Network Test 3 Study Guide

Size: px
Start display at page:

Download "Network Test 3 Study Guide"

Transcription

1 Name: Class: Date: Network Test 3 Study Guide Multiple Choice Identify the choice that best completes the statement or answers the question. 1. When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port? a. router b. switch c. repeater d. hub 2. Why would you need to use a repeater? a. You need to connect two networks together to make an internetwork. b. Your network is too large, and you need to decrease the size of the broadcast domain. c. You want to maximize the available bandwidth. d. You need to add a group of computers to your network, and the distance is too far for normal means of communication. 3. Which of the following is NOT a function of a hub? a. cleans up the signal b. transmits the signal to the correct port c. receives the signal from a connected computer on one of its ports d. regenerates the signal 4. How does a switch learn MAC addresses? a. All the MAC addresses must be entered manually. b. The switch comes loaded with the most frequently used addresses. c. The switch reads each frame and makes a note of where each MAC address came from. d. The switch uses a mathematical formula to determine what the MAC address would be for each computer connected to it. 5. Why is the use of a switch preferred over a hub? a. Devices on a hub have to share the available bandwidth. b. Switches are intelligent; they read the frame and determine where to send it. c. Switches can operate in full-duplex mode. d. All of the above. 6. What does a switch store in its switching table? a. the source MAC address of a frame and the port it was received on b. the destination MAC address of a frame and the port it was received on c. the source IP address of a frame and the port it was received on d. the destination IP address of a frame and the port it was received on 5

2 Name: 7. What is a packet called that is intended for only one individual computer? a. broadcast b. unicast c. multicast d. anycast 8. Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses? a. ARP b. ICMP c. DHCP d. IP 9. What does it usually mean when the activity light on a switch is blinking? a. It is malfunctioning. b. It is ready to receive data. c. It is communicating with the network. d. A collision is imminent. 10. What component of the computer provides it with a MAC address? a. motherboard b. NIC c. CPU d. BIOS 11. A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent? a. It s a unique serial number assigned by the manufacturer. b. It s the address it uses for a multicast packet. c. It s the decryption key used for security purposes. d. It s the organizationally unique identifier for the manufacturer of the device. 12. What command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer? a. route b. tracert c. ipconfig d. arp 13. What is the purpose of the default route? a. It serves as a guideline for how to configure routes. b. It s a route set by Microsoft so that all information comes to their servers first. c. It s where the router sends all packets with destinations of which it has no knowledge. d. None of the above 2

3 Name: 14. A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers? a. switch b. router c. hub d. modem 15. When referring to network bandwidth, what is the basic unit of measurement? a. bytes per second b. bits per second c. bandwidth per second d. bytes per minute 16. Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP? a. RTS b. ARP c. CTS d. DNS 17. The SSID is configured on which of the following so that it can be distinguished from other available wireless networks? a. router b. access point c. switch d. repeater 18. What command would you issue from the command prompt to test whether your computer has connectivity to the network? a. ping IPaddress b. arp -d IPaddress c. ipconfig IPaddress d. ipconfig /all 19. Which of the following is not a true statement regarding the function of a switch? a. It determines the path used based on the destination IP address. b. It sends broadcast frames out all connected ports. c. Each port on a switch represents a separate collision domain. d. Switches have the ability to operate in full-duplex mode. 3

4 Name: 20. Which of the following combinations will you find in a switching table? a. application/destination port number b. IP address/exit interface c. destination network/next Hop d. MAC address/switch port number 21. Which of the following is the fastest switching mode? a. cut-through b. fragment-free c. store-and-forward d. auto-negotiate 22. Besides a managed switch, what is a high-end switch that offers features such as multicast processing and port security called? a. intuitive b. executive c. smart d. enterprise 23. Which of the following is the switching protocol that is used to eliminate the possibility of switching loops? a. RIP b. SNMP c. NTP d. STP 24. Which of the following is not a function that would be found in a managed switch? a. the ability to stop switching loops using STP b. the ability to transfer it s switching table with neighboring switches c. the creation of VLANS to logically separate resources d. to limit access to the network by enabling security on individual ports 25. Each interface on a router must have an IP address and what else to be able to communicate on the network? a. network ID b. default gateway c. MAC address d. serial number 26. When a router s interface is configured with multiple IP addresses with each address belonging to different networks, what is it called? a. multi-homed router b. dynamic router c. link-state router d. router on a stick 4

