answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What is Tribal flood network?

The Tribe Flood Network or TFN is a set of computer programs to conduct various DDoS attacks such as ICMP flood, SYN flood, UDP flood and Smurf attack.

Tribal Flood Network (TFN), like trinoo, is a classic DDoS attack, using a master program and multiple agents on multiple compromised systems.

Unlike trinoo it can spoof the source IP for the agents, and can generate multiple types of attack (including UDP flood, TCP SYN flood, ICMP echo request flood, and ICMP directed broadcast).

TFN2K is a more sophisticated version of the original TFN.

What is open and close architecture?

An open architecture in computers/technology is one in which the details are published and are known. Anyone can contribute to the technology because it has been well described.

A closed architecture is the opposite. Sometimes we call these proprietary architectures because little is know about them except by the creators, and they aren't telling ...

Why is the internal network card disabled when DELL latitude D830 is undocked?

I've seen it in several DELL Latitude series D laptops, that the ethernet NIC (Network Interface Card) at some point stops working when the laptop is used solo, and works fine when it's inserted in a DELL docking station / port replicator.

...are, that when docked, the network connection is fine. When the computer is used standalone (doesn't matter if hot-undocked, or just booted up standalone, with power supply connected or on battery), the corresponding Local Area Connection in Windows becomes set to "disabled", and the network card in the Hardware Manager is visible as red crossed-out. Trying to enable the connection fails, re-enabling the network card fails as well.

The network card in Latitude D-series is power-managed, so initial thoughts were that this is power management gone bananas problem. However, it's not exactly...

...is the way DELL notebooks treat the internal network card and the network outlet on the dock/port replicator. They try to make the "external" (dock) network card sort of an extension of the built-in one, with the same MAC address etc.

In short, the outcome is such, that when you install or update drivers for this network card when docked, the driver seems to make some incorrect assumptions and the only working state is the docked state.

is not very complicated, provided that you have administrative rights to your system.

1) Boot the computer undocked (standalone).

2) Go to the Hardware Manager (via Right-click on My Computer->Properties->Hardware tab, or via Start->Settings->System)

3) Go to Network Adapters

4) Locate the Broadcom NetXtreme... (or similarly named) network card - usually it will have it's icon crossed out in red. In some cases might need to choose "show hidden devices" to see it.

5) Right click on it and choose Uninstall, confirm uninstalling the card from system.

6) Go to Settings->Control Panel->Add New Hardware

7) System should search for a moment and automatically find the network card, install the same drivers it had before (but this time properly)

8) You can reboot and see that your network card is functioning standalone. You can also dock the laptop and see, that it works docked as well. And the best part - when you undock again - the card will still work! :)

In the future, if you want to install some updated network drivers on this Latitude, remember to install them when the machine is used standalone, without dock/port replicator.

Good luck!

What is redundency in computer networks?

Redundancy in computer networks has to do with the back up systems that have been designed to avoid loss of information should a server, or shared network, go down. Often this includes scheduled backup "saves" onto a set of disks that are rotated daily, weekly, or monthly. This enables companies to repair the issue and reload yesterday's work (for example) and not have to do the work again.

Which networking device is used for LAN segmentation?

that would be a managed switch which you can then create vlans within the switch

you would also need a router if all the segments would be on a different network

How do you uninstall client server for netware in a Microsoft XP?

If you are asking about IPX/SPX Novell protocol, you uninstall the protocol attached to the network device (NIC) by going to the Network settings, finding the adaptor, and removing the protocol.

How do you print client's address on labels?

It is usually done by whatever program holds the address information. It can also be done through mail merge in some word processing programs.

How many network and host bits are in a slash 16 network?

Assuming IP version 4 (the current standard), a complete IP address has 32 bits. /16 means that the first 16 bits specify the network; the remaining bits (also 16 in this case - calculated as 32 minus 16) specify the host.

Assuming IP version 4 (the current standard), a complete IP address has 32 bits. /16 means that the first 16 bits specify the network; the remaining bits (also 16 in this case - calculated as 32 minus 16) specify the host.

