Networking 1

Category: Uncategorized

Lab 9 Trouble Shooting

Objectives:

configure a small network with static routes. two routers used.Configure Routing Information Protocol 

Equipment

Routers, Computers, Cables, Switches

Questions:

What method did you use to test connectivity? Was it successful? If not, why did the test fail?

Pinging,not successful, router needed reconfigured

 Was there any output from the debug command? 

showed the routers and computers connected

What did the output show? 

updates

Describe the process it took to isolate the fault and the actions necessary to correct the problems.

Checked connection visually then pinged and found non connective to certain computers and routers therefore did reconfiguring of ip addresses.

Conclusion

Good review on basic troubleshooting from my other networking background. Good lab to finish the semester with.  

Lab 8 Video Editing

objectives: To learn how edit a video using Sony Vegas

Equipment: PC, Sony Vegas Software

Notes and Observations: First I downloaded the Hitchcock video from the url in the lab. Next I found what does the fox say and downloaded it as an avi file.I then edited them by creating clips and spliting. The final clip had Hitchcock smiling then panning to the music video.

Answer to questions on lab:

1. Which of these licenses could you use in your class video project? Why?

Attributions

2. Which license would not be acceptable to use in your video project?  Why not?

Attributions because they’re noncommercial.

3. Which licenses allows you to use the work as long as you share your work with others through Creative Commons as well?

Attributions like ShareAlike

Conclusion: Video making is tedious and time consuming. A lot of editing goes into it.

Research Topic References

Topic

How networking and social media can compromise your identity.

References

Poremba, S. (2013, April 2). 7 Easy Ways to Get Your Identity Stolen. TechNewsDaily.com. Retrieved April 20, 2014, from http://www.technewsdaily.com/17567-7-easy-ways-identity-theft.html

lewis, K. (n.d.). Social Media ID Theft Article | Anvil Media Inc.. Anvil Media Portland OR Social Media ID Theft Article Comments. Retrieved April 20, 2014, from http://www.anvilmediainc.com/about/digital-marketing-resources/articles/social-media-id-theft-article/

Rivero, J. (2012, January 3). Three New Ways to Protect Your Identity in 2012. Forbes.

Thompson, H. (2011, December 15). How to steal an identity in seven easy steps.SmartPlanet. Retrieved April 4, 2014, from http://www.smartplanet.com/blog/thinking-tech/how-to-steal-an-identity-in-seven-easy-steps/

Stuber, S. (Director). (2013). Identity thief : Universal Studios Home Entertainment.

Stickley, J. (2009). The truth about identity theft. Upper Saddle River, N.J.: FT Press.

Identity Theft Is a Very Real, Very Big Concern. (2002, September 4). Daily Herald.

Radin, T. (n.d.). identity theft. Encyclopedia Britannica Online. Retrieved , from http://www.britannica.com/EBchecked/topic/1017439/identity-theft

Identity Theft / Fraud Statistics. (2013, June 8). Statistic Brain RSS. Retrieved April 20, 2014, from http://www.statisticbrain.com/identity-theft-fraud-statistics/

Bureau of Justice Statistics (BJS). (n.d.). Bureau of Justice Statistics (BJS). Retrieved April 20, 2014, from http://www.bjs.gov/index.cfm?ty=tp&tid=42

Lab 7 part 2

Objectives

Use subnets, assign ip addresses, masks, and gateway addresses to build an operational network.

Equipment

Computers, cabling, router, and switches

Notes and Observations

First we setup three different “groups of computers. Two with three computers and one with four computers. Next we mapped out our network like the exercises in class. We then assigned a switch with each group connected to a router. Next we connected the three routers connected to a main switch. We used the network address of 174.178.0.0. With a submask 255.255.192.0 so that we could create four different subnets. The central network we assigned the 0 subnet,  64,128,192 subnet was assigned to the other groups. We then assigned ip addresses and gateway addresses to everyone.

Lastly, we used command prompt to configure the routers and computers.Then we pinged eachother to make sure everything works.

References

Lab handout, Lab Worksheet, and in class exercises 

Questions

none

Conclusion

The lab was very helpful to have a better understanding of subnetting. It would of been better to have before the exam, It helped a lot with the understanding of subnetting in a real life situation with hands on experience.

 

Assignment on Subnetting.

Review on learning subnetting a class B subnet before second exam.

Lab 5 Web and FTP Servers

 

Objectives:To explore and learn more about HTTP and FTP servers in a TCP/IP network

Equipment List

Apache, PC

Notes and Observations:

I used Apache web server to see IP address of the web server in our area. I also traced documents in the web server using documentroot. Then, I created a webpage and entered the IP address to open it. Next, I installed FTP daemon to create FTP accounts. Which then I created an FTP client using the commands. 

Diagrams: None

Questions: What is the most popular type of web server in operation?-Apache 

Has this always been the same?- yes but microsoft is closing in and more people have moved to other web servers as more have developed

How many languages does Apache support?- about 100

What other hardware platforms does Apache support?- Linux, IBM, Apple, Etc.

