Free Essay

Netw320 W3 Lab

In: Computers and Technology

Submitted By urah8r
Words 2956
Pages 12
NETW320 -- Converged Networks with Lab
Lab #3 Title: IPv4 TOS and Router Queuing
Objectives
In this lab, you will work with an intranet for an organization that will encompass four different site locations in different cities. The subnets of these locations will be connected by a backbone IP network. The organization will be using a converged network that allows data and real-time voice traffic to traverse the same packet-switched network.
The data traffic will consist of FTP (file transfer protocol) and email traffic and the voice traffic will be a VoIP (Voice over Internet Protocol) implementation. You will experiment with various router queuing policies to see how routers within a TCP/IP network can be utilized to support QoS (Quality of Service) within a converged network that is based on TCP/IP.
Explanation and Background
Traditional voice and data applications have been kept on separate networks. The voice traffic is confined to a circuit-switched network while data traffic is on a packet-switched network. Often, businesses keep these networks in separate rooms, or on different floors, within buildings that they own or lease (and many still do). This requires a lot of additional space and technical manpower to maintain these two distinct infrastructures.
Today’s networks call for the convergence of these circuit-switching and packet-switching networks, such that voice and data traffic will traverse a common network based on packet switching. A common WAN technology used for this purpose is TCP/IP because it operates at Layer 3. It is capable of delivering voice and data services right to the desktop. However, voice and data traffic require different quality of service guarantees, because voice is interactive and takes place in real time, whereas data traffic is non-real-time and can tolerate delays to a much higher degree than voice traffic.
In this lab, we will make use of the 8-bit ToS (type of service) field within the IPv4 header in order to prioritize traffic in the converged TCP/IP network. This will allow us to improve the quality of the voice traffic while still supporting data traffic on the network. However, routers can implement different software-based buffering, or queuing policies, that will treat changes in the bits of the ToS field in dramatically different ways. For our lab, we will be looking at three major queuing policies, FIFO (first-in first-out), PQ (priority queuing), and WFQ (weighted fair queuing), but be aware that these are not the only router queuing policies available.
FIFO is a very simple policy to understand. Routers using a FIFO policy simply have one buffer. The first packets received in the buffer are the first packets transmitted out. The problem with this policy is that all packets are treated with the same quality of service regardless of their precedence level. This means that high priority traffic will not take precedence over best effort traffic and may be subjected to intolerable delays, or may even be discarded, due to the fact that FIFO only has one buffer with a limited amount of storage locations. This single buffer is likely to cause a bottle neck as traffic of different priority levels compete for the single buffer resource of the FIFO router queuing policy.
PQ is an improvement to FIFO. A PQ queue has more than one buffer. For example, suppose routers implementing PQ have three buffers, one for high priority, one for priority, and one for best effort. In this case, the router will empty its high priority traffic and leave packets in the priority and best effort buffers at a standstill. After it has empted its high priority traffic, it will empty any packets in its priority buffer next. Then it will allow best effort traffic to flow. Precedence can be determined by the TOS value assigned in the IPv4 header.
While this is an improvement on FIFO, it does have a major drawback in that it is an all or nothing deal; meaning, low precedence traffic is put at a dead stop until the high priority buffers are emptied. This can cause several major problems. One problem is that the lower priority buffers may fill up while the higher priority buffers are being emptied. Once the lower priority buffers become filled, any additional low priority packets that arrive will be discarded. Another problem is that the lower priority traffic may be delayed so much by the higher priority traffic that the end-to-end delay may become unacceptable to the users. However, PQ does offer a quality of service that is not available with FIFO.
The final router queuing policy we will examine in this lab is WFQ. WFQ takes PQ a step further. Weights are assigned to different precedence levels, effectively assigning slices of bandwidth to different precedence levels of traffic. The higher the precedence value, the bigger the slice of bandwidth. For example, if we were using all eight precedence values of the TOS field (0 thru 7), WFQ would assign weights using the following method:
Each level of precedence would get assigned a weight that is a value of one plus the precedence, so 0 (precedence value) + 1 = 1 (weight value); 1 (precedence value) + 1 = 2 (weight value), and so forth until you have 7 (precedence value) + 1 = 8 (weight value). Now, if you add up all the weights you would have, 1 + 2 + 3 + 4 + 5 + 6 + 7 + 8 = 36. So there are 36 total slices of bandwidth and those slices would be allocated based on your precedence. Thus, precedence 0 would get its assigned weight over the number of slices available, 1/36. Precedence 1 would get its weight value over the slices of bandwidth available, which would be 2/36, and so forth until precedence 7 would get 8/36. This amounts to saying that out of the next 36 bytes transmitted, 8 would be precedence 7, 7 would be precedence 6, and so on until you have precedence 0, which would get 1 byte out of the 36. In this way, it is not an all or nothing proposition. Every precedence value gets some bandwidth, but the higher the precedence, the more bandwidth you get. Some form of WFQ is the most common policy in use today.
In 1998, the IETF redefined Quality of Service in RFC 2475 (An Architecture for Differentiated Services). DiffServ, as it is called, uses six bits of the IP TOS field to define 64 Code Points, 32 of which are defined in the RFC (recommended), with the other 32 for local use.
Only one of the code points is required and that is PHB (Per Hop Behavior) and all routers on the Internet should offer this class of service. In essence, this allows the older purpose of the TOS field to still be useful. It is usually Best-Effort.
Recommended CPs include EF (Expedited Forwarding for low-loss, low-latency traffic), AF (Assured Forwarding) for defining one or more traffic behavior groups, or BE (Best Effort, the default PHB). Exactly how all these are handled is up to the particular DiffServ Domain, a group of routers that implement common, administratively defined DiffServ policies. These usually coincide with the Internet’s Autonomous Systems.
The other primary method for QoS is Integrated Services (IntServ), which specifies a more “fine-grained” QoS system, contrasted with DiffServ's “coarse-grained” control system.
Every router in a system must implement IntServ, and every application that requires some kind of guarantee has to make an individual reservation. A "Flow Specification (FlowSpec)" describes what the reservation is for, while the RSVP protocol is the underlying mechanism to signal across the network. IntServ is usually used for audio and video traffic.
Terminal Course Objective #6
Analyze current VoIP technologies. The analysis will include a differentiation between IP Telephony and VoIP, an evaluation of the requirements for Implementing VoIP architectures, and an analysis of existing infrastructures to qualify VoIP deployment.
Lab Objective #6
Given a business situation, configure, implement, and manage devices in an existing infrastructure to qualify VoIP deployment.

