answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

Couldn't open any SMTP servers 127.0.0.1 at port 25?

SMTP is the outgoing mail server protocol required to send your email messages from your email account to another. If you are going to configure your email account on any client, you will need to know the provider's email settings. The Hostgator SMTP settings only work for outgoing messages. The incoming protocols are POP and IMAP that are responsible for receiving email messages. The steps to configure your Hostgator email account using SMTP settings in Mozilla Thunderbird are given below.

Step : 1 Launch the Thunderbird application and go to the Tools menu. Select Accounts Settings.

Step : 2 Now, click the Account Actions option and select Add Mail Account.

Step : 3 When prompted for confirmation, click Continue.

Step : 4 Type your Hostgator email address and name. Click Continue.

Step : 5 Select the Manual Configuration option.

Step : 6 Choose either IMAP or POP as your account type.

Step : 7 Enter the incoming server credentials correctly to configure your Hostgator email account.

What is a perspective networks can be classified as PAN LAN NAN MAN or WAN.?

what is a short-range wireless network technology that is designed to make its own connections between electronic devices, without wires, cables, or any direct action from a user.

What is Novell Manage wise?

Novell ManageWise was a network managerment product from the 1990s.

What is unique about network IP addresses?

An IP address must be unique within a LAN; the combination of the network and host portion must present a number that is not duplicated anywhere else in the network. Outside of a LAN the IP addresses do not have to be unique, except that the network id portion can only be used by the organization that owns the IP network address. The host portion does not need to be unique across all LANs within an enterprise network.

Can people in your network see the websites you visit from their computers is it safe to look up a birthday present health problem or something seedier without fear your flatmates can see?

If you mean people you share the network with, the answer is yes. They can see what you are doing if they have proper software for that. The only way you can protect yourself is to use proxy server, or another kind of encrypted connection.

What are two crahteristic peer to peer network?

A peer-to-peer network has no centralized server; any computer on the network can share files or a printer. It is typically used for smaller networks - up to 10 computers or so.

When configuring a switch to use SSH for virtual terminal connections what is the purpose of the crypto key generate rsa command?

This is a fundamental part of public key cryptography. In order to make an encrypted connection, you need a public and private key (a keypair). You hand out a public key to devices who want to speak SSH to you which they can use to encrypt a message. Only your private key can decrypt it. Event endpoint which speaks SSH needs to have a unique public/private keypair in order to ensure that sites cannot decrypt each other's data.

So, before you can run SSH for the first time, you need to generate a keypair. That is what the command does. RSA is one of the most popuplar algorithms to generate a public-private keypair.

Is switch network device?

Yes, switch as well as hub and router are network devices.

What is TCP?

TCP/IP: Transmission Control Protocol(TCP) and Internet Protocol (IP) .

TCP -> As the name suggests it transfers the data from one system to the other IP -> It takes the data in Packets form and delivers them to the specified destination through the IP address provided (to the specified node).

Annapurna.

IP is essentially the data being sent with a nametag that is the destination.

TCP makes sure the IP data arrives intact. If not it will resend the data.

http://www.yale.edu/pclt/COMM/TCPIP.HTM

  1. IP - is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world.
  2. TCP - is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received.

In creating a home network do you need a WAN connection?

I am pretty sure that a WAN connection would not be needed for a home network. A WAN is a Wide-Area Network. A WAN would be used to connect to your business computer from home. A LAN is a Local-Area Network. It should be sufficient if the network is simply for sharing files or printers, etc.

Network evaluation worksheet for hands on project 2-1?

for the filename for each abstract when that document was last update. what was the revision date of the most recent standard beginning with 802.3? what do you suppose this standard would be updated frequently?

Find out another pc's subnet mask?

If the other PC is on the same LAN segment then it will have the same subnet mask as yours. A subnet mask is the same for all subnets within a network so that will be the same as well. For other networks it isn't important to know what their subnet is. You could always ask the other user to find out that information if you needed to know.

How many disks can be used for RAID 1?

The total no. of disks that are required to make RAID 1 is 3