Why do you need an application layer?
You don't unless you plan on networking or plan on using DSL to it's utmost. You can use DSL through the USB port but Ethernet, (network card) is more stable and slightly faster. The network card allows two or more computers to communicate with each other. Without it you cannot network.
What are the two ways to connect a cable modem to a PC?
A firewire or corssover cable can be used to connect any two computers that have these ports. However, a telephone modem can only be used to connect a computer to the internet.
OSI model does not cover all aspects of computer networks. So, it is not popular.
OSI model: it is a representation of what happens when 2 computers or nodes communicate with each other on a network.
What must be configured the same on each node that resides in a LAN segment?
The subnet mask must be the same for all devices in the same LAN segment. The IP addresses must be unique (different). Also, the default gateway address is usually the same for all devices in the same LAN segment.
Why is a WAN more suitable than a LAN?
A LAN has a limited length for distance, and for the number of clients that may be connected to it. If you exceed either, then you may need a longer connection distance, which is afforded by a WAN.
What is flooding in networking?
Flooding most often occurs when a large enough number of packets (the droplets in a stream of data) are flowing through the network that regular data cannot be sent in a normal speed and fashion. Generally it a packet/response of syn/ack or synpackets: the intialization of connections between 2 tcp/ip hosts requires a set of back and forth responses eg. "hey, are you there?" "yes, I'm here." "Are you ready to receive data?" "yes I am, go."
A synflood consists of something like that horrible Verizon Mobile commercial - "Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now?....." you get the idea. Synflood hosts don't respond to the "yes" back from destination, they keep just asking over and over. The faster the flood, the slower the network and computers on the network will run. There are people who take remote control of a large number of pcs (a zombienet or bot-net) and use these to flood the victim with even larger numbers of syn packets. They get control usually by malware (viruses or trojans) and often can't be traced.
Innocent flooding can occur when a router is given a circular route to some of the hosts on the network - the router asks for the response from a certain host and another router says 'I know where that is.. it's (another interface on the first router)' and passes the requst to router 1, who then passes it again to router 2, who sends it to router 1, who sends it to router 2 ..... using protocols to test for and close internal loops in a network will most often stop flooding.
Why do UTP and STP have twists?
STP - Shielded Twisted Pair is twisted to reduces crosstalk. Crosstalk is when the signal crosses wire and reduces the communication quality. Twisting the pairs reduces the signal transmission to other wires in the cable "pack". Twisting them increases the length the cable can be run. Category 5 has a usable length of 100m, 330ft.
What is faster LAN or Wireless?
LAN is a collection of computers with in certain distance say, a building or premises or within a city. A LAN can be a collection of wired computers or wireless computers or mixed. A wireless connection is a connection which uses radio frequencies to send and receive data, e.g. a mobile phone is an application based on wireless connection.
What are the advantages of using twisted-pair cabling over fiber on a network?
I believe it has the benefit of avoiding "cross talk" from the wires near each other, the twisted pair makes it less likely.
I think it also has the benefit of having two wires on one connection for more potential through-put?
What is the meaning of nic in www.url.nic?
National Informatics Center
More Details on webpage: http://indiaimage.nic.in/
What are the characteristics of the star topology?
In a star topology, each device connects to a central network connectivity device such as a hub, switch, or router. These devices would be connected as a "star" (points on a star).
The other characteristic of a star topology is that a failing connection will only affect the failed device unless that device is the connectivity device. This means that in most cases a failing device on a star will not take down the entire network.
Another characteristic of a star is that they are easily expandable and scalable.
Which port is being used by YouTube?
Pakichan
As far as i know its port number 80 being used by all the HTTP sites including youtube.
Which is the starting layer in OSI model?
The top most layer is the application layer and bottom most layer is the physical layer. Since data is transferred from top to bottom, I would say that the starting layer is the application layer.
What is the default subnet mask for ip address 192.168.1.254?
That would be a class E network, E networks do not have defines subnet masks or networks. Just a range (240.0.0.0 - 255.255.255.255).
In very simple words, A leased line is a rent paying line; as the name suggests.
As it is very difficult to connect two different point in far flange areas, a customer uses a line that is provided by some network provider and pays accordingly.You can take it as connecting some of your database in two different cities.
Hope, you understand me :)
What is the main purpose of using LAN and WAN?
LAN stands for Local Area Network. It like an office with all the computers hooked so they can share data and send emails just inside the office or building. A WAN stands for Wide Area Network and it connects two or more LANs...the Internet is a good of example of a WAN...the internet consists of a network connected to other networks..hope this helps.
A repeater. Repeaters work only on layer 1 (Physical) of the OSI model.
What are the advantages of having a redundant network?
If you look at redundant networks in nature, like the network of the veins within a leaf you may realize that redundancy creates resilience.
Often leaves are subjected to parasites or physical damage. If a vital vein is struck in a network without redundancy it would mean all tissues or nodes which it previously fed into would be effectively annihilated from the network (death). A redundant network overcomes this problem by spreading out the risk.
From a Computational standpoint this would be the same problem. Often critical layers of a network if left without connectivity would create critical failures for parts of the network which may be dependent on its activity. Such is the nature of hierarchy.
The simplest form of a network is a client server network?
False - a peer-to-peer network is simpler.
What program can capture packets on a network?
A packet capture (or sniffer) program sees packets coming into and out of the NIC (network interface card). It saves it for later analysis and use. These capture programs can be used to analyze traffic, look for problems, or be used for looking at data coming across the network.
2 What is the maximum distance of Cat 5e cabling for data transmission?
That depends on what you will be using the cable for.
In general, the higher the frequency of the signal being sent down the cable, the shorter the cable has to be.
The environment of the cable is also important. If the cable is in an electrically noisy environment, it needs to be shorter.
There are various standards that specify the maximum length of a cable. Sometimes it will work (some of the time) if you use a longer piece of cable, but following the standard is much more likely to work correctly all the time.
Some examples from computer networking standars:
For 10BASE-T Ethernet, the maximum length of a cable is 100 meters. Note that this standard was defined for Cat 3 cable, so you'll probably be able to use Cat 5e cable to send the signal further. However, there's no standard specifying how much further - you'll probably have to test it yourself.
For 100BASE-T Ethernet, the maximum length is also 100 meters, but the cable grade is specified as Cat 5 (not Cat 5e). So you might be able to make a longer run work with Cat 5e.
For 1000BASE-T Ethernet, again the maximum length is 100 meters, but now the cable must be Cat 5e. Also, all four pairs of the cable are used, whereas in the other two standards only two pairs are used.
HTH,
Gdunge
Can you hook up your wireless cable router to a non-wireless router?
You should be able to do that, but some minor tweaking of setting might be required.
The OSI model and protocols involved in each layer?
Go to the Wiki for OSI model -that discussion and listing is very good.