First, make sure it is actually an Ethernet cord, since Phone Lines and Ethernet cords are commonly confused with each other. But if you know its an Ethernet cord, look for a fairly large port that looks rectangular, Google a picture of an Ethernet port and look for it on the back of your computer.
Once you find this port on the back of your computer, plug one side of the cord into it, then the other side into your modem or router.
Difference costs between LAN and wan?
WAN usually costs more. Especially, there are recurring monthly costs, since you rent the services of an ISP. Note, however, that a LAN and a WAN serve different purposes; you can't simply replace a WAN with a LAN.
How do you hack a other pc through lan?
there is a software called Cain and Abel
its help 2 hack any kind of network connection(lan...wireless..etc.,)
What transport layer protocol does ping use?
Assuming IPv4 ICMP. Ping uses IP for transport. Ping in itself is an "Echo Request", which is a function of the ICMP protocol. The IP Packet will carry the ICMP protocol from end-to-end.
ICMP has a protocol number of 1, so the "Protocol" field in the IPv4 header will contain "1" as a reference to the ICMP payload.
For IPv6, ICMPv6 is used, and the transport will be IPv6.
Which devices are required to setup Ethernet LAN?
In its simplest form - two computers, equipped with ethernet modems, and a suitable length of ethernet vable !
Three ways to classify networks are by?
Network architectures are classified according to the way they are controlled and the distance between their nodes.
What are protocols and why are they introduced in network communications?
A protocol is a set of rules describing some behavior. In order to communicate in a common manner, the sender and receiver have to agree on the "language" of communication.
A protocol states what those rules are, and because they are a standard, everyone agrees and knows what to expect.
What are the advantages to dividing networks into subnets?
The advantages are:
How many bits class A networks are reserved for private address space?
in Class A addresses the first bit identifies the class. The next 7 bits identify the network and the rest are the IP's that belong to that network. However these networks are then broken down using subnets . Class A networks are not given to private clients or small private organisations. So if you want to know how many bits are there for identifying hosts in a Class A network, the answer is 32-8 = 24 bits. However if you mean how many bits are reserved for hosts in your private network space, that depends on your subnet and router. Most routers use NAT to allow multiple hosts to use a single external IP address. I hope this answers your question :)
What pieces of information are contained in a routing table entry?
The metric value of the route
The address of the logical destination network
The type of learning method involved
What is faster broadband or T3 lines?
Broadband does not have a set speed and 3 meg is a measurement of Internet speed. Broadband has a huge range in speed depending on your location and Internet Service Provider or ISP. If you are in a cabled network area it can be say 100meg or 10meg. If you get the broadband service down your phone line it can be 24meg 20 meg 8meg. The actual speed will vary from the advertised speed depending on whether you like far away from the exchange or not. It can even be as low as 0.1 meg or any other speed all the way up to 24meg. To see the speed in your area try putting your land line number into a broadband line check website, one of these can usually be found by searching "broadband line check" on Google.
What is mesh network or topology?
A mesh topology is where each node or computer has a direct link to every other node that it needs to talk to. This topology is okay for small computer set ups (e.g. upto 6 computers) that need very high speed communication between them.
Its not really used any more because it all gets a bit meshy...
What are the requirements of LAN?
switch
straight cables
NIC's - Network Interface Card
(for windows) choose "setup a home or small office network" from network connections window
assign IP addresses for the PC's
What is the difference between port filtering and port forwarding?
There is no difference between port mapping and port forwarding and both are equal and in some router they are used instead of the other one .
The meaning of these names is that "New connections from the outside to a certain port or port range go to a designated LAN machine. The ports are determined by the kind of server you want to run, (e.g. 80 for a web server) and the IP is the private LAN IP of your web server."
What are the types of LAN cables and connectors?
UTP unshielded twisted pair
STP shielded twisted pair
Coaxial cable a.k.a. Coax
Fiber optic cable
Twisted pair cables are usually categorized by transmission ability: CAT3 is for phone use, CAT5 is basic computer network, CAT5e and CAT6 are the latest I'm aware of.
LAN (Local Area Network)
A+ guide to Software
Chapter 8
Page 402
Why does a switch offer better security than a hub?
b. A hub forwards data it receives to every device connected to the hub. It is possible for a network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possible
What are the objectives of assessing a LAN?
lCheck whether all resources are working properly
lConnect appropriate users to the central server
lTo check Network Performance
lTo check network strategy fit the needs of business
lTo check whether network is stable, scalable and Physically and Logically Secure
What is specified by the host bits in an IP address?
The network part of an IP address indicates the network to which the host belongs.
The host bits or host part of an IP address points to the actual device that has an IP address on the network. It can be a computer, printer, router or any device with an IP address that has the same network part.
There really is no "port" for icmp but there is a icmp code. If you are looking for the icmp code for echo-reply it is 0 and the echo is 8 For an access list you could do the following: permit icmp any any echo-reply
permit icmp any any echo Or the same using the icmp code permit icmp any any 0
permit icmp any any 8
What is the difference between point to point and peer to peer?
Peer to Peer everybody is equal, security is slack, and you can only have a few comps on network
server based offers better security, monitor users, more technical and time consuming to set-up, less likely to cause problems if set-up correctly, any amount of comps etc....