Lesson 2 Lab Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the protocols that are used in it. This lab is important to the student because it takes the student through a thought experiment about how data would pass thorough the TCP/IP Model down from the computer and up through the destination computer. By doing this thought experiment the student will come to better understand how different protocols work together to accomplish a specific task. Materials • Word processing document • Textbook Do the Lab Follow …show more content…
Take Note This lab uses Windows 7. If you are using Windows 8, Vista or Windows XP, you will need to make some slight variations to the lab. Materials • word processing document • Computer running Windows 7 Professional Do the Lab The IPCONFIG Command 1. Click the Start button at the bottom left of your Windows 7 Desktop Display in order to bring up the Windows 7 start menu (Figure 2-12). [pic] 2. Type CMD into the Search Programs and Files box at the bottom of the Start Menu and press Enter. 3. The Command Line Interface (CLI) Window will come up (as shown in Figure 2-13). The CLI is a window where you can enter commands into the computer in the form of text. This type of interface was how a person interacted with DOS. It is also how a person is able to currently interact with Linux if they choose not to use one of several graphical interfaces available for use with Linux. [pic] 4. Once you have opened the Command Line Interface (CLI), type in the command ipconfig. When the ipconfig command is entered, the CLI changes to something similar to Figure 2-14. You should note that the
Protocol capture tools and protocol analyzers are important tools for an information systems security professional. These utilities can be used to troubleshoot issues on the network. They can verify adherence to corporate policies, such as whether or not clear text privacy data is being sent on the network. They can be used to test security countermeasures and firewall deployments and are needed to perform audits, security assessments, network baseline definitions, and identification of rogue IP devices.
System requirements for Windows operating systems. It will support any current version of Windows that is still in the extended supported lifetime and any modern 64-bit AMD64/x86-64 or 32-bit x86 processor. Requires, 400 MB available RAM but larger captures require more RAM also 300 MB available disk space but capture files require more space from your system. Additionally, it recommends 1280x1024 resolution or higher, at least 16-bit color and a supported network card for capturing ethernet and/or 802.11 (wi-fi). Wireshark supports most Unix and Unix-like platforms and the system requirements are the equivalents of Windows systems.
For the OS system to be corrdinated with the software you must make sure you are using software that is for your OS. If you don’t use the correct software the OS cannot give that software the right commends to work will not run on the PC.
TCP/IP is a protocol which transfers data across a network. It allows two different computers to communicate well even if they use different codes. Putting both computers into a new common code language which both computers
| Paste your answers to questions 1 through 16 in the document. Be sure to show your work.Perform the required problems.In your own words, summarize what you have learned concerning network commands available within the Windows operating system.
Task 3: Step 1, Paste the screenshot of the Microsoft Network Monitor capture summary window showing the ICMP frames displayed in red. (2.5 points)
Windows is one of the biggest operating systems in the world and was created in 1981 by chase bishop. The purpose of windows is to improve on previous systems and make them all better. This operating system is a graphical
In the space provided below, copy and paste your IP_FileWrite.vbs program sourcecode. If it doesn’t fit, use the next page for the continuation of your program sourcecode.
To view the process, I have on my computer for the boot process I can click on the Windows icon and type in System Configuration. This will open the System Configuration application where I can view the boot tab. Under this tab I see how my system is booting up. Additionally, to view my boot process I can pay attention to how my system is starting when it is powering on.
Module 1 establishes the framework of networking standards and protocols for the rest of the class. The module introduces data communications and defines their components and the types of data exchanged. You will learn how different types of data are represented and how data is flowed through the network.
In general, an IP address along with a port number forms a socket. Figure 3.10 shows the
In the space provided below, copy and paste your IP_FileWrite.vbs program sourcecode. If it doesn’t fit, use the next page for the continuation of your program sourcecode.
4. Identify the network protocols that are used in the protocols that are in the local are network at your shall or workplace. Why were these protocols chosen for your network? Was IPX ever implemented in your local area network? Why? if your network is using IP, what address class(es) is being used? Why? see if you can find out if and how class D and class E addresses are used in your network.
Network protocol communications, network connections established by host computer, network routing information, information about computers