5 Name: 27. What type of routing protocol are RIP and RIPv2? a. distance-state protocol b. link-state protocol c. hybrid protocol d. distance-vector protocol 28. The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what? a. delivery b. convergence c. congestion d. concurrence 29. When an access control list is applied on a router s interface, that interface is performing a specific function on the packets that it receives. What is that function called? a. packet filtering b. packet forwarding c. packet manipulating d. packet dispatching 30. What command issued from a command prompt will display the routing table in Windows? a. route table b. route print c. route delete d. route config 31. A wireless router is actually composed of three devices, a wireless access point and which two other devices? a. a router and a hub b. a switch and a bridge c. a router and a switch d. a router and a bridge 32. What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks? a. white hat b. wardriver c. script kiddy d. phisher 33. Which is the strongest form of wireless security? a. WEP b. WPA c. WPA2 d. WAP2 5

6 Name: 34. Which is the PCI bus type that has the highest possible transfer rate? a. PCI b. PCIe c. PCI-X d. PCMCIA 35. Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive? a. onboard coprocessor b. advanced configuration power management interface c. shared system memory d. preboot execution environment Completion Complete each statement. 36. The Locally Administered Address can be used to override the burned-in address. 37. In a computer s IP address settings, the _ gateway is the address of the router to which a computer sends all packets that are intended for networks outside of its own. 38. A frame is a message that is intended to be processed by all devices on the LAN. 39. The network is a measurement of the amount of data that can pass through a network in a certain period of time. 40. A switch operating in mode can send and receive data at the same time. 41. When a switch receives a broadcast frame, it the frame out to all ports. 42. A switch that is configured to use the Spanning Tree Protocol will place a port in mode if sending traffic to it may cause a switching loop. 43. A router s final task when handling a packet is to send the packet on to its next and possibly final destination; this is referred to as packet. 44. One type of security for wireless networks involves entering a list of the MAC addresses for the devices that are allowed to access the network and excluding all others. This is called MAC. 45. A is used to make connections between the network interface card and the other vital components of the computer, such as the central processing unit. 6

7 Name: Short Answer 46. Why is the NIC considered the gatekeeper? 47. What are the major differences between a hub and a switch? 48. List the steps that a switch performs for each frame. 49. What is a broadcast frame? 50. What is the difference between a switch and a router? 51. What does a router keep in its routing table? 52. What is the importance of a default route? 53. What is a default gateway? 54. What are the major tasks that a NIC performs? 55. What is the MAC address of a computer? 56. Briefly describe the three types of switching methods. 57. What does the Spanning Tree Protocol do? 58. What is a trunk port? 59. What is a broadcast storm? 60. Briefly describe an entry in a routing table from a router. 61. What is the difference between the way that a distance-vector routing protocol and a link-state routing protocol update their networks? 62. What are the three ways that a router can populate its routing table? 63. Why should you change the SSID on your wireless router? 64. What are the three most common encryption protocols for wireless security? Which is the strongest? Which is the weakest? 65. What physical characteristics must you take into account when shopping for a new NIC? 7

8 Network Test 3 Study Guide Answer Section MULTIPLE CHOICE 1. ANS: B PTS: 1 REF: Page ANS: D PTS: 1 REF: Page ANS: B PTS: 1 REF: Page ANS: C PTS: 1 REF: Page ANS: D PTS: 1 REF: Pages ANS: A PTS: 1 REF: Page ANS: B PTS: 1 REF: Page ANS: A PTS: 1 REF: Page ANS: C PTS: 1 REF: Page ANS: B PTS: 1 REF: Page ANS: D PTS: 1 REF: Page ANS: B PTS: 1 REF: Page ANS: C PTS: 1 REF: Page ANS: C PTS: 1 REF: Page ANS: B PTS: 1 REF: Page ANS: A PTS: 1 REF: Page ANS: B PTS: 1 REF: Page ANS: A PTS: 1 REF: Page ANS: A PTS: 1 REF: Page ANS: D PTS: 1 REF: Page ANS: A PTS: 1 REF: Page ANS: C PTS: 1 REF: Page ANS: D PTS: 1 REF: Page ANS: B PTS: 1 REF: Pages ANS: C PTS: 1 REF: Page ANS: D PTS: 1 REF: Page ANS: D PTS: 1 REF: Page ANS: B PTS: 1 REF: Page ANS: A PTS: 1 REF: Page ANS: B PTS: 1 REF: Page ANS: C PTS: 1 REF: Page ANS: B PTS: 1 REF: Page ANS: C PTS: 1 REF: Page ANS: B PTS: 1 REF: Page ANS: D PTS: 1 REF: Page 318 1

