answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

Could i see pictures of the three most common network topology?

The three most common are ring, star, and bus.

Here is a simple picture of the networks.

What is the yogscast server address?

they have 2 that i know. one.yogiverse.com and two.yogiverse.com but they are offline

Describe at least five key principles in the design of layered network architecture?

Principles are not advantages or disadvantages of the layered approach, principles are behind the layered approach

Principles:

  1. Data transmission error free.
  2. Minimum time for route discovery.
  3. Communication between layers through primitives.
  4. Congestion control for minimum delays and retransmission.
  5. Minimum effort in replacing new layer in the existing network layers.

Define PERT and CPM network?

P E R T is the acronym for Product Evaluation Review Technique. C P M signifies Critical Path Method.

What port is 447 for?

Port 447 is assigned to the service:

DDM-Distributed File Management

When we say 100 Mbps unmanaged switch does 100 Mbps specify the capacity of the entire switch or individual port?

This refers to the speed of each port. Combined, an 8-port switch will have a capacity of 1.6Gbps (100Mbps inbound and outbound per port), for example. The switching fabric is said to have this combined capacity.

How does a repeater extend the length of a lan?

bhaiya kuchh nahi rakha hai baato main.......

khurpa le le haatho main........

laura ghusa le gand mai.........

Does LAN use peer-to-peer or server-based networking?

It can be set to both

Lan's typically use server based networking, but a Lan can have no server at all, just workstations that link together.

A local area network for a building?

Since local area networks are small in size and geographic location, a building may contain several LANs connected together with routers. It is very common to have many LANs within a building, either as true physical LANs or logical VLANs through managed switches.

How can a switch help reduce network security problems?

Switches use routing table which does allow to brandband your connection requests how hubs do. It protects you from sniffing programs.

Which network access method relies most often on a star-wired bus physical topology?

A star-wired bus is a hybrid topology (more than 1 type of topology). There is no particular access method that requires or relies on that type of hybrid.

When a PC reports it has used an automatic private IP address what can you assume about the network?

You may assume that there is a problem with network connectivity somewhere. You might also assume that the DHCP server is not operating because an APIPA address would only be used if the device could not receive an address via DHCP protocol.

In networking terms what is reliability?

in networking terms, reliability means ensuring that each segment that the source send arrives at the destination

What needs to be setup on a router to ensure that packets from an unknown destination are forwarded to the next hop?

For a router to forward packets with a destination on a network not in the routing table the gateway of last resort must be set. This can be done on a cisco router by going to global configuration mode and entering the following: Router(config)ip route 0.0.0.0 0.0.0.0 s0/0/0 this will cause the router to forward all packets with a destination not in the routing table out serial interface 0/0/0.

What step can you take when you install a dchp server to ensure that ip addresses are only assigned by a dhcp server managed by a server administrator in your company?

After setting up one or more scope sof contiguous address ranges and activating each scope to configure your DHCP server, you must then authorize your server as a security precausion.

Example of public and private ip Address?

A public ip address can be anything that is not in these three ranges. 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, or 192.168.0.0 - 192.168.255.255.

How many connections are required by a fully-connected network with five stations?

A fully connected network follows the formula c=n*(n-1)/2, where n is the number of nodes and c is the number of connections. So, for a network of 5 nodes (stations) there would be 5*4/2=10 connections.