NETW202 Lab/Assignment Worth 55 Points WK 2 Lab Answer Sheet

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

NETW202 Lab/Assignment worth 55 points

Wk 2 Lab Answer Sheet


You are to use this document to record your lab responses. The work assignments on these pages are
pulled from your Exploration Labs and Study Guide text. Refer to the discussions that accompany the
assignments as needed. You are to complete the lab in its entirety, but not all responses are required –
only those as directed below. You are to place your responses in the bulleted areas below each
question and you are to use RED font for your responses. The screen prints requested should be sized
and cropped accordingly.
Submit to the Wk2 Lab dropbox by end of week 1 which is Monday.
Lab 2.6.1: Topology Orientation and Building a Small Network
For this lab, you will be building a peer to peer network, but using a switch instead of
point to point. Part of the reason for this is that the whole class will be connecting to the same
switch. Therefore, there are several changes to the lab instructions given in the lab book.
First, log into the PC (EXP domain) as normal. Then, the red “crossover” cables at your
bench going from NIC to A are to be removed. They are to be replaced with white “straight
through” cables that will go from NIC to B.
From here, you are to connect your workstation to the B side switch with the fiber optic
cable coming from it. All students will be connecting to the same switch.
Task 2: Identify the Cables used in a Network.
1. What is the difference between the crossover cable and the straight through cable?
a. Crossover is use to connect two PC’s into a simple network and straight through
cable connects Pc’s to hubs or switches.
Task 3:
Now you are to setup your PC to communicate with the rest of the PCs in the class. To do so,
you must set their IP address to be similar to others in network. To do this, begin Task 3, step
2. All IP address will begin with 192.168.1.x. You will replace the x with your workstation
number.
1. What IP address and subnet mask did you use? :
a. 192.168.1.04 255.255.255.0
2. Why didn’t you need default gateway or a DNS server?
a. Because we joined the same network
2. IN step 3, you are to PING your neighbor. From the command line, perform an
IPCONFIG to confirm your address. Then, find out your neighbors IP address to perform
step 4. Provide a screen print of your PING.
a.

3. Unplug one end of the small cable (NIC to B) and then perform the PING again. What is
the output of the PING after you disconnect one end of the cable?
a.

Task 4: Configure your workstation to access the Internet. (Skip the Task 4 in the lab book)
At the physical layer, you are already connected to the Internet. You are physically plugged into
the device that will get you there. However, your logical address (IP address) needs to be
configured correctly. Configure your IP address as explained in Task 3, but use the information
from the signs above the whiteboard. It’s important that each one of you has a unique address,
so that last IP octet must be unique from everyone else. You will also need the Default Gateway
and DNS address for Internet access.
1. Record your settings below.
a.

2. Explain why you need the default gateway.


a. So we can be in the same network.
3. Explain why you need the DNS address.
a. Changes domain names from binary digits to network understanding
Try access the Internet. Provide a screen print of a webpage.
Task 5: Trace route
From a command line interface, perform a trace route to a website of your choice. Before you
do so, run WireShark and start a capture. The command is tracert <website address> (The < >
are NOT included in your command. They indicate that you are replacing what is inside them
with your response!)
1. What is the purpose of trace route?
a. Trace route is a way to find out what routers you go through on the internet to get to a
specific destination
2. What website did you use?
a. Devryu.net
3. Explain what is occurring with the trace route.
a. A list if hops as a packet is routed through a network
4. Provide a screen print of the trace route.
a.

5. Provide a screen print of the WireShark DNS lookup (use the filter).
a.
6. Provide a screen print of the ICMP packets used to perform the trace route.
a.

Task 6: Reflection
Write a half page reflection of what you learned with this lab.

The most important thing I learn is that just because you click on something in the web
it doesn’t mean that it is right there waiting for you. When I entered “devryu.net” I saw in
wireshark how it goes from me to Chicago then to Denver to pull up the information I want. I
understand better on what an IP address is and how each web site is different. I just want to say
I learn a lot but that is what I truly enjoyed.
Week 2 Assignment Worksheet
Fill in, answer, and/or complete the exercises below. Put your answers in RED font in the places
provided. The work assignments on these pages are pulled from your Exploration Labs and Study
Guide text. Refer to the discussions that accompany the assignments as needed.

