The primary goal of this lab was to establish a base network in RLES that will be built on in future labs. We worked with new PFSense, a routing interface with which I was unfamiliar. I learned how to configure internal and external interfaces with PFSense, and was able to modify the rest of the necessary settings via the Web GUI. We learned how to configure RHEL, and also got to experiment with setting up a Wiki. Finally, we had a chance to configure and work with a monitoring application. This lab was also a good introduction to RLES, providing us with an opportunity to learn the ropes of the interface before throwing anything too complicated our way. This was only the first lab, so the majority of the tasks were fairly straightforward. However, the infrastructure we deployed is one that can easily be built on in later labs.
2. Procedural and Informational Documentation
Insert the installation media, and launch the installer. RedHat offers a variety of installation options through its install wizard. Configure as needed by selecting the relevant options. In this case, we installed the Desktop version – this provided a more complete install than the “minimal” install package. Choose a root password, and configure at least one user account. We chose to create an account named “Student” with “student” being the password.
Next, locate your serial code. This code is needed to activate your copy of RHEL. Until you enter your serial code, you will…
This protocol is classified into rounds; every round composed of two phases;
(1) Advertisement Phase
(2) Cluster Set-up Phase
(1) Schedule Creation
(2) Data Transmission
A. Setup Phase: Every node selects independent of other nodes if it will become a CH or not. This selection takes into consideration when the node behaved as a CH for the last time. In the advertisement phase, the CHs inform their neighboring node with an advertisement packet that they become CHs.…
QUES 1. A router has the following CIDR entries in the routing table:
For each of the following IP addresses, what does the router do if a packet with that address arrives?
g entirely with bytes is much simpler than working with individual bits.
Using the first 22 bits of it as…
SECTION A: ARDUINO BOARD
Fig 1. Arduino Uno board
1. ATMEGA328P MICROCONTROLLER
FUNCTION: ATMEGA328P is a microcontroller from the AVR family; it is an 8-bit device, which means that its data-bus architecture and internal registers are designed to handle 8 parallel data signals.
It has 3 types of memory:
• FLASH MEMORY: It is used for storing application, which explains why you don’t need to upload your application every time you unplug Arduino from its power source.
• SRAM MEMORY: Storing…
1. (5 points) Compare and contrast the three types of addresses used in a network.
Application layer – A port is assigned to an application for direct routing of incoming and or outgoing data.
Network layer – IP addresses are assigned to each individual computer. The IP addresses can change and are often assigned by the DHCP server.
Data link layer – Mac Addresses are used to identify which hardware is the sender and which is the receiver. All hardware items have a MAC address. For example:…
1. The customer edge router will peer only with a provider router and will not peer with other customer edge routers. With reference to the diagram above, CE2 will peer with PE2 and not with CE1 or CE3.
2. If a new site is added, configuration is done only on the provider edge router. If site 4 is to be added in the peer model in figure 4, then only the PE router is to be configured. The other CE and PE routers need not be configured or modified.
3. The data packet contains the following…
At this point, WIFI technology is very inexpensive, and found in many homes across the world. Although its original purpose, and the first one everyone thinks of, is its utility in connecting computers wirelessly to the internet, it also works quite well to network computers, allowing the computers in a home to share files, internet access, and printers. The ability to share a printer over a network is extremely helpful. Rather than having to maintain multiple printers, (which will work less…
ABC Accounting, Inc. is a quickly growing company looking to upgrade its current network. The company has grown from 5 to 200 employees in the past year and a half. The company is expected to grow to 350 employees in one year. ABC Accounting, Inc. will add more offices in the current building, which will span three floors. To accommodate their growth ABC Accounting is seeking the necessary solution to build an affordable, expandable, and secure network. This proposal will provide a…
It accepts an M-ary value that specifies a predefined symbol map with the number of distinct symbol map values to use as symbols.
samples per symbol specifies an even, positive number of samples dedicated to each symbol. Multiply this value by the symbol rate to determine the sample rate. The default value is 16. symbol values specifies an array of symbol values with an order that corresponds to the symbol map. The number of QAM states in the array must be 2N, where N is the number of bits per…
Communication is key, regardless of where you work. Communication can be between people or a computer communicating data to a person. When obtaining data from a computer, people want to be able to trust the data that they are receiving and that none of the packets got lost somewhere along the way. Packets are units of data that are routed between an origin and a destination on the Internet. Networks use Ethernet cables, called Category (more commonly referred to as CAT)…