UNIVERSIDADE DA BEIRA INTERIOR Faculdade de Engenharia Departamento de Informática

Size: px
Start display at page:

Download "UNIVERSIDADE DA BEIRA INTERIOR Faculdade de Engenharia Departamento de Informática"

Transcription

1 1 1. This is a frequency evaluation test. 2. Read the questions carefully before answering. 3. Write your answers in the answer sheet provided. 4. Return only the answer sheet with your name, number and course name. 5. The grading grid is at the end of the test. Good work! SINGLE GROUP in the following questions, please choose only one option. 1. Consider the image above. How many subnetworks are shown? a) One, identified by the address /24 b) One,, identified by the address /24 c) Two, identified by the addresses /24 and /24 d) None because the computers run an operationg system that is too old to use networks options 2. Regarding the scheme used in question 1, which of the following statements is true? a) The MAC address of the Modem has to be different from the MAC address of the remaining elements in the network b) The machine with the address cannot use the PING command to determine if the Modem is on c) The Windows machines and the Router/Switch have to be in the same network of the Modem to be able to access Internet d) To configure correctly the network the Router/Switch can only have addresses from one subnet e) All the above

2 2 3. For the scheme above, what would be the network mask for Network A? a) c) d) e) Any of the above 4. Regarding the scheme for question 3 how many subnetworks can you identify between the final host and the Internet Modem? a) 1 b) 2 c) 3 d) 4 5. Regarding the scheme for question 3, hwo many interfaces has the machine identified as XP Router (at least)? a) 1 b) 2 c) 3 d) 4 e) One can not tell, that information is not visible on the scheme 6. Regarding the scheme in question 3, which of the follwoing claims is true? a) All the computers and active equipments have different MAC addresses b) All the network interfaces in the XP Router machine have the same MAC address c) The machine with the address may have the same MAC address of the machine with the address d) The machine with the address must have a MAC address that is different of all the machines it communicates with

3 3 7. Regarding the addresses of Layer 3, what of these claims is true? a) These are physical addresses b) These are addresses used in routing decisions c) There are addresses used only in local networks d) There are addresses changed each time a packet is passes in a Switch 8. A network defined as /24 has a network mask: a) c) d) e) It may have any valid network mask defined by the user 9. A network defined as /24 may have a) 254 hosts b) 256 hosts c) hosts d) hosts e) The number of hosts is not a function of this information 10. Supose you have the address /22. Which of these informations is correct? a) You can create 4 networks with address x.0/24, x < 8 b) You can create 4 networks with address x.0/26, x < 8 c) You can create 4 networks with address x.0/24, x>=8 d) You can create 4 networks with address x.0/26, x>=8 11. When you try to use the command ping you receive an error messge. Probably this mean that: a) Your computer is disconnected from the network b) The computer s network interface is not correctly configured c) The protocol stack is not correctly working d) The command is not correct 12. Regarding the scheme above, the computer PC1 is able to access contents in computer PC2 using Telnet. This means that: a) Routers A and B are configured in the same subnetwork b) The IP addresses for interfaces S0 and S1 are the same c) PC1 is in the same subnetwork as PC2 d) PC2 is running a Telnet server

4 4 13. What network mask admits 2040 hosts in network ? a) b) c) d) e) Following the convention, what of the next network masks is adequate for a Class B network? a) b) c) d) it depents on the number of computers you want to define 15. Following the convention, the address is: a) Public, Class C b) Private Class C c) Public, Class B d) Private, Class B e) It depends on the defined network mask 16. The address (Class A) identifies: a) host 70 of network b) host of network c) host of network 49 d) None of the above. 17. Concerning private IP addresses, which of the following statements is false? a) A network router may be responsible to distribute dynamic IP addresses using the DHCP protocol b) A host can only use a private address if it is connected to the Internet c) A computer may change its IP address dynamically d) A private address has to be unique in its network 18. Concerning public IP addresses, which of the following statements is false? a) A host may use a public address as long as it is in an isolated netork b) A host may use a public IP address in the Internet c) Each host connected to the Internet must have its own public address d) The management of public IP addresses is done differently from private addresses 19. If in the laboratory we define two networks with the addresses /24 and /24, which of these claims is false? a) Each of these networks may have 240 hosts b) Computers in one network will not be able to communicate with computers in the other network c) Computers in one network are able to communicate with the computers in the other d) Inside the class these networks belong to, it is possible to define other subnetworks 20. Consider the Class C /24 network. Besides this one can further define subnetworks. a) 256 b) 255 c) 254 d) 253