Assuming IP version 4 (the current standard), a complete IP address has 32 bits. /16 means that the first 16 bits specify the network; the remaining bits (also 16 in this case - calculated as 32 minus 16) specify the host.

Assuming IP version 4 (the current standard), a complete IP address has 32 bits. /16 means that the first 16 bits specify the network; the remaining bits (also 16 in this case - calculated as 32 minus 16) specify the host.

Spreading network resource administration among server and nonserver members of a network?

"Peer-to-peer networking focuses on spreading network resource

administration among server and nonserver members of a network."

page 16 of Hands-On MS Windows Server 2008

Can someone trace your history on a home network if you have a separate computer?

Yes it is possible. Everything you send or transmit over a local network could potentially be viewed on another computer on that same network. You are able to download and install network sniffers such are WireShark and this will analyse the data being sent over the local network. You would need some basic knowledge of networks to interpret the data you are seeing but if there are only 2 computers on the network this is quite simple.

If the transmitions are encrypted for example if you are making a payment on a secure website this should be safe and details such are your card number would not be possible to get.

What is message payload?

From an application/service perspective the message payload is a combination of the Body and Attachments.

Select the statements that are correct concerning network protocols?

*define the structure of layer specific PDU'sdictate how to accomplish layer functions*outline the functions necessary for communications between layerslimit hardware compatibility*require layer dependent encapsulationseliminate standardization among vendors

If two computers are on same lan so which is needed to communicate them IP DNS or MAC address and why?

If they are both Windows computers, and they are connected to the internet, then they may not see each other unless they are part of the same Workgroup or Domain. Your computer is assigned an IP address by your router when it starts up. Domains are only used at businesses and other organizations with many computers, Workgroups are used on small LANs without a domain controller. In either case, you only need the Names of the computers for them to connect to each other, and you can browse for other devices in the same Workgroup or Domain. They both run the TCP-IP networking protocol, and they both use DNS to find other computers on the internet. The MAC address is a unique number of every network device and is the fundamental way they all communicate with each other. It is like your MAC (physical) address compares to your IP Address (e.g. a phone number), but you don't need to worry about it as it is automatically configured for you.

What can be done when one computer cannot login?

You have to explain the situation a bit more. Are you on a workgroup or a domain? Is it the computer cant get on, or is it the user cant get on? Are you sure that your computer can 'see' the network? Are there any error messages? What OS is on the computer? Was it previously getting on, or is it a new computer?

no we use the computer for home use but u cant login to anything and the computer wont pull up hardly anything it says something about the fire wall we don't know what to do about this

How switch works if you connect one of its ports to a hub?

That shouldn't cause any problem, other than increasing the number of collisions on the segment of the domain that is on the hub, which slows down the network for those computers (especially if they are both being used at once). -DJ Craig

How to Tackle Latency problems between client and server located far apart?

  1. The latency between client and server can tackled by the following ways:

    1. we can break the client code for smaller request and replies. So when a part of data is received by the client, it can start working on that till the next part comes.

    2. client can run multiple sessions with server and data obtained can be added at the client end.

    3. the client can use the time between request and reply for other processes.

Is a VLAN essentially a collision domain?

No- A VLAN is a single broadcast domain. If the VLAN uses a hub, which essentially connects all devices on a single wire, the the VlAN would be a collision domain. However hubs are rarely seen these days. A network switch keeps every device separated on individual collision domains so every device is kept from colliding with any other device.

Your IP address looks like this 000.000.0.00 so how do you change it into 000.000.000.000?

You don't need to worry about changing any of the octets when the values of an octet contain leading zeros. The two examples are effectively the same.

Where a computer would be situated to set up a LAN?

You need at least two devices connected by some type of media to create a LAN. Most LANs would have a distance limitation of not more than 100 meters apart. Other than that, the computer could be placed anywhere within that distance to the other device to create the LAN.