answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

Is the computer a data terminal equipment?

Data Terminal Equipment (DTE)

A Data Terminal Equipment (DTE) is a communication device that is the source or destination of signals on a network, typically a terminal or a computer. It communicaties with the data circuit-terminating equipment and can perform all the required functions necessary to permit users to communicate.

How do you logon to a windowxp without a password?

At large companies and offices there is usually an Administrative User on the computer. It has a separate ID and password that is set up when the computer is set up for the user that allows the help desk and repair people to log into a computer for maintenece and help.or restore your computer to a early session.

Where can you download Bluetooth for PC?

Bluetooth isn't really something that can be downloaded; it requires a special piece of hardware. Windows XP and later include a Bluetooth stack, so if you purchase a Bluetooth adapter, you should be able to use it out of the box.

What layer of OSI model is transceivers on?

Transciever works on the Physical Layer(Layer 1) of the OSI because its basically a repeater or a MAU\ Multi Station Access Unit

Why do you need an application layer?

You don't unless you plan on networking or plan on using DSL to it's utmost. You can use DSL through the USB port but Ethernet, (network card) is more stable and slightly faster. The network card allows two or more computers to communicate with each other. Without it you cannot network.

What are the two ways to connect a cable modem to a PC?

A firewire or corssover cable can be used to connect any two computers that have these ports. However, a telephone modem can only be used to connect a computer to the internet.

Why OSI model is not popular?

OSI model does not cover all aspects of computer networks. So, it is not popular.


OSI model: it is a representation of what happens when 2 computers or nodes communicate with each other on a network.

What must be configured the same on each node that resides in a LAN segment?

The subnet mask must be the same for all devices in the same LAN segment. The IP addresses must be unique (different). Also, the default gateway address is usually the same for all devices in the same LAN segment.

Why is a WAN more suitable than a LAN?

A LAN has a limited length for distance, and for the number of clients that may be connected to it. If you exceed either, then you may need a longer connection distance, which is afforded by a WAN.

What is flooding in networking?

Flooding most often occurs when a large enough number of packets (the droplets in a stream of data) are flowing through the network that regular data cannot be sent in a normal speed and fashion. Generally it a packet/response of syn/ack or synpackets: the intialization of connections between 2 tcp/ip hosts requires a set of back and forth responses eg. "hey, are you there?" "yes, I'm here." "Are you ready to receive data?" "yes I am, go."

A synflood consists of something like that horrible Verizon Mobile commercial - "Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now?....." you get the idea. Synflood hosts don't respond to the "yes" back from destination, they keep just asking over and over. The faster the flood, the slower the network and computers on the network will run. There are people who take remote control of a large number of pcs (a zombienet or bot-net) and use these to flood the victim with even larger numbers of syn packets. They get control usually by malware (viruses or trojans) and often can't be traced.

Innocent flooding can occur when a router is given a circular route to some of the hosts on the network - the router asks for the response from a certain host and another router says 'I know where that is.. it's (another interface on the first router)' and passes the requst to router 1, who then passes it again to router 2, who sends it to router 1, who sends it to router 2 ..... using protocols to test for and close internal loops in a network will most often stop flooding.

Why do UTP and STP have twists?

STP - Shielded Twisted Pair is twisted to reduces crosstalk. Crosstalk is when the signal crosses wire and reduces the communication quality. Twisting the pairs reduces the signal transmission to other wires in the cable "pack". Twisting them increases the length the cable can be run. Category 5 has a usable length of 100m, 330ft.

What is faster LAN or Wireless?

LAN is a collection of computers with in certain distance say, a building or premises or within a city. A LAN can be a collection of wired computers or wireless computers or mixed. A wireless connection is a connection which uses radio frequencies to send and receive data, e.g. a mobile phone is an application based on wireless connection.

What are the advantages of using twisted-pair cabling over fiber on a network?

I believe it has the benefit of avoiding "cross talk" from the wires near each other, the twisted pair makes it less likely.

I think it also has the benefit of having two wires on one connection for more potential through-put?

What is the meaning of nic in www.url.nic?

National Informatics Center

More Details on webpage: http://indiaimage.nic.in/

What are the characteristics of the star topology?

In a star topology, each device connects to a central network connectivity device such as a hub, switch, or router. These devices would be connected as a "star" (points on a star).

The other characteristic of a star topology is that a failing connection will only affect the failed device unless that device is the connectivity device. This means that in most cases a failing device on a star will not take down the entire network.

Another characteristic of a star is that they are easily expandable and scalable.

Which port is being used by YouTube?

Pakichan

As far as i know its port number 80 being used by all the HTTP sites including youtube.

Which is the starting layer in OSI model?

The top most layer is the application layer and bottom most layer is the physical layer. Since data is transferred from top to bottom, I would say that the starting layer is the application layer.

What is the default subnet mask for ip address 192.168.1.254?

That would be a class E network, E networks do not have defines subnet masks or networks. Just a range (240.0.0.0 - 255.255.255.255).

What is leased line?

In very simple words, A leased line is a rent paying line; as the name suggests.

As it is very difficult to connect two different point in far flange areas, a customer uses a line that is provided by some network provider and pays accordingly.You can take it as connecting some of your database in two different cities.

Hope, you understand me :)

What is the main purpose of using LAN and WAN?

LAN stands for Local Area Network. It like an office with all the computers hooked so they can share data and send emails just inside the office or building. A WAN stands for Wide Area Network and it connects two or more LANs...the Internet is a good of example of a WAN...the internet consists of a network connected to other networks..hope this helps.