answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

Why Internet and its protocols is prior over OSI?

The OSI model came after TCP/IP networking protocols were available in networks. The OSI description also as to describe and identify networking components that do not exist in the TCP/IP model.

A static route that points to the next hop IP will have what administrative distance and metric in the routing table?

For a hop to another network that is close, if you want it to be a preferred route the cost metric must be a low number. Depending on which protocol you use for routing, this number should be lower than other numbers as alternate routes.

With the aid of diagrams describe the basic steps in client programs data to a server and receiving a response from the server?

The type of connection varies greatly depending on the client/server. We can not provide any information without knowing the type of software you are refering to. It is likely that the client/server to uses TCP as its network protocol. Research TCP to understand the basics of how computers usually communicate over an IP network. The alternitive to TCP is UDP, which is a less reliable protocol.

In a nutshell (without diagrams, sorry), most client/server connections just use TCP, then some sort of data. Data is usually sent only on one port. The client sends a SYN (syncronize) to the server which replies with an ACK/SYN (acknowledge/syncronize), to which the client replies with an ACK (acknowledge). This opens a connection from the client to the server where data is sent or requested in a format special to the type of program being used.

The best way, although somewhat more advanced, is to download a packet capturing program such as the open source program Wireshark from www.wireshark.org. That will allow you to capture traffic to and from the client/server.

What are the computer telephony integration providers?

Although I am hesitant to provide advertising for any particular vendor, your best bet is to determine the type of IPT system you want, and then find out from them who their partners are. The larger vendors generally do not do the implementations/integrations themselves, and they leave it to consulting companies to handle that. They are normally closely allied with several companies that can do the work.

What is specified by the network number in an IP address?

The network number in an IP address is that portion of the IP address that matches the subnet mask. For instance, if the IP address is 10.11.12.13 and the subnet mask is 255.255.0.0, then the network number is 10.11.0.0. If the subnet mask is 255.255.255.0, then the network number is 10.11.12.0.

The network layer (layer 2 in the OSI model) in the TCP/IP protocol stack uses the network number to determine if the destination address is directly reachable, or if the frame needs to be routed through the default gateway.

How many collision domain do you have if you have 3 HUSwith 10 clients connected per HUB?

If, by "HUSwith" you mean "hubs with", and by "hub" you really mean "hub" and not "switch" then you'll have either three collision domains (if the three hubs are not connected to each other) or a single collision domain (if the three hubs are connected to each other). Replace the hubs with switches and you'll have 30 collision domains, if the switches are not connected, or 32 or 33 if they are (depending on how the inter-switch connections are made: two switches connected to a common third vs. each switch connected to both the other two).

What steps are involved in placing computers in a domain?

To join a domain, you go to the Computer Properties and the Identification tab. Tell the system you want to join a domain, then provide the domain you want to join. You will be asked for administrator credentials in order to join the domain from a client.

What do mean by time division switching?

Time division space switching:-

suppose there are 'n' input lines and 'n' output lines connected to the bus each via switches.

The switches being controlled by the decoder using the counters and control memory etc.

So in the most basic form there is a counter connected to an n to 2^n decoder which controls the connection of the input and the output line to the bus.


2 basic types are:

input controlled time division switching

output controlled time division switching

Is Ethernet voltage AC or DC?

It's AC. DC power is constant, and therefore cannot carry any sort of signalling along with it. Don't think that AC power inside ethernet cables can be used as is, since it depends on what kind of data in being sent across.

Why data transmission must be encrypted?

Data can be pulled out of the air when you send your friend an email over a wireless internet system and it can be pulled off of a cable when it is sent or someone could break into your computer and steal all your data and you would not even know it was happening..so if someone doesn't want someone else to read there messages or data they encryt it.

If all linksys routers use 192.168.1.1 how do they tell them apart?

You should learn more about IP addressing. Most routers (not just linksys) are 192.168.1.1

This 192.168.x.x address is only a private address, its not public. So your private address and my private address and everybody else's private address can be the same. But every public address has to be different. You cant have 2 public addresses the same or there will be huge problems. If you ever heard anything about IP6, you will know what Im talking about.

What devices can you use to limit the size of a collision domain?

A switch or router will limit the number of clients in a collision domain, thus limiting what can be in the collision domain.

Refer to the exhibit Which three ipv4 addresses represent a broadcast for a subnet?

172.16.4.63 /26

172.16.4.191 /26

172.16.4.95 /27
172.16.4.63/26

172.16.4.191/26

172.16.4.95/27
172.16.4.63 /26

· 172.16.4.191 /26

· 172.16.4.95 /27
172.38.27.4 and 10.255.255.248
172.16.128.154/18

172.16.255.254/18

172.24.64.254/18

172.24.127.254/18


**192.168.9.99/28

**192.168.9.64/26

**192.168.9.64/28

Which device should be used for enabling a host to communicate with another host on a different network?

An Ethernet cable should be used for enabling a host computer to communicate with other computers or electronic devices. The Ethernet cable is usually attached through a modem to each device, or the device can be wireless such as in Wi-Fi capabilities.

What does uplink do on a netgear routerhub?

The uplink is a crossover port which allows a connection to another hub, thus extending the number of clients you can connect on the network.

How do you prioritize IP address?

There is no inherent priority in Internet Protocol Addresses.

Therefore, you don't prioritize them.

What is Logical Link Control Protocols?

It is forms part of the Point-to-Point Protocol. In setting up PPP communications, both the sending and receiving devices send out LCP packets to determine the standards of the ensuing data transmission. LCP is logically a Transport Layer protocol according to the OSI model,