C. two PCs, with one cabled to a router Ethernet port with a crossover cable and the other PC cabled to another router Ethernet port with a crossover cable. 7. A. hubs create a single electrical bus to which all devices connect, causing the devices to share the bandwidth. C. hubs allow collisions to occur when two attached devices send data at the same time. 8.
A PC NIC and a switch port create one electrical circuit to use when sending data from the PC to the switch. The transmitter uses a simple encoding scheme that uses a higher amplitude to encode 1 and a lower amplitude to encode 0, sending 1 bit in each bit time. The bit rate is 2000 bits per second (2000 bps). Which of the following is true on this circuit? B.
10 Mbps 2. How is it possible for a network to uphold a maximum speed when it allows different categories of UTP wire to be used? The maximum speed would be determined by the highest cable speed that you have. LAB 5.2: MAC and IP Addresses Exercise 5.2.1 Like your mailing address at home, your computer's NIC has a unique address. This address must be unique in the entire world.
TCP is the transport layer protocol that links the application layer to the network layer. TCP breaks the data into smaller packets, numbers the packets, ensures each packet is reliably delivered, and puts the packets in the proper order at the destination. IP is the network layer protocol and performs addressing and routing. IP software is used at each of the computers through which the message passes through; IP routes the message to the final destination. TCP/IP is the transport & network layer protocol used on the Internet.
What devices would operate at the access layer? Draw a diagram of these devices at the access layer. Label all of the devices. (10 points) Yes, this network does require an access layer for the users to connect to the network. Devices in this layer are the lower end switches and wireless access points.
| Resource owner | Rule-based access controls | A list of rules, maintained by the data owner, determines which users have access to objects | Data Owner | Content-dependent access controls | Access control is based on what is contained in the data. | Access control mechanism | Nondiscretionary access controls | Closely monitored by the security administrator, not the system administrator | Security Administrator | Select an access control model for each of the following scenarios. 1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. a.
Question 1 What is the name of the computer you are working from? SEA-SVR1 Question 2 What is the default lease duration of a Wired subnet type? 6 long time Question 3 What are three recommendations listed in Server Manager for managing the DHCP Server role? 1. Increase fault border by change integrity DHCP orbital cavitys.