Modus Operandi
Execute the steps as shown. In some instances, you may need to refer to the OPNET documentation to obtain additional information you may need to execute a step, solve a problem, or build the simulation. In other instances, you may need to do some research in your text or in online resources to understand and answer a question.
When you encounter the 3 symbol, a question (this one would be number 3) will be asked. In a separate document headed with your name, the course name, the instructor name, the date, and the name of the lab as below:
DeVry Student
NETW320A, Prof. Jones
11/6/07
Lab #3, Hidden Node
Answer question number 3. Do the same each time you encounter this symbol followed by a number. There may be additional questions at the end of the lab.
When completed, hand in the answers document according to your instructor. Be sure you retain an electronic copy.
The symbol denotes a “note” or a “sidebar” that you should pay attention to.

Procedure
Start OPNET IT Guru
Open the scenario 1. Select File/Open. 2. On your F: drive, locate the NETW320 folder. 3. Choose Lab2_RouterTOS.project folder. 4. Click on Lab2_RouterTOS.prj. 5. Click OK. The project should open. 6. If the current Scenario is not FIFO:
Choose Scenarios > Switch Scenarios > FIFO

Your network should look as follows:

Configuring the Scenario Applications 1. The simulation has already been configured for you but let’s look over how things are set up. Be very careful that you do not, at this point, change anything. 2. We will start with the Application Config node. Right-click on the node and select Edit Attributes from the menu. The following screen will appear.

3. Expand the Application Definitions attribute.

4. Note there are three rows, one for each of the types of application traffic we want to generate. Expand E-mail Traffic and E-mail Traffic > Description to look at the e-mail application. Let your cursor rest on the ellipse (…) in the Values column next to the e-mail entry (Note! If you don’t get the “tool tip” click on the top of the window to make it active).

1. Some of the important things to note here include:
Send Interarrival Time = Constant (90): E-mail will be sent every 90 seconds.
Send Group Size = constant (3): Every time the e-mail is sent it will be sent to three other users on the network.
E-Mail Size = constant (2000): Each e-mail sent will consist of 2000 bytes.
Type of Service = Best Effort (0): For our lab, this setting is the most critical. It lets us know that the 3-bit priority setting of the TOS field in the IPv4 header for all e-mail traffic will be set to 000, which is referred to as Best Effort.

