Networking Itt Labs 1.1-1.6

In: Computers and Technology

Submitted By pyromaniac788
Words 3121
Pages 13
Lab 1
Exercise 1.1.1 Create a mapping similar to Figure 1- 1 for the decimal number 2931 using either paper and pencil or a Word document.
10^3 10^2 10^1 10^0
1000 100 10 1
2 9 3 1
2000+900+ 30 + 1 = 2931

Exercise 1.1.2 Create a mapping similar to Figure 1- 2 for the binary number 110 using either paper and pencil or a Word document.
2^2 2^1 2^0
1 1 0
4 + 2 + 0 = 6
Exercise 1.1.3 Create a mapping similar to Figure 1- 2 for the binary number 11 using either paper and pencil or a Word document.
2^1 2^0 1 1
2 + 1 = 3

Exercise 1.1.4 Create an expanded mapping similar to Figure 1- 3 for the binary number 10010 using either paper and pencil or a Word document.
2^4 2^3 2^2 2^1 2^0
16 8 4 2 1
1 0 0 1 0
16 + 2 = 18
Exercise 1.1.5 Create an expanded mapping similar to Figure 1- 3 for the binary number 11100010 using either paper and pencil or a Word document.
2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0
128 64 32 16 8 4 2 1
1 1 1 0 0 0 1 0
128 + 64 +32 + 2 = 226
Exercise 1.1.6 Using the example in Figure 1- 5 and the steps that followed, create a binary conversion for the decimal value 156.
10011100
Exercise 1.1.7 Using the example in Figure 1- 5 and the steps that followed, create a binary conversion for the decimal value 255.
11111111
Exercise 1.1.8 Using the example in Figure 1- 5 and the steps that followed, create a binary conversion for the decimal value 200.
11001000
Exercise 1.1.9 Using the binary converter document, create a decimal conversion for the binary value 1001.
9…...

Similar Documents

Lab 1.1

...a high-level programming language are known as key words or reserved words. 5. What are the short words that are used in assembly language called? Mnemonic 6. What is the difference between a complier and an interpreter? A compiler translates code from a source language (e.g. C, C++, and Java) to a target language, which can then be executed by a (virtual or physical) machine. An interpreter reads code in an interpreted language (e.g. PHP, Perl, and Java Script) and directly executes the contained instructions. 7. What type of software controls the internal operations of the computer’s hardware? The programs that control and manage the basic operations of a computer's hardware are generally referred to system software. Lab 1.1: GUI vs. Console Programming 1. What similarities do you see between the two programs? The similarities that I see between the two programs are the way the answers are displayed. Easy display of information typed in. 2. What differences do you see between the two programs? The......

Words: 348 - Pages: 2

Itt 255 Lab 6

...ITT Technical Institute NT2580 Introduction to Information Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1330 Client-Server Networking II or equivalent, NT1430 Linux Networking or equivalent Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definitions of terms, concepts, elements and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Security Syllabus Where Does This Course Belong? This course is required for the associate degree program in Network Systems Administration (NSA). The following diagram demonstrates how this course fits in the program: NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving......

Words: 3887 - Pages: 16

Itt Nt2580 Lab #5

...Lab #5 1. What is the purpose of the address resolution protocol (ARP)? ARP is a protocol used for resolution of IP addresses into MAC addresses and vice versa. 2. What is the purpose of the dynamic host control protocol (DHCP)? DHCP is used on an IP network to assign IP addresses to computers on the network. This is done without any human intervention. The computer requesting a DHCP-assigned address is given one by the network’s DHCP server within a range of assigned IP addresses which are tracked by the DHCP server. A DHCP-assigned address is normally assigned to a computer for a set lease time and after that lease expires, the computer must renew the IP address or request a new one. 3. What was the DHCP allocated source IP host address for the Student VM and the Target VM? (retracted) 4. When you pinged the targeted IP host, what was the source IP address and destination IP address of the ICMP echo-request packet? Source: 10.134.112.42 (my external IP) Destination: 98.138.253.109 (www.yahoo.com) 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-reply packets were sent back to the IP source? Yes, the target did respond with ICMP echo reply packets. My computer sent four request packets and the destination server sent four reply packets back. 6. Find a TCP 3-way handshake for a TELNET, FTP, or SSH session. What is the significance of the TCP 3-way......

