Task 1 – Networking technologies and standards 1. 10Base-2: 10Base-2 is basically derived from different characteristics of the physical medium. Here the 10 comes from transmission speed of 10mbits....

1 answer below »
for the task and report, you will have to refer to the online classes which I can't upload here so I will give you id and password of my uni account and you can see the classesif you want i can give you a report of


Task 1 – Networking technologies and standards 1. 10Base-2: 10Base-2 is basically derived from different characteristics of the physical medium. Here the 10 comes from transmission speed of 10mbits. The BASE is nothing but baseband signalling, and the 2 for maximum segment length that is 200m. 2. NAS – Network Attached Storage: It is basically dedicated file storage that will enable the multiple client devices to retrieve the data from centralized disk capacity. 3. Cat-5 cabling: The category 5 cable is basically a twisted pair cable that can be used to the computer network. The cable can provide the standard performance is 100 MHz and is suitable for most of the varieties of the Ethernet cable, but it will be over the twisted pair cable and that will be up to 1000 BASE-T. 4. Network Operating System (NOS): The NOS is basically used for connection in between the computer devices and LAN (Local Area Network) connection. It is basically used to reservation for the software to enhancing the operating system to using the networking features. 5. Network Interface Card(NIC): The NIC is an expansion board that will be used to insert into the computer that can be connected into the network. The NIC are basically used to design the different type of network and protocols that can be used to serve the more networks. Task 2 – Networking Standards Organisations 1. ISOC: Internet Society: The ISOC is an American non-profit organization that is basically founded into the 1992. It can provide the leadership into the area of internet related standards, education, access and policy. The ISOC has a mission to provide the development and evolution. It is used to provide the internet for the benefit of to the world. 2. IAB: Internet Architecture Board: It is basically empowering the media and marketing the industries to the digital economy. It’s a membership is comprised of more than 650 media companies. The technology basically responsible for selling, delivering and optimizing the digital and marketing campaign. 3. IETF: Internet Engineering Task Force: The IETF is an open standard organization which develop and promotes the internet standards. The IETF used to comprise the TCP/IP internet protocols. 4. ICANN: Internet Corporation for Assigned Names and Numbers: The ICANN basically helps to the coordinating the domain name system. It is referred to as phone book of the internet. Because it will match the domain names with IP address. The ICANN also operates some part for domain name system and managing the IP addresses and even other protocols. 5. W3C: World Wide Web Consortium: The world wide web is an international community. The member of this organization is a full time staff and the public work together to develop the web standards. 6. IEEE: Institute of Electrical and Electronics Engineers: The IEEE is world’s largest technical professional organisation. It is basically works for advancing the technology domains so that it can be beneficial for the humanity. The IEEE and its members inspire the global community for the publications and technology related stuff for the educational activities. 7. ITU: International Telecommunication Union: It is a United Nations Agency. The ITU helps for an information and communication technologies. The main aim was to found to facilitate the international connectivity in to the communication networks. And it is founded into the 1865. Task 3 - Number systems Counting in Decimal, Binary, Octal and Hexadecimal: Decimal Binary Octal Hexadecimal 0 0000 0 00 1 0001 1 01 2 0010 2 02 3 0011 3 03 4 0100 4 04 5 0101 5 05 6 0110 6 06 7 0111 7 07 8 1000 10 08 9 1001 11 09 10 1010 12 0A 11 1011 13 0B 12 1100 14 0C 13 1101 15 0D 14 1110 16 0E 15 1111 17 0F 16 10000 20 10 17 10001 21 11 18 10010 22 12 19 10011 23 13 20 10100 24 14 21 10101 25 15 22 10110 26 16 23 10111 27 17 24 11000 30 18 Conversions from Decimal to Binary 1. Draw a table showing the structure of a binary number as shown below. A Binary Number is made up of only 0s and 1s. E.g.: 110100 2. Find the largest power of 2 that is equal to or less than the number (79) (In this case it would be 64) and place a 1 in that column. That is the binary equivalent has 1 lot of 64’s 1 3. Subtract 64 from 79 = 5 -15 4. Now find the other powers of 2 that fit into 15 32768 5. Repeat the process till you have determined the values of all 8 bits 128 64 32 16 8 4 2 1 0 1 1 1 1 0 0 1 Converting from Binary to Hexadecimal 1. Break the binary number into lots of 4 bits (starting from the rightmost bit) 79 = 0000 0000 0100 1111 – Binary. 2. Convert each 4 bits into its equivalent hexadecimal value. 79 = 0000 0000 0100 1111 – Binary. 0 0 7 9 - Hexadecimal. Converting from Binary to Octal 1. Break the binary number into lots of 3 bits (starting from the rightmost bit). 79 = 0000 0000 0100 1111 – Binary. Break into 3 bits = 0 000 000 001 001 111 2. Convert each 3 bits into its equivalent octal value. 79 = 0000 0000 0100 1111 – Binary. Break into 3 bits = 0 000 000 001 001 111 Converting each 3 bits into its equivalent octal value. = 0 0 0 1 1 7 Subnet Masks 1. Write the equivalent decimal representations to the right of the 7 bit patterns above. 11111110 = 254 11111100 = 252 11111000 = 248 11110000 = 240 11100000 = 224 11000000 = 192 10000000 = 128
Answered 1 days AfterFeb 10, 2021ITECH1102

Answer To: Task 1 – Networking technologies and standards 1. 10Base-2: 10Base-2 is basically derived from...

Swapnil answered on Feb 12 2021
130 Votes
75658/Solution.docxPart 1: Investigate Linux File System and Basic Linux Commands
Task 2
· /bin/
· User binaries
· Contains binary executables.
· Common linux commands you need to use in single-user modes are located under this d
irectory.
· /home/
· Home directories
· All users store their personal files in home directory.
· /home/user2/Downloads/
· Home directories
· Used for home directory for user 2.
· /etc/
· Configuration files
· Maintains a lot of files​, network configuration files as well as encrypted files that holds user passwords.
· Contains configuration files required by all programs.
· /etc/samba/
· This is used to display an operating system, internet protocol address and servers.
· This also contains startup and shutdown shell scripts used to start/stop individual programs.
· /sbin/
· System binaries.
· Contains binary executable programs, required by System Administrator, for Maintenance.
· Just like /bin, /sbin also contains binary executables.
· But, the linux commands located under this directory are used typically by system administrator, for system maintenance purpose.
· /mnt/
· Mount directory
· Temporary mount directory where system admins can mount file systems​.
· For example, if you’re mounting a Windows partition to perform some file recovery operations, you might mount it at /mnt/windows.
· you can mount other file systems anywhere on the system.
· /mnt/vbox/
· It is a directory we used to accessing the USB sticks from the linux lite virtual machines.
Part 3: Examining Protocols with Wireshark
Task 2: Examining an ARP Request and Response
· ARP stands for Address Resolution Protocol. ARP resolves an IP address to MAC address so the packet gets delivered. The wireshark is used to perform basic protocol analysis on TCP and UDP network traffic. wireshark is protocol analyzer and network packet sniffer which is run by many platforms. These platforms can be windows XP and Vista, linux, unix, macOS, network professional, security experts, developers and educators. The wireshark capture and browse the traffic which is running on your computer network. and the wire shark is open source so everyone can use it.
· The computer wishing to initiate a session with another computer sends out an ARP request asking for owner of certain IP address. Then the system with that IP...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here