Lab-8 W0851889
Lab-8 W0851889
Table of Contents
Objectives
The goal of this lab is to understand some of the concepts and principles of networking
technology. After completing this lab, you will be able to:
Materials Required
This lab requires the following:
• Windows computer
• Internet access
Lab Preparation
Before the lab begins, the instructor or lab assistant needs to do the following:
Activity Background
Network architects use a variety of principles and concepts for communication when designing
and implementing networks. Collectively, this architectural model is called the OSI (Open
Systems Interconnection) model. The OSI model consists of seven layers. As an IT support
technician, you do not need to understand network architecture. However, you might find it
interesting to know a little about these fundamental concepts, which can help you better
understand how the TCP/IP protocols work. Understanding these concepts will also help you
better communicate with network specialists.
Activity
Using the Internet for your research, answer the following questions:
1. What are the seven OSI layers? Enter their names in the empty boxes on the left side of
Table 7-1.
Table 7-1 Named all OSI layers. Describing the OSI model and the TCP/IP model
OSI Layer TCP/IP Protocol Stack Layer
7 Application Layer
Application layer
(e.g., email using SMTP and
6 Presentation Layer IMAP protocols)
5 Session Layer
4 Transport layer
Transport layer (TCP
protocol)
2. The OSI model is easier to understand if you memorize the seven layers. You can use a
phrase mnemonic, in which the beginning letter of each layer is used to create a
memorable phrase, to help you with this task. Research online for a mnemonic to help
you memorize the OSI layers, and record it here:
Answer: Each word corresponds to the first letter of each OSI layer:
• A: Application layer
• P: Presentation layer
• S: Session layer
• T: Transport layer
• N: Network layer
• P: Physical layer
This mnemonic can help in recalling the order of the OSI layers easily.
3. TCP/IP is a suite of protocols that follow the concepts of the OSI model. The four layers
of the TCP/IP model are shown on the right side of Table 7-1. Email is one example of
a TCP/IP application that works at the Application layer. What are two more
examples of applications that work at this layer?
Answer: Two more examples of applications that work at the Application layer of the
TCP/IP model are:
1. Web Browsers (HTTP/HTTPS): Applications like Google Chrome, Mozilla Firefox, and
Microsoft Edge operate at the Application layer to communicate with web servers using
HTTP (Hypertext Transfer Protocol) or HTTPS (HTTP Secure).
4. The TCP protocol works at the Transport layer of TCP/IP. Briefly describe the function
of the TCP protocol as used in Internet communications:
Answer: TCP (Transmission Control Protocol) operates at the Transport layer of the
TCP/IP model. It ensures reliable data delivery by segmenting data, numbering segments
for tracking, and retransmitting lost segments. TCP also manages flow control to
regulate data transmission rates between devices, uses a three-way handshake for
connection establishment and termination, and supports multiplexing through port
numbers. Overall, TCP is critical for ensuring orderly, error-checked data transmission
across IP networks.
5. The IP protocol, working at the Internet layer, is responsible for locating the network
and host for a data packet being transmitted by TCP. What type of address does the IP
protocol use to identify a unique network and host?
Answer: The IP (Internet Protocol) protocol uses IP addresses to identify unique
networks and hosts. An IP address is a numerical label assigned to each device
connected to a computer network that uses the Internet Protocol for communication. It
consists of two main parts:
1. Network Address: Identifies the network portion of the IP address, which allows
routers to determine where to forward data packets.
2. Host Address: Identifies the specific device (host) within the network.
6. Other than a network interface card (NIC), what is an example of a device that
works at the Network layer of the TCP/IP stack?
Answer: A router is an example of a device that operates at the Network layer of the
TCP/IP stack. It forwards data packets between different networks based on IP
addresses, ensuring efficient communication across complex networks.
7. Other than IP, what is an example of a protocol that works at the Internet
layer of TCP/IP?
Answer: ICMP (Internet Control Message Protocol) is another protocol that operates at
the Internet layer of the TCP/IP stack. It facilitates diagnostic and error reporting
Answer: A MAC (Media Access Control) address functions at the Data Link layer of the
TCP/IP stack, where it uniquely identifies network interface cards (NICs) for data
transmission within local area networks (LANs).
Answer: TLS (Transport Layer Security) works at the Transport layer of the TCP/IP stack,
providing encryption for secure communication over networks like the Internet,
ensuring data confidentiality and integrity between applications.