5 5 21. Consider the above scheme. Computer C can execute with success the command ping , but not the command ping This is because: a) Computers A and B are not in the same network as computer C b) IP addresses in Fa0/1 interfaces in routers 1 and 2 are wrong c) The network mask for computer C is wrong d) Interface Fa0/0 in router 2 is not properly configured 22. Consider the scheme above. What would be an appropriate IP address for computer A? a) b) c) d) Consider the scheme for question 22. What would be an appropriate network mask to apply to computer A? a) c) d) Consider the scheme in question 22. What would be the gateway to define for computer A? a) b) c) d)

6 6 25. A computer can not connect to remote computers, nor connect to the Internet, nor use a network printer that is working in the network. What command must be used to test if the network components are properly installed? a) Ipconfig /all b) Ping c) traceroute d) none of the above 26. Consider the scheme above. Which of the statements is true? a) Printers and can only be used by computers in its respective networks b) Printers have wrong addresses because higher addresses are used for broadcast c) Computer only can use printer d) Computer can use printer if the routers are properly configured 27. Which of these addresses is valid for a computer in a subnetwork? a) /27 b) /28 c) /28 d) / Consider the figure above. In this network only a switch is available. If the address is a gateway with access to the Internet, can this computer access the Internet? a) Yes, because the network mas places the gateway in the same network as this computer. b) Yes, because the gateway allows the sharing of contents from the Internet c) No, because the configuration is not dynamic d) No, because the network mask is not correctly defined

7 7 29. Given the address , what is the mask that allows to have exactly 8 subnetworks? a) c) d) The binary operation performed with the network mask and the IP address is a) A sum b) AND c) OR d) EXOR Grading grid Each question is worth 0.6(6) (2/3) values. Incorrect answers are graded with -50% of 2/3. Prof. Nuno M. Garcia, January 2011

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram Topology Diagram All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6 Addressing Table Device Interface IP Address Subnet

More information

1 PC to WX64 direction connection with crossover cable or hub/switch

1 PC to WX64 direction connection with crossover cable or hub/switch 1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network

More information

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Lab PC Network TCP/IP Configuration

Lab PC Network TCP/IP Configuration Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer

More information

Part A:Background/Preparation

Part A:Background/Preparation Lab no 1 PC Network TCP/IP Configuration In this lab we will learn about Computer Networks Configuration Introduction to IP addressing Identify tools used for discovering a computer s network configuration

More information

Chapter 3: IP Addressing and VLSM

Chapter 3: IP Addressing and VLSM Chapter 3: IP Addressing and VLSM QUESTION 54 What is the principle reason to use a private IP address on an internal network? A. Subnet strategy for private companies. B. Manage and scale the growth of

More information

Packet Tracer - Subnetting Scenario 1 (Instructor Version)

Packet Tracer - Subnetting Scenario 1 (Instructor Version) (Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or to provide

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6

More information

CHANGE NETWORK SETTINGS Technicolor TG582n

CHANGE NETWORK SETTINGS Technicolor TG582n CHANGE NETWORK SETTINGS Technicolor TG582n Changing the TG582n Network Settings This document will guide you through the process of changing the gateway address and/or DHCP pool settings of your Technicolor

More information

PART IV. Network Layer

PART IV. Network Layer PART IV Network Layer Position of network layer Network layer duties Internetworking : heterogeneous Physical Networks To look Like a single network to he upper layers The address at Network layer must

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved. IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

More information

LAN TCP/IP and DHCP Setup

LAN TCP/IP and DHCP Setup CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are

More information

Using a simple crossover RJ45 cable, you can directly connect your Dexter to any computer.

