This website uses cookies to ensure you have the best experience. Learn more

Nt1230 Week #3 Connecting To A Network

898 words - 4 pages

NT1230 – 01/17/2013
Week #3
Week #3-Problem Set #1-Unit #3 Problems
1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a Firewall.
2. The: Network Sharing Center tool provides a certain access point for all of the network controls and connections on a computer running Windows 7.
3. A device that connects one network to another is called a router.
4. The most common method for illustrating the operations of a networking stack is the OSI (Open Systems Interconnection), which consists of seven layers.
5. Protocols that do not guarantee delivery of their data, but do operate with a very low ...view middle of the document...

It manages the distribution of Internet number resources, IPv4 and IPv6 address space and also AS numbers (Autonomous System), develops consensus based policies, and facilitates the advancement of the internet.
B. Internet Assigned Numbers Authority (IANA): The IANA was founded by the U.S. government (Department of Defense) in 1988. It oversees global IP address allocation, root zone management in the DNS (Domain Name System), media types, and other Internet Protocol symbols and numbers. This department is operated by the ICANN (Internet Corporation for Assigned Names and Numbers), under a United States Department of Commerce contract. IANA delegate’s allocations of IP address blocks to requesting Regional Registries as needed.
C. Asia-Pacific Network Information Center (APNIC): APNIC was established in 1992, originally in Japan but due to restrictive growth was relocated to Brisbane Australia. It is the Regional Internet Registry for the Asia-Pacific region. It provides number resource allocation and registration services that support the global operation of the Internet. They also allocate IPv4 and IPv6 address space and Autonomous System numbers, but they represent the interest of the Asia-Pacific Internet community on a global stage comprising 56 economies.
2. Approximately how many IPv4 addresses are possible? Approximately 4.3 Billion.
3. Approximately how many IPv6 addresses are possible? 3.403 * 1038.
4. Why do you think the world is running out of Ipv4 addresses? The world is running out of Ipv4 addresses due to the fact that it was the first publicly used version of Internet Protocol. The main reason, I think, is that every device on the internet must be assigned an IP Address to communicate and identify with other devices. The number of devices being connected to the...

Other assignments on Nt1230 Week #3 Connecting To A Network

Cmgt/554 Week 3 Individual Essay

2557 words - 11 pages Patton-Fuller Community Hospital Networking Project Week 3 Individual Week 3 individual Week 3 Individual This paper will show an analysis of the Patton-Fuller Community Hospital network system. Based on the findings I will define what may be missing from the current network architecture. In addition I will identify the wireless technology in use, and how it enhances the hospital network. Looking at the Patton-Fuller Community

Bead Bar Topologies Essay

490 words - 2 pages simply connecting them to the bus, making this an easy network to work with. However, if the main cable fails, the entire network will shut down. Then comes to difficulty of determining why the cable failed. Another advantage to the bus topology is that any computer can be accessed directly and it allows messages to be sent quickly. A disadvantage to the bus is that it needs a scheduler to assign the frequencies and priorities that organize the

Ethical Hacking And Network Defense Unit 2 Assignment

1705 words - 7 pages step usually involves connecting to a network to gain information. Null sessions are used and different tools are utilized in order to get further network information (ehacking.net). 6. Avoiding detection is a vital task. Covering your tracks can mean the difference in accomplishing your tasks as a hacker. A lot of this can be accomplished by ensuring that data has not significantly changed if that is the goal. A system admin will know if

Computer

3676 words - 15 pages HUB Networks using a Star topology require a central point for the devices to connect. Originally this device was called a concentrator since it consolidated the cable runs from all network devices. The basic form of concentrator is the hub.   As shown in Figure; the hub is a hardware device that contains multiple, independent ports that match the cable type of the network. Most common hubs interconnect Category 3 or 5 twisted-pair cable with

Lan Lan Lan Aland

583 words - 3 pages there are two or more layers of stars, all connecting back to the central star (Tomsho, 2011).” I think that this network would be perfect for a small company that is planning to grow. Having more than one central location for all users to connect to will also improve network speed, security, and data access authorization better as well. 2. You are the network administrator for a company that has a peer-to-peer network. How would the