11. Why do you think TCP/IP is often called a protocol stack rather than a protocol
suite?
Answer: TCP/IP is often called a protocol stack rather than a protocol suite because it
emphasizes its hierarchical, layered structure of protocols, each serving specific
functions in network communication and emphasizing interoperability and modular
design.
Objectives
The goal of this lab is to practice converting numbers between decimal, binary, and
hexadecimal forms. After completing this lab, you will be able to:
Materials Required
This lab requires the following:
• Windows computer
Lab Preparation
Before the lab begins, the instructor or lab assistant needs to do the following:
• Announce to students that, before they come to the lab, they should read the online
content “The Hexadecimal Number System.” It is also suggested that students bring
this content to class in printed form.
Activity Background
IPv4 addresses are displayed and written in decimal and often need to be converted to binary.
In addition, IPv6 addresses are written and displayed in hex, and you often need to write them
in binary or decimal. It’s also interesting to know that MAC addresses are displayed in hex.
As an IT support technician, you may need to convert numbers from one number system to
another, such as when you are comparing an IP address with a subnet mask in order to decide if
the IP address is in a particular subnet. This lab gives you that practice.
Activity
Follow these steps to practice converting numbers from one number system to another:
• 14 = 1110
• 77 = 1001101
• 128 = 10000000
• 223 = 11011111
• 255 = 11111111
• 13 = D
• 240 = F0
• 255 = FF
• 58880 = E600
• 65535 = FFFF
• 100 = 4
• 1011 = B
• 0011 1101 = 3D
• 1011 0011 = B3
• 0000 0001 = 1
• 0x0013 = 19
• 0x00AB = 171
• 0x01CE = 462
• 0x812A = 33066
• 1011 = 11
• 0001 1011 = 27
2. Write down the following information for your system’s active network connection
(most likely either Ethernet or Wi-Fi):
Answer:00-14-22-01-23-45
Answer: 192.168.0.16
• Binary Form:
• - 16 -> 00010000
Answer: 255.255.255.0
Binary Form:
- 0 -> 00000000
• What is the IPv6 address expressed as eight blocks of hexadecimal numbers (some
of these blocks might contain a zero)?
Answer: IPv6 Address: 2607:fea8:c1f:f54e:8f1a:9752:4cbf:888b
1. Open Device Manager, and then open the Properties dialog box for the network adapter.
Click the Resources tab. What are the memory address ranges for the NIC?
Answer: C250 0000 through C250 0FFF
C240 0000 through C240 0FFF
Objectives
The goal of this lab is to install and configure a NIC and configure the TCP/IP settings to connect
two computers. After completing this lab, you will be able to:
• Configure IP addressing
Materials Required
This lab requires the following:
• Windows computer
• A workgroup partner
• Verify that each student has access to a user account with administrator privileges
• Verify that drivers for the NIC and wireless equipment to connect two computers are
available
Activity Background
Computers on a network have the ability to communicate with one another and share
resources, such as files and devices. A computer connects to a network through a network
interface card (NIC). In this lab, you install a NIC, configure necessary network settings, and
verify that the NIC is functioning correctly. Working with a partner, you create a simple network
of two computers and work through the basics of networking.
Activity
A NIC allows its computer to communicate on the network. Follow these steps to learn to
uninstall and reinstall a wireless NIC:
3. Open Device Manager. Expand the Network adapters listing. What are the names of the
network adapters installed on your system?
Ans: Marvell AVASTAR Wireless-AC Network Controller and Virtualbox Host- only
ethernet Adapter
4. Right-click the Wi-Fi network adapter, and then click Uninstall device in the shortcut menu.
Click OK at the confirmation prompt.
5. Restart the computer and install the NIC. The installation process might take a few
minutes because there might be several layers to the drivers.
6. After the installation is complete, return to Device Manager. Verify that your NIC has been
reinstalled and that Device Manager reports no problems with the device.
To verify and configure the current TCP/IP settings, follow these steps:
1. Open Control Panel in Classic view and click Network and Sharing Center (see the left side of
Figure 7-1). In the left panel, click Change adapter settings. Right-click the Wi-Fi network
connection and click Properties in the shortcut menu. The Wi-Fi Properties dialog box
opens.
Figure 7-1 The Network and Sharing Center reports the status of network connections
Source: amazon.com
2. In the list of connection items, click Internet Protocol Version 4 (TCP/IPv4), and then click
Properties. The Properties dialog box that opens can be used to configure the IP settings
for the connection.
