Intro to Networking

In: Computers and Technology

Submitted By lamell
Words 1580
Pages 7
What is the ASCII hexadecimal code for a blank space? Why is it necessary to represent a blank space as a separate character in text? A) 0000 B) Defines ascII symbol table

Using Microsoft Word or Excel, create a chart similar to Table 1-3 for the hexadecimal codes for the numbers from 0 through 0) 0000 1) 0001 2) 0010 3) 0011 4) 0100 5) 0101 6) 0110 7) 0111 8) 1000 9) 1001

What are the binary and decimal values of the ASCII letter K? Show the steps of the conversion. decimal | binary | 75 | 01001011 |

Use the web to explore the origin of the Universal Character Set (UCS)—ISO/IEC 10646—and explain why it was developed. And contrast this system with ASCII. What is the relationship of ASCII to the UCS encoding? A) For communication and exchange of electronic information B) The way they encode each character and the number of bits used
Use the web to explore the application of UTF-8 text encoding. What features are provided by UTF-8 that is not provided by ASCII? Why was it chosen to replace ASCII as the standard for the web? A) A variable with encoding that can represent every character in the Unicode character set B) Utf-8 functions better on the web C) It can translate foreign languages
Lab Review 1.4 1. Using the ASCII encoding scheme, write your name (including the space between your first and last name) in hexadecimal. How much memory would it take to store your name if each ASCII character occupied a byte? = 14

J | a | v | o | n | | C | h | e | s | t | n | u | t | 4a | 61 | 76 | 6f | 6e | 20 | 43 | 68 | 65 | 73 | 74 | 6e | 75 | 74 |

2. Using a word size of 64 bits, how much…...

Similar Documents

Intro to Networking

...NT-1210 Intro to Networking 05/30/2012 CH 10-11 Research Paper Essay In the evolution of smart phones the first use of text messaging did not take place until 1992 in England, and this was from a computer to a cell phone. The first cell phone to cell phone text happened in 1993 in Finland, which during this period was leading the cell phone technology race, and in 2000 was the first to offer mobile news services. In this time period of the early 2g (second generation) and 2.5g networks mobile providers started to pop up everywhere making communications more reliable. In 2001 the 3g network was introduced and with this technology came the ability to send pictures and stream video. Mobile providers started to offer media content such as ringtones, news, weather, jokes, music and videos, which in 2007 reached 31 billion in sales and outpaced computer internet sales. In the business aspect of this technology, all of this is the icing on the cake. The ability to keep in touch with your employees at any time or location is priceless. Gone are the days of the travelling salesperson with only the information that was current when they began their journey. Changes to information or current events can be sent immediately, lost files can be sent, up to date sales figures can be accessed and video conferencing is possible. A new application being researched for business use is Unified Messaging, a system that offers access to E-mail, voice and fax messages though a unified......

Words: 430 - Pages: 2

Intro to Networking

...Chapter 2 Mind Map Chapter 2 Lab Two Extra Sources Some of the things that I have learned from searching information on chapter two are that there are way more networking systems then I have ever dreamed about. I just thought WAN stood for wide area network and was just another name for the internet. I learned that WAN is everywhere we are and imbedded in our lives. One of the biggest claims of this would be the ATM. I have used it many times but never knew that it was running off of a WAN. I also found out that WAN can be localized as well as worldwide and that it can incorporate the city you live in, the state you live in, and even the United States. Mind Mapping is a brain emulating method for generating and organizing ideas. This was inspired by a great man and his way of doing things, which was Leonardo da Vinci's and his approach to note-taking. Now that is something really cool and another reason we should have been doing something like this a long time ago. Mind mapping is more than just a simple brain storming tool, it is a tool that we can use to organize our lives, organize our jobs and our responsibilities, and it can even be used to organize our day to make us more proficient in our jobs. I am glad that I have been introduced to this tool so early in my career. Bibliography WAN, MAN, LAN, PAN, And SAN: Evolution, Not Revolution | Digital ICs content from Electronic Design. (n.d.). Retrieved June 29, 2013, from

