Itt It 220chapter 1 Odd 1 Thru 50

In: Computers and Technology

Submitted By TonyU
Words 976
Pages 4
IT 220: Network Standards and Protocols
Chapter 1: Odd Questions Only 1-50

1. State whether the following network descriptions are describing a MAN, WAN or LAN:
a. A network of users that share computer resources in a limited area – LAN
b. A network of users that share computer resources across a metropolitan area – MAN
c. A network that connects local area networks across a large geographic area – WAN

3. Expand the acronym MAC – Media Access Control

5. Expand the acronym WAN – Wide Area Network

7. Define the term topology – Topology is the architecture of a network

9. A disadvantage of the token-ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding a d. token-ring hub

11. What is the difference between a hub and a switch? A hub broadcasts the data it receives to all devices connected to its ports and a switch forwards a frame it receives directly out of the port associated with its destination address.

13. What information is not included in an Ethernet frame? a. Frame size

15. What is the minimum and maximum size of an Ethernet frame? The minimum length of the Ethernet frame is 64 bytes from the destination MAC address through the frame check sequence. The maximum Ethernet frame length is 1518 bytes, 6 bytes for the destination MAC address, 6 bytes for the source MAC address, 2 bytes for length/type, and 1500 bytes for the data.

17. What does the OUI represent? The OUI represents the first 3 bytes of the MAC address that identifies the manufacturer of the network hardware.

19. INTERNET SEARCH: Find the device manufacturer for the following Ethernet devices: a. 00-C0-4F-49-68-AB – Dell Computer Corporation b. 00-0A-27-B7-3E-F8 – Apple Computer, Inc. c. 00-04-76-B6-9D-06 – 3 Com Corporation d. 00-00-36-69-42-27 – ATARI Corporation

21.…...

Similar Documents

Fin 515 Problem 3-1 Thru 3-7

...unincorporated business owned by one individual. Starting a business as a proprietor is easy—one merely begins business operations after obtaining any required city or state business licenses. The proprietorship has three important advantages: (1) it is easily and inexpensively formed, (2) it is subject to few government regulations, and (3) its income is not subject to corporate taxation but is taxed as part of the proprietor’s personal income. Some companies start with more than one owner, and some proprietors decide to add a partner as the business grows. A partnership exists whenever two or more persons or entities associate to conduct a non-corporate business for profit. Partnerships may operate under different degrees of formality, ranging from informal, oral understandings to formal agreements filed with the secretary of the state in which the partnership was formed. Partnership agreements define the ways any profits and losses are shared between partners. A partnership’s advantages and disadvantages are generally similar to those of a proprietorship. A corporation is a legal entity created under state laws, and it is separate and distinct from its owners and managers. This separation gives the corporation three major advantages: (1) unlimited life—a corporation can continue after its original owners and managers are deceased; (2) easy transferability of ownership interest—ownership interests are divided into shares of stock, which can be transferred far more easily......

Words: 2125 - Pages: 9

It -220 Chapter 5 Page 187-191 Q and a 1-37 Odd.

...IT -220 Chapter 5 page 187-191 Q and A 1-37 odd. 1. What are the four layers of the TCP/IP model?       i. Application – Defines the applications used to process requests and what ports and sockets are used.            I. (This layer is used to process requests from hosts and to make sure a connection is made to an appropriate port.)       ii. Transport – Defines the type of connection established between hosts and how acknowledgements are sent.       iii. Internet – Defines the protocols used for addressing and routing the data packets.       iv. Network Interface – Defines how the host connects to the network.  3. What are well known ports?        Also known as “reserve ports”, which are ports 1 – 1023 that are reserved by ICANN (Internet Corporation for Assigned Names and Numbers).             Port Number Assignments         Port Numbers          Description             1 - 1023          The “well known” ports         1024 – 49,151            Registered ports        49,152 – 65,535        Private Ports  5. Define the purpose of a connection oriented protocol. Give an example.       i. Establishes the network connection, manages the data transfer, and terminates the connection.            I. Connection Oriented Protocol – Establishes a network connection, manages the delivery of data, and terminates the connection.       ii. The TCP (Transport Control Protocol) protocol within the TCP/IP transport layer.            I. TCP protocol establishes......