Words: 552 - Pages: 3

Nt 1210 Lab 1.1

...NT1210 LAB 1.1 1.1.1 2931 103 102 101 100 1000 100 10 1 2 9 3 1 ___________________ 2000 + 900 + 30 + 1 = 2931 1.1.2 1102 22 21 20 4 2 1 1 1 0 ________________ 4 + 2 + 0 = 6 1.1.3 112 21 20 2 1 1 1 __________ 2 + 1 = 3 1.1.4 Exercise 1.1.4:   Create an expanded mapping for binary number 10010 subscript 2.      2^7 | 2^6 | 2^5 | 2^4 | 2^3 | 2^2 | 2^1 | 2^0 | 128 | 64 | 32 |   16 | 8 | 4 | 2 | 1 | x | x | x | x | x | x | x | x | 0 | 0 | 0 | 1 | 0 | 0 |     1 | = 18 = 18 0 | 0 | 0 | 0 | 16 + |   0 + |     0 + | 2 + | 0 | Exercise 1.1.5:   Create an expanded mapping for the binary number 11100010 subscript 2. 2^7 |...

Words: 484 - Pages: 2

Lab 1.1

...© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION Lab #1 - Assessment Worksheet Performing Network Reconnaissance using Common Tools information security Course Name and Number: _____________________________________________________ jacob davis Student Name: ________________________________________________________________ dr.bonsu Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment. You used Wireshark to capture and analyze network traffic, OpenVAS to scan the network, reviewed a sample collection of data using NetWitness Investigator, connected to a remote Windows machine and explored two file transfer applications, FileZilla and Tftpd64. You used PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for the network interfaces. Finally, you used Zenmap to perform a scan of the network and created a network topology chart. Lab Assessment Questions & Answers 1. Name at least five applications and tools used in the lab. wire shark, net witness, openVAS, tfpd64, and puty.exe 2. What is promiscuous mode? promiscuous mode allows a network device to intercept and read each network packet that arrives in its entirety. This mode of operation is sometimes given to a network snoop server that captures and saves all packets for......

Words: 354 - Pages: 2

Nt1210 Lab 1.1

...Lab 1.1 1.1.1 10⁰ 10⁰ 10¹ 10¹ 10² 10² 10³ 10³ 1 1 10 10 100 100 1000 1000 2931 2931 30 30 1 1 2000 2000 900 900 2 2 1 1 3 3 9 9 X X X X 1.1.2 2² 2¹ 2º 4 2 1 1 1 X X X 0 0 1 1 5 5 4 4 0 0 1 1 1.1.3 2² 2¹ 2º 4 2 1 0 0 X X X 1 1 1 1 3 3 0 0 2 2 1 1 1.1.4 24 2³ 2² 2¹ 2º 16 8 4 2 1 1 1 0 0 0 0 1 1 0 0 X X X X X 0 0 2 2 16 16 18 18 0 0 0 0 1.1.5 27 26 25 24 2³ 2² 2¹ 2º 128 64 32 16 8 4 2 1 1 1 1 1 1 1 0 0 0 0 0 0 1 1 0 0 X X X X X X X X 226 226 128 128 64 64 32 32 0 0 0 0 0 0 2 2 0 0 1.1.6 28 28 156 156 28 28 28 28 12 12 4 4 0 0 0 0 ˅ ˅ ˅ ˅ ˅ ˅ ˅ ˅ 27 26 25 24 2³ 2² 2¹ 2º 128 64 32 16 8 4 2 1 10011100 10011100 1 1 0 0 0 0 1 1 1 1 1 1 0 0 0 0 X X X X ...