2. Close the E-mail Traffic branch and open the FTP Traffic branch and Description. This time, instead of letting your cursor rest on the ellipse beside FTP, click once on the ellipse and, in the drop-down menu, select edit. This window will appear. This is just a different way of looking (and editing) this information.

3. Some of the important things to note here are as follows:
Command Mix (Get/Total) 50%: The ratio to writing files/reading files will be 50/50.
Inter-Request Time (Seconds) = Constant (30): File transactions will occur every 30 seconds.
File Size (bytes) = constant (25000): Each file will consist of 25000 bytes.
Type of Service = Excellent Effort (3): For our lab, this setting is the most critical. It lets us know that the 3-bit priority setting of the TOS field in the IPv4 header for all FTP traffic will be set to 011, which is referred to as Excellent Effort. 4. Close the FTP Traffic branch and open the VoIP Traffic branch. Again, open the Description and select Voice. Use the Edit method to see the following:

5. Some of the important things to note here are as follows:
Encoder Scheme G.711: Toll quality speech at a coding rate of 64 Kbps. The mean opinion score (MOS), which is a value from 1 to 5 with 5 being the best, for this coder/decoder (CODEC) implementation is 4.3. This is a very high-quality voice encoding scheme, but it requires a lot more bandwidth than other voice encoding schemes, such as G.729 or G.723.1.
Type of Service Interactive Voice (6): For our lab, this setting is the most critical. It lets us know that the 3-bit priority setting of the TOS field in the IPv4 header for all Voice traffic will be set to 101, which is referred to as Interactive Voice. 6. Close the Application Profile Attributes panel.

User Configuration 1. We’ll now take a look at the profiles of the users on the network. Right-click on the Profile Config node and select Edit Attributes. The following screen will appear.

2. Expand the Profile Configuration attribute. Expand Data User to see the configuration for the Data User.

3. Note there are two applications (from the Application Profile) configured for the Data User. Expanding Applications ->Email Traffic, note that the application will start about 5 (sim) seconds after the sim begins and will continue to the end. Expand Repeatability and note the application will repeat about every 300 (sim) seconds, one after the other (Serial) an unlimited number of times.

4. If you like, look at the FTP Traffic application. This is configured a little differently because FTP is characteristically different from e-mail. Close the Data User profile (close Profile Configuration > Data User). 5. Now expand the Profile Configurations > VoIP User. Note much of the configuration is the same.

6. Close the Profile Configuration.

Subnet Configuration 1. Let’s take a look at the subnets. Double-click on the red San Francisco Node subnet. You have now drilled down into the subnet and should see a screen that looks as follows:

2. Right-click on SF_FL!, select “Edit Attributes” and expand the LAN branch.

3. Notice that the number of workstations is set to 10 on SF_FL!. Since San Francisco, Seattle, and San Antonio each have three LANs with 10 users on each, we have a total of 90 Data Users on the entire network. 4. Close this window and right-click on the SF_VoIP workstation and select Edit Attributes. Note this is a single workstation and not a LAN. While perhaps not so true to life, remember that our purpose is to measure the performance of different queue models. A single source of VoIP traffic will suffice to measure this.

5. We are supporting the VoIP User profile. However, there is also an entry under the Applications: Supported Services entry. Expand the Applications entry.

6. Clicking on the ellipse next to Application: Supported Services and selecting Edit from the drop-down indicates that VoIP Traffic is being supported as a service. This is because VoIP is a Peer-to-Peer application, which means each station is both a client AND a server. We have a total of four such devices in our network, one for each of the subnets.

7. Click OK to close the table and OK to close the attribute menu. 8. To return to the main screen, click on the Go to Parent Subnet icon on the tool bar.

The New York Node 1. The New York Node is different from the other subnets because it is the location of the corporate server. 2. By double clicking on it, you will notice that the NY subnet has been built for you and should look as follows:

3. The primary difference here is that the Database Server is configured as a server only. This means that there are Supported Services and no profiles. However, the VoIP workstation is configured the same as the others with both profile and services. 4. Click OK to close the table. To go back to the USA view, click the Go to Parent Subnet icon on the tool bar.

Connecting it Together
All of the main nodes are connected together via a PPP DS-1.
Set Router Queuing Policy 1. We now will set the queuing policy for all routers to FIFO. To do this, click on the IP Cloud. Note that a black circle will appear around the IP Cloud, indicating that it has been selected. 2. From the tool bar, select Protocols > IP > QoS > Configure QoS. 3. The following screen will appear.