Chapter 3

Table 3-1 OSI and TCP/IP Model Comparison

Term Definition
RFC Generally defines the protocols in the TCP/IP suite
Layer 7 Top layer of both the OSI and TCP/IP models
Session Functions at this layer create and maintain dialogs between source and
destination applications
DNS, HTTP, SMTP, The most widely known TCP/IP application layer protocols that provide for
FTP the exchange of user information
Application Top layer of the OSI model
Telnet Protocol used to provide remote access to servers and network work
devices
Presentation This layer provides coding, compression, and encryption
GIF, JPEG, TIFF Graphic image formats

Table 3-3 Port Numbers and Protocols

Port Number Protocol


80 Hypertext Transfer Protocol (HTTP)
110 Post Office Protocol (POP)
23 Telnet
53 Domain Name System (DNS)
67 Dynamic Host Configuration Protocol (DHCP)
20 and 21 File Transfer Protocol (FTP)
25 Simple Mail Transfer Protocol (SMTP)

Multiple Choice and short answer Questions

1. The Open Systems Interconnection reference model is a layered, abstract


representation created as a guideline for network protocol design. The OSI model
divides the networking process into which seven layers?
a. Application, presentation, session, transport, network, data link, and physical
b. Application, presentation, session, transport, Internet, data link, and physical
c. Application, presentation, session, transport, network, Internet, and physical
d. Application, presentation, Internet, transport, network, data link, and physical
2. What is the most popular application service?
a. World Wide Web
b. E-mail
c. P2P
d. eBay
3. The e-mail server operates which two separate processes?
a. Mail Transfer Agent (MTA)
b. Mail Transfer Bridge (MTB)
c. Mail User Agent (MUA)
d. Mail Delivery Agent (MDA)
4. Data transfer from a client to a server is referred to as which of the following?
a. Query
b. Download
c. Upload
d. Pull
5. Which of the following best describes a peer-to-peer network?
a. It decentralizes the resources on a network.
b. It centralizes the resources on a network.
c. It uses file servers.
d. It uses the client/server model.
6. The Domain Name System (DNS) was created to do what?
a. Resolve domain names to e-mail addresses.
b. Resolve domain names to MAC addresses.
c. Resolve domain names to computer names.
d. Resolve domain names to IP addresses.
7. The different top-level domains represent which of the following? (Choose all correct
answers.)
a. Type of organization
b. Country of origin
c. Company or brand name
d. File server name
8. For secure communication across the Internet, which protocol is used to access or post
web
server information?
a. HTTPS
b. SHTTP
c. Telnet
d. STelnet
9. To receive e-mail messages from an e-mail server, the e-mail client can use which of the
following protocols?
a. SMTP
b. SSH
c. S0TP
d. POP
10. Which service automates the assignment of IP addresses, subnet masks, gateway, and
other IP
networking parameters?
a. SMTP
b. TFTP
c. HTTP
d. DHCP
11. What does the term network-aware application mean? List a few examples.
a. Where carriers will need to enable the fast creation of new innovative services in
order to survive and prosper. Examples are thousands of apps on our phones.
12. What is meant by the term application layer services? Why are protocols important
when used in conjunction with application layer services?
a. Enable the human network to interface with the underlying data network. Protocols like
DNS, HTTP, FTP are very important.

Binary To Decimal Conversion

128 64 32 16 8 4 2 1 Answers Scratch Area


1 0 0 1 0 010 _______146__________

0 1 1 1 0 1 1 1 ________119_______

1 1 1 1 1 1 1 1 ________255________

1 1 0 0 0 1 0 1 ________197_________

1 1 1 1 0 1 1 0 ________246_________

0 0 0 1 0 0 1 1 ________19________

1 0 0 0 0 0 0 1 ________129_______

0 0 0 0 0 1 1 1 _________7_____

0 1 1 0 1 1 1 1 ________111_________

1 1 1 1 1 0 0 0 _________248________

Decimal To Binary Conversion


128 64 32 16 8 4 2 1 = 255 Answers Scratch Area

11101110 238

00100010 34

01111011 123

00110010 50

11001000 200

10001010 138

11111010 250

01101011 107

11100000 224

11000000 192

Use all 8 bits for each problem!

You might also like