Words: 891 - Pages: 4

Itt Unit 1

...fghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm Unit 1 assignment 2 Impact of a data classification standard 3/26/2013 Nathan Steiner (13999876) Josh Riggs NT2580 | The "Internal Use Only" data classification standard at Richman Investments will include the most basic IT infrastructure domains to include the User Domain, Workstation Domain, and the LAN Domain. This will encompass all users and their workstations, as well their access to the internet and company server databases and any information in between. The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply...

Words: 343 - Pages: 2

Case Study 1-Itt a&P

...recently been diagnosed with diabetes and I was hoping to find out what you have already had learned about the disease and then I can help you build on that knowledge. First off why don’t you tell me what you have already learned about diabetes? And don’t be afraid to ask any questions. I know that you’ve probably already started reading up about it, and it’s a little scary to think about it, but it’s a long term battle that you will need to fight, and I’m here to help you figure it out your best options for you. I’m going to start with some of the technical mumbo-jumbo and then I’ll break down for you if you need me to. To start with let me explain a little about the disease, feel free to jump in with questions as they arise. Type 1 diabetes is also known as insulin dependent diabetes or juvenile diabetes. The reason this is coming up now is because your body’s homeostasis has been thrown off by your pancreas shutting down. When your homeostasis is balanced, it is in a continuous loop. The entire homeostasis process breaks down like this, in a person without diabetes, when you eat the sugars in the food break down and stimulate your nerve receptors. Those receptors send a message to your brain, which in turn sends a message to your digestive system, specifically your pancreas in this case, to release insulin to break down that sugar. Once the sugar is broken down and the insulin has burned off your blood sugar has returned to a normal range for proper body......

Words: 1117 - Pages: 5

Unit 4 Exercise 1 Comp 1(En1320 Itt)

...Unit 4 Exercise 1: 1. The basic format for a proposal includes the following steps: Introduction Problem Analysis; major causes, Evidence and Effects of the probem. Plan for solving the problem: Major steps, Support and Deliverables. Benefits of the Plan: Costs-benefits analysis Conclusion 2. Proposals are used in college, in the workplace and anywhere you want to pitch a proposal or new project idea including grant writing. 3. The steps for inventing your proposal’s content are defining the problem, analyzing the problem, researching, inquiring, and finding similar projects. 4. The three primary sources of information for proposal writing are online, print, and empirical sources. 5. The steps to planning to solve the problem are map out the plan, explore each major step, figure out costs and benefits, and finding similar projects. 6. Costs and benefits should be listed to prove to the readers that the benefits of their investment are worth the risks. 7. In choosing an appropriate style, the steps are creating an Authoritative Tone, use metaphors and similes, pay attention to Sentence Length, and minimize the jargon. 8. Three tips for designing the proposal are creating a look, create white space and use meaningful headings. 9. The four steps in revising and editing a proposal are looking for inconsistencies in content, getting rid of extra stuff, tweaking the design and proof reading. 10. Five major problems listed are......

Words: 1239 - Pages: 5

Itt Week 1 Lab

...Charles M. Krout June 17, 2014 Week 1 Lab: Clear-Text Data in Packet Trace Learning Objectives and Outcomes * You will learn how to identify clear-text data in a packet trace. * You will become familiar with the NetWitness Investigator interface. Assignment Requirements You need a computer and Internet access to complete this assignment. You are newly hired as a technology associate in the information systems department at Corporation Techs in Dallas, Texas. Corporation Techs is an IT services organization supporting a number of clients in the Dallas/Fort Worth area. It’s a Wednesday, a dull day where you have nothing much exciting to do. Suddenly, you get a call from your manager. He appreciates the work you have been doing so far and thinks that you have the ability to take on more challenging work. To complete challenging tasks, you need to become familiar with the tools of the trade. So, you need to learn about a new packet analyzer called NetWitness Inspector. First, you must download and install the NetWitness Investigator software, and then open a demo trace file and find a clear-text password. You must also explore the tools on the toolbar in NetWitness Investigator to understand the options available. Perform the following steps: 1. Download and install the free version of NetWitness Investigator from the NetWitness Corporation Web site: http://www.netwitness.com/products/investigator.aspx 2. Register and activate the......

