MAC address”? Question 18 Which of the following is one of the two modes of Network Interface Card (NIC) redundancy? (Choose 2) Question 19 The ________ command can be used to display information about current sessions, including source and destination IP addresses and port numbers.
To identify where wireless devices such as APs should be placed in the network you should do what kind of test? Site Survey What does the WiFi Alliance do? Promotes Wi-Fi technology and certifies Wi-Fi products if they conform to certain standards. A company installs an 802.11g AP to rive its employee's wireless access from their cubicles. Carl's cubicle is 40 feet from the AP, Paul's is 20 feet, and Mark's is 100 feet.
Lab 5 Lab 5.2.1 Each NIC must have a unique MAC address because all data is forwarded based on the destination address so without it the switch wouldn’t know where to send the data. 5.2.2 Information on the Support tab: Address Type – DHCP IP Address – 10.39.108.176 Subnet Mask – 255.255.252.0 Default Gateway – 10.39.110.15 5.2.3 Physical address of the NIC for this connection: 00-0C-29-20-53-9E 5.2.4 Manufacturer of the NIC: VMWare 5.2.5 IP address of the NIC and default gateway: 10.39.108.176 10.39.110.1 5.2.6 Steps in an ARP Request and Response: Step 1: When a source device want to communicate with another device, source device checks its Address Resolution Protocol (ARP) cache to find it already has a resolved MAC Address of the destination device. If it is there, it will use that MAC Address for communication. To view your Local Address Resolution Protocol (ARP) cache, Open Command Prompt and type command "arp -a" (Without double quotes using Windows Operating Systems). Step 2: If ARP resolution is not there in local cache, the source machine will generate an Address Resolution Protocol (ARP) request message, it puts its own data link layer address as the Sender Hardware Address and its own IPv4 Address as the Sender Protocol Address.