What do logical topologies describe?
A logical topology shows how a network is configured logically rather than physically. The main difference is that you could have 10 routers, 25 switches, and 5,000 computers in a logical topology and it doesn't matter where they are on the screen, it matters how they are connected to one another.
What are two functions of the network command used when configuring routing protocols?
READ you're ccna cisco routing book.
Which osi model layer provides information necessary to direct data between the two networks?
The Network Layer ---- now Florida carrer college I.T Students stop cheating and go study lol
*Host A will get a result of 172.16.224.0 from the AND process.
Host A will send on to the media a broadcast frame that contains the packet.
*Host A will broadcast an ARP request for the MAC of the host 172.16.231.78.
Host A will change the destination IP of the packet to 172.16.224.1 and forward the packet.
Host A will encapsulate the packet in a frame with a destination MAC that is the MAC address associated with 172.16.224.1.
Can you get to the internet if DHCP is down?
Yes, you can. Connect your computer to the modem.
Or, you can configure your NIC card with a static address and not depend (temporarily) on DHCP. Just be careful, because choosing a static address can be duplicated elsewhere on a network.
Which topology is the best for accounting?
If money are involved you better have a reliable network. For accounting I would recommend hybrid type of network. The best combination is mesh + star. It will provide you redundancy as well as it will not be as expensive and complicated as pure mesh.
Will layer 3 switches route packets between devices on different subnets?
Yes.
Most switches (which operate at layer 2) will NOT route packets between different subnets. However special layer 3 switches DO have this capability.
What is the difference between block cipher and stream cipher?
Stream cipher is one that encrypts a digital data stream one bit or one byte at a time
Block cipher is one in which a block of plaintext is treated as a whole n used to produce a ciphertext block of equal length
hmmmmmmm got it!!!
Check firewall settings if you have one. The files to look for are system.exe and svhost.exe. Are sure that you have internet through wireless interface? If you do, you have nothing to worry about. If you do not, make sure that you the pass phrase for the wireless connections (many routers have it), also make sure that your mac address is not on the black list in the wireless router settings.
What makes a network 'traversable'?
In order for a network to be transversable, it either needs to have all of the vertices even, or just 2 odd vertices
There is no direct mapping of E1 to DS3. The only way to connect the two is using an MPLS network.
A DS3 is 45Mbps. An E1 is 2Mbps. The bandwidth of 22.5 E1's can traverse a DS3.
In order to directly connect an E1 as would a T1 to a DS3 you would need an E3
An E3 is 34 Mbps and 16 E1's could connect to it.
A domain is an example of what type of logical network topology?
Domain is client-server logical topology.
Can what you download off a peer 2 peer network be tracked?
Yes it can. It will show the IP of the uploader and IP of the downloader.
Extranet
What are the main functions of icmp?
Internet Control Message Protocol (ICMP), documented in RFC 792, is a required protocol tightly integrated with IP. ICMP messages, delivered in IP packets, are used for out-of-band messages related to network operation or mis-operation. Of course, since ICMP uses IP, ICMP packet delivery is unreliable, so hosts can't count on receiving ICMP packets for any network problem. Some of ICMP's functions are to: * Announce network errors, such as a host or entire portion of the network being unreachable, due to some type of failure. A TCP or UDP packet directed at a port number with no receiver attached is also reported via ICMP. * Announce network congestion. When a router begins buffering too many packets, due to an inability to transmit them as fast as they are being received, it will generate ICMP Source Quenchmessages. Directed at the sender, these messages should cause the rate of packet transmission to be slowed. Of course, generating too many Source Quench messages would cause even more network congestion, so they are used sparingly. * Assist Troubleshooting. ICMP supports an Echo function, which just sends a packet on a round--trip between two hosts. Ping, a common network management tool, is based on this feature. Ping will transmit a series of packets, measuring average round--trip times and computing loss percentages. * Announce Timeouts. If an IP packet's TTL field drops to zero, the router discarding the packet will often generate an ICMP packet announcing this fact. TraceRoute is a tool which maps network routes by sending packets with small TTL values and watching the ICMP timeout announcements.
By far the most common use of icmp is ping.
In the ring topology what happens if one of the stations is unplugged?
Theoretically, in a ring topology, unplugging one station, interrupts the ring. However, most ring networks use a mechanism that bypasses the station; the ring can continue its operation.
connectionless protocols
Internet Control Message Protocol reports on the success or failure of data delivery?
Yes
ICMP (Internet Control Message Protocol) is a Network layer protocol that reports on the success or failure of data delivery.
IMCP announces these transmission failures to the sender, but IMCP cannot correct any of the errors it detects; those functions are left to higher layer protocols, such as TCP. (Dean,2010 Network+ Guide to Networks 5th ed p145)
AH and ESP protocol works on security in network layer?
The AH (Authentication Header) protocol and the ESP (Encapsulating Security Payload) protocol both function within the network layer. They are part of the IPSec (Internet Protocol Security) standard.