answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

You cannot ping pfsense fom your wan network?

Add a firewall rule to allow ICMP from WAN.

Firewall | Rules | Add

Action - Pass

Interface - WAN

Protocol - ICMP

ICMP type - Any (or echo reply)

Source - Any

If your WAN is a private subnet, you will need to disable block private networks on the Interfaces | WAN page

How connection is established between circuit switching and packet switching?

Simply in a circuit switched application all the data travels over a predefined path end to end. In a packet switched application the data is broken up into packets and may go over different paths and is reassembles at the destination. Imagine a train consisting of a number of cars traveling from point A to point B with data being represented by the content of each car. This would be a circuit switched example. If we took the same contents on the train and put it in trucks containers and told the drivers to go whatever way they wanted to the destination then this would be packet switched.

What is coaxial cable impedance?

Cable impedance is one of the characteristics that define how the cable will transmit signals. There are some simple and some far more complex descriptions of transmission lines on the Internet that describe the feature in more detail.

For the normal user, it is sufficient to know that video signals over co-ax cable will use 75 ohm cable. Most data signals that use co-ax cable will use 50 ohm cable. Generally, the source of the signal will have an impedance equivalent to the characteristic impedance of the cable. Similarly, at the end of the cable, the same value of impedance is needed.

When the cable is terminated properly, the signal will be transferred to the end of the cable without it reflecting back down the cable. It is the reflections that cause ghost images or smearing on a television image. As the length of cable increases, it becomes more important to make sure the correct impedance of cable is used with the correct termination.

When a host on one network wants to communicate with a host on another network what ARP request does it send?

ARP is not used for internetwork communications, it will send ARP to find gateway to be able to communicate with another network.

Explain the physical topology of Virtual Infrastructure 3 Data center?

Virtual Infrastructure Data centre consists of ESX Hosts, Virtual machines, Virtual centre Server, VI Client, web browser for web access to ESX hosts then Storage solutions like iSCSI, SAN ,NFS over a high speed Network or Fibre Channel

Why we use ipv4 not ipv6?

IPv4 was the first used network addressing scheme from the 1970s. IPv6 is newer and not compatible with version 4. It will take some time to upgrade the software and equipment to be able to fully use v6.

48 The RJ-45 connector looks like a telephone jack and is used to connect to a?

It's used on an ethernet cord. More often than not you will be connecting one end to you PC and the other to a modem/transceiver/hub or the likes.

--PS.. It's larger than the phone jack and can only fir into one spot on your PC (granted you only have one NIC)

Which device is used to associate a client computer to the wireless network?

Answer:

Two hardware devices are needed in order for a computer to be connected to the wireless network.

First your need a Wireless Network Card (laptops usually already have them preinstalled)

WiFi cards are simply NIC cards you can install in the computer and can be bought fairly inexpensive these days. Usually the 'drivers' for the cards are installed first from the CD, then the card itself is installed. (some manufacture directions differ, so read the instructions first) It's usually a painless process.

Second you would need a Wireless Router

Wireless routers come a dime a dozen and are simple to install as well.

First connect the router to the cable or DSL modem, with CAT5 cable. Restart both your cable modem and your router.then access and configure the router from the routers web page (usually 192.168.2.1 but it may be different) Make sure you configure your network for WPA2 security and configure the computer for the WPA2 password as well.

You may have to renew your DCHP for this as well - contact your Internet Service Provider for more details on how to do that.

Both the WiFi card and the wireless routers are manufactured buy well known companies, such as Linksys, Belkin, and Cisco.

How long does it take to move file from source host to destination host when message segmentation is used?

This depends entirely on the size of the original message, the MTU used, and whether or not windowing of segments is allowed.