4. Make sure it is configured as shown and select OK. The network should appear as below. 5. If you now rest your mouse cursor on a link, it will show you that the links are connected to FIFO buffers. The default color for FIFO configuration is blue. Double-click into any subnet.

6. Go to File -> save, to save your configuration.

Configuring the statistics 1. OPNET can show us a large variety of statistics. We now need to specify to OPNET which ones we desire. Right click on a blank area of the workspace. The option menu will appear. Select Choose Individual DES Statistics. The Choose Results panel will appear.

2. Now expand the Global Statistics and expand and select the following: Expand Select
Email Download Response Time (sec)
FTP Download Response Time (sec) Traffic Received (packets/sec) Traffic Sent (packets/sec)
IP Traffic Dropped (packets/sec)
Voice Packet Delay Variation Packet End-to-End Delay (sec)

3. Click OK to close the Choose Results menu. 4. Go to File > Save, to save your configuration.…...

Similar Documents

Free Essay

Netw320 Lab 5-6

...NETW320 Week 5 and week 6 – Asterisk* Lab Here You can see that the address is set and that the Ports are now active. And I can get a line for 3 seconds Using my windows phone but it doesn’t stay connected. I have now been working on getting tested with Chas from class This is the coding that I used to set up my Config line. I am still working on the configuration setup.This was taken out of the Red Hat Book. John's extensions.conf [general] static=no writeprotect=no autofallthrough=yes clearglobalvars=yes priorityjumping=no [globals] ; Incoming calls to these numbers will be routed to the specified peer. peer-5555551234 = SIP/mango peer-5555554321 = SIP/mangosteen ; Incoming calls to these numbers will be routed to the specified context. context-8775551234 = DISA-in,s,1 ; These names will override whatever is sent as the Caller ID Name for incoming calls. callerid-5555556789 = Joe Blow ; These are the peers outgoing calls may be routed through, in order. If one is unreachable, Asterisk will attempt to use the next one. outgoing-1 = VoIPmsUS3 outgoing-2 = Callcentric ; This is the password for use with DISA. ...

Words: 1252 - Pages: 6

Free Essay

Labs

...POINT LISAS CAMPUS Esperanza Road, Brechin Castle, Couva www.utt.edu.tt LAB 1 Decomposition reaction Aim: Determination of the number of moles of water molecules of crystallization present in hydrated Magnesium Sulphate (MgSO4.xH2O) Apparatus: Mass balance, test tube, test tube holder, heat-proof mat and bunsen burner. Reagents: Hydrated sodium carbonate. Theory: Chemical decomposition, analysis or breakdown is the separation of a chemical compound into elements or simple compounds. A more specific type of decomposition is thermal decomposition or thermolysis, which is caused by heat. ABA+B, the reaction is endothermic, since heat is required to break the chemical bonds. Most decomposition reaction require energy either in the form of heat, light or electricity. Absorption of energy causes the breaking of the bonds present in the reacting substance which decomposes to give the product. When a hydrated salt is heated it decomposes into a pure form of the salt and water. MgSO4.xH2O MgSO4 + H2O Procedure: Refer to Handout Results: A. Mass of test tube/g = 21.77 B. Mass of the tube and salt/g = 24.0 A table showing the mass of the test tube and salt after 3 consecutive heating: Heating | Mass of the test tube and salt/g | 1st | 23.96 | 2nd | 23.81 | 3rd | 23.81 | Calculations: G. Mass of anhydrous magnesium sulphate/g = F - A = 23.81 – 21.77= 2.04 H. Mass of water of crystallization......

Words: 2572 - Pages: 11

Free Essay

Lab 1 Security and Fundamentals Lab

...Lab 1 assessment worksheet 1. Name at least five applications and tools pre-loaded on the windows 2003 server target vm Windows applications loaded start as services y/n Filezilla y Wireshark n Nessus server n Nessus client n N map zen map n Mozilla fire fox n 2. What was the dhcp allocated source ip host address for the student vm, dhcpp server and ip default gateway router? 172.30.0.10 172.30.0.11 172.30.0.1 3. did the targeted ip host respond to the icmp echo-request with an icmp echo-reply packet when you iniated the ping command at your dos prompt? If yes how many icmp echo-request packets were sent back to the ip source? Yes 12 3 host 4.If you ping the windows target 01 vm server and the Ubuntu target 01 vm server which fields in the icmp echo-request/ echo-replies vary? Ttl is 128.64 5. what is the command line syntax for running an intense scan with zen map on a target subnet of 172.30.0.0/24 N map t4 a v pe ps22,25,80 - pa21,23,80,3389, 172.30.0.0/24 6. name at least 5 different scans that may be performed from the zenmap gui and document under what circumstances you......