Words: 308 - Pages: 2

Chapter 3 Labs Intro to Networking

...reliable data transfer services to the upper layers The session layer controls the dialogues (connections) between computers. The presentation layer establishes context between application-layer entities. The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. 3.2.2 2- Data link= bit/frame 3- Network= packet/datagram 4- Transport= segments 3.2.3 A network has read and decipher data so it knows what to show to the end user. 3.2.4 Because it doesn’t have to present or interact with programs to direct traffic. 3.2 review 1. It transfers the bits between nodes 2. Because some of the layers in osi do not pertain to networking because some layers are for the end user to see not the network. 3. Yes because if they all get combined it will be too much data to decipher at once. 3.3.1 Osi 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data link 1. Physical TCP/IP 5. Application 4. Transport 3. Network 2. Data link 1. Physical Tcp has 5 layers and osi has 7 and osi cares about the end user Tcp just sends the information. 3.3.2 The application layer 3.3.3 Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on......

Words: 775 - Pages: 4

Intro Networking

...society for the reason of easily organizing the tasks at hand. With this method it not only pertains to networking but to real life as well. Layered architecture is not a new process it has been around for quite some time. A protocol is a set of rules that allows the communications between computers on the network. These rules help regulate the guidelines of speed data transfer and access method. A society based protocol would be like a motorcycle club. For example the network would be the president and the computers would be the other members. The protocol would be the Sgt of Arms as for he would be the one that controls the communication between he members and the president. The four types of different networks are LAN (local area network), WLAN (wireless local area network), WAN (wide area network), and VPN (virtual private network). LAN is your most basic form or network; this is where all the computers belong to the same network and plugged into the same hub. WLAN is your second most basic home network, this is where you are wirelessly connected to the internet in your home and can be connected through multiple devices. WAN is a network that connects multiple LAN networks across a large area. VPN is a network that relies on protocol that encrypts the data from one end to another. This network is more used in government applications or a secure networking site. The OSI and TCP/IP models are similar in ways that the both handle the network. They both have......

Words: 449 - Pages: 2

Intro to Networking

...Intro to Networking Lab 3 Jeff Garwood EX. 3.1 Review 1. The MAC Address is sufficient to route traffic locally because it provides the needed information with regards to the equipment location. This is mostly true on level 2 networks. 2. The Open Systems Interconnection was started in two documents in 1978. The International Organization for Standardization (ISO) and the International Telegraph and Telephone Consultative Committee, or CCITT. In 1983 these two documents were combined as the basic reference model for the OSI. It was created so Protocols could allow the entity in one host to interact with a corresponding entity at the same layer in another host. 3. The TCP dates back into the 1960s on the DOD sponsored ARPANET. In 1973 the TCP/IP came to be and consisted of dozens of different protocols. Of these key protocols, two are usually considered the most important. The Internet Protocol (IP) is the primary OSI network layer (layer three) protocol that provides addressing, datagram routing and other functions in an internetwork. EX. 3.2 Review 1. The composition of the physical wiring, and connectors no matter the type are strictly regulated to ensure the electrons within the communications signal can move fast enough to maintain a connection. The addition of network devices such as switches and routers complete the campus style network. 2. The OSI model is not implemented in a network but is used as a model to guide troubleshooting a local network in......

Words: 719 - Pages: 3

Intro to Networking Project server, plus support for content filtering and antivirus scanning with two great * WinGate plug-ins. Enhanced support for Terminal Services and Active Directory, Bandwidth control, dynamic service binding, a re-written mail server with many new features, remote gateway monitoring and selection, DMZ support. * What's new in this version: Version 8.0 includes HTTPS inspection support, web access control, option to disconnect in reject policy response, and support for adding X-Forwarded-For for reverse proxy requests. WinGate VPN * WinGate VPN gateway license for 12 computer LAN * Now there is a VPN solution that anyone can use. * Easy to set up * Built in Firewall * Extra Support for MS Networking Price -$244.95 Kaspersky AntiVirus for WinGate * Kaspersky AntiVirus for WinGate unlimited user 2 year subscription * This provides much improved scanning performance particularly with relation to the number of concurrent scan jobs that can be undertaken * HTTP Traffic Scanning * Easy Updater * FTP Scanning * Quarantine capabilities Price - $2,240.00 PureSight for WinGate * PureSight for WinGate unlimited user 2 year subscription * Automatic Content recognition * Custom block-pages * Manual classifications * User database integration Price- $1,120.00 NetPatrol Enterprise * Includes free 1 year version protection * IP logging * Easy......