Using a simple crossover RJ45 cable, you can directly connect your Dexter to any computer. Dexter is a network device using the Ethernet protocol to connect and communicate with other devices on the network: Computers, routers, DHCP servers. Thus you have to setup your Dexter and your network

More information

The IP Transmission Process. V1.4: Geoff Bennett

The IP Transmission Process. V1.4: Geoff Bennett The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks

More information

How to Set Up a Wireless Network. How to configure a wireless network for a computer science programming contest using PC 2

How to Set Up a Wireless Network. How to configure a wireless network for a computer science programming contest using PC 2 How to Set Up a Wireless Network How to configure a wireless network for a computer science programming contest using PC 2 Checklist: The procedure to set up a wireless network is not difficult at all.

More information

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 3: IP Protocol Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 3 1 / 24 In previous lectures We learned about layer 1

More information

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier

More information

Workstation ARP. Objective. Background / Preparation

Workstation ARP. Objective. Background / Preparation Workstation ARP Objective Introduce Address Resolution Protocol (ARP) and the arp a workstation command. Explore the arp command help feature using the -? option. Background / Preparation ARP is used as

More information

Source net: 200.1.1.0 Destination net: 200.1.2.0 Subnet mask: 255.255.255.0 Subnet mask: 255.255.255.0. Router Hub

Source net: 200.1.1.0 Destination net: 200.1.2.0 Subnet mask: 255.255.255.0 Subnet mask: 255.255.255.0. Router Hub then to a router. Remember that with a Class C network address, the first 3 octets, or 24 bits, are assigned as the network address. So, these are two different Class C networks. This leaves one octet,

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

AutoDownload: SQL Server and Network Trouble Shooting

AutoDownload: SQL Server and Network Trouble Shooting AutoDownload: SQL Server and Network Trouble Shooting AutoDownload uses Microsoft s SQL Server database software. Since 2005 when AutoDownload was first released Microsoft have also released new versions

More information

1. Hardware Installation

1. Hardware Installation 4 Port 10/100M Internet Broadband Router with USB Printer server Quick Installation Guide #4824904AXZZ0 1. Hardware Installation A. System Requirement Before you getting started, make sure that you meet

More information

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

Teldat Router. ARP Proxy

Teldat Router. ARP Proxy Teldat Router ARP Proxy Doc. DM734-I Rev. 10.00 November, 2002 INDEX Chapter 1 Introduction...1 1. ARP Proxy... 2 Chapter 2 Configuration...4 1. ARP Proxy Configuration... 5 1.1. Enabling ARP Proxy...

More information

Laboratory guide nº 2

Laboratory guide nº 2 Introduction to Computer Networks (IRC) Licenciatura in Electronics Engineering (LEE) Licenciatura in Communication Networks Engineering (LERC) Laboratory guide nº 2 1 Objectives To familiarize your- self

More information

Module 10 Subnetting Class A, B and C addresses. Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d

Module 10 Subnetting Class A, B and C addresses. Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d Module 10 Subnetting Class A, B and C addresses Solutions to the Lab Exercises 10.3.5a, 10.3.5b, 10.3.5c and 10.3.5d 10.3.5a Basic Subnetting Use the following information and answer the following subnet

More information

Lab 10.4.1 IP Addressing Overview

Lab 10.4.1 IP Addressing Overview Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe

More information

Using VDOMs to host two FortiOS instances on a single FortiGate unit

Using VDOMs to host two FortiOS instances on a single FortiGate unit Using VDOMs to host two FortiOS instances on a single FortiGate unit Virtual Domains (VDOMs) can be used to divide a single FortiGate unit into two or more virtual instances of FortiOS that function as

More information

PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications

PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications PC/POLL SYSTEMS supports native TCP/IP polling for the SPS2000 cash register. It is recommended users have the register updated

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone. IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary

