answersLogoWhite

0

📱

Computer Networking

Computer networks are collections of computers which are connected together in order to communicate and transfer information. Questions about computer networks, networking protocols, and how to set them up belong here.

500 Questions

How are computers physically connected in a network?

User Avatar

Asked by Wiki User

Computers in a network are physically connected through network cables such as Ethernet cables or fiber optic cables. These cables are plugged into network switches or routers which help to route data between the connected devices. Wireless networks use radio waves to connect devices without the need for physical cables.

How long is the oui portion of a mac address?

User Avatar

Asked by Wiki User

The Institute of Electrical and Electronics Engineers (IEEE) designated by the International Standards Organization (ISO) as the registering body for OUI, which is utilized in the first 3 octets of a MAC address to identify the manufacturer of a network enabled device.

What are the hardware requirement for mobile computing?

User Avatar

Asked by Wiki User

Mobile computing requires a device with a processor (CPU), memory (RAM), storage (internal or external), display (screen), battery, and wireless connectivity (Wi-Fi, cellular). Additionally, sensors like accelerometers and GPS are important for enhanced functionality. The specific hardware requirements can vary based on the type of mobile device and intended use.

A computer sends packet transport layer to another computerthere is no process with destination port address running at destination computerwhat will happend?

User Avatar

Asked by Wiki User

The destination computer will likely send back an ICMP Destination Unreachable message to inform the source computer that there is no process listening on the specified port. The source computer can then take appropriate action based on this response, such as notifying the user or terminating the connection attempt.

Cut-through switches can detect corrupt packets?

User Avatar

Asked by Wiki User

Cut-through switches cannot detect corrupt packets as they do not perform error checking before forwarding the packets. They simply read the packet header and quickly forward the packet to the destination without performing any packet integrity checks. This means that corrupted packets may potentially be forwarded without detection.

What is IP prefix?

User Avatar

Asked by Wiki User

an IP address is represented as A.B.C.D /n, where "/n" is called the IP prefix or network prefix. The IP prefix identifies the number of significant bits used to identify a network. For example, 192.9.205.22 /18 means, the first 18 bits are used to represent the network and the remaining 14 bits are used to identify hosts.

What is the meaning of VPN server?

User Avatar

Asked by Srinivasa09

A VPN server is the piece of hardware or software acting as the gateway into an entire network or just a single computer. In most scenarios it is always on and listening for VPN clients to connect to it and authenticate. Pramod Shaw Integrated Retail

What are the types of networking protocols?

User Avatar

Asked by Wiki User

look up the tcp/ip set of protocols

Ndis allows any number of adapters to be bound to any number of transport protocols?

User Avatar

Asked by Wiki User

ndis defines parameters for loading more than one protocol on a network adapter

Which network protocol uses port 21?

User Avatar

Asked by Wiki User

The network protocol that uses port 21 is FTP (File Transfer Protocol). FTP is commonly used for transferring files between a client and a server on a computer network. Port 21 is specifically designated for FTP control connections. When a user initiates an FTP connection, the client connects to the server's port 21 to establish communication for sending and receiving files. It is important to note that FTP operates in two modes: active mode and passive mode, each using different ports for data transfer.

What osi model layer are used in Format and code conversion services?

User Avatar

Asked by Wiki User

Format and code conversion services typically operate at the presentation layer of the OSI (Open Systems Interconnection) model.

The presentation layer is the sixth layer in the OSI model and is responsible for ensuring that data exchanged between systems is in a format that both the sender and the receiver can understand. This layer is concerned with data translation, encryption, decryption, compression, and other transformations to ensure compatibility between different systems.

Format and code conversion services at the presentation layer may involve:

1. Data Encryption/Decryption: Encrypting data for secure transmission and decrypting it at the receiving end to ensure confidentiality and integrity.

2. Data Compression/Decompression: Compressing data to reduce transmission overhead and decompressing it at the receiving end to restore the original data.

3. Character Encoding/Decoding: Converting characters from one character encoding scheme to another, such as ASCII to Unicode or UTF-8, to ensure compatibility between systems using different character sets.

4. Data Translation: Converting data between different formats or representations, such as converting between text and binary formats, or between different file formats.

5. Protocol Conversion: Translating data between different network protocols to enable communication between systems using different protocols.

Overall, the presentation layer plays a crucial role in ensuring interoperability and compatibility between heterogeneous systems by handling format and code conversion services.

Ip address is a hardware or software or code or a program?

User Avatar

Asked by Wiki User

An IP (Internet Protocol) address is not hardware, software, code, or a program in itself. Instead, it is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

Here's a breakdown of what an IP address represents:

1. Numerical Identifier: An IP address serves as a numerical identifier for devices (such as computers, smartphones, routers, etc.) within a network. It allows devices to locate and communicate with each other across the internet or local network.

