answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

How do you find a subnet mask for a network printer?

It should be the same as the subnet mask for your PC. To check go to My network places, right click open properties, right click on local area connection and open properties, click on tcp/ip and then click on properties. You should now be looking at your ip config for your PC subnet mask and default gateway should be the same on the printer as on your PC. Or you can open a command prompt Start-run-type in cmd than type in "ipconfig" (no "")

What are the advantages of single chain communication network?

It can be used to transmit important messages from the top of an organisation to the lower levels.

What is one important consideration when using network scanning technologies?

The most important consideration in network scanning is that you have the permission of the owners to do that (in writing), and that it is a part of your job description. Without those, you can't do any scanning.

Blank layer services facilitate communication between software applications and lower layer network services so that the network can interpret an applications request and in turn the?

The Application Layer is responsible for interfacing a user network request from an application via an API (application Program Interface) with the network stack.

This allows an application to not have to know anything about how to do network functionality; it can merely request the network software to do something without worrying about the details.

Why does IP TCP and UDP discard a packet that arrives with a checksum error without notifying the sender?

UDP protocol.

-----------------------------------

Well my version of answer is:

In the case of IP and UDP, these are unreliable protocols that do not guarantee delivery, so they do not notify the source. TCP does guarantee delivery. However, the technique that is used is a timeout. If the source does not receive an acknowledgment to data within a given period of time, the source retransmits.

In which situation would it be most desirable to use a connectionless Transport layer protocol?

When it's not necessary to have reliable delivery of data or you application is responsible for integrity of data. UDP is used for such things like DHCP, DNS (not for zone transfers) and so on.

What do users typically access a network through LAN?

Network shares (typically music/video), networked "LAN: games, remote into other computers on the LAN.

What type of network has the computers connected to a hub in the center?

A center connectivity device means a star topology is being used. If it is a managed hub such as a MAU or MSAU unit, then it is a token ring network.

WHAT IS contention based media?

Hi,

Contention based media is legacy Ethernet, when the use of hubs was the best way in those environments first there were a lot of collisions.

Thanks

Why is network layer associated with IP addressing?

The network layer uses IP addresses to determine whether or not to route a packet from one network to another. Since an IP address has two parts, the network id and the host/client id, this makes it a natural fit (IP addressing) for the network layer.

Describe why an application developer might choose to run an application over udp rather than tcp?

UDP is a transport protocol that does not check for errors. One would use it when speed of the transport is desired, not quality or reliability. If you were streaming video or using voice, then getting the packets to the destination quickly is more important than making sure each sound gets to the receiver.

How does a client notify a server that an ASCII data transfer is requested?

Packet 23 is a request from the client to start the data packet transfer from the server. The text STOR text.txt signifies this.

Short name for remembering the osi model layers?

There are several mnemonics you can use:

Please Do not Throw Sausage Pizza Away

or

All People Seem To Need Data Processing

And there are some others ...

Can You can share your PIN with a co-worker if they require network access?

You could share it, but it is probably against company policy (security) to do so.

IP subnet masks allows for up to 30 hosts per subnet?

255.255.255.224 will select a network of 32 IP addresses, with the lowest reserved as the network identifier, and the highest as the broadcast address, leaving 30 usable host IP addresses.

Do Cat 6 cables require special RJ45 jacks or do you use the same ones as for Cat 5?

They are the same ones.

Cat 6 just use's some wires in the cable a different way. Cat5e is compatible with Cat6 systems but may not give you the most bang for your buck. They're all standard "connectors".

Is this is possible to connect two computers with LAN having different Operating System like one have Windows XP and other have Windows 7?

Yes,we can connect windows xp and windows7 pcs through LAN.but in both of the pcs the firewall should be off.We can connect windows PC and Linux PC also.but we should have to install samba server in Linux PC.samba server acts as an interface between the windows and Linux platform.I have answer this question as of my knowledge.please send me an acknowledgement if it need s any corrections.

Thanks

Rajesh

Can you connect a wireless access point to a two-desktop wired network by cable and access a wireless laptop without connecting via the Ethernet port?

No, why would you? I suggest just buying a wireless PCI card for the two desktops. It would make life much more easier.

You can, what you need is a wireless router... this will allow you to have approximatly 4 ethernet ports and wireless access to your network, but look in your manual to make sure you encrypt the data so as to protect from wireless predators...

How can you simulate a networking application in c with osi layers which part of the code represents the layers in the osi?

Well its not too tough!We can do this in following way 1)For Physical layer define some file which will operate like system buffer and do include initial primitives that physical layer includes! Only write or something else 2)Data link layer functions should be defined in another file which will use physical layer structures as abstract data types. For this please physical level or any layer datastructures as structures and functionalities as pointer to function mapped with those correlated functions. 3)Network layer concerns are often related to subnet transport for this there is one requirement that you should use simple logical identification like define a dummy address that will be mapped as one particular record and can be identified with one particular host by running a same client program from different directories and primarily setting logical id like IP address and then retrieving only what is having 'myID:message ' lke structure ..................For other layers you can do same but I think one need some prior knowledge of Threading to define it more presentatively. I have made a simulation during my college days at MCA that was using a essential feature on WIN platforms that is NET command. I cannot write here in so short how can we do all that but If you feel above not helping write to me at rupesh_joshi@sify.com or rupesh.joshi@gmail.com Rupesh K Joshi

What is the sub protocol that enables tcp ip to internetwork?

Both TCP and IP are subprotocols in the OSI model. IP is used for routing purposes, whereas TCP is used for transport control.

If you are asking primarily about internetworking then it would be the IP protocol.