More information

Lab 10.3.5a Basic Subnetting

Lab 10.3.5a Basic Subnetting Lab 10.3.5a Basic Subnetting Objective How to identify reasons to use a subnet mask How to distinguish between a default subnet mask and a custom subnet mask What given requirements determine the subnet

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

IST 220 Honors Project. Subnets with Variable Length Subnet Masks

IST 220 Honors Project. Subnets with Variable Length Subnet Masks IST 220 Honors Project Subnets with Variable Length Subnet Masks Project Objectives: In this project, you will subnet the IP address 193.170.10.0 according to needs of the organization. Overview a) Perform

More information

CCNA Exploration: Accessing the WAN Chapter 7 Case Study

CCNA Exploration: Accessing the WAN Chapter 7 Case Study Objectives: Mitigate attacks based on DHCP rogue servers. Intro: ChurchBells Inc. is having connectivity issues and needs your help. The Scenario: According to the reports, some user PCs within the company

More information

Internet Access Setup

Internet Access Setup Internet Access Setup Introduction In the Quick Setup group, you can configure the router to access the Internet with differnet modes (e.g. PPPoE, PPTP or Dynamic/Static IP). For most users, Internet access

More information

SYMETRIX SOLUTIONS: TECH TIP April 2014

SYMETRIX SOLUTIONS: TECH TIP April 2014 Understanding Class C Masking In the day to day support operations a Symertix tech support agent will most often come across customers that have their PC and Symetrix DSP on a Class C Mask of 255.255.255.0.

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

networking revision B

networking revision B networking revision B Table of Contents Local area network options (Single Main Repeater Systems)... 3 Wired/Wi-Fi connection through Wi-Fi router... 3 Wired connection through router... 4 Direct connection...

More information

EDGE FX Network configuration

EDGE FX Network configuration Page 1 of 16 TITLE: Category: EDGE FX Network configuration GERBER EDGE Document Number: 4280 Supplied by: Gerber Service Last Modified: April 14, 2011 Summary: In order to connect an EDGE FX to your PC

More information

Expert Reference Series of White Papers. Binary and IP Address Basics of Subnetting

Expert Reference Series of White Papers. Binary and IP Address Basics of Subnetting Expert Reference Series of White Papers Binary and IP Address Basics of Subnetting 1-800-COURSES www.globalknowledge.com Binary and IP Address Basics of Subnetting Alan Thomas, CCNA, CCSI, Global Knowledge

More information

Device Interface IP Address Subnet Mask Default Gateway

Device Interface IP Address Subnet Mask Default Gateway Felix Rohrer Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1 S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1

More information

estadium Project Lab 8: Wireless Mesh Network Setup with DD WRT

estadium Project Lab 8: Wireless Mesh Network Setup with DD WRT estadium Project Lab 8: Wireless Mesh Network Setup with DD WRT Objectives To become familiar with wireless mesh networks and show set up a wireless mesh network test bed using the DD WRT firmware. We

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Debugging Network Communications. 1 Check the Network Cabling

Debugging Network Communications. 1 Check the Network Cabling Debugging Network Communications Situation: you have a computer and your NetBurner device on a network, but you cannot communicate between the two. This application note provides a set of debugging steps

More information

1 crossover cable. the PCs. network

1 crossover cable. the PCs. network King Abdul-Aziz University Faculty of Computing and Information Technology Department of Information Technology Computer Networks CPIT370 Lab#2: Wired Peer to Peer network and star topology using a switch

More information

CCNA R&S: Introduction to Networks. Chapter 9: Subnetting IP Networks

CCNA R&S: Introduction to Networks. Chapter 9: Subnetting IP Networks CCNA R&S: Introduction to Networks Chapter 9: Subnetting IP Networks Frank Schneemann Chapter 9: Subnetting IP Networks Subnetting IP Networks In this chapter, you will be learning how devices can be grouped

More information

NXT Controller Manual IP Assignment in WAN Environments Application Note

NXT Controller Manual IP Assignment in WAN Environments Application Note It is difficult to perform NXT controller IP address assignment and auto-configuration when controllers are on different subnets from the local PC (the PC from which the Doors.NET client is run). This

