Lesson 2 Lab Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the protocols that are used in it. This lab is important to the student because it takes the student through a thought experiment about how data would pass thorough the TCP/IP Model down from the computer and up through the destination computer. By doing this thought experiment the student will come to better understand how different protocols work together to accomplish a specific task. Materials • Word processing document • Textbook Do the Lab Follow …show more content…
Take Note This lab uses Windows 7. If you are using Windows 8, Vista or Windows XP, you will need to make some slight variations to the lab. Materials • word processing document • Computer running Windows 7 Professional Do the Lab The IPCONFIG Command 1. Click the Start button at the bottom left of your Windows 7 Desktop Display in order to bring up the Windows 7 start menu (Figure 2-12). [pic] 2. Type CMD into the Search Programs and Files box at the bottom of the Start Menu and press Enter. 3. The Command Line Interface (CLI) Window will come up (as shown in Figure 2-13). The CLI is a window where you can enter commands into the computer in the form of text. This type of interface was how a person interacted with DOS. It is also how a person is able to currently interact with Linux if they choose not to use one of several graphical interfaces available for use with Linux. [pic] 4. Once you have opened the Command Line Interface (CLI), type in the command ipconfig. When the ipconfig command is entered, the CLI changes to something similar to Figure 2-14. You should note that the
In general, an IP address along with a port number forms a socket. Figure 3.10 shows the
| Paste your answers to questions 1 through 16 in the document. Be sure to show your work.Perform the required problems.In your own words, summarize what you have learned concerning network commands available within the Windows operating system.
Task 3: Step 1, Paste the screenshot of the Microsoft Network Monitor capture summary window showing the ICMP frames displayed in red. (2.5 points)
4. Identify the network protocols that are used in the protocols that are in the local are network at your shall or workplace. Why were these protocols chosen for your network? Was IPX ever implemented in your local area network? Why? if your network is using IP, what address class(es) is being used? Why? see if you can find out if and how class D and class E addresses are used in your network.
Module 1 establishes the framework of networking standards and protocols for the rest of the class. The module introduces data communications and defines their components and the types of data exchanged. You will learn how different types of data are represented and how data is flowed through the network.
In the space provided below, copy and paste your IP_FileWrite.vbs program sourcecode. If it doesn’t fit, use the next page for the continuation of your program sourcecode.
On my Windows 10 computer, it is rather simple to gather information on my system. I only need to click the Windows icon on the bottom left of my desktop and type in “System Information.” This opens a desktop application that will show me all the information I may need. This application is broken up into three separate tabs: Hardware Resources, Components, and Software Environment. Under Hardware Resources I can find the input/output section, and memory too. Under the Components section I can see things like my multimedia, ports, network, and storage. Under the Software Environment I can see items like my system drivers, what print jobs may be stuck, and my startup programs. If I am looking to
In the space provided below, copy and paste your IP_FileWrite.vbs program sourcecode. If it doesn’t fit, use the next page for the continuation of your program sourcecode.
Protocol capture tools and protocol analyzers are important tools for an information systems security professional. These utilities can be used to troubleshoot issues on the network. They can verify adherence to corporate policies, such as whether or not clear text privacy data is being sent on the network. They can be used to test security countermeasures and firewall deployments and are needed to perform audits, security assessments, network baseline definitions, and identification of rogue IP devices.
Network protocol communications, network connections established by host computer, network routing information, information about computers
An operating system must support a wide variety of networking protocols in order to meet the needs of its users. The user will be able to identify and make sure that various systems and servers are running smoothly, also the user is will if the system is loaded or
The Operating System manages the flow of data and tells the processor what component needs to be doing. It does this my relaying one piece of information at a time but done so fast it seems it is doing it all at the same time. It does this by giving the information to the processer in computer language, so it can understand.
System requirements for Windows operating systems. It will support any current version of Windows that is still in the extended supported lifetime and any modern 64-bit AMD64/x86-64 or 32-bit x86 processor. Requires, 400 MB available RAM but larger captures require more RAM also 300 MB available disk space but capture files require more space from your system. Additionally, it recommends 1280x1024 resolution or higher, at least 16-bit color and a supported network card for capturing ethernet and/or 802.11 (wi-fi). Wireshark supports most Unix and Unix-like platforms and the system requirements are the equivalents of Windows systems.
TCP/IP is a protocol which transfers data across a network. It allows two different computers to communicate well even if they use different codes. Putting both computers into a new common code language which both computers