Words: 366 - Pages: 2

It220 Chapter 11 Pg 443-444 # 1-39 Odd

...Harry lary IT220 Chapter 11 pg 443-444 # 1-39 odd 1. List two advantages of wireless networking. 3. What is an ad hoc network? 5. What are the four physical layer technologies being used in 802.11 wireless networking? 7. Define a pseudorandom sequence as it applies to FHSS. 9. What is the frequency range used by 802.11a, and what modulation technique is used? 11. Define MIMO as it applies to 802.11n. 13. What is the purpose of an access point? 15. What is an association, and what is its purpose? 17. Draw a picture of a point-to-point wireless connection 19. In what frequency band does Bluetooth operate? 21. What is a piconet? 23. What is the purpose of the paging procedure in Bluetooth? 25. What are the three parameters that define an RFID system? Means of powering the tag, Frequency of operation, Communications protocol (also called the air interface protocol) 27. Cite three advantages for using an active RFID tags? 29. What is the WiMax frequency standard for the United States? 3.5 GHz 31. How does WiMax differ from Wi-Fi? Wimax using as a wireless 'MAN' for broad band Internet connection, between 30 and 40 miles Wi-fi using as a wireless 'LAN' to connect access point or PC in network, between 25 and 40 meeter 33. What is the purpose of wireless beacons? Beacon's flexible technology platform is ideally suited for custom applications 35. What is the purpose of......

Words: 324 - Pages: 2

Database Itt Tech Unit 1 True or False

...Nick Eubanks Unit 1 True/False Questions Indicate whether the following statements are true or false on the student answer sheet. 1) At its simplest, a database can be seen as a collection of related data. TRUE 2) A delimited file is a file where the length of the file is limited. FALSE 3) A delimited file is one in which the data is separated by a character such as a comma. TRUE 4) All fixed length files are of the same length. TRUE 5) In relational databases, logical design is kept separate from physical design. FALSE 6) A hierarchical database is designed with a tree-like structure that resembles a file system. TRUE 7) Codd defined the core principles of a relational database in 1970. TRUE 8) Data redundancy improves the integrity of a database. FALSE 9) In a diagram, crows feet notation conveys more information about the relationships. TRUE 10) A primary key uniquely identifies each row in a database table. TRUE 11) In a relational database, all data is kept in tables, even the information about the tables. TRUE 12) SQL is the language used by relational databases to create objects and to manipulate and retrieve data. TRUE 13) An entity is someone who is interested in the database. TRUE 14) In a statement of scope, a constraint is a limit on what the database will do. TRUE 15) Oracle...

Words: 326 - Pages: 2

Unit 1 Assignment 1 Itt Tech

...Unit 1 Assignment 1 Blank Answer Sheet Name: Date: Electronics ET2530 1. Define Modulation. The process of varying one or more properties of a periodic waveform, called the carrier signal, with a modulating signal that contains information to be transmitted. 2. What is a carrier Frequency? A carrier frequency is a single radio frequency with steady amplitude. 3. Describe two reasons that modulation is used for communications transmissions. a) Signal integrity b) Power savings 4. List three parameters of a high frequency carrier that may be varied by a low frequency intelligence signal. Amplitude, frequency and phase v = Vp·sin(ωt + Φ) ω = 2πf (describe which parameters can be varied) 5. What are the frequency ranges included in the following frequency subdivisions: MF (medium frequency)300-3000kHz, HF (high frequency)3-30MHz, VHF (very high frequency)30-300MHz, UHF (ultra-high frequency)300-3000MHz, and SHF (super high frequency)3-30GHz? 7. A microwave transmitter typically requires a +8dBm audio level to drive the input fully. If a +10 dBm level is measured, what is the actual voltage level measured? Assume a 600Ω system. (2.45V) Hint: Use this equation and solve it for V2 10 dBm = 20 · log10 (V2/0.77459) 9. Convert the following power to their dBm equivalents: (a) p = 1 W = 30.0000dBm (b) p = 0.001 W = 0.00000dBm (c) p = 0.0001W = -10.0000dBm (d) p = 25 μW = dBm Use this formula: dBm = 10 · log10 [P2/(10-3)] 15. Define electrical......

