Top-Rated Free Essay
Preview

Chapter 2 Lab Manual

Satisfactory Essays
1433 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chapter 2 Lab Manual
Samuel Lee
NT1210 Intro to Networking
Instructor. Bobbie Casteel III
Chapter 2 Manual

Lab 2.1
Exercise 2.1.1
Explain why all of these elements are necessary for allowing one device to communicate with another. What happens if one of them is not present? Explain this circumstance for all five elements.

Exercise 2.1.2
Most modern computers have device drivers for network interfaces that manage most of these elements automatically. What characteristics of modern computer networks allow this type of integration? Use your textbook and Internet research to support your answer.

Exercise 2.1.3
For this exercise, you will enable peer-to-peer communication on your Windows XP machine. Complete the steps that follow to enable this service. What other networking services are available for installation?

Exercise 2.1.4
Briefly explain why wireless connections between peer devices do not need specialized equipment like a crossover cable to connect to each other. Use your textbook and Internet research to support your answer

Exercise 2.1.5
For this exercise, you will be creating a new network connection on your Windows PC. List the types of connections that are available to choose. Record the settings that you choose in each step.

Lab 2.1 Review
1. Explain the difference between a network device and a peripheral device and give examples of each. You can use your textbook and the Internet to research your answer.

2. Explain why you would want to limit the type of incoming connections that you allow on a computer. Use your textbook and Internet research to support your answer

3. Explain the purpose and benefits of a peer-to-peer network.

Lab 2.2

Exercise 2.2.1
If an organization has 30 users, each with his or her own PC, what is the comparative cost of buying a $120 printer for each user versus the cost of buying a single, higher-capacity $500 printer that can be used by the entire office? What is the drawback to having only a single printer? What is the cost of having two additional backup printers for the office compared to having individual printers? How many shared printers can be purchased and still be less expensive than individual printers?

Exercise 2.2.2
If each of the 30 users in an organization prints an average of 22 pages per hour and a shared printer has the capacity to print 180 pages per hour, how many shared printers will be needed to prevent overloading each printer’s capacity? Would there be a benefit to having more than the exact number needed? Justify your answer.

Exercise 2.2.3
In this exercise, you will map a network location to your local machine. Record the steps that you follow for the process, and record the network location that is mapped to the letter you choose.

Exercise 2.2.4
What are the drawbacks of using a networked drive for storing important documents? Use your textbook and the Internet to support your conclusion.

Exercise 2.2.5
For this exercise, you will create a link to a web resource on your desktop. You should record the address of the link that you create.

Exercise 2.2.6
How often should you verify that the network resource is connected correctly? What will happen to your connection if the web-based resource gets moved or taken offline? Justify your conclusions.

Lab 2.2 Review

1. Why is it infeasible to create a shortcut to every web-based resource (such as a website) that you use frequently? What is a better alternative to creating shortcuts on your desktop for frequently visited sites?

2. Should you create multiple mounted drives for different folders on the same network computer? What will this accomplish, and why is it a good or bad idea? Justify your conclusion with support from your textbook or Internet research.

3. The two primary functions of a network are sharing resources and communicating between devices. Why is the ability to share resources advantageous in a network? What benefit does it provide?

Lab 2.3

Exercise 2.3.1
Briefly define LAN, MAN, PAN, and WAN. What is the critical distinction for these networks? What is the classification metric used here?

Exercise 2.3.2
Briefly define the term network topology. What is the metric used to define networks by topology?

Exercise 2.3.3
Using the ring topology shown in Figure 2-10, how many actual messages would it take (the number of hops on the network) to send a message from A to B? How many actual messages would it take to send a message from B to A? How many additional links would be required to add a new node E between C and D? How would this affect the number of messages it takes to traverse the ring?

Exercise 2.3.4
Using the bus topology from Figure 2-11, how many actual messages would it take to send a message from A to D? How many actual messages would it take to send a message from D to A? How many additional links would be required to add a new node E between C and B? How would the added node affect the network?

Exercise 2.3.5
Using the star topology in Figure 2-12, consider the number of actual messages necessary to send a message from A to B. How many messages are sent if the central device is a hub when A sends a message to B? How many messages are sent if the central device is a switch when A sends a message to B? What effect does adding a new node E between C and D have on the network?

Exercise 2.3.6
Using the mesh topology shown in Figure 2-13, how many actual messages are necessary to send a message from A to D? How many actual messages are needed to send a message from A to B? How many links would be required to add a new node E between C and D? How many links would be required to add a new node F if E is already added?

Lab 2.3 Review
1. What are some devices that you can connect to a PAN? You can use your textbook and Internet research to support your answer.

2. Of the network topologies covered in this lab, which of them have a single point of failure for the network? A single point of failure is where one device or connection going down will stop all network traffic. Justify your position.