More information

Port Forwarding for CCTV. How to See Video Offsite

Port Forwarding for CCTV. How to See Video Offsite Port Forwarding for CCTV How to See Video Offsite KNOW BEFORE YOU GO Does Customer have Broadband Is Broadband Cable or DSL If Cable it is likely that ISP provides a router most often it is a wireless

More information

Ethernet Local Area Networks (LANS) Two basic ways to cable an 10 Mb/s Ethernet LAN: Bus-style (large Ethernet cable, or thin Ethernet cable)

Ethernet Local Area Networks (LANS) Two basic ways to cable an 10 Mb/s Ethernet LAN: Bus-style (large Ethernet cable, or thin Ethernet cable) Ethernet Local Area Networks (LANS) Two basic ways to cable an 10 Mb/s Ethernet LAN: Bus-style (large Ethernet cable, or thin Ethernet cable) Large Ethernet cable is bulky, uses cable-taps. Smaller cable

More information

FINAL ASSESSMENT/EXAMINATION JULY 2015 PLEASE READ ALL INSTRUCTIONS CAREFULLY BEFORE YOU BEGIN THIS EXAMINATION

FINAL ASSESSMENT/EXAMINATION JULY 2015 PLEASE READ ALL INSTRUCTIONS CAREFULLY BEFORE YOU BEGIN THIS EXAMINATION THE UNIVERSITY OF TRINIDAD & TOBAGO FINAL ASSESSMENT/EXAMINATION JULY 2015 Course Code and Title: CNET 2001 Network Architecture Programme: B.A.Sc. ICT Computer Engineering Date: Tuesday July 28, 2015

More information

Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples

Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 5: Designing IP Addressing in the Network II Assistant Teacher Samraa Adnan Al-Asadi 1 Subnetting the Subnet When contiguous 1s are added to the default mask, making

More information

Linksys Gateway SPA2100-SU Manual

Linksys Gateway SPA2100-SU Manual Linksys Gateway SPA2100-SU Manual Manuel de l'utilisateur Table of Contents Looking for Basic Setup Instructions?... 3 Most Recent Version of this Manual... 3 Advanced Setup Instructions... 4 Wiring Your

More information

QT-6000 FTP CLIENT SETUP

QT-6000 FTP CLIENT SETUP QT-6000 FTP CLIENT SETUP The QT-6000 with IPL Versions 1.43K and higher now have a new FTP (File Transfer Protocol) function to allow direct file transfers from the QT-6000 to a PC. The PC can be on the

More information

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of

More information

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation Basic ViPNet VPN Deployment Schemes Supplement to ViPNet Documentation 1991 2015 Infotecs Americas. All rights reserved. Version: 00121-04 90 01 ENU This document is included in the software distribution

More information

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

Savvius Insight Initial Configuration

Savvius Insight Initial Configuration The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Lab 3.1.2 Creating a Logical Network Diagram

Lab 3.1.2 Creating a Logical Network Diagram Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

Broadband Router ESG-103. User s Guide

Broadband Router ESG-103. User s Guide Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits

More information

Instructor Notes for Lab 3

Instructor Notes for Lab 3 Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

More information

Lab 2 - Basic Router Configuration

Lab 2 - Basic Router Configuration CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how

More information

Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server

Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Objective Scenario Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students will learn the

More information

Software Installation Guide

Software Installation Guide Software Installation Guide This manual explains how to install the software over a USB or network connection. Network connection is not available for models SP 200/200S/203S/203SF/204SF. Flowchart The

More information

7 TRANSMISSION CONTROL PROTOCOL/ INTERNET PROTOCOL (TCP/IP)

7 TRANSMISSION CONTROL PROTOCOL/ INTERNET PROTOCOL (TCP/IP) 7 TRANSMISSION CONTROL PROTOCOL/ INTERNET PROTOCOL (TCP/IP) PROJECTS Project 7.1 Project 7.2 Project 7.3 Project 7.4 Project 7.5 Understanding Key Concepts Configuring TCP/IP Properties Comparing Name

