answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

Ethernet FDDI and Token Ring communication protocols have one common characteristic what is it?

They both help a network run efficiently by preventing collisions. Ethernet uses Carrier Sense, Multiple Access with Collision Detection (CSMA/CD). Carrier Sense - when a device connected to an Ethernet network wants to send data it first checks to make sure it has a carrier on which to send its data.

Multiple Access - this means that all machines on the network are free to use the network whenever they like as long as no one else is transmitting

Collision Detection - a means of ensuring that when two machines start to transmit data simultaneously, that the resultant corrupted data is discarded, and re-transmissions are generated at differing time intervals. Token Ring never has collisions because the information (packets) only travel in one direction, and all the nodes on the network communicate so that they know when information is being passed on, each node communicates via a token. They both help a network run efficiently by preventing collisions. Ethernet uses Carrier Sense, Multiple Access with Collision Detection (CSMA/CD). Carrier Sense - when a device connected to an Ethernet network wants to send data it first checks to make sure it has a carrier on which to send its data.

Multiple Access - this means that all machines on the network are free to use the network whenever they like as long as no one else is transmitting

Collision Detection - a means of ensuring that when two machines start to transmit data simultaneously, that the resultant corrupted data is discarded, and re-transmissions are generated at differing time intervals. Token Ring never has collisions because the information (packets) only travel in one direction, and all the nodes on the network communicate so that they know when information is being passed on, each node communicates via a token.

What is difference between internet and intranet?

An Internet is a public network that anyone could use or have access to. An Intranet is a private network which requires a VPN connection (usually) and a valid user-name and password (or other authentication). An intranet is usually a company website only employees can access

How do you avoid data buffer overflow in transport layer?

There is a special bit signaling if the buffer is full. If the buffer is full the bit signals "BUSY" as result transmission stops until the bit changes to "READY" and transmission resumes.

What may be the subnet mask of 192.168.2.1?

if the ip address is 192.168.2.1 then the subnet mask should be 255.255.255.0

What is the difference between a host and a workstation?

host or server is same. the server provide the service to the end user or client.

like engineered programming.

What factors account the success and popularity of TCP IP?

  • Integrated Addressing System: TCP/IP includes within it (as part of the Internet Protocol, primarily) a system for identifying and addressing devices on both small and large networks. The addressing system is designed to allow devices to be addressed regardless of the lower-level details of how each constituent network is constructed. Over time, the mechanisms for addressing in TCP/IP have improved, to meet the needs of growing networks, especially the Internet. The addressing system also includes a centralized administration capability for the Internet, to ensure that each device has a unique address.
  • Design For Routing: Unlike some network-layer protocols, TCP/IP is specifically designed to facilitate the routing of information over a network of arbitrary complexity. In fact, TCP/IP is conceptually concerned more with the connection of networks, than with the connection of devices. TCP/IP routers enable data to be delivered between devices on different networks by moving it one step at a time from one network to the next. A number of support protocols are also included in TCP/IP to allow routers to exchange critical information and manage the efficient flow of information from one network to another.
  • Underlying Network Independence: TCP/IP operates primarily at layers three and above, and includes provisions to allow it to function on almost any lower-layer technology, including LANs, wireless LANs and WANs of various sorts. This flexibility means that one can mix and match a variety of different underlying networks and connect them all using TCP/IP.
  • Scalability: One of the most amazing characteristics of TCP/IP is how scalable its protocols have proven to be. Over the decades it has proven its mettle as the Internet has grown from a small network with just a few machines to a huge internetwork with millions of hosts. While some changes have been required periodically to support this growth, these changes have taken place as part of the TCP/IP development process, and the core of TCP/IP is basically the same as it was 25 years ago.
  • Open Standards and Development Process: The TCP/IP standards are not proprietary, but open standards freely available to the public. Furthermore, the process used to develop TCP/IP standards is also completely open. TCP/IP standards and protocols are developed and modified using the unique, democratic "RFC" process, with all interested parties invited to participate. This ensures that anyone with an interest in the TCP/IP protocols is given a chance to provide input into their development, and also ensures the world-wide acceptance of the protocol suite.
  • Universality: Everyone uses TCP/IP because everyone uses it!

