Unit 7 Assignment Christopher Place Kaplan Online University Unit 7 Assignment Question 1 A Media Access Control Address (MAC Address) is also known as a physical address and is used on the media access control protocol sublayer and is assigned to routers ports to identify them to a physical address. The reason for the router having more than one MAC address is because it has two different ports assigned for different reasons and in this case it is for internet and LAN. An IP address is an address associated with every device on a network and a computer so that the internet knows where the web servers and mail servers can send their data to. The reason for the two different IP addresses on the router is because every router has two of them one is called the WAN interface or public IP address and the other is called LAN interface or private IP address. The WAN interface is the side that is connected to the internet which is why it is public and the LAN interface is the side that is connected to the network and that is why it is private.
Routers R1 and R2 are directly connected via their serial interfaces and are both running the EIGRP routing protocol. R1 and R2 can ping the directly connected serial interface of their neighbor, but they cannot form an EIGRP neighbor adjacency. What action should be taken to solve this problem? Configure both routers with the same EIGRP process
Which of the following is a Windows command-line utility for seeing NetBIOS shares on a network? * c. Net view 29. To view eDirectory information on a NetWare 5.1 server, which of the following tools should you use? * d. Novell Client 30. The Nbtstat command is used to enumerate *nix systems.
Then convert the address to decimal form. By controlling which IP addresses assigned to the individual computer, you must make sure you assign it one of the IP addresses your provider gave you; assign it the netmask your provider gave you; and assign it a gateway, which is the IP address of your router When setting up a router, you: assign it the IP address, in the range, your provider gave you; assign it the netmask your provider gave you; tell it the IP address of your ISP's
NT1210 Research Paper From what I gathered about “Layer 2 switches” is that the Layer 2 switches use a MAC address from a host NIC card. This makes it to decide where to “forward frames”. Also Layer 2 is a hardware-based control. It uses “application-specific integrated circuits”, which provides “wire speed, high speed, low latency”. OIS layer 7 packets are called “layer 4-7 switches” these are like content switches, content service switches and web switches or application switches… Content switches are normally used for “load balancing” among server groups like on TCP/IP.
IP Address Class A, Class B, and Class C IP Address classes were the original organizational structure for IP addresses. The specific address class would determine the maximum potential size for a computer network. The address class would define which of the specific bits of the address would be used to identify the network and network identification, the bits to identify the host computer and host ID, and total number of host subnets permitted per network. Five total classes of IP addresses were defined, class A through E. Although the IP class term will commonly be used to describe the difference between one network and another, the practical use of addressing is not commonly used any more. It has been replaced with classless addressing where a netmask can be assigned to any IP address range.
What is one of the earliest mechanisms designed to provide Web servers with application-hosting capabilities? A) UDDI B) ISAPI C) CGI D) SSI Feedback: The Common Gateway Interface (CGI) is one of the earliest mechanisms designed to provide Web servers with application-hosting capabilities. CGI is essentially a protocol that enables a Web server to run an application specified in a client request and pass the request to that application for processing. The Web server then receives the output from the application and packages it as a reply to the client in the form of a Web page. Table for Individual Question FeedbackPoints Earned:1.0/1.0Correct Answer(s):C 3.
Unit 10: Troubleshooting and Networks Learning Objective Explain the client-server and peer-to-peer network models. Describe the six-step troubleshooting process. Key Concepts Using a troubleshooting process Operation of the Internet TCP/IP protocols Reading Pearson Certification Team, Chapter 10: Troubleshooting and Chapter 11: Networks Keywords Use the following keywords to search for additional materials to support your work: * Electrostatic discharge Windows recovery environment Recovery console System restore Blue screen errors Client Server Peer-to-peer Modem ISDN Broadband Internet DSL LAN TCP/IP HTTP/HTTPS SSL HTML FTP Telnet DNS Port Email UTP Fiber-optic cable IP address IPCONFIG Ping Quiz 10 1. When two bodies of different charges come together, you get a. ARC b. grounded c. ESD d. static buildup 2. What is the last step of the troubleshooting process?
Voice or data computers, network interfaces, and transmission medium C. Modems, transmission links, and wireless access points D. TCP/IP software, modems, and transmission links Correct! The correct answer is: B. âA network consists of two or more connected computersâ (Laudon & Laudon, 2011, p. 194). âBasic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switchâ (p. 225). Networking and telecommunications technology, consisting of both physical devices and software, links the various pieces of hardware and transfers data from one physical location to another. 2.
Video 4.0 * SSL * Used by web browser * Encrypts data being sent from your pc to the server * Https:// Terms SSL- secure sockets layer Summary This segment went over SSL or secure sockets layer and what it used for. Also it covered what to look for when trying to see if the site your on is using SSL. My Thoughts This was a short and to the point video. I liked how it showed the user where to look for the SSL location or https:// . Video 4.14 * Email * SMTP * POP3 and IMAP4 Terms SMTP- simple mail transfer protocol is used to SEND email to the mail server and to the internet POP3- Post office protocol is the service used to download emails from the mail server to the client.