answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What do logical topologies describe?

A logical topology shows how a network is configured logically rather than physically. The main difference is that you could have 10 routers, 25 switches, and 5,000 computers in a logical topology and it doesn't matter where they are on the screen, it matters how they are connected to one another.

Host A has an IP address of 172.16.225.93 a mask of 255.255.248.0 and a default gateway of 172.16.224.1. Host A needs to send a packet to a new host whose IP is 172.16.231.78. What two things occur?

*Host A will get a result of 172.16.224.0 from the AND process.

Host A will send on to the media a broadcast frame that contains the packet.

*Host A will broadcast an ARP request for the MAC of the host 172.16.231.78.

Host A will change the destination IP of the packet to 172.16.224.1 and forward the packet.

Host A will encapsulate the packet in a frame with a destination MAC that is the MAC address associated with 172.16.224.1.

Can you get to the internet if DHCP is down?

Yes, you can. Connect your computer to the modem.

Or, you can configure your NIC card with a static address and not depend (temporarily) on DHCP. Just be careful, because choosing a static address can be duplicated elsewhere on a network.

Which topology is the best for accounting?

If money are involved you better have a reliable network. For accounting I would recommend hybrid type of network. The best combination is mesh + star. It will provide you redundancy as well as it will not be as expensive and complicated as pure mesh.

Will layer 3 switches route packets between devices on different subnets?

Yes.

Most switches (which operate at layer 2) will NOT route packets between different subnets. However special layer 3 switches DO have this capability.

What is the difference between block cipher and stream cipher?

Stream cipher is one that encrypts a digital data stream one bit or one byte at a time

Block cipher is one in which a block of plaintext is treated as a whole n used to produce a ciphertext block of equal length

hmmmmmmm got it!!!

Have internet with Ethernet but not wireless have error message limited or no connection you get the message even when you have internet have tried many things and getting tired of trying not sure wha?

Check firewall settings if you have one. The files to look for are system.exe and svhost.exe. Are sure that you have internet through wireless interface? If you do, you have nothing to worry about. If you do not, make sure that you the pass phrase for the wireless connections (many routers have it), also make sure that your mac address is not on the black list in the wireless router settings.

What makes a network 'traversable'?

In order for a network to be transversable, it either needs to have all of the vertices even, or just 2 odd vertices

How many E1 go into a T3?

There is no direct mapping of E1 to DS3. The only way to connect the two is using an MPLS network.

A DS3 is 45Mbps. An E1 is 2Mbps. The bandwidth of 22.5 E1's can traverse a DS3.

In order to directly connect an E1 as would a T1 to a DS3 you would need an E3

An E3 is 34 Mbps and 16 E1's could connect to it.

What are the main functions of icmp?

Internet Control Message Protocol (ICMP), documented in RFC 792, is a required protocol tightly integrated with IP. ICMP messages, delivered in IP packets, are used for out-of-band messages related to network operation or mis-operation. Of course, since ICMP uses IP, ICMP packet delivery is unreliable, so hosts can't count on receiving ICMP packets for any network problem. Some of ICMP's functions are to: * Announce network errors, such as a host or entire portion of the network being unreachable, due to some type of failure. A TCP or UDP packet directed at a port number with no receiver attached is also reported via ICMP. * Announce network congestion. When a router begins buffering too many packets, due to an inability to transmit them as fast as they are being received, it will generate ICMP Source Quenchmessages. Directed at the sender, these messages should cause the rate of packet transmission to be slowed. Of course, generating too many Source Quench messages would cause even more network congestion, so they are used sparingly. * Assist Troubleshooting. ICMP supports an Echo function, which just sends a packet on a round--trip between two hosts. Ping, a common network management tool, is based on this feature. Ping will transmit a series of packets, measuring average round--trip times and computing loss percentages. * Announce Timeouts. If an IP packet's TTL field drops to zero, the router discarding the packet will often generate an ICMP packet announcing this fact. TraceRoute is a tool which maps network routes by sending packets with small TTL values and watching the ICMP timeout announcements.

By far the most common use of icmp is ping.

In the ring topology what happens if one of the stations is unplugged?

Theoretically, in a ring topology, unplugging one station, interrupts the ring. However, most ring networks use a mechanism that bypasses the station; the ring can continue its operation.

Internet Control Message Protocol reports on the success or failure of data delivery?

Yes

ICMP (Internet Control Message Protocol) is a Network layer protocol that reports on the success or failure of data delivery.

IMCP announces these transmission failures to the sender, but IMCP cannot correct any of the errors it detects; those functions are left to higher layer protocols, such as TCP. (Dean,2010 Network+ Guide to Networks 5th ed p145)

AH and ESP protocol works on security in network layer?

The AH (Authentication Header) protocol and the ESP (Encapsulating Security Payload) protocol both function within the network layer. They are part of the IPSec (Internet Protocol Security) standard.