Words: 739 - Pages: 3

Nt1110 Lab 1.1

...Nt1110 Lab 1.1 The operating system on my computer from school is windows 7 enterprise. It is a 64 bit operating system with service pack 1 installed. There are many features on this device such as windows 7 has carried over the use of many of the applications as windows xp without the hassle of waiting for the system to adjust. Another feature is that it runs on lower hardware requirements this adds to the previous feature but in a different way by making it usable on netbooks effectively making it a good replacement for prior operating systems on the device. An immensely helpful feature is the further organization on the task bar. The icons and applications have been grouped together for greater accessibility and multiple windows of the same application open and stacked. There are also some pretty simple features of the windows7 OS such as aero shaker. This allows you to focus on one window by grabbing the address bar at the top and shaking it with your mouse this will minimize all the other windows you have on your screen. Stacking is also a new simple feature that allows you to drag a window to the side of the screen where it will automatically stay and fill half the screen allowing for users to view multiple windows in a much more simple manner. There are many other features provided in the windows7 operating system that may be found useful go out and find them and enjoy it for yourself. Now let’s take a closer look at the properties of this OS rather than the......

Words: 325 - Pages: 2

Lab 1.1-1.6

...Exercise 1.1.1 10 3 102 101 100 1000 100 10 1 2 9 3 1 1.1.2 22 21 20 4 2 1 1 1 0 = 6 1.1.3 21 20 2 1 1 1 = 3 1.1.4 24 23 22 21 20 16 8 4 2 1 1 0 0 1 0 16 2 = 18 1.1.5 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 1 1 0 0 0 1 0 128 64 32 2 = 226 1.1.6 128 64 32 16 8 4 2 1 1 0 0 1 1 1 0 0 = 156 1.1.7 128 64 32 16 8 4 2 1 1 1 1 0 0 0 0 1=225 1.1.8 128 64 32 16 8 4 2 1 1 1 0 0 1 0 0 0 =200 1.1.9 1.1.9 24 23 22 21 20 16 8 4 2 1 1 0 0 1 8 1=9 1.1.10 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 0 1 1 1 0 0 1 128 32 16 8 1=185 1.1.11 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 0 1 1 1 1 32 8 4 2 1= 47 1.1.12 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 0 0 0 0 0 0 1 128 1= 129 1.2.1 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 1 0= 6 1 0 0 1=9 Sum=15 1.2.2 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 1 0=6 1 0 1=5 Sum=11 1.2.3 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 1 1=7 1 1 1=7 Sum=14 1.2.4 Value 1 110 Value 2 011 OR result 111 1.2.5 111 100 And Result 100 1.2.6 NOT 1001= 0110 1.2.7 27 26 25 24 23 22 21 20 128 64 32 16 8 4 2 1 1 0 1 0=10 1 0=2 Sum= 12 by continuing to multiple by 2 1.2.8...

Words: 422 - Pages: 2

Nt1110 Lab 1.1

...Computer Structure and Logic NT1110 Lab 1.1 The operating system currently in use on my laptop is Windows 7 Enterprise. The service pack that is installed on the operating system is Service Pack 1. There are many different features that are included in Windows 7 Enterprise that were not available in previous versions of Windows. For example, some of them include improving application response with BranchCache, helping users search for information with Federated Search, and managing what software is allowed to be run using AppLocker. You can also protect and manage the data on your PC with BitLocker and BitLocker To Go. DirectAccess is also provided on Windows 7 Enterprise to allow users easy access to corporate networks. (Source: http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-7/features.aspx) My laptop has an Intel Celeron 2957U processor with a processor speed of 1.40 GHz. The amount of installed RAM in my laptop is 4.00 GB. The disk space currently available is 421 GB with the maximum of 465 GB available. The operating system could be upgraded to Windows 8. A few of the devices that are attached to my laptop include a battery, a Dell Wireless 1705 Bluetooth radio, a Toshiba ATA Hard Disk Drive, an integrated webcam, and a standard PS/2 keyboard with a Dell Touchpad. There are other devices that are used on my laptop as well, but I wanted to list some of the devices that made up the core of my laptop without delving into too......

