Subnetwork

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 1 of 2 - About 19 Essays
  • Improved Essays

    Case Study On RLES

    • 1211 Words
    • 5 Pages

    1. Goal The primary goal of this lab was to establish a base network in RLES that will be built on in future labs. We worked with new PFSense, a routing interface with which I was unfamiliar. I learned how to configure internal and external interfaces with PFSense, and was able to modify the rest of the necessary settings via the Web GUI. We learned how to configure RHEL, and also got to experiment with setting up a Wiki. Finally, we had a chance to configure and work with a monitoring application. This lab was also a good introduction to RLES, providing us with an opportunity to learn the ropes of the interface before throwing anything too complicated our way. This was only the first lab, so the majority of the tasks were fairly straightforward. However, the infrastructure we deployed is one that can easily be built on in later labs. 2. Procedural and Informational Documentation RHEL Setup Procedure Insert the installation media, and launch the installer. RedHat offers a variety of installation options through its install wizard. Configure as needed by selecting the relevant options. In this case, we installed the Desktop version – this provided a more complete install than the “minimal” install package. Choose a root password, and configure at least one user account. We chose to create an account named “Student” with “student” being the password. Next, locate your serial code. This code is needed to activate your copy of RHEL. Until you enter your serial code, you will…

    • 1211 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This protocol is classified into rounds; every round composed of two phases; Set-up Phase (1) Advertisement Phase (2) Cluster Set-up Phase Steady Phase (1) Schedule Creation (2) Data Transmission A. Setup Phase: Every node selects independent of other nodes if it will become a CH or not. This selection takes into consideration when the node behaved as a CH for the last time. In the advertisement phase, the CHs inform their neighboring node with an advertisement packet that they become CHs.…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    QUES 1. A router has the following CIDR entries in the routing table: Address/Mask Next Hop 135.46.56.0/22 Interface 0 135.46.60.0/22 Interface 1 192.53.40.0/23 Router 1 Default Router 2 For each of the following IP addresses, what does the router do if a packet with that address arrives? 1. 135.46.63.10 2. 135.46.57.14 3. 135.46.52.2 4. 192.53.40.7 5. 192.53.56.7 g entirely with bytes is much simpler than working with individual bits. Answers: 1. 135.46.63.10 Using the first 22 bits of it as…

    • 607 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    SECTION A: ARDUINO BOARD Fig 1. Arduino Uno board 1. ATMEGA328P MICROCONTROLLER FUNCTION: ATMEGA328P is a microcontroller from the AVR family; it is an 8-bit device, which means that its data-bus architecture and internal registers are designed to handle 8 parallel data signals. It has 3 types of memory: • FLASH MEMORY: It is used for storing application, which explains why you don’t need to upload your application every time you unplug Arduino from its power source. • SRAM MEMORY: Storing…

    • 1504 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    1. (5 points) Compare and contrast the three types of addresses used in a network. Application layer – A port is assigned to an application for direct routing of incoming and or outgoing data. Network layer – IP addresses are assigned to each individual computer. The IP addresses can change and are often assigned by the DHCP server. Data link layer – Mac Addresses are used to identify which hardware is the sender and which is the receiver. All hardware items have a MAC address. For example:…

    • 766 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Case Study

    • 370 Words
    • 2 Pages

    1. The customer edge router will peer only with a provider router and will not peer with other customer edge routers. With reference to the diagram above, CE2 will peer with PE2 and not with CE1 or CE3. 2. If a new site is added, configuration is done only on the provider edge router. If site 4 is to be added in the peer model in figure 4, then only the PE router is to be configured. The other CE and PE routers need not be configured or modified. 3. The data packet contains the following…

    • 370 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    ABC Accounting, Inc. is a quickly growing company looking to upgrade its current network. The company has grown from 5 to 200 employees in the past year and a half. The company is expected to grow to 350 employees in one year. ABC Accounting, Inc. will add more offices in the current building, which will span three floors. To accommodate their growth ABC Accounting is seeking the necessary solution to build an affordable, expandable, and secure network. This proposal will provide a…

    • 1768 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    At this point, WIFI technology is very inexpensive, and found in many homes across the world. Although its original purpose, and the first one everyone thinks of, is its utility in connecting computers wirelessly to the internet, it also works quite well to network computers, allowing the computers in a home to share files, internet access, and printers. The ability to share a printer over a network is extremely helpful. Rather than having to maintain multiple printers, (which will work less…

    • 1852 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    RAID level 5 works with any number of disk equal or greater than 3 and places a parity sum on one disks in the set to be able to recover from a disk failure. (Striped blocks with distributed parity.) The parity calculations are done in a RAID 5 set using XOR. We assume a small RAID 5 set of four disks and some data is written to it. On the first three disks we have the binary information 1010, 1100 and 0011, here representing some data, and now calculate the parity information for the…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4-Qm Analysis

    • 482 Words
    • 2 Pages

    It accepts an M-ary value that specifies a predefined symbol map with the number of distinct symbol map values to use as symbols. samples per symbol specifies an even, positive number of samples dedicated to each symbol. Multiply this value by the symbol rate to determine the sample rate. The default value is 16. symbol values specifies an array of symbol values with an order that corresponds to the symbol map. The number of QAM states in the array must be 2N, where N is the number of bits per…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Previous
    Page 1 2