Posts

Showing posts from September, 2015

stress is classful

http://www.thekennelclub.org.uk/media/21400/gcdspuppy.pdf http://www.thekennelclub.org.uk/training/good-citizen-dog-training-scheme/ http://www.thekennelclub.org.uk/training/ http://www.msn.com/en-us/health/pregnancyparenting/10-signs-your-child-may-have-aspergers-syndrome/ar-AAf8yj6?li=AAa0dzB&ocid=iehp#page=6

Network + I Assignment Module 3

You have been contracted to install a wireless network for a startup company. The facility open office space is 200ft long by 120ft wide. The company is expects to start with 50 nodes and would like to plan for future expansion up to 75 nodes. After an inspection of the facility it is determined there are no solid or electrical interferences in the facility. As part of your proposal you will need to determine the number and placement of Wireless Access Points (WAPs) and their Channel and SSID setup.  Also, provide information on any pitfalls, including any environmental issues that should be avoided to preserve the best connectivity, and the Wireless Standard you will recommend, and why. Concerns Answer WAP placement The center of a large area would be ideal for wireless access in an ideal situation depending on the distance to the clients. WAP Quantity Using a single WAP we can avoid issues of different SSID and interference in our service area. Interferenc...

quizlet a+ 801 notes& chain of custody

https://quizlet.com/25886839/220-801-september-2013-201-250-flash-cards/ https://quizlet.com/17986747/openexamscom-comptia-a-220-801-flash-cards/ https://quizlet.com/25886918/220-801-september-301-350-flash-cards/ https://quizlet.com/23937009/openexamscom-comptia-a-220-801-flash-cards/ https://quizlet.com/43901847/chapter-678-short-answers-flash-cards/ https://en.wikipedia.org/wiki/Northbridge_(computing ) https://en.wikipedia.org/wiki/Chain_of_custody

Review Questions CH1

1.  What is name of the unique physical address that is assigned to every network interface card? IP address Hostname MAC address NetBIOS name   2.  How many bits are used to create an IPv4 address? 8 6 32 64   3.  If you have a Class B address with a default subnet mask and you need to create eight subnets, then which of the following subnet masks should you use? 255.255.255.240 255.255.224.0 255.255.240.0 255.240.0.0   4.  Which of the following IP addresses are valid only for private IP addressing that is filtered from the Internet? (Choose two.) 10.1.1.1 172.17.255.254 11.1.2.4 193.168.2.1   5.  Which information directory protocol is the standard for file transfer over the Internet? TCP UDP FTP HTTP   6.  Which of the following layers of the OSI model is...

NETWORK + I Assignment Module 2

NETWORK + I Module 2 Assignment List the service or protocol name for each of the Well Known TCP/UDP Port Numbers listed below. Does the service use TCP, UDP or both? Port # Service or Protocol Name TCP, UDP or Both? 20 FTP data transfer TCP 21 FTP control (command) TCP 23 Telnet TCP 25 SMTP TCP 53 DNS TCP/UDP 80 HTTP TCP/UDP 110 POP3 TCP 111 ONC RPC UDP 115 SFTP TCP 119 NTP TCP 137 NetBIOS Name Service UDP 143 IMAP TCP 161 SNMP UDP 311 Mac OS X Server Admin TCP 389 LDAP TCP

NETWORK+ I Assignment Module 1

NETWORK + I 09/30/15 Harrison Valetski Module 1 Assignment Provide a brief overview of the function of the below devices and describe which layers of the OSI Model they operate. Hubs A hub is a device that has multiple ports into which connections can be made.  There are two major types of hubs: active and passive. An active hub is plugged into a power source so that it can amplify signals as well as connect them. A passive hub does not provide power but provides only connectivity. All devices connected to a hub are also connected to each other. A hub does not filter any communication or provide any intelligence in regard to the data stream; it simply lets all the information flow through it and connects anything and everything that is connected to it. I t works at layer 1 (Physical) of the OSI model.  MAUs These are a lot like hubs in that they are unmanaged typically (although they do come in managed control access units on occasion) non-switched and generally ...

network troubleshooting

1.8  Given a scenario, implement the following network troubleshooting methodology Generally speaking, troubleshooting is a process of isolation. The best troubleshooters will try to determine what still works and how far it continues to work and then determine exactly where it breaks down. The more you know about the interworking of a network, the better you will be able to determine the weakness or the problem based on its symptoms. There are many different troubleshooting methodologies, but all share the same basic steps. In the following sections, I'll discuss the steps involved in troubleshooting a network. To facilitate this discussion, I will also present a scenario to which you will apply your troubleshooting methodology. For this scenario, I will use technical information and terminology that I have previously discussed. Specifically, say you have a user who is complaining that she cannot access any intranet or Internet resources. Now, let's apply a troubleshootin...

common networking protocols

Image
1.6  Explain the function of common networking protocols Sorry, but it's not enough to just know the port number and the protocol it represents. To truly understand your network and how to manage it, you need to fully understand each protocol, what it does, and how it relates to your network as a whole. Table  1.7  lists all of the most common protocols and their purpose, function, and use in your network. I have also listed each of protocols and given more detailed information about each of them. Table 1.7:  The most common protocols  Open table as spreadsheet Protocol Purpose Function Use IP Addresses and transports data from one network node to another. A Network layer connectionless protocol, it “fires and forgets.” Performs fragmenting and assembling of packets. IP addresses are assigned to computers and to router interfaces. These addresses are used to transfer a packet into the proper network so it can be delivered to a host. T...