What operating system and edition do the computers

Assignment Help Computer Engineering
Reference no: EM133218598

Question: You will be setting up a small office/home office (SOHO) network in the classroom. You will need the following for your group: Two laptop computers Two network cables One SOHO router Perform the following steps once your group has all of the equipment: Plug the power jack into the router, and then plug the outlet into the power strip in the room.

Connect one laptop to one of the Ethernet ports on the router marked 1 through 4. Connect the other laptop to one of the Ethernet ports on the router marked 1 through 4. Make sure you didn't plug the computers into the port marked WAN or Internet on the router. Verify the lights on the network ports of the computers and router are lit and/or blinking.

Let your instructor know if they aren't. Open the Network and Sharing Center on each computer to verify it has detected the new network. You can find the link in the Settings app after you then select the Network & Internet category. You can also right click the network connection in the task notification area (bottom right) and select Open Network & Internet Settings for a shortcut. If it doesn't, you may need to return to the Network and Sharing Center, select Change advanced sharing settings from the left menu, and then verify Turn on network discovery and Turn on file and printer sharing are both selected for the Private and Guest or Public networks.

Please let your instructor know if you are prompted for a password on the desktop computer. Open File Explorer and look in the navigation pane. You should see the other computer connected to the SOHO router listed there. After setting up your network, answer these questions as a group in a Word document. Only one group member needs to submit the document, but make sure each person's first and last name are on it. What is the physical topology of this network?

What operating system and edition do the computers in this classroom run? Is the operating system used in the classroom considered to be a network operating system (NOS)? What network model is being used on this lab? How might you be able to tell if a computer is part of a client-server or peer-to-peer network model?

Hint: You can find this information through the Settings app in Windows. If you shared a folder from one computer to the other, would it change the network model being used? What layer of the OSI model does file sharing work at? If you open the command prompt on both computers and type in ipconfig /all, does the computer have an IP address? If so, what is it? What layer of the OSI model do IP addresses exist at? What layer of the OSI model is responsible for the lights on the network interfaces of the computers and router?

Reference no: EM133218598

Questions Cloud

Discuss the importance of employee security : Discuss the importance of employee security awareness training. What innovative ways should company's implement security training? Please provide examples
Write a bash shell script named numbers : Write a bash shell script named numbers.sh to display the numbers 3 to 8. You must use a "for loop" in your solution
What types of storage media do they utilize : Find at least 2 examples of tiered storage devices on the internet. Try to write a summary that includes information about the device such as what types
Create list variable that contains all the square : Create list variable that contains all the square numbers in the range 0 to 9 in the first element, in the range 10 to 19 in the second element
What operating system and edition do the computers : What operating system and edition do the computers in this classroom run? Is the operating system used in the classroom considered to be a network operating
Research paper that talks about big data security : Research paper that talks about BIG Data Security and why it is important today, talk about usage, advantages, disadvantaged and future trends in BIG Data
Explanation of the reading intervention strategy identified : Explanation of the reading intervention strategy identified. Why differentiation is important when you are implementing intervention strategies
Calculates the theoretical field capacity : Calculates the theoretical field capacity of the combine? If we assumed the field efficiency of the combine is 80 percent, what is the effective field
Identify a grade level appropriate work of literature : Reading Strategy Differentiation Essay - For each strategy, identify a grade level appropriate work of literature that supports the targeted skill

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd