241_Lab1_Instructions_Netlab
.docx
keyboard_arrow_up
School
Rochester Institute of Technology *
*We aren’t endorsed by this school
Course
241
Subject
Computer Science
Date
Apr 3, 2024
Type
docx
Pages
7
Uploaded by JusticeEagleMaster178
NSSA 241 Lab 1 Instructions – Wireshark and IP Addressing Netlab
Hints and Useful information:
Be sure to review the questions in the frame below each activity. This will help you to be sure you have all the data needed before moving onto the next activity (or leaving for the day).
Two students will work on one bench which has three PCs, unless otherwise directed. Throughout the lab, P = pod number and M = machine number.
A pod consists of two benches for a total of six PCs. On one bench the PCs are numbered 1, 2, and 3. On the other bench the PCs are numbered 4, 5, and 6. In the instructions, when you see
a PC indicated with 1/4 or 2/5 or 3/6 use the PCs as numbered on your side of the pod. For example, considering the IP address, 10.140.100.PM, P is the Pod number and M is the machine number with M=1 for PC1, M=2 for PC2, M=3 for PC3, M=4 for PC4, M=5 for PC5 or M=6 for PC6.
Lab Objectives:
Introduction to the Networking Lab
Application of basic IP addressing principles
PC-PC connectivity using a Cisco 3750 Switch and Ethernet patch cables
Use of Packet Sniffer and filter capability
Activity 0 - Setup
Before beginning any lab, reboot Windows 10
on all PCs.
Click on the Windows icon , then click on the power icon that appears and select the Restart.
o
You will notice that rebooting the machines resets anything that might have been changed before you came into the lab. This is important in starting with a clean slate as the settings will impact your experiments. 2205 Netlab – SPH/SPM
Page 1
NSSA 241 Lab 1 Instructions – Wireshark and IP Addressing Netlab
Activity 1 – Testing Network Adapter Cards and Protocol Stack
For Windows 10 on PC1/4 and PC2/5 on your bench: 1.
Open an MS-DOS command window on all bench PCs. Search for CMD using the search icon in the lower left-hand corner of your screen and hit enter. 2.
Check the current network configuration for all three PCs using the command ipconfig /all
in the DOS command window of each device. For this lab, we will be focusing on the Ethernet 2 adapter. Record the MAC and IP addresses for each NIC. 3.
Carry out the following six pings at the command prompt in the MS-DOS command window. All the pings should all be successful. Remember P = pod number and M = machine number.
ping 10.140.100.PM
or ping <ip address>
a.
PC1/4 pings its own IP
b.
PC2/5 pings its own IP
c.
PC1/4 pings loopback, 127.0.0.1
d.
PC2/5 pings loopback, 127.0.0.1
e.
PC1/4 pings PC2/5
f.
PC2/5 pings PC1/4
4.
Test a continuous ping. Google how to start one and how to stop one. Examine the results.
2205 Netlab – SPH/SPM
Page 2
Pod Name _________
Pod # _________
NIC Type(Description)___________________________________
Device Name
Hardware (AKA Physical
or MAC) Address
Protocol (IPv4) Address
PC1/4
PC2/5
PC3/6
NSSA 241 Lab 1 Instructions – Wireshark and IP Addressing Netlab
Activity 1: Questions Use the website https://www.adminsub.net/?sc0=3 to help you answer the following questions. 1.
What does the OUI website do? 2.
Who is the manufacturer of the Ethernet adapters in the Networking Lab PCs ? 3.
What organization manages the OUIs? 4.
Identify two other Ethernet network card manufacturers from other Ethernet adapters other than the ones identified in the Networking lab. List each manufacturer with their corresponding 24 bit OUI in hexadecimal notation. 5.
Explain how and where you found/identified the MAC address, the manufacturer and their OUI. 6.
What are the IP addresses for the PCs on the bench where you are working?
7.
What is the subnet mask for each PC?
8.
What class of address is this?
9.
Are these IP addresses dynamically or statically (manually) assigned? How did you determine this?
10.
Explain the difference between dynamic and statically (manually) assigned IP addresses.
11.
What is the purpose of pinging loopback address (127.0.0.1)?
12.
What is the purpose of pinging your own IP address? 13.
Explain the difference between a regular ping and a continuous ping. 14.
Explain what is displayed after each ping is executed. You may need to do some
Internet research. Be sure to explain each field. For example, what does bytes = 32 mean? What does time<1ms mean? What does TTL
mean? Do more than spell out the acronym. Explain what this is reporting to someone
who is testing the network using the ping utility.