Words: 369 - Pages: 2

Premium Essay

Netw320

...iLab Grading Rubric Category | Points | Description | Project 4-1: Compute RF Behavior (page 152) 25 points * Step 4 Calculation * Step 11 Calculation * Step 15 Calculation * Step 17 Calculation * Step 19 Calculation * Summary of RF Behavior | 2 2 2 2 2 15 | Calculate each of the five measurements in the project.In your own words, summarize what you have learned concerning RF behavior from your calculations, readings, and research. | Case Project 4-3: MIMO (page 156) 25 points * Introduction * Advantages/Disadvantages * Applications * Future | 55510 | Discuss MIMO antenna technology, including history, advantages, disadvantages, current applications, and future. | Total | 50 | A quality paper will meet or exceed all of the above requirements. | Deliverables IMPORTANT: A report template is provided beginning on the next page, and you must use it to submit your assignment. Before submitting your assignment, delete the pages containing the instruction and rubric. Your submitted assignment should begin with the title page and only contain your report. Don’t forget to place your name, your professor’s name, and the date on the title page. Week 2 iLab Report Francisco Santoya DeVry University NETW360: Wireless Technologies and Services COMPUTE RF BEHAVIOR AND MIMO Submitted to: Professor: Jalinous Date: 9/11/13 Compute RF Behavior Calculate each of the five measurements in the project by performing......

Words: 727 - Pages: 3

Premium Essay

Netw320

...Cedric Clinton NETW320 Professor: Steve Gonzales Lab Report week2 1. On the Results Browser, make sure you are on Current Project so you have both sets of results. Expand DB Query and Select DB Query Response Time (sec). Hit the Show button. Zoom into the last half portion of the graph for better granularity and to avoid start up oscillation time to stabilize. Copy and label this graph to your lab report and answer the following: 1.) Which run has a better (lower) DB Query Response time? The scenario that runs the silence suppression (red line on my lab) has the best DB query response time. 2.) In regard to your answer to part a, approximate how much faster (in seconds or milliseconds) of a response time the better scenario has. The faster scenario that runs silence suppression is approximately 0.2 seconds faster. 2. Expand E-mail and select Download Response Time (sec). Select Show and zoom into the last half portion of the graph for better granularity and to avoid start up oscillation time to stabilize. Copy and label this graph to your lab report and answer the following: 3.) Which run has a better (lower) e-mail Download Response time? The scenario that runs the silence suppression (red line on my lab) has the lower email download response time. 4.) In regard to your answer to part a, approximate how much faster (in seconds or milliseconds) of a response time the better scenario has. The scenario that runs silence suppression is......

Words: 1098 - Pages: 5

Free Essay

Lab Report

...Weekly iLab iLab: Exploring the Microbiology Lab FirstName Tiffani_LastName: Whitehead Section 1 Lab Safety 1. There are four safety equipment items that a lab should have. Identify two of these four items. (2 pts) Biological Safety Cabinet, Eyewash and shower 2. Identify one of the three ways to keep your work area safe. (1 pt) Keep your workspace free of all unnecessary materials 3. There are five recommendations for dressing properly in a lab environment. Name two of these recommendations. (2 pt) Avoid loose fitting items of clothing, Wear appropriate shoes sandals are not allowed. 4. There are several safety tips to protect one’s mucous membranes and broken skin. Identify one of the recommended tips. (1 pt) Do not apply makeup, put in contact lenses, or otherwise perform activities that might introduce lab organisms to your personal space. 5. When working in a microbiology lab, it is important to contain spills and discard materials properly. Describe how a spill should be cleaned up safely in a microbiology lab. (3 pts) 1. Wear a lab coat, disposable gloves, safety glasses or a face shield, and if needed, approved respiratory equipment. 2. Soak a paper towel(s) in an appropriate disinfectant (70% ethanol or fresh 10% bleach solution) and place around the spill area. 3. Working from the outer edges into the center, clean the spill area with fresh towels soaked in the disinfectant. Be sure to decontaminate any areas or surfaces......

