+ All Categories
Home > Documents > Wk2 Lab Netw2002

Wk2 Lab Netw2002

Date post: 22-Nov-2014
Category:
Upload: omar-torres
View: 116 times
Download: 1 times
Share this document with a friend
12
NETW202 Lab/Assignment worth 55 points Wk 2 Lab Answer Sheet You are to use this document to record your lab responses. The work assignments on these pages are pulled from your Exploration Labs and Study Guide text. Refer to the discussions that accompany the assignments as needed. You are to complete the lab in its entirety, but not all responses are required – only those as directed below. You are to place your responses in the bulleted areas below each question and you are to use RED font for your responses. The screen prints requested should be sized and cropped accordingly. Submit to the Wk2 Lab dropbox by end of week 1 which is Monday. Lab 2.6.1: Topology Orientation and Building a Small Network For this lab, you will be building a peer to peer network, but using a switch instead of point to point. Part of the reason for this is that the whole class will be connecting to the same switch. Therefore, there are several changes to the lab instructions given in the lab book. First, log into the PC (EXP domain) as normal. Then, the red “crossover” cables at your bench going from NIC to A are to be removed. They are to be replaced with white “straight through” cables that will go from NIC to B. From here, you are to connect your workstation to the B side switch with the fiber optic cable coming from it. All students will be connecting to the same switch. Task 2: Identify the Cables used in a Network. 1. What is the difference between the crossover cable and the straight through cable? a. Crossover is use to connect two PC’s into a simple network and straight through cable connects Pc’s to hubs or switches. Task 3: Now you are to setup your PC to communicate with the rest of the PCs in the class. To do so, you must set their IP address to be similar to others in network. To do this, begin Task 3, step 2. All IP address will begin with 192.168.1.x. You will replace the x with your workstation number. 1. What IP address and subnet mask did you use? :
Transcript
Page 1: Wk2 Lab Netw2002

NETW202 Lab/Assignment worth 55 pointsWk 2 Lab Answer SheetYou are to use this document to record your lab responses. The work assignments on these pages are pulled from your Exploration Labs and Study Guide text. Refer to the discussions that accompany the assignments as needed. You are to complete the lab in its entirety, but not all responses are required – only those as directed below. You are to place your responses in the bulleted areas below each question and you are to use RED font for your responses. The screen prints requested should be sized and cropped accordingly. Submit to the Wk2 Lab dropbox by end of week 1 which is Monday.Lab 2.6.1: Topology Orientation and Building a Small Network

For this lab, you will be building a peer to peer network, but using a switch instead of point to point. Part of the reason for this is that the whole class will be connecting to the same switch. Therefore, there are several changes to the lab instructions given in the lab book.

First, log into the PC (EXP domain) as normal. Then, the red “crossover” cables at your bench going from NIC to A are to be removed. They are to be replaced with white “straight through” cables that will go from NIC to B.

From here, you are to connect your workstation to the B side switch with the fiber optic cable coming from it. All students will be connecting to the same switch.Task 2: Identify the Cables used in a Network.

1. What is the difference between the crossover cable and the straight through cable?a. Crossover is use to connect two PC’s into a simple network and straight through

cable connects Pc’s to hubs or switches.Task 3:Now you are to setup your PC to communicate with the rest of the PCs in the class. To do so, you must set their IP address to be similar to others in network. To do this, begin Task 3, step 2. All IP address will begin with 192.168.1.x. You will replace the x with your workstation number.

1. What IP address and subnet mask did you use? :a. 192.168.1.04 255.255.255.0

2. Why didn’t you need default gateway or a DNS server?a. Because we joined the same network

2. IN step 3, you are to PING your neighbor. From the command line, perform an IPCONFIG to confirm your address. Then, find out your neighbors IP address to perform step 4. Provide a screen print of your PING.

Page 2: Wk2 Lab Netw2002

a.

3. Unplug one end of the small cable (NIC to B) and then perform the PING again. What is the output of the PING after you disconnect one end of the cable?

a.

Task 4: Configure your workstation to access the Internet. (Skip the Task 4 in the lab book)At the physical layer, you are already connected to the Internet. You are physically plugged into the device that will get you there. However, your logical address (IP address) needs to be configured correctly. Configure your IP address as explained in Task 3, but use the information from the signs above the whiteboard. It’s important that each one of you has a unique address,

Page 3: Wk2 Lab Netw2002

so that last IP octet must be unique from everyone else. You will also need the Default Gateway and DNS address for Internet access.

1. Record your settings below.a.

2. Explain why you need the default gateway.a. So we can be in the same network.

3. Explain why you need the DNS address.a. Changes domain names from binary digits to network understanding

Try access the Internet. Provide a screen print of a webpage.

Page 4: Wk2 Lab Netw2002

Task 5: Trace routeFrom a command line interface, perform a trace route to a website of your choice. Before you do so, run WireShark and start a capture. The command is tracert <website address> (The < > are NOT included in your command. They indicate that you are replacing what is inside them with your response!)

1. What is the purpose of trace route?a. Trace route is a way to find out what routers you go through on the internet to get to a

specific destination 2. What website did you use?

a. Devryu.net3. Explain what is occurring with the trace route.

a. A list if hops as a packet is routed through a network4. Provide a screen print of the trace route.

a.