3. What are the limiting factors for growing mesh networks (adding new nodes)? What are the limiting factors for growing star networks? Use your textbook and Internet research to justify your answer.

4. Give an example of a MAN and describe why this type of network would be useful. Use your textbook and Internet research to justify your answer.

Lab 2.4
Exercise 2.4.1
For this exercise, you will follow the instructions for Windows, Mac OS, and Linux (or whatever subset of these operating systems is available to you in the lab). Record the steps that you take, and copy the output from the command into your lab report.

Lab 2.4 Review
1. Compare the output of two of the operating systems in which you entered the ipconfig or ifconfig command. What common information was given by the operating systems?

2. Outside of networking, is there a benefit to knowing how to access the command-line interface of an operating system? Use your textbook and Internet research to support your answer.

3. Windows and Mac OS focus more on the graphical user interface of the operating system instead of the command-line interface. Why has this focus been selected, and what marketing advantage is there to this emphasis? Use your textbook and Internet research to support your answer.

Lab 2.5
Exercise 2.5.1
For this exercise, you will use the man page for the man command to get more information on man pages. To complete this, type man man in the Terminal window at the > prompt. From the information given in the man page for the man command, what is the purpose of a man page and why are they useful?

Exercise 2.5.2
What are the sections contained in a man page?

Exercise 2.5.3
What are four of the available options for use with the man command?

Lab 2.5 Review
1. According to the man page for ifconfig, what is the purpose of the ifconfig command and what information does it return by default?

2. List three of the command-line options available for the ifconfig command. You can get this information directly from the man page.

3. What information is returned when you enter the following commands in Linux? man –f ifconfig man –w ifconfig

You May Also Find These Documents Helpful

  • Better Essays

    INDP Kudler Fine Food

    • 1189 Words
    • 4 Pages

    The major network components devices are a Network Interface Card (NIC), a Hub, Switches, Servers, Cables and connectors, firewalls, work stations, wireless access points, Wide area networks (WANs), Routers, VOIP phones and Modems.…

    • 1189 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    When configuring windows networking, two major approaches are valid to secure all the network resources, the workgroup approach and the Domain approach. The workgroup approach is simply to create a windows peer-to-peer network with a decentralized security system. This workgroup security approach…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    NETW202 W1 Lab Report

    • 927 Words
    • 5 Pages

    In your own words, summarize what you have learned concerning network commands available within the Windows operating system.…

    • 927 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Overview|On a Windows 7 computer, the Network and Sharing Center provides access to most of the operating system’s networking tools and configuration parameters. In Exercise 7.1, you examine the current Sharing and Discovery settings on one of the computers that will become part of the lab network.|…

    • 740 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    A peer-to-peer network is a network where each workstation has equivalent capabilities and responsibilities. In this type of network there is no dedicated server, each workstation acts as a server and they share the responsibilities that a single dedicated server would. Each workstation is allowed to access all information allowed by the owners of each workstation. Each…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    Communication to run smoothly across the network there are devices that place intermediary roles in networking. These intermediary devices provide connectivity and work behind the scenes to ensure that data flows across the network. These devices connect the individual hosts (end devices) to the network and can connect multiple individual networks to form an internetwork.…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Write suitable materials for Chapter 1, section 1 which explains the purpose and workings of basic communication devices and the principles of signal theory.…

    • 3587 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    It 241 Week 1 Cp

    • 928 Words
    • 4 Pages

    3. Specify the standard transmission distance and transfer speed for the wireless technology you identified.…

    • 928 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    NT1210

    • 4443 Words
    • 28 Pages

    Explain the functionality and use of typical network protocols.  Use preferred techniques and necessary tools to troubleshoot common network problems. 2 Objectives  Define a computer network.…

    • 4443 Words
    • 28 Pages
    Powerful Essays
  • Satisfactory Essays

    If we are talking about loopback then I would say: this is how the computer would talk to itself. An example would be like sending an email alert but you don’t know which mail service is being used. Talk to the local mail server on TCP/25 and it doesn’t matter because all the mail services listen on TCP/25. Another example is updating. If you don’t have loopback then the files won’t get sent and the update will fail.…

    • 340 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Both peer-to-peer networks and client-server networks involve sharing resources of other computers across the network and use Ethernet to communicate between all the computers on the network.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ethernet Lab

    • 710 Words
    • 3 Pages

    1) Determine the type of Ethernet cable that needs to be created, either “Straight through” or “Cross Over”. For this experiment, a Straight through cable will be required.…

    • 710 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    parking project

    • 11647 Words
    • 47 Pages

    iMax Technologies was started in the year 2008 and has seen tremendous growth since its inception. With deep knowledge of the Indian steel industry…

    • 11647 Words
    • 47 Pages
    Powerful Essays