Words: 870 - Pages: 4

Free Essay

Netw320 W2

...NETW320 -- Converged Networks with Lab Lab # 2 Title: Silent Suppression – Cont. Procedure Start OPNET Modeler Open the scenario 1. Select File/Open. 2. Select Project. 3. Open your f: drive. (Note: If you don’t see drive F: listed, you click on “My Computer or “Computer” first.) 4. Open your op_models directory. 5. Open your NETW 320 directory. 6. Open the Lab1_Silent.project folder. 7. Click on Lab1_Silent.prj. 8. Click OK. The project should open. 9. Choose Scenarios > Switch to Scenario > Silent_Suppression. Results analysis 1. We are now ready to look at the results. From the tool bar, select DES > Results > View Results. 2. The Results Browser will appear. You may have to expand the items in the top left panel and click on them to get Global Statistics to appear in the bottom left panel. 3. Expand Global Statistics and select the following (4) statistics: Expand Select DB Query Response Time (sec) HTTP Page Response Time (sec) E-mail Download Response Time (sec) Voice Packet End-to-End Delay (sec) 4. You can adjust the size of the panels as you wish by hovering the cursor over the panel border until it changes to the adjust line cursor, and then hold the left mouse button to set the panel size. 5. Change the view from As Is to Time Average using the dropdown menu on the lower right-hand side. Remember, your results may not be exactly the same but they should be very similar. 6. Click Show. A graph similar...

Words: 1759 - Pages: 8

Free Essay

Lab Step

...Hands-On Steps Note: This lab contains detailed lab procedures which you should follow as written. Frequently performed tasks are explained in the Common Lab Tasks document on the vWorkstation desktop. You should review these tasks before starting the lab. 1. From the vWorkstation desktop, open the Common Lab Tasks file. If desired, use the File Transfer button to transfer the file to your local computer and print a copy for your reference. Figure 1 "Student Landing" workstation 2. On your local computer, create the lab deliverable files. 3. Review the Lab Assessment Worksheet at the end of this lab. You will find answers to these questions as you proceed through the lab steps. Part 1: Capture Network Traffic using TCPdump utility Note: In the next steps, you will use TCPdump, a command line utility, to capture network traffic on the TargetLinux01 virtual server. You will generate that traffic by exploiting a cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) tool. In the lab environment, you will be capturing traffic on one interface. In a real-world situation, it is likely the machine would be straddling both an internal network and an external network. In that case, you would want to want to monitor both sides of the interface. Monitoring outside network traffic allows information systems security practitioners to see who and what is attempting to infiltrate your IP network. Monitoring internal traffic allows network analysts to see......

Words: 3168 - Pages: 13

Premium Essay

Netw202 W3 Lab

...Introduction Assignment Gain skills required for the practical portion of the CCENT certification: The steps of the lab are contained in the Sample Solution. This particular lab does not require Cisco hardware to complete. Conditions You will find that the lab is most effective if you use it as a guide and work out your calculations on a separate sheet of paper. You can then check your work by clicking on the Hint button found in each step. Notes After taking a vLab for the first time using the Sample Solution, try the Suggested Approach link for a challenge. You've got a number of tools available on the left bar of the main page to aid you in your lab. Here are brief notes on each. Diagram Task Index Task 1 – Computing Usable Subnets and Hosts Task 1 – Computing Usable Subnets and Hosts Step 1: You are given the Class C network address: 192.168.89.0. From this network, if you needed to create 2 subnets, how many bits would need to be borrowed at a minimum? Action: Count on your fingers to work out how many bits need to be borrowed to create 2 subnets. Explanation: You can use this simple trick to determine the number of bits needed. Hold out your hand and counting on your fingers from left to right, the first finger equals 2, the second finger is double that (4), the third finger is doubled again (8), and so on. As an example, let’s say you needed 10 subnets. Count on your fingers until you reach the first number that is equal to or exceeds the value 10. Going......

