Chapter 9
Connecting to and Setting Up a Network
Reviewing the Basics
1. How many bits are in a MAC address?
48 bits
2. How many bits are in an IPv4 IP address? In an IPv6 IP address?
32 bits, 128 bits
3. How does a client application identify a server application on another computer on the network? By a port number
4. What are IP addresses called that begin with 10, 172.16, or 192.168?
Private IP addresses
5. In what class is the IP address 185.75.255.10?
Class B
6. In what class is the IP address 193.200.30.5?
Class C
7. Describe the difference between public and private IP addresses. If a network is using private IP addresses, how can the computers on that network access the Internet?
Public IP addresses are licensed and authorized to
…show more content…
Which wireless encryption standard is stronger, WEP or WPA?
WPA
29. When securing a Wi-Fi wireless network, which is considered better security: to fi lter MAC addresses, use encryption, or not broadcast the SSID?
To use encryption
30. Would you expect WPS to be used when a wireless network is using strong security, weak security, or no security (as in a public hotspot
Strong security
Thinking Critically
1. You have just installed a network adapter and have booted up the system, installing the drivers. You open Windows Explorer on a remote computer and don’t see the computer on which you just installed the NIC. What is the fi rst thing you check?
a. Has TCP/IPv6 been enabled?
b. Is the computer using dynamic or static IP addressing?
c. Are the lights on the adapter functioning correctly?
d. Has the computer been assigned a computer name?
Answer: c. Are the lights on the adapter functioning correctly?
2. Your boss asks you to transmit a small fi le that includes sensitive personnel data to a server on the network. The server is running a Telnet server and an FTP server. Why is it not a good idea to use Telnet to reach the remote computer?
a. Telnet transmissions are not encrypted.
b. Telnet is not reliable and the fi le might arrive corrupted.
c. FTP is faster than Telnet.
d. FTP running on the same computer as Telnet causes Telnet to not work.
Answer: a. Because Telnet transmissions are not encrypted
3. Your job is to support the desktop computers in a small company
Overview|On a Windows 7 computer, the Network and Sharing Center provides access to most of the operating system’s networking tools and configuration parameters. In Exercise 7.1, you examine the current Sharing and Discovery settings on one of the computers that will become part of the lab network.|
12. A TCP/IP network includes an Ethernet LAN with 10 PCs uses a LAN switch. PC1 sends data intended for an app running on PC2. Which of the following mechanisms does Ethernet define so that PC2 receives and processes the data? A)The Ethernet header lists PC2’s MAC address so that PC2 will realize that the data is meant for PC2.
Client Server is a computer system where a central server provides data of networked workstations.
12. A TCP/IP network includes an Ethernet LAN with 10 PCs uses a LAN switch. PC1 sends data intended for an app running on PC2. Which of the following mechanisms does Ethernet define so that PC2 receives and processes the data? The Ethernet header lists PC2’s MAC address so that PC2 will realize that the data is meant for PC2
When you're ready to get started, follow the installation method instructions you'd like to use (CD or download). During installation, select the option for the network connection type, not the USB option.
Third, there is a set of software that allows the computer to send data across this network. There are a lot
SECTION IV: ( 2 points) Using the 100 Tips for Wireshark document from Laura Chappell, outline your favorite 2 tips and outline when and how you would use them to troubleshoot a network problem. Write at least 3 sentences on each tip you select to profile. Each outline is worth1 points each.
1. You have been assigned the IP network address of 135.65.0.0 and have selected 255.255.240.0 as the subnet mask. How many valid subnet addresses are available? 2. You have a network address of 132.66.0.0 and a subnet mask of 255.255.240.0. Find the number of the valid subnets and how many possible host addresses are on each subnet excluding addresses of all 1s and all 0s. 3. You have a network address of 165.35.0.0 and have selected 255.255.192.0 as the subnet mask value. How many possible subnets are there?
Internet. Which of the following is true about the Internet connections that must exist so that the
1. You have been assigned the IP network address of 135.65.0.0 and have selected 255.255.240.0 as the subnet mask. How many valid subnet addresses are available? 2. You have a network address of 132.66.0.0 and a subnet mask of 255.255.240.0. Find the number of the valid subnets and how many possible host addresses are on each subnet excluding addresses of all 1s and all 0s. 3. You have a network address of 165.35.0.0 and have selected 255.255.192.0 as the subnet mask value. How many possible subnets are there?
A . A cable modem uses the same type of cable as used for cable TV.
Geoffrey Laptop: Resolve the issue with the studio 1a laptop not connected to the wireless network.
4. Which TWO (2) of the four network types (e.g., LAN, WAN, Wireless LAN and MAN) might
To start Wireshark, I went through my computer and found the installer .exe file. Once installed I opened it and the first thing on the screen was the Internet Interfaces. The screenshot below shows that my computer has two Local Area Connections, however, only one is actively receiving/sending packets.
Unlike IPv4 addresses, which are specified in dotted decimal notation in 8-bit sections, IPv6 addresses are specified in hexadecimal format in 16-bit sections separated by a colon, as in