answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What are the good performance of star topology?

because star topology make another computer will continue their working even another computer have a problem or each of the computer cable have the problem..

What is a network?

the hardware and software connecting electronic devices so they can communicate with each other

What kind of problems are caused by excessive broadcasts traffic on a network segment?

Excessive broadcast traffic can cause network congestion, and cause systems within that broadcast domains to be slowed down by having to process large amounts of packets.

What is physical layout in the network topology?

netwok topology is firstly the process of configuring computer system and peripherals in other for it to have a maintained and stabled communication link in a network environment. so there must be a layout of configuration and networking environment....

Why should i get hired as a networking manager?

I assume you have networking training and that you want to work in the field... isn't that why anyone wants to be hired in a certain field?

Also - it pays well ...

How can you make a LAN connection between two vista laptops using either WiFi or a LAN cable when there is only internet protocoll versions 4 and 6?

Just use a cross-over cable between the two systems. The protocols will think they are talking to each other through a hub or switch or similar device.

What are the steps to making a peer to peer network?

The steps are:

  1. Put a NIC device in every system that will connect to the network
  2. Create a cable that goes from the NIC to a connectivity device, such as a hub or switch.
  3. Install a networking protocol on each system
  4. Configure the networking protocol to name each device and put an appropriate network address on each NIC card.

That's it! You're done.

Which command display the IP address of the host?

It depends on the Operating System -

For Win. 9x you can use winipcfg

Other windows versions use ipconfig

Unix and Linux use ifconfig

Are special tools required when working with CAT 5 cabling to create a patch or crossover cables?

There is a cat-5 crimping tool needed to attach plugs to the ends of the cables. It is also advised to test your cables with a cable tester, but this can also be done by simply plugging it into a computer & switch.

What is the conclusion of network topology?

The conclusion of network topology is to ensure that the system is working as required. Topology refers to the physical wiring process in a network.

Which firewall ports needs to be open for 'computer management--connect to another computer' to work?

Im not sure I fully understand what you are asking. Perhaps if you re-phrase your question I would be in a better position to help.

However I will say that the ports you need open all depend on what program you are using. You could connect to another computer with remote desktop (RDP) and for that you would have to open port 3389. Or you could use something like Radmin which goes on port 4899.

Is the size of ARP packet fixed?

In theory, no, not necessarily, since ARP is flexible enough to be used to discover or describe a connection between other kinds of addresses, which don’t have to be the same lengths as IPv4 and Ethernet addresses.

Brifely explain advantage of client server computing?

Client Server computing allows management of a network through any device in the network; you don't have to physically be at a device to troubleshoot or upgrade it. Another benefit is something known as single-signon. A user needs to remember only one user-name and password combination to sign on to the network.

Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?

Cisco uses DUAL FSM (EIGRP) to make sure that on a global level a route is recalculated when the possibility exists that it might cause a routing loop. In essence, this attempts to prevent routing loops. Other algorithms used in path calculation are the Bellman-Ford (shortest path) and Ford-Fulkerson (maximum flow).