Do you think Apache is a good server for a commercial application? No, because its community based and there are more commercial oriented servers that would be better, but Apache is free.

 

 

Conclusions:

I learned a more in depth knowledge of web and FTP servers. I also learned about Apache and how HTTP and FTP servers operate on a TCP/IP network.

Lab 4

Objectives:

To create a stand-alone operational TCP/IP computer network with IPv4 addressing. The lab helped us better explore the TCP/IP network and how to config one.

Equipment List:
Switch, Router, Cabling

Notes and Observations:
My group and I created a working TCP/IP network by connecting three computers to switches which then when to a router. We then established eachothers IP addresses for our own computers and the IP for the router. We then used the hyperterminal to use the basic commands to connect everything together which I found the most difficult part of the lab due to some missing steps but received assistance by the instructor.
Questions and Answers:

Compare and contrast IANA and ARIN?

IANA, organization that distributes IP addresses worldwide. ARIN, organization that distributes IP addresses in the United States.

What are some reasons to update the TCP/IP protocol with a new IPv6 standard (to replace the older IPv4 standard)?

There are limited IPv4 addresses. IPv6 addresses have more characters so therefore can support the growing number.
What are some of the reasons to continue to use the IPv4 standard?

Most devices are already IPv4 setup and its easy to setup, but IPv6 is taking over.
What is the highest OSI layers that computers are communicating with when all of the computers have been connected together (using a hub or switch networking device), any TCP/IP addresses associated with the machines have been removed, the network interface cards of the computers are connected together (and the NICs have their link lights lit)?

Data Link Layer.

What protocol is used to automatically (or dynamically) assign IP addresses to computers?

DHCP
How do you check network connectivity? Can you think of other ways to confirm that the network works between the computers?

You can ping eachother by finding out the IP addresses to devices. You can also attempt to send messages to everyone and see who receives them.

Conclusions:

This lab was fairly easy. I’ve done this before. Only issue was with using hyperterminal. Great lab overall went well.

Lab 3

Objectives:

The objectives for this lab are to learn about the OSI model to help us better understand computer networks.

Equipment:

Personal Computer

Notes and Observations:

I first completed the background information questions. I learned the OSI model stood for open systems interconnection that was established in 1977. I created a mnemonic for the OSI model. All people seem to need data processing. I then filled out the chart for the OSI model.

Next, I completed the the questions about routers, hubs, and switches. Then, I opened command prompt and found out my IP Address and MAC address by typing ipconfig. Next, I used ARP and pinged other computers in the room and got their addresses. I then did a trace route and got 20 hops to iland.net with an IP address of 216.74.192.3.

Lastly, I used the Cisco Catalyst switch to see how data was sent and the addresses it went through.

 

Diagrams: N/A

Diagrams are on the lab which is just the OSI model table.

References:

Lab 3 sheet and in class cooperation 

Conclusion:

I successfully used the OSI model as a method of understanding how data is sent and received in a network as well as how to track it and use it. So far in the networking class, this lab has taught me the most and helped me develop a better understanding. 

Lab 2

Objectives: To create a working CAT5 cable using the T568B wiring standard and to use a 110 punch down tool to complete a punch panel as well as research other types of cabling.

Notes and Observations: I cut off the old RJ45 connector and followed the color order and arranged my wires and crimped the connector to the insulation and repeated the same steps for the other end. Cable was tested and worked. I then used the 110 punch down tool and arranged the wires on the punch board and terminated the connections.Thicknet cable can run up to 500 meters thinnet 185 meter. Thinnet is easier to run because its a thinner cabling and is generally cheaper than thicknet. UTP offers better crosstalk protection than thicknet and thinnet and is more cost effective than fiber optic cabling. UTP can be ran up to 100 meters. Fiber optic cabling is faster than the other types of cabling however is more expensive and is frequently used as a backbone for a large network or for long distances.
Diagrams, flowcharts, and figures: Diagram on page two of the handout with the color order.

References: Lab 2 handout that explained the wire order and past experience.

Questions: N/A

Conclusions: I successfully created a working CAT5 cable with RJ45 connectors and successfully used the punch down tool to terminate my connection on the punch board.

Lab 1 report

Objectives: To set up a blog page where I can post each lab report, set up a wiki to share notes/ information with other students, and lastly set up a Diigo account where information can be shared with the KSU Networking Group.

Notes and Observations: I set up a blog page using wordpress and filled out the username and password. I posted my first post for lab one. I then set up and wiki using the email sent by the instructor and followed instructions setting up a username and password. Then, I set up a Diigo account the same way as the Wiki. I posted an article from CNN about NFL blocking mobile video use during the Super Bowl.
Diagrams, flowcharts, and figures: N/A

References: Lab 1 handout, K-State Webmail

Questions: N/A

Conclusions: I successfully created a blog, Wiki, Diigo, and shared a webpage.