display a website. This will include things such as images, files, scripts and pages that make up the website. Once there is an access to the site the browser will get the data from the web server. The web server will then use HTTP (hypertext transfer protocol) and send the data to your browser. The browser then converts the html and displays the website. Mail server: A mail server is a computer that stores electronic mail also known as emails. When someone wants to open an email the computer…
variety of network cable types. Whereas in some other cases, a very basic network may only utilise one kind of network cable. The cable needed varies according to the client’s needs for example the size of the network (PAN, LAN, MAN, WAN), the network protocols and even the network topology. Different cables have different characteristics and it is important to learn about the different cables available on a network to develop a successful network. In this report I will be discussing and…
Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Part 1: Examine the Header Fields in an Ethernet II Frame What is significant about the contents of the destination address field? It starts with the broadcast ARP protocol from the router asking who has 192.168.2.22. Then it starts showing the source ip address then destination addresses then rebroadcasting from your router. ____________________________________________________________________________________ ____…
What is a VPN? It stands for virtual private network. Its main purpose is to secure the connections between the host and the server. It fulfills that purpose by using tunneling protocols, encryption, data encapsulation and certified connections to protect the identity of the host. The simplest way to think about it is to compare it to a LAN connection but without wiring. The History of VPN: Early VPNs were often set up to give individual employees secure remote access to their company…
It means that the packet originated from somewhere else and that is why it didn’t take the expected best path. The only disadvantage to this system is that it is not feasible on path vector based routing system. A path vector protocol is a computer network routing protocol which maintains the path information that gets updated dynamically. Updates which have looped through the network and returned to the same node are easily detected and discarded [3]. Now current Internet uses BGP which is in…
A general definition of a home network would be the interconnection between two or more computers to establish a local area network inside the home. With the advancement of the technology, the notion of computers has changed because many devices can do the same job that computers do. Therefore, let us define a home network as a local area network that allows digital devices present inside of a home to communicate together. We will enumerate a list of Home Network devices and we will write…
distance between the computers or departments. It is in Bus topology as since the computers connect to the network by connecting to the network cable. This as opposed to a star network topology setup. Next to each network component is an Internet Protocol (IP) address. Each IP consists of four number whose value can range from 0 to 255. This four numbers are separated by period marks (WhatIsMyIPAddress.com, 2000-2016). No number can be repeated on the same LAN sharing the same subnet mask…
To be able to create a computer which will be more like a human, the humans should be focusing on developing some input devices for perception, processor and memories to be able to store information like a human, software to perform, output devises to replace human hands and feet, permanently storage device and network for communication. Just creating all of this wouldn’t be enough. Inventors should be more focusing on a human sensors and perception which is very hard to program into a computer.…
1. How would you determine the university’s Internet Protocol (IP) address range? a. Log in to university workstation either from any computer on campus or by creating a VPN in my PC and connecting to passport.missouristate.edu. b. Run the ipconfig command to analyze the IP address and subnet that gives the addressing schema for the network. 2. What information can you retrieve from the Domain Name System (DNS)? From the DNS, the following information can be retrieved a. Number of servers…
In each scenario mentioned in previous section, we formulate network topologies as undirected graph $\mathcal{G}=(\mathcal{V},\mathcal{E})$ with $n$ nodes and $m$ edges having demand at a node $i$ in $\mathcal{V}$ given by $d_i$. Here, $\mathcal{V}$ indicates set of nodes and $\mathcal{E}$ indicates set of edges in the topology. A link would exist in the topology between node $i$ and node $j$, if they are in the communication range of each-other satisfying constraint, \begin{equation} P_i…