This last point is, perhaps ironically, arguably the most important. Not only is TCP/IP the "underlying language of the Internet", it is also used in most private networks today. Even former "competitors" to TCP/IP such as NetWare now use TCP/IP to carry traffic. The Internet continues to grow, and so do the capabilities and functions of TCP/IP. Preparation for the future continues, with the move to the new IP version 6 protocol in its early stages. It is likely that TCP/IP will remain a big part of internetworking for the foreseeable future.

What have you learned from some of the jobs you have held?

To answer this question make sure you focus on jobs that are similar to the one you are applying to. Your response should be direct and succinct.

Is a default gateway required if you want to communicate on the LAN by IP addresses only?

A default gateway entry is only needed if the two computers are on different subnets. This is true whether you use IP addresses or have some sort of name resolution. The default gateway points to a router that routes packets between subnets.

For instance:

Computer 1 - 201.13.16.99, subnet mask 255.255.0.0

Computer 2 - 199.27.12.43, subnet mask 255.255.0.0

These two computers are on different subnets, and would require a router AND a default gateway entry pointing to that router to communicate.

Computer 1 - 192.168.2.100, subnet mask 255.255.255.0

Computer 2 - 192.168.2.67, subnet mask 255.255.255.0

These two computers are on the same subnet, and will be able to communicate as long as they have a physical ethernet connection between the two. No default gateway entry or router is needed.

The default gateway IP is never used by the TCP/IP stack unless a connection outside the local subnet is needed.

Note that this has nothing to do with whether you use IP's or netbios names resolved by a WINS server or DNS names resolved by a DNS server. All these schemes eventually resolve down to an IP (and then to a MAC address for the actual communication) so the above still applies.

Which address in a network cannot be assigned to hosts?

The general rule in networking is that the network id cannot be all zeroes or all ones, and the host id cannot be all zeroes or all ones.

The all zero address results in a reserved address meaning "this network".

The all ones address is a broadcast address, and cannot be assigned to a single system.

What does the transport layer use?

In a standard networking protocol stack, the transport layer provides reliable transfer, fragmentation and de-fragmentation (when necessary), error detection and (within limits) recovery. Being located between the network layer (3) and the session layer (5) within the OSI network model, the transport layer uses services of both adjacent layers to facilitate uplink and downlink of the respective protocol data units.

Many networking protocols do not strictly follow the OSI networking model, and may thus employ a different interpretation of transport layer.

How do you install the Panasonic dy- wl10 wireless LAN adaptor?

The Panasonic DY-WL10 wireless LAN adaptor is made primarily for VIERA HDTVs and Blu-ray Disc Players. Plug in via USB and it will automatically install.

Why does your computer get the same ip address from different routers?

IP addresses are assigned by DHCP servers, not by routers. DHCP servers will cache your IP address and reassign the same IP until the cache is cleared.

----

What is the main purpose of telnet?

Telnet provides not encrypted connectivity to servers and workstations through terminal type of connection. It uses command-line type.

What is telnet programm?

A telnet program is essentialy a remote terminal application, used to connect to a remote computer and interact with it in text mode (command line) only. It operates over a TCP/IP network, and uses TCP port 23.

The telnet conversation is completely open, not encrypted in any way, starting from the logon (username/password entry), and therefore should be avoided on untrusted networks, where it can be easily sniffed ("overheard" by anybody that analyzes the network traffic).

A secure alternative to telnet is called ssh (secure shell).

SONET Specifies framing and multicomplexing at the physical layer?

(True) SONET Specifies framing and multicomplexing at the physical layer of the OSI model.