2. Network Layer Protocol: IP addresses are associated with the Internet Protocol (IP), which operates at the network layer (Layer 3) of the OSI (Open Systems Interconnection) model. The IP protocol is responsible for routing data packets between devices on a network.

3. Two Main Versions: There are two main versions of IP addresses currently in use: IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6). IPv4 addresses are 32-bit numerical addresses expressed in dotted-decimal format (e.g., 192.168.0.1), while IPv6 addresses are 128-bit hexadecimal addresses (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

4. Dynamic or Static: IP addresses can be assigned dynamically (automatically assigned by a DHCP server when a device connects to a network) or statically (manually assigned and configured for specific devices).

5. Essential for Network Communication: IP addresses play a crucial role in facilitating communication between devices on the internet or within a local network. They are used by routers and other networking devices to route data packets to their intended destinations.

While an IP address itself is not hardware, software, code, or a program, it is an essential component of network communication and is used by various hardware and software components to enable connectivity and data exchange within computer networks.

The metaphorical meaning of drops of Jupiter?

User Avatar

Asked by Wiki User

"Drops of Jupiter" is a song by Train that uses the metaphor of "Drops of Jupiter" to symbolize the experiences and emotions of a person returning home after being away. It suggests that like drops of Jupiter in the song, the person has gained wisdom and insight from their journey.

Disadvantages of sonet?

User Avatar

Asked by Wiki User

Some disadvantages of SONET include high cost of implementation, complexity in network planning and management, and limited flexibility to accommodate newer technologies and increased bandwidth requirements. Additionally, SONET can be difficult to scale and may not be cost-effective for smaller networks.

Describe how it architecture and it infrastructure are interrelated?

User Avatar

Asked by Wiki User

IT architecture refers to the high-level structure and design of an organization's IT systems, while IT infrastructure includes the hardware, software, networks, and facilities that support these systems. The IT architecture guides the design and layout of the IT infrastructure to ensure that it meets the organization's needs and goals effectively. In other words, IT infrastructure is the physical implementation of the IT architecture.

How many public IP addresses are needed for a small network?

User Avatar

Asked by Wiki User

Here are a few scenarios:

Single Device: If you have a very small network consisting of only one device that needs to communicate with the internet, such as a home computer or a small office server, then only one public IP address is typically needed.

Small LAN (Local Area Network): For a small LAN with multiple devices but minimal external connectivity requirements, such as a home network with several computers, smartphones, and smart devices, a single public IP address can be used with NAT to allow all devices to access the internet through the router's single public IP address.

Multiple Servers or Services: If your small network includes multiple servers or services that need to be accessible directly from the internet (such as web servers, email servers, or remote access services), you may need additional public IP addresses to assign to each server/service. However, it's also common to use port forwarding and/or reverse proxy setups to route traffic to these services using a single public IP address.

VPN (Virtual Private Network): If your small network requires VPN access for remote users or branch offices, you may need additional public IP addresses to support VPN connections, depending on the VPN configuration and requirements.

Advantages of communication media?

User Avatar

Asked by Wiki User

Communication media such as email, video conferencing, and social media allow for quick and convenient communication over long distances. They also enable the sharing of multimedia content like images and videos, increasing the engagement and effectiveness of communication. Additionally, communication media can be easily archived and referenced, making it easier to track and monitor conversations.

What is protocol of Ellestad?

User Avatar

Asked by Wiki User

The Ellestad protocol is a stress test used to assess a patient's cardiovascular fitness levels. It involves gradually increasing the treadmill speed and incline while monitoring the patient's heart rate, blood pressure, and symptoms. The test helps to evaluate the functional capacity of the heart and detect any abnormalities.

What do headers do?

User Avatar

Asked by Wiki User

Headers provide information about the content of a document, such as titles, author names, and publication dates. They help organize and structure the document, making it easier to navigate and understand. In digital documents, headers can also be used for search engine optimization and accessibility purposes.

A great advantage of a VPN is that it provides communications over networks?

User Avatar

Asked by Wiki User

A great advantage of a VPN is that it provides ____________ communications over _____________ networks.

How does vpn connection differ from using remote desktop?

User Avatar

Asked by Wiki User

VPN is like being connected on a network .. remote connection you actually


control the computer.

What does a SonicWall global VPN client do?

User Avatar

Asked by Wiki User

The SonicWall VPN client is a hardware based networking device that connects the client with a desired VPN server to build a virtual private network for transferring data over a so called secure VPN-tunnel.

Where vpn used?

User Avatar

Asked by Wiki User

A vpn is used anywhere that information must be protected because it is confidential.

An example of a VPN is when you connect to your work email inbox from a laptop or a PDA decice acrooss the internet.

How is a checkpoint VPN used by someone?

User Avatar

Asked by Wiki User

A checkpoint VPN is used by first subscribing to the product through the Check Point website. Once this is done, you will have to use the software available on the website to connect to the VPN.