answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What protocol uses udp?

DNS uses both TCP and UDP, also a lot of online chats use UDP. I think even when you want videos on YouTube UDP is used to deliver video and audio.

How do you create matching on multiple keys in Easytrieve?

Define the keys in both input files: FILE INFILE1

AKEY1 1 4 A

AKEY2 5 9 A

AKEY3 14 9 A

AKEY4 31 1 A

AKEY5 23 8 A FILE INFILE2

BKEY1 159 4

BKEY2 1 9

BKEY3 10 9

BKEY4 19 1

BKEY5 151 8 ... JOB INPUT (INFILE1 KEY (AKEY1 AKEY2 AKEY3 AKEY4 AKEY5) +

INFILE2 KEY (BKEY1 BKEY2 BKEY3 BKEY4 BKEY5))+

START BEGINNING FINISH ENDING

*

*** KEY EXISTS IN BOTH FILES

*

IF MATCHED

MTCH-CNT = MTCH-CNT + 1 .....

Why tcpip is clubbed together despite working in different osi layers?

TCP/IP is just used to show the whole group of protocals used in sequence. Different protocals on different layers work together to send data over a network connection. It if wasn't for the TCP/IP sequence, you would not be seeing this message right now. TCP/IP is just used to show the whole group of protocals used in sequence. Different protocals on different layers work together to send data over a network connection. It if wasn't for the TCP/IP sequence, you would not be seeing this message right now.

Disadvantage of virtual private network?

you cant switch your iternet cables back and forth between a ps3 and a computer. while its in private network mode.

They slow down the Internet. Although if the service quality (eg, boxpn.com), then he has a lot of servers and almost no speed drops.

Where is SOAP on the OSI model?

in the application layer. SOAP is wrapped in HTTP or HTTPS, which can be warpped by TLS, and hen wrapped in TCP (Session) and then wrapped in IP which is the network layer protocol.

How do you get a mac to automatically connect to a server at login?

To set up Mac OS X to connect to a server at Login:

Connect to the server you want to use. Open System Preferences. Select your account from the Accounts section. Click the Login Items tab. Drag the server's icon from a Finder window into the list of Login items in the System Preferences window. Quit System Preferences.

How are endless loops of packets prevented?

A packet will not go around networks endlessly because it has a field in the header called the TTL field. This is a number that limits the number of hops or networks a packet will be forwarded to.

What is the difference between LAN and DLNA?

A LAN is a Local Area Network, it usually a physical network, either made up of wires (cat5/fiber optics/rg6) or wireless (802.11a/b/g/n - WEP/WPA/WPA2) devices. Basically it is the actual network between all the devices.

DLNA is a protocol that runs over that network (a specific set of instructions or a language that allows the devices to talk to each other). In this case, it allows a media server to talk to media clients. This is most useful for allowing devices like your PS3/XBOX/DVR etc to stream movies from a computer or "server" somewhere else in the house. Programs that allow this include Serviio and TVersity.

What is the average processor speed of a mini computer?

A "mini" computer was the standard of team computing back in the late 70's and through the 80's. I worked on a Prime system and a MassComp system during that time period. I don't recall the clock rate of the Prime 400, but the MassComp was based on the Motorola 68020 and ran about 20MHz. (I might be off a bit as it has been about 30 years...)

By comparison, today's micro-computer (laptops, desktops) boast speeds in excess of 1GHz - some over 2GHz. The problem with raw speed is that the faster you clock the processor, the more power you need to make it go and the hotter it runs. So, to get more power out of modern machines without desoldering the processor from the board, companies have limited the clock speed and gone to dual processors. In fact, my laptop has 4 dual-core processors each running at about 1.5GHz!

What are the commercial facilities in wide area network?

All the commercial organizations in the world with a web connection or providing a web service.

What is primary DNS server?

The primary DNS server is usually the same as the router's IP adress.

What is mean of ping and what is mean of ttl and times?

Ping is a small tool that you can find in a command prompt of any windows machine. It is invaluable when it comes to networks and networking. If there is any one tool you couldn't work without, its ping.

