2. Which layer of the TCP/IP model processes requests from hosts to make sure a connection is made to the appropriate port? i. Application Layer 3. What are well known ports?
| Question 4 | What is the name of the computer you are working from? SEA-SVR2 | Question 5 | What IP addressing settings are currently configured?10.10.0.12 | Question 6 | Is the computer currently configured for DHCP? How can you tell? Yes, DHCP enabled and it received an ip address of 10.10.0.20 | Question 7 | What is the IP address of the DHCP server from which W2K8yy has obtained its IP address? DHCP Server 10.10.0.11 | Question 8 | If the answer to #7 was not the IP address of the SEA-SVR1 computer, why might this have happened?
Suppose the university has the 128.100.xxx.xxx address range on the Internet. How would you assign the IP addresses to the various subnets? How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions. As a network manager, I would assign the IP addresses to various subnets by associating a subnet base address with each physical network.
Routers R1 and R2 are directly connected via their serial interfaces and are both running the EIGRP routing protocol. R1 and R2 can ping the directly connected serial interface of their neighbor, but they cannot form an EIGRP neighbor adjacency. What action should be taken to solve this problem? Configure both routers with the same EIGRP process
Answer After I study the case, I will control the users IP addresses validating them by a Domain Controller. This server will have a pool of valid IP address from 128.100.001.001 to 128.100.210.255. I would assign the IP addresses using Routers, they will control the DHCP on each building’s subnet and also they will be connected to the College Backbone subnet and validate the LAN access. The subnet IP range assignment will be: 128.100.001.xxx; for the backbone subnet Router, who will assign Building Routers IP addresses. 128.100.005.xxx to 128.100.85.xxx for the Admin (10 Buildings).
Unit 10: Troubleshooting and Networks Learning Objective Explain the client-server and peer-to-peer network models. Describe the six-step troubleshooting process. Key Concepts Using a troubleshooting process Operation of the Internet TCP/IP protocols Reading Pearson Certification Team, Chapter 10: Troubleshooting and Chapter 11: Networks Keywords Use the following keywords to search for additional materials to support your work: * Electrostatic discharge Windows recovery environment Recovery console System restore Blue screen errors Client Server Peer-to-peer Modem ISDN Broadband Internet DSL LAN TCP/IP HTTP/HTTPS SSL HTML FTP Telnet DNS Port Email UTP Fiber-optic cable IP address IPCONFIG Ping Quiz 10 1. When two bodies of different charges come together, you get a. ARC b. grounded c. ESD d. static buildup 2. What is the last step of the troubleshooting process?
Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):sendmail; Sendmail 5. What tasks must you complete to install SSL on an IIS server? A) Obtain and install a server certificate. B) Create an SSL binding for your Website(s). C) Configure the Website or FTP7 site to use SSL.
Scenario 5-1 1) If they enter their home IP address 10.54.3.145 and add the port number at the end :283 in the address line of the browser, it will access IE through port 283, taking the user to the internal
IP Address Class A, Class B, and Class C IP Address classes were the original organizational structure for IP addresses. The specific address class would determine the maximum potential size for a computer network. The address class would define which of the specific bits of the address would be used to identify the network and network identification, the bits to identify the host computer and host ID, and total number of host subnets permitted per network. Five total classes of IP addresses were defined, class A through E. Although the IP class term will commonly be used to describe the difference between one network and another, the practical use of addressing is not commonly used any more. It has been replaced with classless addressing where a netmask can be assigned to any IP address range.
NT1210 Research Paper From what I gathered about “Layer 2 switches” is that the Layer 2 switches use a MAC address from a host NIC card. This makes it to decide where to “forward frames”. Also Layer 2 is a hardware-based control. It uses “application-specific integrated circuits”, which provides “wire speed, high speed, low latency”. OIS layer 7 packets are called “layer 4-7 switches” these are like content switches, content service switches and web switches or application switches… Content switches are normally used for “load balancing” among server groups like on TCP/IP.