9 COMPLETION 36. ANS: MAC PTS: 1 REF: Page ANS: default PTS: 1 REF: Page ANS: broadcast PTS: 1 REF: Page ANS: bandwidth PTS: 1 REF: Page ANS: full-duplex PTS: 1 REF: Page ANS: floods PTS: 1 REF: Page ANS: blocking PTS: 1 REF: Page ANS: forwarding PTS: 1 REF: Page ANS: filtering PTS: 1 REF: Page ANS: bus PTS: 1 REF: Page 314 SHORT ANSWER 46. ANS: The NIC s responsibility is to examine every frame that is received and either allow it access to the computer or reject it. In order for the frame to be accepted, the destination MAC address must match the NIC s MAC address, or it is refused. There are two exceptions to this rule. If the destination MAC address is a broadcast, then the NIC accepts it. If the NIC is put in promiscuous mode, then it will accept all frames. PTS: 1 REF: Page 81 2

10 47. ANS: The major difference is that switches are intelligent. They examine each frame that they receive for the destination MAC address and then send the frame out the correct port for that address. A hub simply accepts a frame from one of its ports and then sends it out all ports. A switch also keeps a table of MAC addresses so that it knows where to send a frame. Because a switch can control where it sends a frame, devices that are connected to a switch can communicate at the same time, allowing each device to access the full network bandwidth. With a hub, only one device can transmit at a time so the bandwidth is shared among all connected devices. Also, because a switch controls the flow of frames, there is little chance of a collision. In a hub, collisions might occur frequently when under heavy use. PTS: 1 REF: Pages ANS: First, the switch receives a frame. It examines the frame for the source and destination MAC addresses. Then the switch looks up the destination MAC address in its switching table. In the switching table, the MAC address will be listed with the port number where the destination device can be found. The switch then will forward the frame out the appropriate port. The switch also updates its switching table with the source MAC address. PTS: 1 REF: Page ANS: A broadcast frame is a frame that has a destination MAC address of all binary 1s, which in hexadecimal notation reads as FF-FF-FF-FF-FF-FF. Broadcast frames carry messages that are intended for all devices on a network. Broadcast frames are forwarded by hubs and switches but not by routers. PTS: 1 REF: Page ANS: Routers are used to connect LANs together. A switch is used to connect computers and other devices together to form a LAN. Routers are intelligent just like a switch, but routers deal with IP addresses instead of MAC addresses and packets instead of frames. Switches forward broadcast messages to all devices on a LAN, but routers separate LANs so they do not forward broadcast messages. PTS: 1 REF: Page ANS: Each interface of a router is a connection to a different network. The router needs to keep a record of the networks that are attached to it so that it can forward the packets it receives to the correct network. So, a routing table consists of a list of what network is available via which interface. PTS: 1 REF: Page ANS: When a router receives a packet, it looks at the destination IP address to determine where to send the packet. If the router has an entry for the network that the packet is intended for, then everything is fine, and it forwards the packet. However, if there is no entry in the routing table and no default route, then the router does not keep the packet; it simply discards it. If a default route is entered, then the router forwards the packet out the interface listed in the routing table so the packet is not discarded. PTS: 1 REF: Page 95 3

11 53. ANS: A computer on a LAN can communicate with other devices on the same LAN because a switch uses the computer s physical address. However, when a computer wants to communicate with a device on another network, it must send the packet to the router so the computer needs to know the address of the router. The address of the router is considered the default gateway. It is where all packets sent from the computer to destinations other than its own network are sent. This address is included in a computer s IP configuration. PTS: 1 REF: Page ANS: A NIC, along with its driver, provides your computer with a connection to the network medium. When a NIC receives a packet from the network protocol, it encapsulates the packet with the source and destination in a new header and the CRC in a trailer. Then it converts the frame into bits and sends it to the network medium. When the NIC receives a message, it does the reverse, converts the bits into a frame. Then the NIC checks the destination MAC to make sure that it is the same as its own or a broadcast address. It then removes the header and trailer and sends the packet on up to the network protocol. PTS: 1 REF: Page ANS: The MAC address is a number that is burned into the memory of each NIC. It is a unique number assigned by the manufacturer. It is 48 bits and is usually expressed in six two-digit hexadecimal numbers. The first 24 bits are an ID number for the manufacturer, called the OUI, and the last 24 bits are a serial number assigned by the manufacturer. PTS: 1 REF: Pages ANS: Cut-through switching is the fastest; it reads the destination MAC address and sends the frame out. Store-and-forward switching is the slowest; it stores the entire message and then sends it to the correct port. Fragment-free switching is the middle man; it reads enough to make sure the packet is not fragmented and then sends it out. PTS: 1 REF: Page ANS: The Spanning Tree Protocol is used to detect whether there is a possibility of a switching loop caused by redundant paths. If a loop is possible, it places one of the ports in blocking mode to prevent it. PTS: 1 REF: Pages ANS: When a switch is configured with VLANs, the switch needs to have a way to communicate between the VLANs. A trunk port is a port that is configured to carry all traffic. PTS: 1 REF: Pages ANS: A broadcast storm is a switching loop that occurs with broadcast packets. PTS: 1 REF: Page 295 4