Words: 3485 - Pages: 14

Premium Essay

Lab 1 Binary Conversion Lab

...Gian Ciannavei Lab 2: Number Conversion Lab Task 1: Below is an example that shows how to turn the decimal number ‘125’ into a binary number. 125/2=62 R1 62/2=31 R0 31/2=15 R1 15/2=7 R1 7/2=3 R1 3/2=1 R1 2/1=1 R1 Binary number = 1111101 Task 2: Add correlating weights together to gain decimal value from binary number. 1-2-4-8-16-32-64< Weights 1-1-1-1-1-0-1<Bits 64+32+16+8+4+1=125 Task 3 on next page Gian Ciannavei; Lab 2 Task 3: Below is an example on how to turn the decimal ‘210’ into a hexadecimal using the division by 16 methods. 210/16=13 R2 13 (lsd) 2 (msd) 16-1 <weights 13-2 <Digits=D2 Next is an example of how to turn a hexadecimal into a decimal, in this case, back to ‘210’. 16*13=208 1*2=2 2+208=210 Note: You can also convert the decimal number into binary and turn the binary number into a hexadecimal. 210/2=105 R0 105/2= 52 R1 52/2=26 R0 26/2=13 R0 13/2=6 R1 6/2=3 R0 3/2=1 R1 ½=1 R1 210=11010010 1101=13 0010=2 13(LSD) 2(MSD) =D2 Task 4: Convert hexadecimal number E7 into a decimal. 14(LSD) 7(MSD) =E7 14*16=224 7*1=7 224+7=231 Gian Ciannavei; Lab2 Convert hexadecimal E7 into binary, and then back to decimal to check answers. 14(LSD) 7(MSD) =E7 14*16=224 7*1=7 224+7=231 231/2=115 R1 115/2=57 R1 57/2=28 R1 28/2=14 R0 14/2=7 R0 7/2=3 R1 3/2=1 R1 ½=1 R1 Binary = 11100111...

Words: 317 - Pages: 2

Free Essay

Labs

...Tissues The Integumentary System 35 43 The Cell: Transport Mechanisms and Permeability–Wet Lab Classification of Covering and Lining Membranes 49 Overview of the Skeleton: Classification and Structure of Bones and Cartilages 53 The Axial Skeleton The Fetal Skeleton 59 67 81 87 93 103 77 The Appendicular Skeleton Articulations and Body Movements Microscopic Anatomy and Organization of Skeletal Muscle Gross Anatomy of the Muscular System Histology of Nervous Tissue 113 119 125 Exercise 16A Skeletal Muscle Physiology: Frogs and Human Subjects Exercise 18A Neurophysiology of Nerve Impulses: Wet Lab Gross Anatomy of the Brain and Cranial Nerves Electroencephalography Human Reflex Physiology General Sensation 153 157 167 177 173 Special Senses: Vision 133 Spinal Cord, Spinal Nerves, and the Autonomic Nervous System 145 137 Special Senses: Hearing and Equilibrium Special Senses: Olfaction and Taste Functional Anatomy of the Endocrine Glands iii Exercise 28A Role of Thyroid Hormone, Pituitary Hormone, Insulin, and Epinephrine: Wet Lab 183 Exercise 29A Blood Exercise 30 Exercise 31 Exercise 32 189 199 205 209 Anatomy of the Heart Conduction System of the Heart and Electrocardiography Anatomy of Blood Vessels Exercise 33A Human Cardiovascular Physiology: Blood Pressure and Pulse Determinations 217 Exercise 34A Frog Cardiovascular Physiology: Wet Lab Exercise 36 Exercise 38 Exercise 40 Exercise 42 Exercise 43 Exercise 44 Exercise 45 Exercise......

Words: 120457 - Pages: 482

Premium Essay

Netw320-Course Project

...Course Project (80 points) QoS Design and Implementation 1. Objectives As a network engineer working for a Service Provider, design and implement QoS on a converged network. For this project it is assumed that the converged network offers triple play services and has the following traffic: VOIP, High Definition TV (HDTV), Video on Demand (VOD) and Internet. Note 1: The project is based on the experience acquired by the students in the previous labs, hence the main sources to complete the project are the labs of previous weeks, so it is important that the students review the lab instructions of the labs that have already been completed. Note 2: The students will have access to the same lab equipment of Skillsoft as the previous weeks. The students will need to access the iLab to complete the project. 2. Project Requirements Part A: Design In this part the student should provide the QoS design. A1. It is assumed that the traffic sources for HDTV, VOD, VOIP and Internet are connected to switch NYCORE1 to four different ports. The following are the requirements: (10 points) * Assign a switch port to each type of traffic. * Assign a COS to each type of traffic. The COS marking has 8 classes, from 0 to 7, assuming 0 is the lowest priority and 7 is the highest. Decide which class each traffic should have, based on the importance of the traffic. * Provide your answers in the form of the table below: Traffic Type | Switch Port Number | COS | VOIP |...

