Preview

nt1230 Unit 3 Problems Set1 Unit 3 Problems

Satisfactory Essays
Open Document
Open Document
210 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
nt1230 Unit 3 Problems Set1 Unit 3 Problems
Unit 3 Problems Set1 Unit 3 Problems

1. A software routine, which also acts as a filter that blocks certain types of incoming and outgoing traffic, while enabling other types is called firewall

2. The network tool provides a central access point for all of the network controls and connections on a computer running Windows 7

3. A device that one network to another is called router

4. The most common method for illustrating the operations of a network stack is the osi model which consists of 7

5. Protocols that do not guarantee delivery of their data, but do operate with a very low overhead that conserve network bandwidth are called connectionless protocols

6. The windows 7command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called ping.exe

7. The windows 7 command line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called nslookup.exe

8. Most networks use DHCP to dynamically assign addresses and configure computers to use them

9. The Windows 7 utility that displays a list of the routers currently forwarding packets to a particular destination is called tracert.exe

10. The top and bottom layers of the OSI model are called the application and physical layers

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    JG NT2640

    • 333 Words
    • 1 Page

    B. PC and switch. C. Router and hub D. Wireless access point (Ethernet port) and switch.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Overview|On a Windows 7 computer, the Network and Sharing Center provides access to most of the operating system’s networking tools and configuration parameters. In Exercise 7.1, you examine the current Sharing and Discovery settings on one of the computers that will become part of the lab network.|…

    • 740 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NETW202 W1 Lab Report

    • 927 Words
    • 5 Pages

    Firewalls___ (i.e. client based) must allow access to ports specified for specific vLab type, allow use of our tunneling software if specified ports are blocked, or be disabled to gain access to the vLab. (2 points)…

    • 927 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    A network protocol defines rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets.…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1210

    • 831 Words
    • 4 Pages

    Define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer.…

    • 831 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 3 P3

    • 1666 Words
    • 7 Pages

    This means that the transmission of data can be sent or received to a device and never the other way around. Radio broadcasting and communicating with a printer is an example of such communication, where the communication medium is used for one-way communication.m…

    • 1666 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 3 assignment 3

    • 854 Words
    • 3 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.) C) The physical layer sits just below the data link layer. D). The network layer sits in the middle of the five layers.…

    • 854 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hacking2E Lab03 AW

    • 563 Words
    • 3 Pages

    This tool is used to identify the path that must be followed to reach one system from another. It…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one by one across the network is called:…

    • 3425 Words
    • 14 Pages
    Good Essays