Words: 2164 - Pages: 9

Intro to Networking

...Networks This chapter will allow you to explore the common models of networking from the physical media connection to the application that displays the information, including how these layers interact and how they map to real networking devices. The labs in this chapter are designed to reinforce concepts from Chapter 3 of your Introduction to Networking textbook and allow you to explore some of the more important ideas with greater depth. You will explore the different types of network reference models available and analyze how each one applies to real network technology. You will also use packet capturing to look at real network traffic and explore the data link layer of networking. At the end of this chapter, you should be able to ■ Explain the purpose of network reference models ■ Describe the layers of the OSI reference model and explain what each layer provides ■ Describe the layers of the TCP/IP model and relate it to the OSI model and real networking equipment ■ Capture live packet information on a network and explain the data link layer portion of the packets captured ■ Enable network resources such as shared printers and file sharing on your own PC Lab 3.1: Network Reference Models approximate Lab Time: 10–15 min. Materials Needed: paper/pencil, Textbook, and Internet research This lab reviews the importance of modeling communication on a network. This will include a review of the state of networking before standardized reference models existed and the......

Words: 270 - Pages: 2

Intro to Networking Chp 7 Review

...allows two-way communication between sites. Time-division multiplexing-A type of logic used by some networking devices, including circuit switches in the telco, in which the switch divides a faster line into time channels. T-carrier system- The name of the combination of different physical line standards (DS0, DS1, DS3, and others), plus circuit switches that use time-division multiplexing (TDM) features, that together allowed the phone company to create digital circuits from end to end and create leased-line services for customers. DS0- Digital Signal Level 0. One of the physical line standards in the T-carrier system, as originally created by the companies of the Bell System in the United States. DS0 runs at 64 Kbps DS1- Digital Signal Level 1. One of the physical line standards in the T-carrier system, as originally created by the companies of the Bell System in the United States. DS1 runs at 1.544 Mbps, with a 193-bit frame, 24 DS0 channels, and an 8-Kbps overhead channel. Frame relay- A widely popular packet-switching technology and service that emerged in the marketin the 1990s, using permanent virtual circuits (PVC) between pairs of routers that can send frames to each other, and data-link connection identifiers (DLCI) to address and identify each PVC. Acronyms ATM-Asynchronous transfer mode. A series of networking standards for both LANs and WANs. CO- Central Office- The term that refers to a telco office......

Words: 1592 - Pages: 7

Nt1210 Intro to Networking Lab 1.3

...NT1210 Intro to Networking Unit 1 Lab 1.3 Bit Byte Structure exercise 1.3.1 What is the decimal value of Byte 1 by itself? What is the decimal value of Byte 2 by itself? Byte 1 is 6400 and Byte 2 is 233 Exercise 1.3.2 What is the decimal equivalent of the binary sequence in Figure 1-12 (the combined sequence of Byte 1 and Byte 2 as a single decimal value)? How does this compare to the individual values of Byte 1 and Byte 2? The Binary Sequence is 6433 because it is the sum of both values. Exercise 1.3.3 Given a device with a storage capacity of 120 MB, how many bytes can be stored on this device? 1.2x10^8=120,000,000 Bytes Exercise 1.3.4 Given a computer with a disk capacity of 16 GB and a word size of 32 bits, how many words can be stored on the disk? 1.6x10^10=16,000,000,000 Bytes=128,000,000,000 Bits 128,000,000,000/ 32=4,000,000,000 words Exercise 1.3.5 Represent the binary value 110110^2in hexadecimal. Show the steps of conversion that you used. 110110=Two zeros needed to be added to make the value of 8 bits 1101=D 0010=2 Exercise 1.3.6 Represent the hexadecimal value f616 in binary and decimal. Show the steps of conversion that you used. F16 = 11112 and 616 = 01102 when put together the binary value is 111101102 which is equal to 246....

