Networking Chapter 1 Other Times Its Best Limit The Amount Data Captured Initially Every Situation

subject Type Homework Help
subject Pages 3
subject Words 1512
subject Authors Ed Tittel, James Pyles, Jeffrey L. Carrell

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 1 Solutions
Answers to Review Questions
2. d
4. d
6. c
8. False
10. a, b, c, d
12. a, c, d
14. b
16. c, d
18. b
20. c
22. a, b, c, d, e
Hands-on Projects Discussion
Hands-On Project 1-1
In this project, the students install the Wireshark protocol analyzer software on their computer for use throughout
the course. It’s important to make sure that the software installs properly.
Hands-On Project 1-2
In this project, the students explore the capabilities of the protocol analyzer. First, they perform basic protocol
analyzer tasks, such as capturing basic packet traffic and observing basic display and analysis capabilities on the
Hands-On Project 1-3
In this project, students learn to perform basic tasks that are absolutely necessary to understanding how to use a
protocol analyzer on the job (or at least, on a real network). In this project, students select a protocol filter to learn
page-pf2
Hands-On Project 1-4
In this project, students learn how to create a display filter. A display filter reduces the amount of information that
Wireshark displays from a trace file. This is helpful when a student wants to view only specific traffic captured in
Hands-On Project 1-5
In this project, students examine the contents of captured packets, as decoded and displayed by the protocol
analyzer software. This gives students their first looks into the precise data structures and organizations that
ultimately define what TCP/IP is and how it works. Students build on this foundation, and learn how to read more
into such decodes throughout the rest of this course.
Case Projects Discussion
Case Project 1
The correct answer to this question is “at the hub.” On a hub-based network, such as the one described in this Case
Project, all network traffic must transit through the hub as it’s transmitted by any single machine, and then
forwarded to all other machines. Because the hub is the center of this particular networking environment, it’s the
best place to attach the protocol analyzer. Modern networks are more likely to use switches, and to require use of
Case Project 2
The best arguments for switching to IPv6 (or for supporting dual-stack environments where IPv4 and IPv6 coexist)
include the following factors: improved security, a larger and more flexible address space, and more room to grow
in the future. IPv6 includes numerous enhancements that boost its security across the board as compared to IPv4,
Case Project 3
One obvious method is to check the protocols list in a protocol analyzer that’s set up to run for a day or longer on
the network during normal load and activity conditions. Even if administrators do not capture much data, the
page-pf3
Guide to TCP/IP: IPv6 and IPv4, Fifth Edition
ISBN 978-1-305-94695-8
Case Project 4
Excessive errors on a network render what would ordinarily be usable bandwidth completely unusable. Thus,
overall effective utilization of the network usually decreases, even as measured utilization of the network may
actually increase. Because errors still consume bandwidth, even though they’re not communicating anything
useful, they are considered “bandwidth stealers” that should be located and corrected as soon as possible. For that
Case Project 5
1. Requests for Comments (RFCs) were established in 1969 as a series of notes or memos intended to be an
informal fast distribution way to share ideas with other network researchers.
2. RFCs were originally informal notes or memos printed on paper and distributed to network researchers as a

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.