0% found this document useful (0 votes)
2 views3 pages

CSET2200 Lab 2

Uploaded by

jacobegnor2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views3 pages

CSET2200 Lab 2

Uploaded by

jacobegnor2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Lab 2

Part a.

1) Assume you have one end of an Ethernet cable in your hands and that connector is a
straight pass through. What type of cable (straight pass through or crossover) do you
have in your hands? Explain your answer.

Straight Pass Through. If the connector is straight pass through, the cable is straight pass
through.

2) If you have a standard Ethernet cable in your hands, what is the quickest way to
determine the type of cable (straight pass through or crossover)?

The color of wires 1 and 2 can determine if the cable is pass through or crossover. If they are
orange, they are straight pass through. If they are green, they are crossover.

3) When would you use a crossover cable?

When you are connecting two devices together.

4) What is CSMA/CD and how does it work?

CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It manages access
to network channels and troubleshoots collisions. It prevents transmissions from being sent at
the same time by detecting if transmissions are sent at the same time. If they are, it sends a jam
signal to one of the transmissions and waits to try to send it again after a random time.

5) What is the difference between a switch and a hub?

A hub broadcasts data to all devices on the network, while a switch sends data to the intended
recipient.

6) Explain each of the characteristics of an Ethernet topology network.

Shared bus - all devices are connected to a single cable. All devices on that bus receive the
same data at the same time.

Best-effort delivery - sends data without sending assurance to the sender that the data was
received

CMSA/CD - prevents collisions and troubleshoots them upon happening.


Uses a hub network, all devices receive all transmissions and the device decides if it was the
intended recipient or not.

7) What are the twisted pair cable categories and uses/application for each?

There are Shielded and Unshielded categories for twisted pair cables. Shielded twisted pairs
have a built in grounding that protects the wirews from external interference. This is used in
most ethernet applications. Unshielded twisted pairs do not have the shielding, therefore are
cheaper. There are more susceptible to external interferences and are used in telephone and
LAN applications.

8) Explain each of the good network design goals.

Connectivity - the ability for devices to connect to the network easily


Reliable Performance - The performance of the network is consistent
Management control and security - the ability to control and record who does what and when
Scalability - the ease of growing the network by adding more devices and maintaining the other
goals.

Part b.

1. What is an RFC# (in reference to Computer Networking) and how/why are they
created?

An RFC is a Request for Comments. These are records that describe the developments and
standards of Internet and Networks Usage.

2. What is IEEE and it's importance to data communication?

IEEE is the Institute of Electrical and Electronics Engineers. They establish widely used
networking standards and publish technical literature for networking research.

3. What is the IETF and it's importance to data communication?

IETF is the Internet Engineering Task Force. They define standard operating internet protocols
to keep all users safe and efficient.

4. Compare best practice -v- standards in networking.

Knowing your network - Understanding all operations in your network to prepare and plan for
updates.
Network Monitoring - keeping a close eye on the network allows for quick resolutions of
problems
Network Segmentation - restricting access to certain areas of the network to improve secuirty
Network Documentation - serves as a reference guide and will sho history to diagnose and
prevent further issues
Firewalls - can stop or slow down attacks on the network
Audit Software and Firmware - enures all software and firmware are up to date and working as
efficiently as possible
Disaster Relief Plans - keeping a backup of essential pieces of the network ensures you can
restore the network if it were to fail

5. What is a dual stack system?

A dual stack system supports the use of noth IPv4 and IPv6 addresses at the same time

6. Explain the following: a bit, octet, hexadecimal, and decimal value

A bit is the building block of data. It is either a 0 or 1.


An octet is eight bits.
Hexadecimal describes a system with 16 symbols, each comprised of 4 bits.
Decimal describes a system that uses digits 0 through 9, converted from a string of bits

You might also like