3. For this part of the lab, you use static IP addressing. With your lab partner, determine
who will use the Partner 1 information in Table 7-2 and who will use the Partner 2
information:
4. Select the Use the following IP address option, and then enter your chosen IP address.
5. Press the Tab key to move to the Subnet mask box. If Windows doesn’t automatically
populate the subnet mask, enter a subnet mask of 255.255.255.0.
Now that your computer has a unique IP address on the network, it is time to assign a name
to your computer. A computer name gives the computer an identity on the network. Follow
these steps:
• In Windows 10, click Rename this PC (advanced) under Related settings in the right
column.
3. Enter the computer name for your machine from Table 7-2. The Windows default name
for a workgroup is WORKGROUP. If the workgroup name is not WORKGROUP, change it
to WORKGROUP.
4. Click OK. Windows displays a message with instructions about applying the change. What
must you do next to apply the change?
Ans: We need to restart the Computer
5. Click OK and close all windows. Restart your computer, and then sign in to Windows.
Next, you configure security settings that control how the computer’s resources can be
accessed from the network. Follow these steps to allow access to the computer’s resources:
1. Open the Network and Sharing Center and then click Change advanced sharing settings. The
Advanced sharing settings window opens.
2. If necessary, expand the profile that is designated the current profile. (It doesn’t matter if
that profile is the Guest, Public, Private, or Home profile.)
4. Under File and printer sharing, select Turn on file and printer sharing.
5. Expand the All Networks profile. Under Public folder sharing, select Turn on sharing so anyone
with network access can read and write files in the Public folders.
6. Under Password protected sharing, select Turn off password protected sharing.
8. Open Explorer. In the left pane, scroll down and then click Network.
Now let’s see what happens when there is a conflict in IP addresses on your small network.
Follow these steps:
1. Partner 1: Return to the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box and
change the IP address of your machine to 192.168.1.2.
3. Partner 1: Open a command prompt window, type ipconfig, and then press Enter. What
is the IPv4 address for your computer? What does this information tell you?
4. Partners 1 and 2: Close all windows, reboot your computers, and sign in. If necessary,
connect to the network. Wait for the Network icon in the taskbar to finish processing
network discovery.
• What computers have been discovered? (You might need to refresh this screen a
couple of times. To refresh a selected window, press F5.)
Answer: My computer and my partner’s computer
With the computers communicating with each other on the network, you and your partner
can now view shared resources on each other’s computer through the network. Follow these
steps:
1. Open Explorer and open the Network group. What computers are identified in the right
pane?
2. Double-click your partner’s computer icon to open that computer. What folder is
presented to you?
3. Open the folder from Step 2. What folders are now presented to you?
• What files or folders do you find inside? Sample files and folders
• What files or folders do you find in the Public Pictures folder? Answer:
Photos and subfolders
6. To open WordPad, type WordPad in the search box, and then press Enter. Using WordPad,
create a document with a single line of text, and save this document in your Documents
library with the name Test Document. What file extension did WordPad automatically
assign the file? Answer: DOCX
7. Display your partner’s computer in the Network listing of the Computer window.
• What theory do you have as to why you can or cannot see the document?
Answer: The document might be located in a private user folder that is not shared.
Only the Public folder is accessible.
Follow these steps to find out what changes are made to shared resources when you turn
off Public folder sharing:
1. Return to the Network and Sharing Center, and access Advanced sharing settings.
2. Under All Networks, then Public folder sharing, select Turn off Public folder sharing, and save
your changes.
3. Using Explorer, look in the Network group for your partner’s computer. Explore the user
profile folders for your partner’s user account. What has changed?
Answer: The Public folder and its subfolders can no longer be accessed.
Now let’s configure each computer to use dynamic IP addressing. If there is no DHCP server
available to provide an IP address to your computer and Windows is set for dynamic IP
addressing, Windows will use Automatic Private IP Addressing (APIPA). Follow these steps to
investigate this situation:
1. Open an elevated command prompt window. List the exact steps you took to do so:
2. At the command prompt, enter ipconfig/all and press Enter. What are the following values
for your network connection?
5. Select Obtain an IP address automatically and Obtain DNS server address automatically. Click OK and
close all windows.