Activity 2 – Manually Configure Network Adapter Cards and Protocol Stack
Configure the TCP/IP protocol stack on PC1/4, PC2/5 and PC3/6:
1.
Find the network protocol settings. Click Windows Search, then search for network, select check network status
. This will show that you are connected via the Ethernet 2 adapter. This is your primary NIC. At the bottom of this screen, select view network properties. You will see a lot of information about your network card here. Take a minute to read through this and think about what you are seeing.
2.
Next, select the arrow to go back to the previous status screen. On the left, select
Ethernet. Then select
change adapter options. You will see one adapter labeled Ethernet 2 and two other virtual (VMware) adapters. Make note of the virtual adapters as this will be important
when you are capturing traffic via Wireshark throughout the semester.
3.
Select the Ethernet 2 adapter, then Properties -> Internet protocol 4.
2205 Netlab – SPH/SPM
Page 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Geographical Information System (Design Geodatabase)
An Environmental Protection Agency is planning to simulate flood caused by a dam breach. When the dam breach occurs, the water will spill to the river below, and flood will spread to the area along the riverbanks. This flood can be simulated based on the land elevation and land cover types. The agency would like to estimate the number of houses that will get an impact from the flood, and the road network for evacuation plan. You are required to design a geodatabase that will provide necessary information for the agency.
Question:
a. Determine attributes for each dataset. b. Apply some topological rules for your datasets.
arrow_forward
Geographical Information System (Design Geodatabase)
An Environmental Protection Agency is planning to simulate flood caused by a dam breach. When the dam breach occurs, the water will spill to the river below, and flood will spread to the area along the riverbanks. This flood can be simulated based on the land elevation and land cover types. The agency would like to estimate the number of houses that will get an impact from the flood, and the road network for evacuation plan. You are required to design a geodatabase that will provide necessary information for the agency.
Question:
a. Identify data themes that need to be included in the map.b. Determine data models to represent each theme.c. Determine types of datasets in a geodatabase for each data model.d. Determine attributes for each dataset.
arrow_forward
Use Case Modeling
Instant messaging is an online chat that offers real-time text transmission over the Internet. The system contains the following requirements:
A user can:
Set profile including change profile picture, change name, and change status.
Manage account through either change privacy settings, change SIM number, or delete account
Send broadcast message by selecting a list of contacts
Create a group including choose a group name, choose the contacts to add, and choose a group picture.
Chat with a contact including send text, send an attachment, send contact, and send location.
Mute a conversation. Choose the duration to mute either one week, one month, or one year.
Make a voice/video call with a contact.
Search for a contact either through contacts chats or through contacts list
Invite friend
Model the use case diagram for the above system.
Write the use case narrative of the “Send Location” use case
Use-Case Name:
Use-Case ID:…
arrow_forward
Course: Software Engineering
A web based software for an online book store is to be developed when a valid customer logon to the site a list of available books is displayed. When the customer selects the required book a form will be displayed that will take input the credit card number and other necessary information of the user.
After submission of the form by the customer the validity of the credit card is ensured by a banking system (external to the system). The valid orders are passed to the shipment department and an email is sent to the customer that his order is being shipped.
Mention your brain storming as well before the drawing.
Write four functional (user+system) requirements.
Draw level 1 DFD of the given scenario.
Draw ERD of the given scenario.
arrow_forward
Video-Rental LTD is a small video rental store. The store lends videos to customers for a fee, and purchases its videos from a local supplier.
A customer wishing to borrow a video provides the empty box of the video they desire, their membership card, and payment – payment is always with the credit card used to open the customer account. The customer then returns the video to the store after watching it.
If a loaned video is overdue by a day the customer's credit card is charged, and a reminder letter is sent to them. Each day after that a further card is made, and each week a reminder letter is sent. This continues until either the customer returns the video, or the charges are equal to the cost of replacing the video.
New customers fill out a form with their personal details and credit card details, and the counter staff give the new customer a membership card. Each new customer's form is added to the customer file.
The local video supplier sends a list of available titles to…
arrow_forward
Font
Paragraph
Styles
Example-3
A company sells product via website. Website earns $ 5000 an hour in revenue.
When an attack happens, website normally fails for three hours, Cost to repair is
$1000.It was seen that in the previous years, website was down for at least 4 times
a year. Calculate SLE, ARO, ALE for the above data,
The company wishes to purchase a fail over server to reduce this problem and the
cost of implementing it is $15000. If ARO can be reduced to 1 by implementing
fail over server, do you think that it is a feasible option?
12
arrow_forward
The EAM device that does not use a control panel is the:sorter why?
arrow_forward
Mathematics in The Modern World (3)
Note: I will report you if you answer this post multiple times so please follow it.Thank you, Tutor!