Words: 703 - Pages: 3

Itt Unit 1 Elec Comm

...1. Define modulation. Impressing a low-frequency intelligence signal onto a higher-frequency carrier signal 2. What is carrier frequency? The higher frequency that carries the modulation(Intelligience) 3. Describe the two reasons that modulation is used for communications transmissions. To transfer information, such as voices, images, or data. Also, the frequencies employed by the modulated signal are high enough to permit the use of antennas of reasonable length. 4. List the three parameters of a high-frequency carrier that may be varied by a low-frequency intelligence signal. amplitude, frequency, and phase 5. What are the frequency ranges included in the following frequency subdivisions: MF (medium frequency), HF (high frequency), VHF (very high frequency), UHF (ultra high frequency), and SHF (super high frequency)? MF:300 kHz–3 MHz, 3-30MHz: HF, 30–300 MHz: VHF, 300 MHz–3 GHz: UHF, 3–30 GHz: SHF 7. A microwave transmitter typically requires a +8-dBm audio level to drive the input fully. If a +10-dBm level is measured, what is the actual voltage level measured? Assume a 600- sys- tem. (2.45 V) 9. Convert the following powers to their dBm equivalents: (a) p = (b) p = (c) p = (d) p = 1 W (30 dBm) 0.001 W (0 dBm) 0.0001 W (-10 dBm) 25mW (-16 dBm) 15. Define information theory. 16. What is Hartley’s law? Explain its significance. 23. A triangle wave of the type shown in Table 1-3(e) has a peak-to-peak amplitude of 2 V and f = 1 kHz. Write...

Words: 483 - Pages: 2

Unit 4 Activity 1 Itt Tech Short Answer 1-7

...Short Answer 1-7 on page 111 How do modules help you to reuse code in a program? Because you are writing a code to perform a specific task Name and describe the two parts that a module definition has in most languages. Heather and body When a module is executing, what happens when the end of the module is reached? When the end is reached, the computers go back to the part of the program that called the module and the program resume execution. What is a local variable? What statements are able to access a local variable? The Module can only call on a local variable. Statement made inside the same module can call on a local variable In most languages, where does a local variable’s scope begin and end? Star from where the variables is defined and runs to the end on the block in which it is defined. What is the difference between passing an argument by value and passing it by reference? Passing an argument by value means that only a copy of the argument’s value is passed into the parameter variable. Passing an argument by reference means that the argument is passed into a special type of parameter known as a reference variable. Why do global variables make a program difficult to debug? Global variables make a program difficult to debug because any statement in a program file can change the value of a global variable. If you find that the wrong value is being stored in a global variable, you have to track down every statement that......

Words: 276 - Pages: 2

Client Server 1 Itt

...Chad Van Buren Jr Unit 2 Assignment 1: Disk Redundancy Research 1. RAID stands for redundant array of independent discs 2. We would use RAID depending on the need of the individual or entity. RAID differs depending on the type you install. In question 3, I will discuss the difference between RAID types. From there you can decide which one suits your needs best. 3a. RAID 0- Is taking any number of disks and striping data across all of them. This will greatly increase speeds, as you're reading and writing from multiple disks at a time. An individual file can then use the speed and capacity of all the drives of the array. The downside to RAID 0 is that it is not redundant; the loss of any individual disk will cause complete data loss. b. RAID 1- Requires at least 2 hard drives. These disks mirror each other, meaning that all the data saved on one will then be mirrored or copied onto the other. The advantage to this RAID is that if one of your hard drives fails, you can then manually plug in your other hard drive to make it the primary and continue on with your business without delay or loss of data. If your second disk is then not replaced and the secondary hard drive fails all your data will be lost. c. RAID 5- This RAID requires the use of at least 3 hard drives. It’s similar to RAID 0 in the sense that data is stripped through all the hard drives to increase performance. What makes this RAID unique is the use of what’s known as parity bit. What this does is......

