answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What are the similarities between OSI model and TCP IP model?

SIMILARITIES

The main similarities between the two models include the following:

They share similar architecture. - Both of the models share a similar architecture. This can be illustrated by the fact that both of them are constructed with layers.

They share a common application layer.- Both of the models share a common "application layer". However in practice this layer includes different services depending upon each model.

Both models have comparable transport and network layers.- This can be illustrated by the fact that whatever functions are performed between the presentation and network layer of the OSI model similar functions are performed at the Transport layer of the TCP/IP model.

Knowledge of both models is required by networking professionals.- According to article obtained from the internet networking professionals "need to know both models". (Source:

Both models assume that packets are switched.- Basically this means that individual packets may take differing paths in order to reach the same destination.

How do you access server in client machine?

the server will run in a specific port ,by sending request to that port in a specific format we can access the server for accessing the server one must know it's IP address and port in which it is running

Full form of smps?

it is used to supply power to motherboard and other peripherals

What is internet card and network card?

An internet card is something that allows you to surf the World Wide Web (www)

A network card is a local piece of equipment that allows you to connect to other computers on the network.

Which network topology least secure?

Token Ring. Nothing can communicate without the token, therefore there is never more than one device transmitting at a time, but it's very inefficient.

If you want the most efficient Ethernet topology, Full Mesh would be the most efficient traffic-wise, but not cost-effective. A Hierarchical topology would be a decent compromise between cost effectiveness and efficiency.

How does a crossover cable connect two routers?

It connects the pins that are used for transmitting on one router to the pins that are used for receiving on the other router.

The difference between wire less LAN and wire lan?

A wired LAN uses wires to connect the computers but a wireless LAN uses radio waves.

What is meant by Dialog Control at Session layer?

Dialog Control is the main function of Session layer.

Session layer manages dialogs between two computers and it is responsible for communication or conversation.

There are three forms of dialog.

1. Simplex dialogs : one way transfers, for example.. computer to printer ( computer will send data to printer and printer will receive the data ).

2. Half-Duplex Dialogs - Two-way transfers, Each device must take their turn. Both cannot transfer at the same time. for example..walkies-talkie

3. Full-Duplex Dialogs - Two-way simultaneous data transfers. Each device has it's own channel. for example.. telephone.

Problems that you encountered setting up a LAN network?

Some of the problems encountered in a Local Area Network include data insecurity and incompatibility of components/nodes. This depends on how the LAN is set up.

What are the common uses of ftp and http today?

FTP is File Transfer Protocol. This is used for, say, if you have Norton (I use this reference a-lot for those of you who read my posts) and you want to upgrade, some people make a mistake and install over the old version. NEVER A GOOD IDEA! This can, and USUALLY WILL cause a software conflict. In this case, your software could be rendered useless. So, you would contact customer support. The easiest way is to "Chat With Technical Support". If they feel they can help you, they may ask you permission to access your computer. With the ability to access your computer, they can control your mouse, run programs, remove, and install. FTP allows you to open a specified port (usually mandated by the manufacturer) to allow access to your PC to fix this. Another use for FTP is for Online Gaming that use account's. With FTP, you are able to kick people with vulgar language, being racist, or breaking any other rule in the T&C's.

HTTP is "Hypertext Transfer Protocol" which is the directory that servers use to send information to your computer that you request.

If you are running Windows XP, you can click "Start", and open "My Documents". This view is called Windows Explorer, not to be confused with Internet Explorer. If you look at the top of the Explorer windows, just like in a web browser, you will notice something like "C://admin/my documents/music/goo goo dolls/song1.aiff" This is called a directory, it points to the location of a file.

If you are running Windows Server 2008 (or any other earlier version for that matter), the directories will begin with http:// instead of C://. C:// is the C drive (usually your main HDD) where as the http:// points to a directory within the servers of the web.

http is NOT to be confused with .htm, .html., xml, or .xhml which are file EXTENSIONS, and not DIRECTORIES.

How can two switches be connected?

Traditionally, two switches can be connected together with a crossover cable.

A crossover cable should be used whenever two of the same network devices need to be connected together. e.g. Connecting a router to another router, a switch to another switch or a PC to another PC.

Using a crossover cable is not always necessary however. Most new network devices include a feature named Auto-MDIX (Medium Dependant Interface Crossover). Auto-MDIX detects what type of cable is connected and automatically changes its own configuration to enable data transmission to the other device. i.e. It does not matter if you use a straight through cable or crossover cable on Auto-MDIX enabled devices. Both will work.

What are advantages and disadvantages of combining the session presentation application layer in the osi model into one single application layer in internet?

by combing these layers the functionality is performed by a

single layer and overhead is reduced.The disadvantage is

more functions need to be performed by single layer

A class B network has subnet mask of 255.255.230.0 What is the maximum no of hosts per subnet?

Let's break this into binary first:

11111111 11111111 11110000 00000000

For a class b network, there are 16 bits available (the right 16 numbers). We see that 4 of those have been borrowed already (they have 1's) so we have 12 left.

The formula to find the maximum number of hosts is 212 - 2 (the 12 comes from the number above).

So, the answer is 4096.

----------------------------------------------------------------------------------------------------------------

Great binary breakdown explanation!!!

However you forgot to subtract 2 decimals to fully apply the formula.

(1 Network address, and 1 Broadcast range).

So the correct answer is 4094

How many layer of tcp ip?

The TCP/IP model was adopted and condensed into 4 Layers.

1. Link layer ( Layer 1and 2 of the OSI model)
2. Internet Layer (Layer 3 of the OSI model)
3. Transport ( Layer 4, 5 and 6 of the OSI model)
4. Application ( Layer 7 of the OSI model)

http://en.wikipedia.org/wiki/TCP/IP_model#Link_Layer

AUI port on a router connects to what networking protocol?

Ethernet AUI

AUI cables have a D-type 15 pin connector. Pin assignments are as follows:Pin 1Control In circuit ShieldPin 2Control In circuit APin 3Data Out circuit APin 4Data In circuit ShieldPin 5Data In circuit APin 6Voltage CommonPin 9Control In circuit BPin 10Data Out circuit BPin 11Data Out circuit ShieldPin 12Data In circuit BPin 13Voltage PlusPin 14Voltage ShieldPins 7, 8 and 15 are not used.

What is Dora process in DHCP and how it works?

1) Client makes a UDP Broadcast to the server with a DHCPDiscover, or Discover packet.

2) DHCP offers to the client.

The server sends a DHCPOffer including other configuration parameters (DHCP Options) for the client per the servers configuration file

3) In response to the offer Client requests the server.

The client replies DHCPRequest, unicast to the server, requesting the offered address.

4)The server sends DHCPAck acknowledging the request which is the clients final permission to take the address as offered. Before sending the ack the server double checks that the offered address is still available, that the parameters match the clients request and (if so) marks the address taken.

A good reference for DHCP information is Droms and Lemon "The DHCP Handbook". BoydK