Words: 1330 - Pages: 6

Free Essay

Labs

...Sonia Graham Normal Lab Values   | REFERENCE RANGE | SI REFERENCE INTERVALS | BLOOD, PLASMA, SERUM | | | Alanine aminotransferase (ALT) | 8-20 U/L | 8-20 U/L | Amylase, serum | 25-125 U/L | 25-125 U/L | Aspartate aminotransferase (AST) | 8-20 U/L | 8-20 U/L | Bilirubin, serum (adult) Total // Direct | 0.1-1.0 mg/dL // 0.0-0.3 mg/dL | 2-17 µ mol/L // 0-5 µ mol/L | Calcium, serum (Total) | 8.4-10.2 mg/dL | 2.1-2.8 mmol/L | Cholesterol, serum | < 200 mg/dL | < 5.2 mmol/L | Cortisol, serum | 0800 h: 5-23 µ g/dL // 1600 h: 3-15 µ g/dL | 138-635 nmol/L // 82-413 nmol/L | | 2000 h: ≤ 50% of 0800 h | Fraction of 0800 h: ≤ 0.50 | Creatine kinase, serum (at 30 ° C) ambulatory | Male: 25-90 U/L | 25-90 U/L | | Female: 10-70 U/L | 10-70 U/L | Creatinine, serum | 0.6-1.2 mg/dL | 53-106 µ mol/L | Electrolytes, serum | Sodium | 135-145 mEq/L | 136-145 mmol/L | Chloride | 95-105 mEq/L | 95-105 mmol/L | Potassium | 3.5-5.0 mEq/L | 3.5-5.0 mmol/L | Bicarbonate | 22-28 mEq/L | 22-28 mmol/L | Magnesium | 1.5-2.0 mEq/L | 1.5-2.0 mmol/L | Gases, arterial blood (room air) | pH | 7.35-7.45 | [H + ] 36-44 nmol/L | PCO 2 | 33-45 mm Hg | 4.4-5.9 kPa | PO 2 | 75-105 mm Hg | 10.0-14.0 kPa | Glucose, serum | Fasting: 70-110 mg/dL | 3.8-6.1 mmol / L | | 2-h postprandial: < 120 mg/dL | < 6.6 mmol/L | Growth hormone - arginine stimulation | Fasting: < 5 ng/mL | < 5 µ g/L | | provocative stimuli: 7 ng/mL | > 7 µ g/L | Immunoglobulins, serum |...

Words: 635 - Pages: 3

Free Essay

Labs

...© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones Bartlett Lab #2© Jones &SALE ORLearning, LLC Vulnerabilities to &SALE ORLearning, LL AligningBartlett DISTRIBUTION Risks, Threats, and NOT FOR DISTRIBUT NOT FOR COBIT P09 Risk Management Controls © Jones & Bartlett Learning, LLC Introduction © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, © Jones & Bartlett Learning, LLC first released in 1996.Jones & Bartlett Learning, LLC © ISACA is an IT professionals’ association centered on auditing and IT governance. This NOT FOR SALE OR DISTRIBUTION The lab lab will focus on the COBIT framework. NOT FOR SALE OR DISTRIBUTION uses the latest two versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which is the latest version released in June 2012. Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to © Jones & Bartlett Presentation is done making use of a © Jones & Bartlett Learning, LL present handling of risk management. Learning, LLC set of COBIT......

Words: 2487 - Pages: 10

Free Essay

Itt Lab 7 Lab Doc

...© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION Lab #7 - Assessment Worksheet Using Encryption to Enhance Confidentiality and Integrity Course Name and Number: _____________________________________________________ john schenberger Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you learned how cryptography tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. You used Kleopatra, the certificate management component of GPG4Win, to generate both a public and private key as both a sender and a receiver. You used the sender’s keys to encrypt a file, sent it to the receiver, and decrypted it using the receiver’s copy of the keys. Lab Assessment Questions & Answers 1. If you and another person want to encrypt messages, should you provide that person with your public key, private key, or both? The public key is the only key that I will share with another person as part of the handshake in order of the encryption take place. 2. What does Kleopatra allow you to do once it is installed? Kleopatra allow you to encrypted messages, files and text with a private key. 3. What key type was used to create the certificate on Kleopatra? What other types of encryption key......

Words: 285 - Pages: 2