Words: 715 - Pages: 3

Nt1430 Linux Networking Unit 5 Assignment 1 Itt Orange

...Francisco Ramirez Unit 5 assignment 1 Ch. 18 1. Sftp-secure file transfer protocol is a network protocol that provides file access, transfer, and management over a trusted data stream. Scp-secure transfer protocol is a network protocol that transfers data that can withstand or is immune to interception and tampering. 2. Use the “ssh host who” command in the terminal to show who is logged in 3. Scp user@bravo:-r your@home:blank 4. “$ ssh plum xterm” or use this command with “-y” if x11 forwarding is not trusted 5. The problem that enabling compression prevent when using a ssh to run remote x11 applications on a local display would be that this creates a backup feature. Should the computer crash, all of your work will be saved on the hard drive. 6. Check with the remote administrator to see if something has changed. Ch. 20 1. Edit “etc/aliases file to include the entry: root, var/logs/systemmail 2. “Cat~/. Forward”, then max@bravo.com then “/max” 3. Edit “/etc/mail/access” and add the following: “connect 192.168.1.1 relay” 4. “dnl” stand for “delete to new line”, works the same as # in shell script; it instructs the compiler to ignore any line followed by “dnl” 5. Go to content configuration on Spamassassin, then under “required spam assassin score”, change 3 to 5. 6. First, type the mail followed by the e-mail address of the recipient: mail Max@email.com, then type the subject line, then press enter. Type your message,......

Words: 270 - Pages: 2

Home Page » Computers and Technology Pt1420 Unit 1 in: Computers and Technology Pt1420 Unit 1 “Unit 1 Assignment 1” Itt Technical Institute Intro to Programming – Pt1420 Unit 1 Assignment 1 Short Answer Questions 1.

...Home Page » Computers and Technology Pt1420 Unit 1 In: Computers and Technology Pt1420 Unit 1 “Unit 1 Assignment 1” ITT Technical Institute Intro to Programming – PT1420 Unit 1 Assignment 1 Short Answer Questions 1. Why is the CPU the most important component in a computer? The reason the CPU is the most important component in a computer is because without the CPU you can’t run any software. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? The number in a bit that represents a turned on position is 1. The number in a bit that represents a turned off position is 0. 3. What would call a device that works with binary data? A digital device is a device that works with binary data. 4. What are the words that make up a high-level programming language called? Keywords or Reserved Words are words that make up a high-level programming language. 5. What are short words that are used in assembly language called? Mnemonics are short words that are used in assembly language. 6. What is the difference between a compiler and an interpreter? The difference between a compiler and an interpreter is that a compiler translates high-level language into separate machine language program while an interpreter translates AND executes the instructions in a high-level language program. 7. What type of software controls the internal operations of the computer’s hardware? An......

Words: 393 - Pages: 2

Itt It255 Research Project Part 1

...Brian Gobrecht IT255 Project Part 1 The domains of an infrastructure are broken down into several parts. The User, Workstation, LAN, LAN-to-Wan, Remote Access, Wan, and System/Application domains. All of these are a very crucial part of a domain structure and if one fails to do its proper job most of it or all of it will come to a screeching halt. The User Domain is pretty self-explanatory yes a system can do without a user but by itself it’s more probable to breakdowns and other things to go wrong. So to help the user out in a way it’s not damaging to the infrastructure. One way is to have the computer scan for viruses in anything that plugs into the usb slot such as a portable hard drive or a memory card. As for unauthorized downloads such as music or photos I suggest enable content filtering. Workstation domains are another vital part of keeping the system healthy at most times. To protect this I suggest either at the door of the server room keycards to get in and at the workstation itself both a physical and pass worded approach to ensure the right person is getting in. And to add further measure of security the room would be camera surveyed and users will be logged. A LAN domain can be a very volatile domain with all the wiring and NIC cards and LAN switches common in most rooms. If we are to hopefully secure this part of the domain I would like to be able to restrict access to the computers and laptops that are only necessary to the work environment. So if someone...

Words: 474 - Pages: 2

Little Women | Buddha Saitan (2009) | Major: Message