Week 1 part 1
The name of the business that we choose is AT&T. AT&T provides voice, video, data,
and Internet telecommunications and professional services to businesses, consumers,
and government agencies. AT&T was est
SOHO - D-Link Wireless AC3200 Tri Band Gigabit Cloud Router
MED BUISNESS - Linksys EA9200 AC3200 Tri-Band Smart Wi-Fi Router
SMALL BUSINESS - Cisco Systems Cisco RV110W Wireless router
SMALL BUSINESS - C
COMPARE AND CONTRAST LAYER 3SWITCHES/ROUTERS
Advantage of Router:
a) Router limits the collision domain.
b) Router can function on LAN & WAN>
c) Router can connect different media & architectures.
d) Router can determi
Lab Assessment Questions & Answers
1. Most remote configuration and administration uses the _ protocol?
Remote configuration and administration uses Secure Sell Protocol
2. SSH stands for?
Stand for secure sell
3. The File Transfer Protocol (FTP) uses w
Commercial transactions conducted electronically on the Internet.
Delivery Difficulties: Real-time order notification so that when an o
ISL- Isl is a cisco system protocol that maintains VLAN information in Ethernet frames. It
maintain flows between switches and routers or switches and switches.
STACKWISE- Cisco stackwise allows IT personal to t
UNIT 9 ASSIGNMENT: VLSM REDESIGN
Variable Length Subnet Mask, abbreviated as VLSM, is a means to specify a different subnet mask for the
same network number on different subnets.
Classless sub netting gives you more hosts and Classfu
IS3120 NETWORK COMMUNICATION INFRASTRUCTURE
There are six different ways that IPv6 is more efficient than IPv4, it has multiple other
uses but these are the most popular ones. The first one is that it is more efficient routing; IPv6
June 22nd, 2015
Unit 2 Assignment 2: Evolution of Ethernet
1. What impact will the continued evolution of the Ethernet standard have on data
storage requirements, assuming capacity continues to follow the same pattern of
UNIT 4 ASSIGNMENT 1
Unnecessary Services from a Saved Vulnerability Scan
Nmap/Zenmap is an application that allows a user to scan their network to see what
ports and other services are open for use. Network security uses Nmap/Zenmap t
BY ERROL BENJAMIN
Variable Length Subnet Mask
Is a means to specify a different subnet mask for the
same network number on different subnet
In VLSM Subnetting, we do subnetting of subnets
according the network requirement
WHAT IS 802.11X?
802.11x refers to a group of evolving wireless local area network (WLAN) standards that are under
development as elements of the IEEE 802.11 family of specifications, but that ha
ADVANTAGES OF IPV6 AND CONS OF IPV6
1. Efficient Routing- IPv6 reduces the size of routing tables and makes routing more efficient.
2. Efficient Packet Processing- IPv6's simplified packet header makes packe
1) TCP stands for?
a) Transmission Control Protocol
2) UDP stands for?
a) User Datagram Protocol
3) The File Transport Protocol (FTP) uses which transport protocol, TCP or UDP?
4) The PING diagnostic
[Street Address], [City, ST ZIP Code]
[Summarize your professional background and education, as relevant to this position]
[Get any text formatting you see in this document with ju