In communication and computer network research, network simulation is a technique whereby a software program models the behavior of a network by calculating the interaction between the different network entities (routers, switches, nodes, access points, links etc.). Most simulators use discrete event simulation - the modeling of systems in which state variables change at discrete points in time.
There are both free/open-source and proprietary network simulators available. Examples of notable network simulators / emulators include:
Both commercial tools are available at deeply discounted prices to universities.
The advantage is in fault detection; in a bus topology any break in any wire segment would cause the entire LAN to fail. With a star topology, a break in any wire segment only affects the one client connected to the network.
Does network monitor allow you to look inside of packets on the network?
Yes, a network monitor program is designed to show you all of the parts of a network packet.
Even your visited websites, chat messages or emails content. I saw a product name "WFilter" can do that.
Most modern local networks use cables, adaptors and connecting devices that can communicate at a maximum speed of 100Mbits/sec (quick enough - in theory - to move an 8Mb file from one computer to another in 1 second).
This is a high speed LAN. There is a newer standard of network which has a maximum speed of 1000Mbits/sec (x10 speed), which requires new adaptors and hardware.
What are some disadvantages of using NetBIOS?
There are 3 disadvantages to NetBios:
Why is auto-negotiation not recommended for use in critical network data paths?
Its not recommended because the use of manually set configuration often led to duplex mismatches when two devices are connected.
How to disable website in d-link 24 port switch?
Disable a website..? Im going to assume you mean block it. Your not going to do it from a switch either. A switch is only a very basic peice of hardware, it just passes on data - it doesn't check to see what the data is. If its only one website you could just block it from the hosts file. If its a specific type of site, you should probably just download some specific software.
When does a host device issue an ICMP echo request?
to initiate a ping to determine if a destination address is reachable
Why a lan user can not monitor the internet?
The simple answer is that a LAN user (client) will not see all of the packets on the Internet; they will only see the packets for their own LAN segment.
What protocols to use on networks?
That depends on the type of network you are talking about. For instance, the Internet is a network and uses TCP/IP as its protocol. Intranets based on Microsoft Server also use TCP/IP. However, there are other protocols.
Which network devices can be found in LAN but not with WAN?
An LAN card is a must if you wish to connect to a LAN but it is not required for WAN
What is the main difference between a router and a 12port hub?
A router allows communication between two different networks. A hub just links devices in a network.
What are the procedures for securing the company LAN?
The procedures for securing a network revolve around securing confidential information and the assets (resources) of a company's network. You have to ensure that confidentiality is maintained, along with integrity and availability. How you go about doing that depends on the company and the type of network, access to the network, etc.
Yes. You need to have an IP (either static or dynamic) You must have a subnet mask that corresponds to the IP address; and a gateway IP address that is on the same subnet.
physical layer.
How does a client server work as a midway between heterogeneous and distributed computing system?
Stuff Stuff
Would you Illustrate of making crossover and straight-through cabling?
There are some great YouTube videos demonstrating the techniques... check them out.
Why is it important to consider existing network infrastructure prior to purchasing new hardware?
It is extremely important to know what the existing topology of your network is before purchasing any other equipment, because if you buy the wrong type of equipment for the topology the network may not work.
Secondly, when buying equipment you need to consider future expansion; what may work now may be too slow in the future or too limited in the future, given the number of new devices you may want to add to the network. You always need to plan for the future.
A layer appears to be communicating directly with the same layer at the other end of the link (i.e. its peer). What is actually happening is that the data is being passed down to lower layers for transmission and is passed up again at the other end.
Compare the osi reference model with tcpip reference model discuss the shortcomings of these models?
Q.8 What is the difference b/w OSI Reference Model and TCP/IP Reference Model? The open systems interconnection (OSI) reference model describes how information from a software application in one computer moves through a network medium to a software application in another computer. The OSI reference model is a conceptual model composed of seven layers, each specifying particular network functions. As in the OSI model, data is passed down the stack when it is being sent to the network and up the stack when it is being received from the network. The four-layered structure of TCP/IP is seen in the way data is handled as it passes down the protocol stack from the application layer to the underlying physical network.
Is there a cable available to connect an ipod to a stereo through the headphone port?
The answer to this question is YES! and even better, there are cables that aren't *proprietary*whereby chargingyou an arm and a leg at your local IPOD store. The headphone jack on the IPOD is just like that on any walkman, boombox, or even computer soundcard. The jack is referred to as a 3.5 mm stereo headphone jack (by size). It has 3 separate contacts: 2 of the contacts are for the separate (right and left) speaker channels, and the third contact (closest to the jack handle) is a common ground for the right and left. The most common input on stereos (home style in living room or boombox style) is RCA input jacks. The cable you are looking for has a 3.5 mm jack on one end, and a pair of RCA connectors on the other end (respective to right and left channels). These cables are a standard commodity at electronic stores such as Best Buy, Music Center, Target, Walmart, and even Radio Shack. The lazy types can order one via online websites for these stores.
Why is it not possible to use the subnet mask 255.255.255.254?
Because that would only allow one address, and two are reserved (One for broadcast, one for a gateway).
So that would mean that the lowest possible subnet mask which would be usable would be 255.255.255.252, with three spare addresses. Even so, this would only allow one additional terminal on the network.
When is the uplink connection used on a switch?
Uplink connections are typically used to connect the switch to a higher level switch, that is more powerful and closer to the backbone.
On basic switch models, the regular ports are MDIX ports, meant to connect directly to a PC. The Uplink port is then an MDI port, which can connect (with a straight cable) to an MDIX port on a different switch. Often the highest numbered port (8, 16, or 24 for instance) has one MDIX port in the regular set and an MDI uplink next to it, but you can only use one of these two.
You can use a crossover cable to connect MDIX to MDIX or MDI to MDI port.
On more modern switches, ports are often MDI/MDIX autosensing and this reason for existence of uplink ports has passed (all Gigabit Ethernet has this, and many 100 Mbit Ethernet).
In the mean time, however, switch models have come into being which have faster speed uplink ports. For instance, 10 Mbit switches with 1 or 2 100 Mbit ports to connect to the core network, or these days 100 Mbit switches with a few Gigabit ports.