More information

Algemene Theorie en Vaardigheden 2. April 2014 Theaterschool OTT-2 1

Algemene Theorie en Vaardigheden 2. April 2014 Theaterschool OTT-2 1 Les 6 Showcontrol April 2014 Theaterschool OTT-2 1 OSI layers versus equipment Layer 1: Physical Network Interface Card (NIC) Hub (multiport repeater) Modem (modulator/demodulator, converts signals) Layer

More information

IPv6 in Axis Video Products

IPv6 in Axis Video Products TECHNICAL NOTE REFERENCE DOCUMENT IPv6 in Axis Video Products Created: 2006-01-31 Last updated: 2006-05-29 TABLE OF CONTENTS DOCUMENT HISTORY... 2 1 IPV6 IN GENERAL... 3 1.1 The IPv6 address... 3 1.1.1

More information

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners

More information

Application Note Configuring the UGate 3000 for use with ClipMail Pro and ClipExpress

Application Note Configuring the UGate 3000 for use with ClipMail Pro and ClipExpress Application Note Configuring the UGate 3000 for use with Introduction This Application Note guides the ClipMail user through the UGate gateway configuration process by using a simple dial up connection

More information

Remote Desktop How-To. How to log into your computer remotely using Windows XP, etc.

Remote Desktop How-To. How to log into your computer remotely using Windows XP, etc. Remote Desktop How-To How to log into your computer remotely using Windows XP, etc. Overview How XP Remote Desktop works, its features Unattended usage, drag n drop between computers How to set it all

More information

DSL- G604T Frequently asked Questions.

DSL- G604T Frequently asked Questions. DSL- G604T Frequently asked Questions. Cannot get connection to the router.... 2 Router is not communicating with the ISP... 6 Router shows connected but cannot browse the Internet.... 6 Part of the web

More information

Internet Basics Thursday, November 20, 2008

Internet Basics Thursday, November 20, 2008 Internet Basics Thursday, November 20, 2008 Welcome to Internet Basics, the first section of the Basic Networking course of the online Allworx Reseller technical training. This course provides general

More information

No need to operate a DHCP server. If a server s IP address changes, clients will lose the ability to access it!

No need to operate a DHCP server. If a server s IP address changes, clients will lose the ability to access it! setting IP addresses copyright 2015 Robert Montante Static Address Assignments Suitable for small networks No need to operate a DHCP server Necessary for server systems If a server s IP address changes,

More information

HREP Series DVR DDNS Configuration Application Note

HREP Series DVR DDNS Configuration Application Note HREP Series DVR DDNS Configuration Application Note DDNS enables your HREP Series DVR to be remotely accessed using a Dynamic DNS server, which is commonly used if a broadband connection does not have

More information

Self Help Guide. Please read the following carefully; Synopsis: Requirements: A Computer with a working RJ45 LAN Port All Belkin Modem Routers

Self Help Guide. Please read the following carefully; Synopsis: Requirements: A Computer with a working RJ45 LAN Port All Belkin Modem Routers IMPORTANT! This Guide refers to the following Products: Establishing A Connection From PC To Router Please read the following carefully; Synopsis: This Self-Help Guide is designed to assist you if you

More information

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is

More information

Provisioning Cable Services

Provisioning Cable Services CHAPTER 10 This chapter describes how to provision MPLS VPN cable in IP Solutions Center (ISC). It contains the following sections: Overview of MPLS VPN Cable, page 10-1 in ISC, page 10-5 Creating the

More information

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas surligas@csd.uoc.gr Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Lab 1.2.3 Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

Lab 1.2.3 Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips Lab 1.2.3 Review of Basic Router Configuration with RIP Objective Cable and configure workstations and routers Setup IP addressing scheme using Class B networks Configure Routing Information Protocol (RIP)

More information

c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem

c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem Start Here Follow these instructions to set up your router. Verify That Basic Requirements Are Met Assure that the following requirements are met: You have your broadband Internet service settings handy.

More information