Preview

Data Communication and Networking Lab Exercise

Satisfactory Essays
Open Document
Open Document
430 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Communication and Networking Lab Exercise
Data communication and networking 7040

Week 4 assignment: Lab exercise

Introduction:
All network administrators must focus the rules and their system and network administrations and clients will discover satisfactory. These operational conditions can be viewed as ordinary for that system. Studies have demonstrated that system supervisors are wagering on expanded transmission capacity as the answer for system issues. A decently characterized and appropriately executed system testing methodology will help the system supervisor foresee the operation of the system.
Different types of tests:
1. Ping test
2. Speed test
3. Net Index
Ping Test
Ping is a standard utility system accessible on generally PCs. A ping utility sends test messages from the PC to a remote gadget over a TCP/IP system. Other than figuring out if the remote PC is as of now internet, ping likewise gives markers of the general pace or unwavering quality of system associations. The Ping utility is basically a system organizer and the apparatus that is utilized to check whether a PC is working further more to check whether system associations are in place. Ping uses the Internet Control Message Protocol (ICMP) Echo capacity which is point by point in RFC 792. A little parcel is sent through the system to a specific IP address. This parcel contains 64 bytes - 56 information bytes and 8 bytes of convention peruse data and the chance that the associations are great and the target PC is up, a great return bundle will be reversed. PING can likewise tell the client the quantity of bounces that lie between two PCs and the measure of time it takes for a parcel to make the complete excursion. Also, a head can utilize
Ping to test out name determination.

Graph Dates of My Home Network
From01/13/2015 to 02/03/2015

`

01/13/2014

01/19/2015

01/26/2015

02/03/2015
Ping
16
23
23
17
Speed
22.75
17.96
25.61
27.27
Index
86.2
86.2
86.2
86.2
Jitter
3
5
3
3
Loss
0
0
0
0

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 Unit 5 Questions

    • 821 Words
    • 3 Pages

    support autonegotiation. Both PCs connect to a LAN switch using a UTP cable. Both switch ports…

    • 821 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    A network communication mode in telecommunications and computer networking, where a communication session or a semi-permanent connection is established before any useful data can be transferred, and where a stream of data is delivered in the same order as it was sent…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    It’s used for port scanning. It can be used to see what hosts are on the network and to see what services they are running.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Whenever you and another person are playing online games, you’re not actually sending out massive amounts of information over the internet. Most of the graphically intense displays you see on the screen are actually on your local machine. It’s not explosions being sent over the physical wire itself. The only packets and things your machine is sending over the wire is the actual positioning of where you are on the map, your direction, and vertical positioning as well.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4639 Words
    • 19 Pages

    Typically this constitutes an interface for communicating with the device, through the specific computer bus or communications subsystem that the hardware is connected to, providing commands to and/or receiving data from the device, and on the other end, the requisite interfaces to the operating system and software applications. It is a specialized hardware-dependent computer program which is also operating system specific that enables another program, typically an operating system or applications software package or computer program running under the operating system kernel, to interact transparently with a hardware device, and usually provides the requisite interrupt handling necessary for any necessary asynchronous time-dependent hardware interfacing…

    • 4639 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    According to S. Branch (2012), in his article What is a Ping Sweep he says “A ping sweep, also called an Internet Control Message Protocol (ICMP) sweep, is a diagnostic technique used in computing to see what range of (IP) addresses are in use by live host, which are usually computers”. Ping sweeps are not unusual, they are often used by administrators in diagnosing network issues; however, hackers also use ping sweeps to find active computers so they will know where to concentrate their attacks. This can become a serious security breach for an unprepared network. Hackers send not one ping but many packets at the same time. This tends to slow down a network. When the hackers ping sweep finds an active computer it can send request for confidential information.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Labpaq Case Study

    • 4681 Words
    • 19 Pages

    Testing involves operation of a system or application under controlled conditions and evaluating the results. Controlled conditions should include both normal and abnormal…

    • 4681 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    drive test

    • 361 Words
    • 2 Pages

    Verified interoperability between the assigned platform and mobile phones towards network vendors in live network and lab for LTE, UMTS, GSM, EVDO and CDMA…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Latency : In a network, latency, a synonym for delay, is an expression of how much time it takes for a packet of data to get from one designated point to another. In some usages (for example, AT&T), latency is measured by sending a packet that is returned to the…

    • 820 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    SSL-Secure socket layer

    • 2648 Words
    • 11 Pages

    server, this is an important protocol due to the expansion of Internet. In fact, it is a long…

    • 2648 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Although ICMP messages are contained within standard IP datagrams, ICMP messages are usually processed as a special case, distinguished from normal IP processing, rather than processed as a normal sub-protocol of IP. In many cases, it is necessary to inspect the contents of the ICMP message and deliver the appropriate error message to the application that generated the original IP packet, the one that prompted the sending of the ICMP message.…

    • 2030 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Internet Protocols

    • 542 Words
    • 2 Pages

    Internet protocols, or Internet rules, are the standards used to send data from one computer to another. The protocols that expedite data transfer include Internet Protocol Versions Four and Six, Remote Access, Hyper Transfer, File Transfer, Electronic Mail, and Network News Transfer. Communication and information transfer on the Internet is becoming available in constantly increasing speeds. Internet protocols use these increasing speeds by facilitating communication, and information transfer, while benefiting the end user.…

    • 542 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The purpose of this book is to show you how to make network-aware applications that run on the Microsoft Windows and Windows NT operating systems using the Windows Sockets (WinSock) Application Programming Interface (API). To that end, several practical examples are examined that utilize the basic functionality of WinSock. Network operating systems, such as Windows for Workgroups and Windows NT, provide basic file and printer sharing services. This most basic level of functionality is provided “out of the box.” Network-aware applications are programs that use the capabilities of a collection of connected computers. Network-aware programs range from custom applications that transfer data among computers on a network to mainstream applications that enable electronic mail and remote database access. The WinSock API is a library of functions that a programmer can use to build these network-aware applications. WinSock has its roots in Berkeley sockets as introduced in the Berkeley Software Distribution of UNIX. WinSock uses the TCP/IP (Transmission Control Protocol/Internet Protocol) suite, which provides the formal rules of behavior that govern network communications between all computers running this particular computer networking protocol. Before I begin the examination of network programming, look at the basics of computer networking in general. A network can be loosely defined as a collection of two or more computers that have some sort of communication path between them. A network can be loosely classified as either a local area network (LAN) or wide-area network (WAN). The use of the terms LAN and WAN is somewhat misleading because which term you use is relative…

    • 74530 Words
    • 299 Pages
    Powerful Essays
  • Satisfactory Essays

    lost and found

    • 291 Words
    • 2 Pages

    Every computer on the internet communicates with other computers using the transmission Control Protocol / Internet Protocol (TCP/IP) suite. Computers on the internet use a client / server architecture. This means that the remote server machine provides files and services to the user’s local client machine. Software can be installed on a client computer to take advantage of the latest technology.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays

Related Topics