12 60. ANS: The first value describes how the router learned about the route. The next value is the destination network of the route followed by the metric. Next is the address of the next hop and then the timestamp. Finally, the interface out of which the packet will be forwarded is listed. PTS: 1 OBJ: Page ANS: A distance-vector routing protocol sends out information about the network s status to all of its neighbors on a set schedule. A link-state protocol only sends out information to its neighbors when there is a change in the status. PTS: 1 REF: Pages ANS: It knows about networks that are directly connected to it. A static route can be manually entered. The router can be configured to use a routing protocol, and routes will be entered dynamically. PTS: 1 REF: Page ANS: The SSID is always set to a default value by the manufacturer. These SSIDs, along with their passwords, are readily available on the Internet. It is best to change the SSID as a preventative measure to help strengthen your security. PTS: 1 REF: Page ANS: They are WEP, WPA, and WPA2. WEP is the weakest, and WPA2 is the strongest. PTS: 1 REF: Page ANS: First, you need to find out what type of bus is available for the additional card. Then, you need to check what type of medium is being used and what type of connector is required to connect to that medium. PTS: 1 REF: Page 317 5

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Switching in an Enterprise Network

Switching in an Enterprise Network Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

Layer 3 Routing User s Manual

Layer 3 Routing User s Manual User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

Securing end devices

Securing end devices Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

GregSowell.com. Mikrotik Basics

GregSowell.com. Mikrotik Basics Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

Howstuffworks "How LAN Switches Work" Click here to go back to the normal view!

Howstuffworks How LAN Switches Work Click here to go back to the normal view! Page 1 of 17 Search ComputerStuff AutoStuff ElectronicsStuff ScienceStuff HomeStuff EntertainmentStuff MoneyStuff TravelStuff Main > Computer > Hardware Click here to go back to the normal view! How LAN

More information

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved. IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program. Configuration Gateway > WAN Page Gateway: LAN nat config Page Gateway: LAN dhcp server config Page Gateway LOG Page Preparing the Network Preparing the Computers for TCP/IP Networking Configuring TCP/IP

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

TestOut Network Pro English 4.0.x LESSON PLAN

TestOut Network Pro English 4.0.x LESSON PLAN TestOut Network Pro English 4.0.x LESSON PLAN 2 Table of Contents Introduction Section 0.1: Using the Simulator... 5 Networking Basics Section 1.1: Networking Overview... 6 Section 1.2: Network Topologies...

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners

More information

Lab - Using IOS CLI with Switch MAC Address Tables

Lab - Using IOS CLI with Switch MAC Address Tables Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 S2 VLAN 1 192.168.1.12

More information

Network Protocol Configuration

Network Protocol Configuration Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring

More information

Cisco 12 CCNA Certification

Cisco 12 CCNA Certification Cisco 12 CCNA Certification Application for Board Authorization of Courses District: Chilliwack School District 33 Developed by: John Murtha Date: May7, 2004 School: Sardis Secondary Principal: Bob Patterson

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

LANs and VLANs A Simplified Tutorial

LANs and VLANs A Simplified Tutorial Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name

More information

Fundamentals of Switching

Fundamentals of Switching 1 CCNA 640-801 Exam Notes - Fundamentals of Switching CCNA 640-801 Exam Notes Fundamentals of Switching 1. LAN Segmentation 1.1 In a collision domain, a frame sent by a device can cause collision with

More information

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Document ID: 91672 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01 CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60

More information

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 Before You Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

9 Simple steps to secure your Wi-Fi Network.

9 Simple steps to secure your Wi-Fi Network. 9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password

More information

COMPUTER NETWORK TECHNOLOGY (40)

COMPUTER NETWORK TECHNOLOGY (40) PAGE 1 OF 9 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2012 TOTAL POINTS (450) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must

More information

O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1

O 10.16.1.0/27 [110/129] via 192.168.1.5, 00:00:05, Serial0/0/1 1 Which two statements are true regarding the advantages of the use of static routes? (Choose increased security reduced effort in configuring routes the administrator maintains control over routing easier

More information

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

IP SAN BEST PRACTICES

IP SAN BEST PRACTICES IP SAN BEST PRACTICES PowerVault MD3000i Storage Array www.dell.com/md3000i TABLE OF CONTENTS Table of Contents INTRODUCTION... 3 OVERVIEW ISCSI... 3 IP SAN DESIGN... 4 BEST PRACTICE - IMPLEMENTATION...