Words: 292 - Pages: 2

Ip Networking Assignment 1.1

...IP Networking Assignment 1.1 Chapter 1 1. The TCP/IP networking model is a model of networking functions that are separated into different layers. Each layer performs a specific function that effects the layer above and below it. We use the TCP/IP model to troubleshoot a computer that is experiencing network issues. 2. There are seven different layers in an OSI model. Layer 1 (Physical layer): the physical characteristics of a computer such as connectors and pins. Layer 2 (Data Link): defines the internet protocols and the format of a header and trailer that allows devices to send and receive data successfully. Layer 3 (Network): routing IP packets and IP addressing. Layer 4 (Transport): data delivery from one computer to another. Layer 5 (Session): User communicating with the computer. Layer 6 (Presentation): defining data formats such as text files (.txt) and picture files (JPEG). Layer 7 (Application): support for applications such email and internet explorer. 3. The difference between same layer and adjacent layer interactions is that same layer deals with two computers, while adjacent with just one computer. 4. Encapsulation is the process of placing data into a header and footer. Decapsulation is the process of removing data from a header and footer. Chapter 2 1. There are five different types of Ethernet which are 10Base2, 10Base5, 10Base-T, 100Base-TX, and 1000Base-T. Also there are many different types of topologies such as bus, star, mesh, extended star...

Words: 726 - Pages: 3

Nt1210 Lab 1.1

...Unit 1 Lab 1.1: Reading Binary Exercise 1.1.1: Create a mapping for the decimal number 2931 10^3 10^2 10^1 10^0 1,000 100 10 1 *2 *9 *3 *1 2,000 900 30 1 =2931 Exercise 1.1.2 Create a mapping for the binary number 1102 2^2 2^1 2^0 4 2 1 *1 *1 *0 4 + 2 + 0 = =6 Exercise 1.1.3 Create a mapping for the binary number 112 2^1 2^0 2 1 *1 *1 2 + 1 = =3 Exercise 1.1.4 Create an expanded mapping for the binary number 100102 2^4 2^3 2^2 2^1 2^0 16 8 4 2 1 *1 *0 *0 *1 *0 16 + 0 + 0 + 2 + 0 = =18 Exercise 1.1.5 Create an expanded mapping for the binary number 111000102 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 *1 *1 *1 *0 *0 *0 *1 *0 128 + 64 + 32 + 0 + 0 + 0 + 2 + 0 = =226 Exercise 1.1.6 Create a binary conversion for the decimal value 156 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 *1 *0 *0 *1 *1 *1 *0 *0 128 + 0 + 0 + 16 + 8 + 4 + 0 + 0 = =156 Exercise 1.1.7 Create a binary conversion for the decimal value 255 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 *1 *1 *1 *1 *1 *1 *1 *1 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = =255 Exercise 1.1.8 Create a binary conversion for the decimal value 200 2^7 2^6 2^5 2^4 2^3 2^2 2^1 2^0 128 64 32 16 8 4 2 1 *1 *1 *0 *0 *1 *0 *0 *0 128 + 64 + 0 + 0 + 8 + 0 + 0 + 0 = =200 Exercise 1.1.9 Using the binary converter document, create a decimal conversion for the binary value 10012. =8 Exercise 1.1.10 Using the binary converter document, create a decimal......

Words: 707 - Pages: 3

Nt1210 Intro to Networking Lab 1.6

...NT1210 Lab 1.6 gathering file system information. Exercise 1.6.1 Record the amount of space you have available and how much total space you have on your Windows hard drive. My Computer Local Disc C: Right click local disc then properties then this will show you how much capacity the Hard Drive will have used spaced is 56,945,139,712 bytes 53.0 GB free space 102,988,910,592 bytes 95.9 GB Exercise 1.6.2 Using a Linux or Mac OS computer, determine the amount of space you have available and how much total space you have on the hard drive. On Mac OS X, you can get this information by right- clicking the MacintoshHD icon on the desktop and selecting Get Info. On a Linux machine, you can type df -h at the command-line interface. Open System Monitor from Dash and select the Filesystems tab this will show you used disc space with free space. 56,945,139,712 bytes 53.0 GB 102,988,910,592 bytes 95.9 GB Exercise 1.6.3 Locate the system information for your Windows machine and record the amount of RAM you have installed. 2GB Ram Memory Exercise 1.6.4 Locate the amount of RAM you have available on either a Mac OS X machine or a Linux machine. Compare this to the RAM allocated for the Windows machine. On a Mac OS X computer, open the MacintoshHD directory, open the Applications folder, open the Utilities folder, and then choose System Profiler to find the amount of RAM installed. On a Linux machine, you can use the free command to display the amount of memory available and the......