Content Covered:
- Graph Theory
Direction: Solve the problem below by giving the complete solution. In return, I will give you a good and high rating. Thank you so much!
Note: Be careful with the calculations in the problem. Kindly double check the solution and answer if there is a deficiency. And also, box the final answer. Thank you so much!
arrow_forward
Process Sale: A customer arrives at a checkout with items to purchase. The cashier uses the POS system
to record each purchased item. The system presents a running total and line-item details. The customer
enters payment information, which the system validates and records. The system updates inventory. The
customer receives a receipt from the system and then leaves with the items.
arrow_forward
Databases: What is the difference between status and event data.
arrow_forward
functional and non-functional requirements. Write down both for the following system.
An automated ticket-issuing system sells rail tickts.Users select their destination and input a credit card and a personal identification number. The rail ticket is issued and their credit card account charged. When the user presses the start button, a menu display of potential destinations is activated, along with a message to the user to select a destination. Once a destination has been selected, user are requested to input their credit card.its validity is checked and the user is then requested to input a personal identifier. When the credit transaction has been validated, the ticket is issued.
arrow_forward
Give Authentic and Relevant Answer.
Software Engineering
The client's ultimate objective is to have an online software system that gives information about the movies that the client sells to customers online. The system gives information about movies and actors/actresses. That is, the system should be accessed online. Each movie is identified by title and year of release. A movie has a genre (drama, comedy, etc.), a running time, and one director. A movie is made at a movie studio and may have multiple producers (people in charge of the movie production).
A movie studio has a unique name and address, and may make one or more movies. Producers are identified by name and date of birth and produce one or more movies. Directors are also identified by name and date of birth and direct one or more movies. Assume that directors don’t act or produce movies. Actors are identified by name and date of birth, and may appear in one or more movies. An actor who appears in a movie, has a role. There…
arrow_forward
Psuedocode that calculates total time taken to complete something:
EX: Start time - 10:31am, End time - 1:37pm
Total time - 3:06
arrow_forward
Computer engineering: What is meant by linker.
arrow_forward
USC (PAG) Personal Academic Guide ™ is your personal electronic sequence sheet. This is a simple application to keep track of each course you are doing/have done, serve as a personal exam timetable for the course which have final exams, keep track of your projects for courses with projects and keep a record of grades earned. It should also allow you to write notes for each course you have done. The concept is like a check sheet system blended with a simple exam timetable.
Use the UML Class diagram below to:
Create the appropriate sequence diagrams to model at least three (3) areas of your application.
arrow_forward
Sequence Diagram
arrow_forward
USC (PAG) Personal Academic Guide ™ is your personal electronic sequence sheet. This is a simple application to keep track of each course you are doing/have done, serve as a personal exam timetable for the course which have final exams, keep track of your projects for courses with projects and keep a record of grades earned. It should also allow you to write notes for each course you have done. The concept is like a check sheet system blended with a simple exam timetable.
Create a Class Diagram of at least six (6) major entities for your application. For entities with a large number of attributes you are allowed to limit your attributes to a max of six (6). All operations within each class should be identified by their visibility
arrow_forward
A web application's data flow should be described in detail.
arrow_forward
expain about screenshot
arrow_forward
Explain the functionality of additional mouse buttons (e.g., thumb buttons) and how they can be programmed for specific tasks.