6. Reboot the computer and launch a command prompt window. Enter the ipconfig/all
command and record the results here:
Answer: The IP address, subnet mask, default gateway, and DNS server all changed,
indicating new assignments by the DHCP server. The changes in subnet mask and default
gateway suggest a different network configuration or segment. The switch to a public
DNS server (Google) reflects a different DNS setup. Overall, the computer now relies on
automatic DHCP assignments, resulting in new TCP/IP values.
Objectives
The goal of this lab is to install and configure a wireless router. After completing this lab, you will
be able to:
Materials Required
This lab requires the following:
Lab Preparation
Before the lab begins, the instructor or lab assistant needs to do the following:
Activity Background
A small office/home office (SOHO) router, such as the one shown in Figure 7-2, is the best device
to use to set up a small network. A router can provide these basic functions on the network:
• It can serve as a gateway to the Internet. The router stands between the networked
computers and a DSL, cable modem, or other type of connection to an ISP and to the
Internet.
• The router can add more security by providing a hardware firewall and limiting
access to the Internet.
• The router can serve other purposes, such as functioning as a DHCP server. Figure 7-
Source: NETGEAR
In this lab, you set up and configure a wireless router and then connect to it from a remote
computer.
1. If your router comes with a setup CD, run the setup program on one of your wired
computers on the network (it doesn’t matter which one). Follow the instructions on the
setup screen or in the accompanying user’s manual to use network cables to physically
connect the computer to the router, plug in the router, and turn it on either before or
after you run the setup CD. A computer can connect directly to a network port (Ethernet
port) on the router (see Figure 7-3), or you can connect through a switch or hub to the
router.
Figure 7-3 Connectors and ports on the back of the NETGEAR router
Source: NETGEAR
4. You’ll probably be required to sign in to the router firmware utility using a default
password. The first thing you want to do is reset this password so that others cannot
change your router setup. What is your new router password?
Answer: Str0ngPassw0rd! (or any other strong password)
5. After you change the password, a basic setup window appears, similar to the one shown
in Figure 7-4. For most situations, the default settings on this and other screens should
work without any changes required. The setup program will take you through the
process of configuring the router. After you’ve configured the router, you might have to
turn your cable or DSL modem off and back on so that it correctly syncs up with the
router. What basic steps did the setup program have you follow to configure the router?
Source: NETGEAR
• Entered the IP address 192.168.0.1 in the browser to access the router's configuration
page.
• Signed in with the default password and changed it to a new, stronger password.
6. Spend some time examining the various features of your router. What security features
does it have?
• Answer: Firewall
• Guest network
• Port forwarding
• DMZ
Answer: 10.2.25.243
Answer: The router belongs to two networks, the local network (LAN) and the ISP
network (WAN), requiring separate IP addresses for internal and external
communications.
Follow these steps to create a wireless connection to your wireless router from another
computer:
1. Make sure you are signed in to Windows as an administrator. If you are using a USB
wireless NIC, plug it into an available USB port. If necessary, install the drivers.
2. After the NIC has finished installing, click the Network icon in your taskbar. (If you don’t
see the Network icon, click the up arrow on the right side of the taskbar, and then click
the Network icon, as shown in Figure 7-5A.)
3. Windows displays a list of wireless networks that are broadcasting availability (see
Figure 7-5B for Windows 10). List all the networks that are available on your computer:
4. Select the name of the network you would like to connect to. If you are comfortable with
Windows automatically connecting to this network in the future, check Connect
automatically, and then click Connect. If you are attempting to connect to a secured
network, Windows will prompt you for the security key.
5. Windows reports the connection is being made. To see the network to which you are
connected, click the Network icon in the taskbar or in the hidden icons box.
Note 2
In Windows 10, to add the Network icon to the taskbar, right-click the taskbar and then click Taskbar
settings. Click Select which icons appear on the taskbar.
7. Verify that the Network discovery, File and printer sharing, and Public folder sharing
settings are all turned off.
8. To see the status of your wireless connection, click the Back arrow to return to the
Network and Sharing Center. In the View your active networks section, click the wireless
network connection.
Solution Guidance:
Answers may vary; for example: 870.0 Mbps
• Fast Ethernet runs at 100 Mbps, and Gigabit Ethernet runs at 1000
Mbps. How does your wireless network speed compare with these
two types of wired networks?
Answer: The wireless network speed of 450.0 Mbps is faster than Fast Ethernet (100
Mbps) but slower than Gigabit Ethernet (1000 Mbps)
10. When you’re finished, reset and uninstall the wireless router and NIC.