answersLogoWhite

0

Ya ,use ipx or appletalk

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

How devices are identified while connecting bluetooth?

After device to connect bluetooth, device will scan the bluetooth address, this address is a unique, device identification is mainly done by address!


How do you get my mac to connect to the internet when there is no wifi?

Connecting to the Internet is usually done through a modem/router. If these do not provide a wireless network then it will need to be wired usually by connecting an Ethernet cable between the router and the computer.


Connecting multiple routers on a network in a home environment?

It can be done, just as it might be in a corporate environment. They would be on different networks in your house, if that is what you want.


What server presents its own IP address to the Internet and does not allow outside computers to know the IP addresses of computers inside the network?

This process is done by NAT - Network Address Translation. It is a service that may be run on any server.


Do you need a router if you buy a printer with built innetworking?

You need some sort of device that will assign the printer an IP address. This is normally done with a router. Without an IP address you will not be able to find your printer on the wireless network. The router has the primary IP address and then it breaks it down and assigns private address to the other components. The router automatically assigns all hardware on the wireless network with an IP address using the Dynamic Host Protocol (DHCP). This way you do not have to mess with it and your system seems like it has only one IP address and you can hook up as many devices as you want on the network with paying your Internet Service Provider more money.


How do you change a MAC address of a PC?

This cannot be done, the MAC address is set in the hardware at the factory to a unique value that no other network device has anywhere in the world and cannot be changed.


How do you determine what bits to use to calculate the network address?

An IP address comes in two formats: ipV4 and ipV6. In IpV4 32 bits are allocated to the IP address. In IpV6, 128 bits are allocated to the address. This is done by the protocol and is a standard for developing an IP address.


Can you saw other computers in wireless network?

Yes you can see other computers in a wireless network, each device has it's own unique MAC-address which describes to the computer what type of device is connected to the network. Using the 'Network' feature on the computer gives the person a graphical view of who is connected to the Network, this can be done by going to: Start, 'Network'.


Can you hack into your own computer?

Hacking your own laptop is being done by downloading and installing prorat tool of trojan horse..!! After installing it at the specific time when you are involved in the internet, give your ip address at the specific place where needed.Then consequently it will provide a network connecting your laptop to your own laptop.Now using some basic command you can do whatever you want in your laptop without knowing about it to the user....!!


Can users share a public ip address?

Yes, this is done routinely, in part because of the scarcity of public IP (version 4) addresses.To achieve this, the users within a network use private IP addresses, in one of the ranges recommended by RFC 1918 - for example, any address that has "10" in the first byte.A NAT device will do the address translation on the border between the internal and the external network. The result is that equipment on the outside of our company's network will only see the single public IP address.Yes, this is done routinely, in part because of the scarcity of public IP (version 4) addresses.To achieve this, the users within a network use private IP addresses, in one of the ranges recommended by RFC 1918 - for example, any address that has "10" in the first byte.A NAT device will do the address translation on the border between the internal and the external network. The result is that equipment on the outside of our company's network will only see the single public IP address.Yes, this is done routinely, in part because of the scarcity of public IP (version 4) addresses.To achieve this, the users within a network use private IP addresses, in one of the ranges recommended by RFC 1918 - for example, any address that has "10" in the first byte.A NAT device will do the address translation on the border between the internal and the external network. The result is that equipment on the outside of our company's network will only see the single public IP address.Yes, this is done routinely, in part because of the scarcity of public IP (version 4) addresses.To achieve this, the users within a network use private IP addresses, in one of the ranges recommended by RFC 1918 - for example, any address that has "10" in the first byte.A NAT device will do the address translation on the border between the internal and the external network. The result is that equipment on the outside of our company's network will only see the single public IP address.


How mapping is done between cache memory and main memory?

Its simply done. By connecting many lines :p


What is the function of a wireless bridge?

Wireless bridging is the technique of connecting two wireless access points together. This can be done to extend the range of a wireless network, or to create a wireless bridge between two or more wired networks, perhaps in separate buildings.