Words: 263 - Pages: 2

Nt1210 Intro to Networking Lab 1.5

...root directory C: to get to your Classes folder. This path will differ slightly depending on the operating system. Record the navigation path to get to your new Classes folder. Hint: Most directory structures that include the desktop of a computer involve finding a folder for users and selecting the correct user. C:\Classes Exercise 1.5.2 Open the Classes folder you created and move the myname.txt file to the Networking folder. What has happened to the OS reference to the location of the file myname.txt? What has happened to the physical storage location of myname.txt in memory? C:\Classes\Networking\Myname.txt It changes the file path from C:\Classe\ to C:\Classes\Networking Exercise 1.5.3 Inside the Networking folder, create a new set of folders for your labs and assignments. You should add at least five subfolders. Diagram the hierarchy that now exists from the root Classes folder. C:\Classes\Networking C:\Classes\Networking\Coding C:\Classes\Networking\Homework C:\Classes\Networking\Labs C:\Classes\Networking\Networking C:\Classes\Networking\Vitural Computers exercise 1.5.4 Exercise 1.5.4 Disk fragmentation occurs when files are deleted from memory but that space is not used to store another file. Use the web to identify issues that disk fragmentation can cause for computer perfor- mance. Will changing your file structure affect the fragmentation of the disk? Justify your answer. With Disk fragmentation it will speed up the computer in terms of......

Words: 441 - Pages: 2

Nt1210 Intro to Networking Lab 4.1

...twisted pair wiring protects the transmission line from electromagnetic interference leaking into or out of the cable. STP cabling often is used in Ethernet networks, especially fast data rate Ethernets. Exercise 4.1.4 Complete the entries in Table 4-1. Use your textbook and Internet research to compose your answer. The common connector for interfacing UTP wires to a computer for networking is the Registered Jack 45 (RJ-45) interface. This uses eight copper wires (four twisted pairs) to complete the connec- tion between interfaces. The pinout for these wires defines the order in which the individual wires connect to the network interface card and how the wires transition from one end of the cable to the other. A straight cable is used to connect a device to a network hub or switch. This type of cable does not change the wiring order from one end to the other. You can see an example of this in Figure 4-1. Exercise 4.1.4 Complete the entries in Table 4-1. Use your textbook and Internet research to compose your answer. The common connector for interfacing UTP wires to a computer for networking is the Registered Jack 45 (RJ-45) interface. This uses eight copper wires (four twisted pairs) to complete the connection between interfaces. The pinout for these wires defines the order in which the individual wires connect to the network interface card and how the wires transition from one end of the cable to the other. A straight cable is used to connect a device to a network......

Words: 721 - Pages: 3

Nt1210 Intro to Networking 4.3

...NT1210 Lab 4.3 Cabling exploration Exercise 4.3.1 Use your textbook and Internet research to complete the comparison in Table 4-3. Cite the sources from which you retrieved the information to complete the comparison. UTP-Defines a cable that can carry data up to 100 Mbps. The signaling frequency of this cable is up to 100 MHz. Cheapest form of cable available for networking purposes. Easy to handle and install. Highly prone to external interference like EMI and RFI. Highly prone to crosstalk. Unable to provide secured transmission of data. Coaxial (Thinnet) 185m 100 Mbps Low Uses thin cabling, low hardware costs Difficult to troubleshoot, difficult to maintain. Coaxial (Thicknet) 500m 100 Mbps directly connects computers and it costs more. Multimode cables are less expensive to operate, install and maintain than single-mode cables. However, they are much more limited in both speed and distance. For instance, the maximum speed of a multimode cable is 10GB, but only up to a distance of 300 meters. Up to 2 kilometers, it is only capable of transmitting at 100Mbit. Beyond that, its transfer speed becomes negligible. This limitation is negated by the fact that its maximum speed is sufficient for the environment that it is most often used in. Singlemode cable provides less signal attenuation, higher transmissions speeds, and up to 50 times greater transmission distance than multimode cable. Singlemode cable can transmit data at terabits per second over 100km without......

Words: 866 - Pages: 4

Nt1210 Intro to Networking Lab 5.4

...whether all the hosts on the local-area network are reachable? You can assume that you are starting from computer A. List the command sequence(s) you would need to enter to test this functionality. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping, Ping, and Ping, Ping, and Ping This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping Exercise 5.4.4 If your local machine (node A) is not connecting to any other hosts on the network, what two commands will give you information on whether your network device is active and the current configuration of your NIC or adapter? Type Netstat into CMD and ipconfig/all...

Words: 344 - Pages: 2

Nt1210 Intro to Networking Lab 2.2

...Exdahellilvn NT1210 Lab 2.2 Networking drives Exercise 2.2.1 If an organization has 30 users, each with his or her own PC, what is the comparative cost of buying a $120 printer for each user versus the cost of buying a single, higher-capacity $500 printer that can be used by the entire office? What is the drawback to having only a single printer? What is the cost of having two additional backup printers for the office compared to having individual printers? How many shared printers can be purchased and still be less expensive than individual printers? It would cost $3,900 if each user had their own printer V.S. buying a high capacity single printer for $500. On top of that if ink cartridges cost around $32.00 dollars apiece for each printer cartridge. It would cost a total of $960 for ink cartridges for all 30 printers. If a single printer was connected to a single workstation then it would be only tied to that workstation. No other users would be able to use printer connected to the workstation. The cost of having two backup printers would depend on what type of printers. There are two known types of printers one LaserJet or standard color ink printers. LaserJet printers can run around $500 each V.S. $120-$150 for a standard color printer. Still the cost of having two additional backup printers is less than having each workstation have their own. You can buy up to four printers costing $500 apiece and still come out money ahead. Even if you spent $100 dollars on......

Words: 838 - Pages: 4

Intro to Networking Lab 9.1

...Lab 9.1 – 9.4 ITT – Technical Institute Introduction to Networking Martin Gilmore January 6, 2016 Lab 9.1: Broadband Internet Exercise 9.1.1 * This was inefficient because it prohibited the use of the phone line for its original intention. * The limitation of the data rate for this type of connection was 56kbps. Exercise 9.1.2 * Broadband uses multiple channels of frequencies to transmit data more efficiently where broadband uses a single channel. Exercise 9.1.3 DSL Connection Types DSL Type | Maximum Download Speed | Maximum Upload Speed | Maximum Distance (m) | ADSL | 24 Mbps | 1.4 Mbps | 6000+ | HDSL | 1.54 Mbps | 1.54 Mbps | 3650 | IDSL | 144 Kbps | 144 Kbps | 10,700 | MSDSL | 2 Mbps | 2 Mbps | 8800 | RADSL | 7 Mbps | 1 Mbps | 5500 | SDSL | 2,048 Mbps | 2,048 Mbps | 3000 | VDSL | 52 Mbps | 16 Mbps | 1000+ | Lab 9.2: Networks and Subnets Exercise 9.2.1 * If you had 4 bits for the host ID, how many unique combinations can be made from 4 bits? * 16 * What is another way to express this value as a power of 2? * 42 Exercise 9.2.2 * On a /24 network, how many unique host ID values exist? * 256 hosts * On a /16 network, how many unique host ID values exist? * 65,534 hosts, or 164 Exercise 9.2.3 * What is the reserved network address? * * What is the reserved broadcast address? * * What is the first available host ID for a unique host on this......

Words: 542 - Pages: 3

Aegis of Earth Protonovus Assault-CODEX | Eyewitness - Die Augenzeugen | Software