Bsa 362 Week 2

376 words - 2 pages Kudler Fine Foods currently has three sites connected via a T3 dedicated line connecting all three stores as seen in this diagram on Kudler’s Intranet Our goal in this project is to. * Design a WAN to tie all three KFF locations together. Make the internal network configuration in each store a WLAN, and add VOIP to the multi-store network. * Define which store will house the central servers. * Design the network to be expandable

Nt1210 Intro To Networking 4.3

866 words - 4 pages up to 50 times greater transmission distance than multimode cable. Singlemode cable can transmit data at terabits per second over 100km without requiring re-amplification of the signal. http://www.imakenews.com/drs/e_article001146955.cfm?x=b11,0,w https://people.richland.edu/dkirby/142fibercable.htm Exercise 4.3.2 Rank the three main types of cable (UTP, SMF, and MMF) in a hierarchy of use for connecting network devices based on your

Bis 303 Week 2 Dq 1

381 words - 2 pages Paper BIS 303 Week 5 Learning Team Assignment Hospitality Information Systems Internal and E To download this tutorial follow the link - https://bitly.com/12BD1Ro If you haven't decided on a major, take the core classes of several possible majors. This will give you the chance to determine which major feels right for you. Plus, once you do select your major, you may have earned enough credits in some of the other fields to obtain a minor. This provides you with a degree that is more impressive.

Is3220 Week 7

1569 words - 7 pages server so that it has a gateway address for all network IDs that VPN must be able to connect 9. Users can't connect to the Internet when connected to the VPN server Sometimes, users are unable to connect to the Internet after the VPN link is established. Once the VPN link is disconnected, the users have no problem connecting to the Internet. This problem arises when the VPN client software is configured to use the VPN server as its

Whats Up

292 words - 2 pages 7-1 -The principal components of telecommunications networks and networking technologies are? -Describe the features of a simple network and the network infrastructure for a large company. A simple network consists of two or more connected computers. Basic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switch. The networking infrastructure for a large

Cis 175 Assignment 1

2878 words - 12 pages Strayer University Week 10 Assignment 3: Business Intelligence and Data Warehouses CIS175008VA016-1154-001 Intro to Networking Professor Obi Ndubuisi June 14, 2015   For the company DesignIT, I would use a LAN type of network (for local-area network). This networks several computers, a mail (exchange) server, a database server and a file share server in one building and interconnects with each switch or backbone. I chose this for

Similar Documents

Psych 625 Week 3 Time To Practice

751 words - 4 pages PSYCH 625 Week 3 Time to Practice Complete both Part A and Part B below. Part A Some questions in Part A require that you access data from Statistics for People Who (Think They) Hate Statistics. This data is available on the student website under the Student Test Resources link. 1. For the following research questions, create one null hypothesis, one directional research hypothesis, and one nondirectional research hypothesis

Unit 1 Problem Set Essay

474 words - 2 pages Luckus Little NT1230 Client Server Networking Unit 1 Problem Set 1 Lesson 1 1. the general public in the United States will be able to purchase all of the Windows 7 editions in retail stores except... Starter, Home basic and Enterprise. 2. the core module that provides all of the Windows 7 capability that isn't language- or edition-specific is called... MinWin Module. 3. When you copy a file to a library, Windows

Test Essay

1808 words - 8 pages : Critical Path Method. Framework of PERT and CPM There are six steps common to both PERT and CPM. 1. Define the project and all of its significant activities or task. 2. Develop the relationships among the activities. Decide which activities must precede and follow others. 3. Draw network connecting all of the activities. 4. Assign time and/or cost estimates to each activity. 5. Compute the longest time path through the

Ping Sweeps And Port Scans Essay

1200 words - 5 pages Ping Sweeps & Port Scans: Potential Dangers and Defense Strategies THIS IS MY ORIGINAL WORK, PLEASE DO NOT SUBMIT IT AS YOUR OWN, BUT USE IT AS A GUIDE WHILE WRITING YOUR OWN… I REQUEST YOU TO GIVE ME AN “A” RATING ON THIS PAPER; THANK YOU!!! Insert Your Name Name of University SEC 280 Week 1 Insert Tutor’s Name 1st, October, 2012 Outline 1) Introduction (pg.3) 2) Ping Sweeps & Port Scans (pg.3) a) Ping Sweeps