Can a lan server record or access live video calls?
That depends on software used for calls. If your software allows to record data on sources located on network, than yes you can record it. Same is true for access.
What are the disadvantages of a sever based network over a peer to peer network?
the most advantages of peer to peer network configuration is
Identify the form of attack where a valid transmission is recorded to later be used to fraudulently authenticate to a server
Is two dsl modem work at same telephone line at same time?
On a single phone line, no.
But alot of times in the USA the phone line coming into the house actually has 2 lines on it, these can be set to use one or the other line, allowing two modens to function in that house, even though they are actually using different lines. (does require the activation of the second phone line with your phone carrier, often a lesser cost than the first line was)
What is computer telephony integration?
techniques behind computer telephony integration "Computer Telephony Integration (CTI), is a concept that enables computers and phone systems to communicate with each other. In fact, CTI effectively merges the functions and features of each of these two technologies into one integrated system. CTI in its simplest terms includes placing and answering voice, fax, and data calls." - Database Systems Corp. reference Computer Telephony in Related Links below.
Suppose you establish a home network and you want all three of your computers?
Then they would be connected, simple as that. They would be able to have close to the same IP Addresses. They would also be able to transfer documents through the network to share with other computers.
VLAN is Virtual Local area network and it is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. VLANs are configured through software rather than hardware, which makes them extremely flexible.
What is the difference between toggle switch and a push button?
A toggle switch is like a light switch. You flick (or 'toggle') the switch on or off and it stays in that position until you flick it again.
You could compare a push button switch to a key on a keyboard. When you press a key momentarily it will display one letter on the screen. If you hold down the key, the same letter will repeat (e.g. aaaaaaaaaaaaaaa).
Toggle switches can also look like push button switches. Most power buttons on a desktop computer tower is a toggle switch. The reset button on a computer tower is a push button switch.
What are the disadvantages of straight through cable?
1. Expensive as you need to buy a router or switch to successfully create a network.
2. Requires more wiring than a crossover cable when only dealing with two computers.
Is the computer a data terminal equipment?
A Data Terminal Equipment (DTE) is a communication device that is the source or destination of signals on a network, typically a terminal or a computer. It communicaties with the data circuit-terminating equipment and can perform all the required functions necessary to permit users to communicate.
How do you logon to a windowxp without a password?
At large companies and offices there is usually an Administrative User on the computer. It has a separate ID and password that is set up when the computer is set up for the user that allows the help desk and repair people to log into a computer for maintenece and help.or restore your computer to a early session.
Where can you download Bluetooth for PC?
Bluetooth isn't really something that can be downloaded; it requires a special piece of hardware. Windows XP and later include a Bluetooth stack, so if you purchase a Bluetooth adapter, you should be able to use it out of the box.
What is a computer network located within a limited geographical area?
Typically that would be a LAN (local area network)
What layer of OSI model is transceivers on?
Transciever works on the Physical Layer(Layer 1) of the OSI because its basically a repeater or a MAU\ Multi Station Access Unit
Why do you need an application layer?
You don't unless you plan on networking or plan on using DSL to it's utmost. You can use DSL through the USB port but Ethernet, (network card) is more stable and slightly faster. The network card allows two or more computers to communicate with each other. Without it you cannot network.
What are the two ways to connect a cable modem to a PC?
A firewire or corssover cable can be used to connect any two computers that have these ports. However, a telephone modem can only be used to connect a computer to the internet.
OSI model does not cover all aspects of computer networks. So, it is not popular.
OSI model: it is a representation of what happens when 2 computers or nodes communicate with each other on a network.
What must be configured the same on each node that resides in a LAN segment?
The subnet mask must be the same for all devices in the same LAN segment. The IP addresses must be unique (different). Also, the default gateway address is usually the same for all devices in the same LAN segment.
Why is a WAN more suitable than a LAN?
A LAN has a limited length for distance, and for the number of clients that may be connected to it. If you exceed either, then you may need a longer connection distance, which is afforded by a WAN.
What is flooding in networking?
Flooding most often occurs when a large enough number of packets (the droplets in a stream of data) are flowing through the network that regular data cannot be sent in a normal speed and fashion. Generally it a packet/response of syn/ack or synpackets: the intialization of connections between 2 tcp/ip hosts requires a set of back and forth responses eg. "hey, are you there?" "yes, I'm here." "Are you ready to receive data?" "yes I am, go."
A synflood consists of something like that horrible Verizon Mobile commercial - "Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now? Can you hear me now?....." you get the idea. Synflood hosts don't respond to the "yes" back from destination, they keep just asking over and over. The faster the flood, the slower the network and computers on the network will run. There are people who take remote control of a large number of pcs (a zombienet or bot-net) and use these to flood the victim with even larger numbers of syn packets. They get control usually by malware (viruses or trojans) and often can't be traced.
Innocent flooding can occur when a router is given a circular route to some of the hosts on the network - the router asks for the response from a certain host and another router says 'I know where that is.. it's (another interface on the first router)' and passes the requst to router 1, who then passes it again to router 2, who sends it to router 1, who sends it to router 2 ..... using protocols to test for and close internal loops in a network will most often stop flooding.
Why do UTP and STP have twists?
STP - Shielded Twisted Pair is twisted to reduces crosstalk. Crosstalk is when the signal crosses wire and reduces the communication quality. Twisting the pairs reduces the signal transmission to other wires in the cable "pack". Twisting them increases the length the cable can be run. Category 5 has a usable length of 100m, 330ft.
What is faster LAN or Wireless?
LAN is a collection of computers with in certain distance say, a building or premises or within a city. A LAN can be a collection of wired computers or wireless computers or mixed. A wireless connection is a connection which uses radio frequencies to send and receive data, e.g. a mobile phone is an application based on wireless connection.
What are the advantages of using twisted-pair cabling over fiber on a network?
I believe it has the benefit of avoiding "cross talk" from the wires near each other, the twisted pair makes it less likely.
I think it also has the benefit of having two wires on one connection for more potential through-put?