Words: 496 - Pages: 2

Intro to Networking Lab 9.1

...Lab 9.1 – 9.4 ITT – Technical Institute Introduction to Networking Martin Gilmore January 6, 2016 Lab 9.1: Broadband Internet Exercise 9.1.1 * This was inefficient because it prohibited the use of the phone line for its original intention. * The limitation of the data rate for this type of connection was 56kbps. Exercise 9.1.2 * Broadband uses multiple channels of frequencies to transmit data more efficiently where broadband uses a single channel. Exercise 9.1.3 DSL Connection Types DSL Type | Maximum Download Speed | Maximum Upload Speed | Maximum Distance (m) | ADSL | 24 Mbps | 1.4 Mbps | 6000+ | HDSL | 1.54 Mbps | 1.54 Mbps | 3650 | IDSL | 144 Kbps | 144 Kbps | 10,700 | MSDSL | 2 Mbps | 2 Mbps | 8800 | RADSL | 7 Mbps | 1 Mbps | 5500 | SDSL | 2,048 Mbps | 2,048 Mbps | 3000 | VDSL | 52 Mbps | 16 Mbps | 1000+ | Lab 9.2: Networks and Subnets Exercise 9.2.1 * If you had 4 bits for the host ID, how many unique combinations can be made from 4 bits? * 16 * What is another way to express this value as a power of 2? * 42 Exercise 9.2.2 * On a /24 network, how many unique host ID values exist? * 256 hosts * On a /16 network, how many unique host ID values exist? * 65,534 hosts, or 164 Exercise 9.2.3 * What is the reserved network address? * 176.33.4.0 * What is the reserved broadcast address? * 176.33.4.255 * What is the first available host ID for a unique host on this......

Words: 542 - Pages: 3

Itt Lab 7 Lab Doc

...© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION Lab #7 - Assessment Worksheet Using Encryption to Enhance Confidentiality and Integrity Course Name and Number: _____________________________________________________ john schenberger Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you learned how cryptography tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. You used Kleopatra, the certificate management component of GPG4Win, to generate both a public and private key as both a sender and a receiver. You used the sender’s keys to encrypt a file, sent it to the receiver, and decrypted it using the receiver’s copy of the keys. Lab Assessment Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public key, private key, or both? The public key is the only key that I will share with another person as part of the handshake in order of the encryption take place. 2. What does Kleopatra allow you to do once it is installed? Kleopatra allow you to encrypted messages, files and text with a private key. 3. What key type was used to create the certificate on Kleopatra? What other types of encryption key......

Words: 285 - Pages: 2

Lab 1.6

...Lab 1.6 Exercise 1.6.1 Record the amount of space you have available and how much total space you have on your Windows hard drive. This will vary by system. Exercise 1.6.2 Using a Linux or Mac OS computer, determine the amount of space you have available and how much total space you have on the hard drive. On Mac OS X, you can get this information by rightclicking the MacintoshHD icon on the desktop and selecting Get Info. On a Linux machine, you can type df -h at the command-line interface. Again, this will vary from system to system. Exercise 1.6.3 Locate the system information for your Windows machine and record the amount of RAM you have installed. This will vary from system to system. Exercise 1.6.4 Locate the amount of RAM you have available on either a Mac OS X machine or a Linux machine. Compare this to the RAM allocated for the Windows machine. On a Mac OS X computer, open the MacintoshHD directory, open the Applications folder, open the Utilities folder, and then choose System Profiler to find the amount of RAM installed. On a Linux machine, you can use the free command to display the amount of memory available and the amount in use; to get the result in megabytes, use the free -m command at the command-line interface. This will vary from system to system. Exercise 1.6.5 Access the System Information window on your Windows machine and record the type of processor and the processor speed for the computer. This will vary from system to......

Words: 894 - Pages: 4

Highlight Cinta Suci - Episode 88 dan 89 | Isaac Byrne | お支払い方法