answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What is the minimum number of pins of COM port needed to make a serial network between two computers?

Four. Four pins ie.,TXD,RXD,RTS and CTS. U wil need to use the others in case of devices like modem ,etc.For communication between 2 computers u can avoid thm.

How would a repeater be used in an Ethernet segment?

Repeaters are usually used in coaxial based ethernet networks. For this purpose they are used to extend the length of a network segment. For example, in a 10base2 ethernet network the maximum length of a segment is 180 meters. A repeater could join two segments together to increase the length of the network and the number of clients in the network.

In today's modern networks you will see neither coaxial networks nor repeaters in a LAN. Repeaters are used for DSL transmissions, but not for LANS.

Recently I installed Net Protector Antivirus's licenced copy on my lan connected system while installing my lan was disablednow i cant see my lan in my network placeswat to do?

This could mean the drivers for your network adapter have been disabled or damaged and are unusable, try grabbing the motherboard driver/utility disc that came with the computer and installing LAN/Network drivers found on that disc.

If you cant find or did not receive a disc try looking on the motherboard manufacturers website for LAN/Network drivers suitable to your motherboard.

You could also try uninstalling Net Protector and seeing if that works, another alternative is contacting Net Protectors tech support and outline your problem to them. They made the program so they could provide better advice.

What can I do if I am charged with copyright infringement and I am a student?

It is going to be up to the person who charged you with infringement - assuming you actually DID infringement - which they have to substantiate. Have you been given some options by this person? The problem if going to be bigger if you have benefited financially from copyrighted material. Being a student doesn't give you ammunity -as the saying "ignorance of the law is no excuse" would suggest. If it was worth charging you - it is pretty important to someone and you could be drawn into a real mess. My advice is to call an attorney right away because if they are coming after you - you're going to want to take pre-emptive action.

What do networking protocols do?

Network protocols provide mechanisms that enables communications between sysytems, clients, servers, websites etc. without protocola systems would not be able to communicate, share data etc.

What type of network topology for a small company of 20 employees a bus network or ring network or star network?

Star is more appropriate, it's little bit expensive than for instance ring but it's easier to maintain and the bandwidth is higher (depending on UTP you are going to use).

Is TCP IP used for everything?

No, TCP/IP is the not the only protocol used in the world, but it is certainly one of the most popular. Older networks may still use IPX/SPX (Novell) which is a competitor to TCP/IP. Mainframes use SNA or LU6.2 protocols which are very different from TCP/IP. Appletalk is also a competitor to TCP/IP.

What is the importance of data communication system?

Data communications allows companies and individuals to transmit information or data from one point to another. There are many professions that use data communications systems including systems analysts.

Why are optical fibers better than wires for transmitting signals?

Because fibers are not subject to the electromagnetic interference, also speeds are much higher. Fibers can be used to longer distances (up to 40 km).

What are the benefits of Autonomous number in computer Networks?

It allows a large organization to more easily keep track of routing and network requirements, especially with an ISP (Internet Service Provider). The organizational benefits give a clearly defined routing policy for the internet.

What is cnfigured in mainframes that can be apart of network?

If a mainframe is using TCP/IP as its protocol it is configured the same way any other system using TCP/IP would be configured: an IP address, subnet mask, and default gateway address.

What is the minimum category of twisted pair cabling that should be used to support networking?

The minimum category cabling for networking is cat 3 cable. That cable will allow you to transmit and receive on a LAN at a maximum of 10 Mbps.

Why are data link protocols required?

Protocols are a commonly agreed-upon set of rules for common communication between devices. At the data link layer they have to agree on the rules of how the frame is constructed, otherwise there would be no correct way to deliver frames to the intended systems.

What is the network broadcast address for a Class C address of 192.168.32.0 with the default subnet mask?

The broadcast address for a class C network will always end in 255, in other words the fourth octet of the IP address will always be 255 (assuming your using classful addresses). For example, the broadcast address of the 192.168.1.0 /24 network is 192.168.1.255

Which two values represent the network number and default mask for the address 209.165.200.225?

This is a class C address, so the network number is 209.165.200.0, and the default subnet mask is 255.255.255.0

It essential chapter 1-10 final exam?

1ABC Inc. decided to integrate redundancy by connecting multiple hard disks to duplicate the information they

store. Which type of adapter will need to be installed on the servers to accomplish the desired redundancy?

What are the advantages of having a router receive a default route rather than a more specific route?

My moma said that life was like a box of chocolates, you never know what you gonna get.

What are the legal uses of peer to peer networking?

This question confuses two completely different things. One is whether it is legal to use a particular application in a particular way. The other is whether an application is organized as peer-to-peer or some other way, such as client-server or master-slave. Whether an application is peer-to-peer has nothing to do with whether it is legal to use an application in a particular way.

A peer-to-peer application is an networked application where none of the processes in the application is inherently controlled by any other process in the application. Contrast this with a client-server application, where a client makes requests of a server (which the server can honor or not as it sees fit), or a master-slave application, where a controlling process (the master) issues instructions to one or more controlled processes (the slaves). The most popular applications that we use on the Internet today tend to be client-server or master-slave applications, but applications do not inherently need to work this way. Consider for example a telephone or instant messaging program that allows users at two different computers to talk (via voice or text) to each other. Each computer can independently send messages (voice or text) to the other one. Many kinds of IM and telephony applications are set up as client-server (whether the server mediates between clients in some way) but one advantage of implementing these applications as peer-to-peer is that no central server is needed.

Peer-to-peer applications have undeservedly developed a bad reputation for several reasons. One is that some popular peer-to-peer applications have been widely used to transfer copyrighted material. Yes, it's illegal (in most countries) to transfer copyrighted material without permission - but it doesn't matter whether this is done using a peer-to-peer program, or a client-server program, or a USB thumb drive. Copying of copyrighted material is illegal no matter how you do it.

Another reason peer-to-peer apps have developed a bad reputation is that peer-to-peer applications don't care which end established a networking connection. Once the connection between two peers is established, either peer may make requests of the other. Many sites naively rely on "firewalls" to protect their computers from attack. A common policy is to block all connections that are being initiated from outside the firewall, on the theory that requests can only come from the party that initiated the network connection. Many client-server applications work this way, but this is not true for networked applications in general. Sites that naively rely on firewalls to protect their network may categorically object to usage of peer-to-peer programs since their firewalls will not protect them.

Fortunately, the advantages of peer-to-peer applications are becoming more widely understood and acceptance of peer-to-peer as a legitimate organizing principle for networked applications is increasing.

.

How do you prepare a straight and cross cable?

A straight through cable goes as follows on both ends:

  • orange-white
  • orange
  • green-white
  • Blue
  • Blue-white
  • Green
  • Brown-white
  • brown

A cross over switches green and orange so it would be as follows on the other end:

  • green-white
  • green
  • orange-white
  • Blue
  • Blue-white
  • Orange
  • Brown-white
  • brown