More information

Cisco Networking Professional-6Months Project Based Training

Cisco Networking Professional-6Months Project Based Training Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH

More information

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn) NETVIGATOR Wireless Modem Setup Guide (TG789Pvn) Configure the NETVIGATOR Wireless Modem Make sure that system meets the following requirement prior to NETVIGATOR Wireless Modem usage: - Subscribers who

More information

Written examination in Computer Networks

Written examination in Computer Networks Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the

More information

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 This fee includes the following exams: Cisco Certified Network Associate (CCNA) 100-101 ICND1 and 200-101 ICND2

More information

Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Allan Johnson

Switching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Allan Johnson Switching Basics and Intermediate Routing CCNA 3 Labs and Allan Johnson Introduction Switching Basics and Intermediate Routing CCNA 3 Labs and s is a supplement to your classroom and laboratory experience

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3

More information

CONNECTING THE RASPBERRY PI TO A NETWORK

CONNECTING THE RASPBERRY PI TO A NETWORK CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete

More information

Chapter 1 Reading Organizer

Chapter 1 Reading Organizer Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Leased Line + Remote Dial-in connectivity

Leased Line + Remote Dial-in connectivity Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer

More information

Security Technology White Paper

Security Technology White Paper Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

CHAPTER 10 LAN REDUNDANCY. Scaling Networks CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Domain 3.0 Networking... 1

Domain 3.0 Networking... 1 Table of Contents Domain 3.0 Networking... 1 DOMAIN 3.0 NETWORKING 1. You are installing a cable modem in a client s home. How should you select where to put the cable modem? A. Placing the modem right

More information

101 Application Delivery Fundamentals

101 Application Delivery Fundamentals CERTIFIED F5 STUDY GUIDE Eric Mitchell Channel SE, East US and Federal F5 Networks Contents Overview 4 Printed References 4 Section 1 - OSI 5 Objective - 1.01 Explain, compare, and contrast the OSI layers

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149

More information

Networking Devices. Lesson 6

Networking Devices. Lesson 6 Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and

More information

Networked AV Systems Pretest

Networked AV Systems Pretest Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials

More information

Part A:Background/Preparation

Part A:Background/Preparation Lab no 1 PC Network TCP/IP Configuration In this lab we will learn about Computer Networks Configuration Introduction to IP addressing Identify tools used for discovering a computer s network configuration

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network

More information

ProCurve Switch 1700-8 ProCurve Switch 1700-24

ProCurve Switch 1700-8 ProCurve Switch 1700-24 Management and Configuration Guide ProCurve Switch 1700-8 ProCurve Switch 1700-24 www.procurve.com ProCurve Series 1700 Switch Management and Configuration Guide Copyright 2007 Hewlett-Packard Development

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT

More information

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4 1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Configuring Settings on the Cisco Unified Wireless IP Phone 7925G

Configuring Settings on the Cisco Unified Wireless IP Phone 7925G CHAPTER 5 Configuring Settings on the Cisco Unified Wireless IP Phone 7925G This chapter describes the available configuration settings on the Cisco Unified Wireless IP Phone 7925G. It contains the following

More information

Preparing the Computers for TCP/IP Networking

Preparing the Computers for TCP/IP Networking Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

Easy Smart Configuration Utility

Easy Smart Configuration Utility Easy Smart Configuration Utility REV1.1.0 1910010977 CONTENTS Chapter 1 About this Guide...1 1.1 Intended Readers... 1 1.2 Conventions... 1 1.3 Overview of This Guide... 1 Chapter 2 Getting Started...4

More information

! encor en etworks TM

! encor en etworks TM ! encor en etworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Configuring the BANDIT III s T1 E1 Card for a PCM Voice Network The T1 E1 card fits into the expansion slot on

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1

IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1 IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320 Management Guide Software Release v2.0.0.1 www.edge-core.com Management Guide ECW5320 Indoor Enterprise Access Point IEEE 802.11a/ac/n/b/g

More information