answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What is meant by a 0.0.0.0 network address entry with a subnet mask if 0.0.0.0 in a pc's routing table?

It means the computer is set to get an IP address from a server (called DHCP) and it didn't get one.

What is the large scale network project?

A U.S. government Internet research project. It's aim is to fund the research and development of cutting-edge networking and wireless technologies and to increase the speed of the networks.

What Rules that network devices use to communicate?

A network must use a common language or set of rules to be able to communicate with other networks. These rules are standardized by committee and are an agreed upon set of rules.

These rules are known as protocols, and are widely published.

Does SMTP uses UDP?

No. It use TCP. Port No. is 25.

It's use for Email routing between mail server.

What cable type is preferred for backbone?

Fibre optic cabling is preferred for backbone cabling, particularly over large distances. But whichever type of cabling you use, cable that passes from floor-to-floor or through plenum areas must be fire-rated. Optical fibre non-conductive riser (OFNR) and/or optical fibre non-conductive plenum (OFNP) are the obvious choices here.

What are the main stages of a system development life cycle SDLC?

The stages of the System Development Life cycle are:

1. Concept Proposal - In this step, the basics of the project are defined (purpose, how funding will be obtained, ROI, etc.)

2. Requirements Analysis - In this step, the client's (or company's) requirements are formally defined. These take three different forms: Functional, non-functional, and regulatory. Functional requirements define features (what the product/software will do). Non-functional requirements refer to requirements that don't refer to features (e.g. speed, required uptime, etc.). Regulatory requirements are requirements that are mandated by a third party. Examples would be URL standards, security standards/laws, etc.

3. Architectural design - In this step, it is determined how the software will be implemented. For example, a basic paradigm for the software is determined (peer-to-peer, client-server, etc.) and in many cases, the optimal programming language is also determined.

4. Coding and Debugging - The software is actually programmed, and the most obvious bugs are squashed.

4. (Beta) Testing - The software is given to a select group of people who test the software in day-to-day situations to make sure that it works as it was intended to work.

5. Deployment - The software is released to the general public (or the company department for which it was intended).

High level computer network design?

I have posted a answer to this, you can view this in 'Related Links' below this.

A High-level network design includes overall topology, network diagrams depicting major equipment layout and layer 1 connections, and multi-vendor integration including project recommendations.

For detail description visit securityarena website link for High Level Design Considerations.

http://securityarena.com/networks/39-cisco/69-high-level-network-design-considerations.html

Receives a packet that is destined for 192.168.1.4 How will router treat the packet?

the router will enqueue the packet that is sent to the destination 192.168.1.4.and then that packet is sent on transmission media(cable).it checks every ip address that is holding the ip same as the destination ,if it reaches there then it deleiver it on that machine.

What is the subnet mask for the IP address 74.176.12.141?

If you are getting this IP from your ISP you must ask them. It most likely is 255.255.255.248 This IP seems to be a Default Gateway, your address would be 74.176.12.142 with the above mentioned subnet mask. Now if this is for your homewaork or exam, then this answer is not correct and you should have paid attention in class to Subnets.

How do you set up a point to point internet connection to receive wifi in a deadzone?

There should be some signal for point to point connection. P2P also used the same infrastructure as for the internet. Hence you should have a connection to make P2P.

What is NetBEUI?

Pronounced net-booey, NetBEUI is short for NetBios Extended User Interface.It is an enhanced version of the NetBIOS protocol used by network operating systems such as LAN Manager, LAN Server, Windows for Workgroups, Windows 95 and Windows NT.

What is polling method in computer networks?

Polling, on computer networks, involves a server and client. The Server will check if the client is ready to receive data. If not ,then data will not be transferred to the client.