So what does it do. It sends a message to a computer anywhere on the network/internet, and if the computer is connected you will get a response. If the computer is not connected to the network/internet you wont get a response.

TTL is its 'Time to live'. Say there is a computer on the other side of the network. For the ping to reach it, it might have to go through a router, then through a server and then onto another router and then it gets to the destination.

If this is the case it needs 4 hops, one hop for each previously mentioned device. Now if i say i only want the TTL to be 3. That means it will only get to the third hop and that's it. If I say I want the TTL to be 6 then it will get there- because it only takes 4 hops to get to the machine. Usually for most users, you'd be better off leaving the TTL field alone.

Why 95 percent of networkers failed in network marketing?

Network marketers failed because they always wanted to win but they don't actually know how coupled with the wrong techniques of prospecting and the wrong use of tools. They failed to comprehend the 3 M's of Network Marketing: Message, Market, and Media.

Take for example, any of the following situations will bring no good.

1. A wrong message to a right market through a right media.

2. A right message to a wrong market through a right media.

2. A right message to a right market through a wrongmedia.

Bottomline: Your message must be clear, given to the right people through the right media. With the advent of technology, one can use online marketing very effectively through the use of facebook.

What could cause packet loss at the router?

There are a number of reasons for packet loss; bad cabling, bad ports, too many collisions on the network, attenuation in the cable, bad routes, etc.

How do you change LAN speed from 10mbps to 100mbps?

In order to get a higher speed from a LAN you must ensure that the cabling, all network connectivity devices (switches, etc) and NICs are capable of that higher speed.

In other words, you may also have to upgrade your equipment for a higher speed.

Is there a site for videos that isn't blocked by filters?

The question cannot be answered in general, since the most likely source of the block is the network administrator at your school or workplace, your parents at home, or your local ISP.
That is, site X may be blocked at your place even if I can access it just fine.

If the block comes from a local network administrator, the best you can hope for is to find a site they have forgotten. If you do find one and use it a lot, any network administrator that is no more than half asleep at the job is likely to notice and block that site too, so your best bet would be to use it sparingly.

How do you detect an intrusion that has occurred?

If you aren't using an IDS (intrusion detection system) then you have to examine the system/audit logs of the computer that may be an intrusion.

That may or may not indicate a problem. Sometimes that information isn't specifically put anywhere.

What is connection base internet protocol?

A connection based protocol requires a technique known as hand-shaking. This means that every packet that is transmitted requires a response from the receiver indicating that they received the packet and that the packet arrived safely.

There is a 3-way startup sequence to create a connection using handshaking protocol.

Will pinging the network cause problems?

It depends on if you are doing it in automatic mode or manual. If you use software to perform constantly ping, you will might flood your network. If you do it occasionally you have no reason to worry about.

Could i see pictures of the three most common network topology?

The three most common are ring, star, and bus.

Here is a simple picture of the networks.

Trending Questions
Does a virtual server make it possible to hide things on your computer from others? Which command display the IP address of the host? How does UDP verify datagram integrity? Explain the store and forward method of switching give the advantage and disadvantage of this message switching technique what is packet switching? What are characteristics of a computer network? What is the primary disadvantage of telnet compared to SSH? What attribute of a NIC would place it at the data link layer of the OSI model? Dotted decimal notation for a 29 subnet mask? How do you connect wires using a heat shrink connector? What feature allows the switches to pass VLAN traffic between switches? Which three data structures are lost if a router is rebooted or loses power? What are the common uses of ftp and http today? How do you catch a computer virus? How do you enter the router brl-04fpu admin site if it cannot load up the page as it is configured as static ip while im using pppoe adsl? Users in the network are experiencing slow response time when doing file transfers to a remote server What command could be issued to determine if the router has experienced any input or output error? What is simple duplex? If 24 voice signals are to be multiplexed and transmitted over twisted pair what is the total bandwidth required if frequency division is used? Networks that cover a small geographic area are call? Which type of network cable is more reliable STP or UTP? What is the value of network addresses?