5. Provide a screen print of the WireShark DNS lookup (use the filter).a.

Page 5: Wk2 Lab Netw2002

6. Provide a screen print of the ICMP packets used to perform the trace route.a.

Task 6: ReflectionWrite a half page reflection of what you learned with this lab.

The most important thing I learn is that just because you click on something in the web it doesn’t mean that it is right there waiting for you. When I entered “devryu.net” I saw in wireshark how it goes from me to Chicago then to Denver to pull up the information I want. I understand better on what an IP address is and how each web site is different. I just want to say I learn a lot but that is what I truly enjoyed.

Page 6: Wk2 Lab Netw2002

Week 2 Assignment Worksheet

Fill in, answer, and/or complete the exercises below. Put your answers in RED font in the places provided. The work assignments on these pages are pulled from your Exploration Labs and Study Guide text. Refer to the discussions that accompany the assignments as needed.

Chapter 3

Table 3-1 OSI and TCP/IP Model Comparison

Term DefinitionRFC Generally defines the protocols in the TCP/IP suiteLayer 7 Top layer of both the OSI and TCP/IP modelsSession Functions at this layer create and maintain dialogs between source and

destination applicationsDNS, HTTP, SMTP, FTP

The most widely known TCP/IP application layer protocols that provide for the exchange of user information

Application Top layer of the OSI modelTelnet Protocol used to provide remote access to servers and network work

devicesPresentation This layer provides coding, compression, and encryptionGIF, JPEG, TIFF Graphic image formats

Table 3-3 Port Numbers and Protocols

Port Number Protocol80 Hypertext Transfer Protocol (HTTP)110 Post Office Protocol (POP)23 Telnet53 Domain Name System (DNS)67 Dynamic Host Configuration Protocol (DHCP)20 and 21 File Transfer Protocol (FTP)25 Simple Mail Transfer Protocol (SMTP)

Multiple Choice and short answer Questions

1. The Open Systems Interconnection reference model is a layered, abstract representation created as a guideline for network protocol design. The OSI model divides the networking process into which seven layers?

a. Application, presentation, session, transport, network, data link, and physicalb. Application, presentation, session, transport, Internet, data link, and physicalc. Application, presentation, session, transport, network, Internet, and physicald. Application, presentation, Internet, transport, network, data link, and physical

Page 7: Wk2 Lab Netw2002

2. What is the most popular application service?a. World Wide Webb. E-mailc. P2Pd. eBay

3. The e-mail server operates which two separate processes?a. Mail Transfer Agent (MTA)b. Mail Transfer Bridge (MTB)c. Mail User Agent (MUA)d. Mail Delivery Agent (MDA)

4. Data transfer from a client to a server is referred to as which of the following?a. Queryb. Downloadc. Uploadd. Pull

5. Which of the following best describes a peer-to-peer network?a. It decentralizes the resources on a network.b. It centralizes the resources on a network.c. It uses file servers.d. It uses the client/server model.

6. The Domain Name System (DNS) was created to do what?a. Resolve domain names to e-mail addresses.b. Resolve domain names to MAC addresses.c. Resolve domain names to computer names.d. Resolve domain names to IP addresses.

7. The different top-level domains represent which of the following? (Choose all correct answers.)

a. Type of organizationb. Country of originc. Company or brand named. File server name

8. For secure communication across the Internet, which protocol is used to access or post webserver information?

a. HTTPSb. SHTTPc. Telnetd. STelnet

9. To receive e-mail messages from an e-mail server, the e-mail client can use which of the following protocols?

a. SMTPb. SSHc. S0TPd. POP

Page 8: Wk2 Lab Netw2002

10. Which service automates the assignment of IP addresses, subnet masks, gateway, and other IPnetworking parameters?

a. SMTPb. TFTPc. HTTPd. DHCP

11. What does the term network-aware application mean? List a few examples.a. Where carriers will need to enable the fast creation of new innovative services in

order to survive and prosper. Examples are thousands of apps on our phones.12. What is meant by the term application layer services? Why are protocols important

when used in conjunction with application layer services?a. Enable the human network to interface with the underlying data network. Protocols like

DNS, HTTP, FTP are very important.

Binary To Decimal Conversion

128 64 32 16 8 4 2 1 Answers Scratch Area 1 0 0 1 0 0 1 0 _______146__________

0 1 1 1 0 1 1 1 ________119_______

1 1 1 1 1 1 1 1 ________255________

1 1 0 0 0 1 0 1 ________197_________

1 1 1 1 0 1 1 0 ________246_________

0 0 0 1 0 0 1 1 ________19________

1 0 0 0 0 0 0 1 ________129_______

0 0 0 0 0 1 1 1 _________7_____

0 1 1 0 1 1 1 1 ________111_________

1 1 1 1 1 0 0 0 _________248________

Decimal To Binary Conversion

Page 9: Wk2 Lab Netw2002

128 64 32 16 8 4 2 1 = 255 Answers Scratch Area

11101110 238

00100010 34

01111011 123

00110010 50

11001000 200

10001010 138

11111010 250

01101011 107

11100000 224

11000000 192

Use all 8 bits for each problem!


Recommended