arrow_forward
Personal Identification Techniques of fingerprinting unit tries to present different personal identification techniques, but there are still other methods that are not included. It is your task to look for these in the internet or other resources and provide a brief description to it. You need also to provide your sources.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Related Questions
- Geographical Information System (Design Geodatabase) An Environmental Protection Agency is planning to simulate flood caused by a dam breach. When the dam breach occurs, the water will spill to the river below, and flood will spread to the area along the riverbanks. This flood can be simulated based on the land elevation and land cover types. The agency would like to estimate the number of houses that will get an impact from the flood, and the road network for evacuation plan. You are required to design a geodatabase that will provide necessary information for the agency. Question: a. Determine attributes for each dataset. b. Apply some topological rules for your datasets.arrow_forwardGeographical Information System (Design Geodatabase) An Environmental Protection Agency is planning to simulate flood caused by a dam breach. When the dam breach occurs, the water will spill to the river below, and flood will spread to the area along the riverbanks. This flood can be simulated based on the land elevation and land cover types. The agency would like to estimate the number of houses that will get an impact from the flood, and the road network for evacuation plan. You are required to design a geodatabase that will provide necessary information for the agency. Question: a. Identify data themes that need to be included in the map.b. Determine data models to represent each theme.c. Determine types of datasets in a geodatabase for each data model.d. Determine attributes for each dataset.arrow_forwardUse Case Modeling Instant messaging is an online chat that offers real-time text transmission over the Internet. The system contains the following requirements: A user can: Set profile including change profile picture, change name, and change status. Manage account through either change privacy settings, change SIM number, or delete account Send broadcast message by selecting a list of contacts Create a group including choose a group name, choose the contacts to add, and choose a group picture. Chat with a contact including send text, send an attachment, send contact, and send location. Mute a conversation. Choose the duration to mute either one week, one month, or one year. Make a voice/video call with a contact. Search for a contact either through contacts chats or through contacts list Invite friend Model the use case diagram for the above system. Write the use case narrative of the “Send Location” use case Use-Case Name: Use-Case ID:…arrow_forward
- Course: Software Engineering A web based software for an online book store is to be developed when a valid customer logon to the site a list of available books is displayed. When the customer selects the required book a form will be displayed that will take input the credit card number and other necessary information of the user. After submission of the form by the customer the validity of the credit card is ensured by a banking system (external to the system). The valid orders are passed to the shipment department and an email is sent to the customer that his order is being shipped. Mention your brain storming as well before the drawing. Write four functional (user+system) requirements. Draw level 1 DFD of the given scenario. Draw ERD of the given scenario.arrow_forwardVideo-Rental LTD is a small video rental store. The store lends videos to customers for a fee, and purchases its videos from a local supplier. A customer wishing to borrow a video provides the empty box of the video they desire, their membership card, and payment – payment is always with the credit card used to open the customer account. The customer then returns the video to the store after watching it. If a loaned video is overdue by a day the customer's credit card is charged, and a reminder letter is sent to them. Each day after that a further card is made, and each week a reminder letter is sent. This continues until either the customer returns the video, or the charges are equal to the cost of replacing the video. New customers fill out a form with their personal details and credit card details, and the counter staff give the new customer a membership card. Each new customer's form is added to the customer file. The local video supplier sends a list of available titles to…arrow_forwardFont Paragraph Styles Example-3 A company sells product via website. Website earns $ 5000 an hour in revenue. When an attack happens, website normally fails for three hours, Cost to repair is $1000.It was seen that in the previous years, website was down for at least 4 times a year. Calculate SLE, ARO, ALE for the above data, The company wishes to purchase a fail over server to reduce this problem and the cost of implementing it is $15000. If ARO can be reduced to 1 by implementing fail over server, do you think that it is a feasible option? 12arrow_forward
- The EAM device that does not use a control panel is the:sorter why?arrow_forwardMathematics in The Modern World (3) Note: I will report you if you answer this post multiple times so please follow it.Thank you, Tutor! Content Covered: - Graph Theory Direction: Solve the problem below by giving the complete solution. In return, I will give you a good and high rating. Thank you so much! Note: Be careful with the calculations in the problem. Kindly double check the solution and answer if there is a deficiency. And also, box the final answer. Thank you so much!arrow_forwardProcess Sale: A customer arrives at a checkout with items to purchase. The cashier uses the POS system to record each purchased item. The system presents a running total and line-item details. The customer enters payment information, which the system validates and records. The system updates inventory. The customer receives a receipt from the system and then leaves with the items.arrow_forward
- Databases: What is the difference between status and event data.arrow_forwardfunctional and non-functional requirements. Write down both for the following system. An automated ticket-issuing system sells rail tickts.Users select their destination and input a credit card and a personal identification number. The rail ticket is issued and their credit card account charged. When the user presses the start button, a menu display of potential destinations is activated, along with a message to the user to select a destination. Once a destination has been selected, user are requested to input their credit card.its validity is checked and the user is then requested to input a personal identifier. When the credit transaction has been validated, the ticket is issued.arrow_forwardGive Authentic and Relevant Answer. Software Engineering The client's ultimate objective is to have an online software system that gives information about the movies that the client sells to customers online. The system gives information about movies and actors/actresses. That is, the system should be accessed online. Each movie is identified by title and year of release. A movie has a genre (drama, comedy, etc.), a running time, and one director. A movie is made at a movie studio and may have multiple producers (people in charge of the movie production). A movie studio has a unique name and address, and may make one or more movies. Producers are identified by name and date of birth and produce one or more movies. Directors are also identified by name and date of birth and direct one or more movies. Assume that directors don’t act or produce movies. Actors are identified by name and date of birth, and may appear in one or more movies. An actor who appears in a movie, has a role. There…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Microsoft Windows 10 Comprehensive 2019Computer ScienceISBN:9780357392607Author:FREUNDPublisher:CengageCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE LNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage