What is digital token in e-commerce?
The digital token based payment system is a new form of electronic payment system which is based on electronic tokens rather than e-cheque or e-cash. The electronic tokens are generated by the bank or some financial institutions. Hence we can say that the electronic tokens are equivalent to the cash which are to be made by the bank.
What is better A hub or a Switch?
In general a switch is better than a hub because it doesn't repeat signals to all of the ports (and thus reduces collisions).
remote access is where a computer is used from a different location to where the user is, this is useful to IT staff so they can administer a machine without even being in the same building, home users also benefit from remote access by being able to 'dial in' to their home computers whist at work or elsewhere.
TCP is connection oriented protocol,mean it ensure that a packet is delivered and also set up a connection before sending data to destination source and destination exchange several control signal before sending data.If a packet is lost,TCP resend it. UDP does not establish any communication before sending data.It sends data and forget it.If a packet is lost,application using UDP cannot resend it.A example of UDP is voip,if a packet is lost,a part of conversation is also lost and can not be resend
Flow Control
There are certain protocols for communication between networks?
There are many ways to communicate between networks. The rules for doing so are called protocols, and there are many known protocols. Some are historical in nature (meaning they have been around a long time) and some are newer ones developed in the last few years.
Protocols describe how to communicate and when to communicate. They may be specific to a means of communication (i.e. web traffic, email traffic) or they may be more general (TCP/IP - covering many protocols).
Deciding on which protocol to communicate with other networks is based on how the networks communicate currently and what kind of traffic will be transferred between the two. A protocol is designed so that there are common rules regarding communication, so certain protocols will be used to be common between networks.
TCP/IP is an example of a very common, widely-used communication protocol.
What does implementing a lan switch reduce?
Lan switches eliminate collision domain. A single collision domain in a network would mean half duplex as it can only send or receive at one time. each port of a switch is considered a collision domain in itself. so more the number of collision domain , better for the network.
Where a peer to- peer networking is appropriate?
Usually as a rule of thumb a peer to peer network is appropriate when the number of clients is about 10 or less, and you don't need a dedicated technician to run the network. In addition, a peer to peer network is best used when the growth of the network is small or slow as well.
Small departments and companies successfully use peer to peer networking because they do not require anything more costly or sophisticated.
First, make sure it is actually an Ethernet cord, since Phone Lines and Ethernet cords are commonly confused with each other. But if you know its an Ethernet cord, look for a fairly large port that looks rectangular, Google a picture of an Ethernet port and look for it on the back of your computer.
Once you find this port on the back of your computer, plug one side of the cord into it, then the other side into your modem or router.
Difference costs between LAN and wan?
WAN usually costs more. Especially, there are recurring monthly costs, since you rent the services of an ISP. Note, however, that a LAN and a WAN serve different purposes; you can't simply replace a WAN with a LAN.
How do you hack a other pc through lan?
there is a software called Cain and Abel
its help 2 hack any kind of network connection(lan...wireless..etc.,)
Which devices are required to setup Ethernet LAN?
In its simplest form - two computers, equipped with ethernet modems, and a suitable length of ethernet vable !
What transport layer protocol does ping use?
Assuming IPv4 ICMP. Ping uses IP for transport. Ping in itself is an "Echo Request", which is a function of the ICMP protocol. The IP Packet will carry the ICMP protocol from end-to-end.
ICMP has a protocol number of 1, so the "Protocol" field in the IPv4 header will contain "1" as a reference to the ICMP payload.
For IPv6, ICMPv6 is used, and the transport will be IPv6.
Three ways to classify networks are by?
Network architectures are classified according to the way they are controlled and the distance between their nodes.
What are protocols and why are they introduced in network communications?
A protocol is a set of rules describing some behavior. In order to communicate in a common manner, the sender and receiver have to agree on the "language" of communication.
A protocol states what those rules are, and because they are a standard, everyone agrees and knows what to expect.
What are the advantages to dividing networks into subnets?
The advantages are:
How many bits class A networks are reserved for private address space?
in Class A addresses the first bit identifies the class. The next 7 bits identify the network and the rest are the IP's that belong to that network. However these networks are then broken down using subnets . Class A networks are not given to private clients or small private organisations. So if you want to know how many bits are there for identifying hosts in a Class A network, the answer is 32-8 = 24 bits. However if you mean how many bits are reserved for hosts in your private network space, that depends on your subnet and router. Most routers use NAT to allow multiple hosts to use a single external IP address. I hope this answers your question :)
What pieces of information are contained in a routing table entry?
The metric value of the route
The address of the logical destination network
The type of learning method involved
What is faster broadband or T3 lines?
Broadband does not have a set speed and 3 meg is a measurement of Internet speed. Broadband has a huge range in speed depending on your location and Internet Service Provider or ISP. If you are in a cabled network area it can be say 100meg or 10meg. If you get the broadband service down your phone line it can be 24meg 20 meg 8meg. The actual speed will vary from the advertised speed depending on whether you like far away from the exchange or not. It can even be as low as 0.1 meg or any other speed all the way up to 24meg. To see the speed in your area try putting your land line number into a broadband line check website, one of these can usually be found by searching "broadband line check" on Google.
What is mesh network or topology?
A mesh topology is where each node or computer has a direct link to every other node that it needs to talk to. This topology is okay for small computer set ups (e.g. upto 6 computers) that need very high speed communication between them.
Its not really used any more because it all gets a bit meshy...
What are the requirements of LAN?
switch
straight cables
NIC's - Network Interface Card
(for windows) choose "setup a home or small office network" from network connections window
assign IP addresses for the PC's
What is the difference between port filtering and port forwarding?
There is no difference between port mapping and port forwarding and both are equal and in some router they are used instead of the other one .
The meaning of these names is that "New connections from the outside to a certain port or port range go to a designated LAN machine. The ports are determined by the kind of server you want to run, (e.g. 80 for a web server) and the IP is the private LAN IP of your web server."
What are the types of LAN cables and connectors?
UTP unshielded twisted pair
STP shielded twisted pair
Coaxial cable a.k.a. Coax
Fiber optic cable
Twisted pair cables are usually categorized by transmission ability: CAT3 is for phone use, CAT5 is basic computer network, CAT5e and CAT6 are the latest I'm aware of.