answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What do you mean by ping?

Packet InterNet Grouper (Groper)" (sometimes also defined as "Packet Inter-Network Groper). The usefulness of ping in assisting the "diagnosis" of Internet connectivity issues was impaired from late in 2003, when a number of Internet Service Providers filtered out ICMP Type 8 (echo request) messages at their network boundaries. This was partly due to the increasing use of ping for target reconnaissance, for example by Internet worms such as Welchia that flood the Internet with ping requests in order to locate new hosts to infect. Not only did the availability of ping responses leak information to an attacker, it added to the overall load on networks, causing problems for routers across the Internet.

Ping is a computer network utility program that allow verification of an IP address' existence over the network or the internet.

Tcp ip and netbeui which is not routable?

IPX/SPX : Routable // TCP/IP : Routable // NetBEUI : Not Routable

Types of communication networks?

Communication network can be generally viewed as Switched & Broadcast.In switched network comes Circuit & Packet Switched network.Circuit Switched Network are used by Telphone,GSM.Packet Switched network are further sub divided into Datagram & Virtual Circuit.Datagram circuit followed by Internet,IP network whereas Virtual circuit example is ATM .

What devices are you tranmitting to when using 11111111 11111111 1111111 11111111 as a IP address?

All devices on your network segment. NOTE: In dotted decimal notation, which is the most common way of expressing IP addresses to make them easy for humans to read, this would be 255.255.255.255 or what is commonly referred to as all ones.

How does using the OSI model facilitate teaching and learning about networking?

The OSI (Open Systems Interconnection) model is a conceptual framework that describes how data is transmitted over a network. The OSI model divides the process of network communication into seven distinct layers, each of which performs a specific function. The layers are designed to work together seamlessly, making it easier to develop and troubleshoot network systems.

Using the OSI model can facilitate teaching and learn about networking in a number of ways:

Structured Approach: The OSI model provides a structured approach to understanding how network communication works. By breaking down the process into seven distinct layers, learners can better understand the complexities of network communication and how each layer contributes to the overall process.

Common Language: The OSI model provides a common language that network professionals can use to communicate with one another. This can make troubleshooting and problem-solving more efficient, as all parties involved can use the same terminology and concepts.

Modular Design: The OSI model's modular design makes it easier to develop and maintain network systems. Each layer performs a specific function, and changes made to one layer can be implemented without affecting other layers, allowing for more flexible network design.

Standards-based: The OSI model is based on international standards, making it a widely recognized and accepted framework for network communication. This means that learners who understand the OSI model will have a strong foundation for working with a wide range of network technologies and protocols.

Overall, using the OSI model can facilitate teaching and learning about networking by providing a clear and structured framework for understanding how network communication works, promoting common language and modular design, and being standards-based.

What is the default subnet mask of a class A address?

Class A default is 255.0.0.0

Class B default is 255.255.0.0

Class C default is 255.255.255.0

Are Peer to peer networks recommended where there are a large number of users?

No, they are not. The reason is that the more users/clients you have on a Peer to Peer network the harder it is to administer it. Everyone is their own administrator and you can't enforce policies, backups, or security easily with a peer to peer network.

A general rule of thumb in the industry is to limit such a network to around 10 devices. Although more could be used it becomes an administrative and troubleshooting nightmare.

What is used to connect two or more networks?

A Translational Bridge is used to connect networks that use different protocols.

Functions of wan?

Wide area network generally consist of two or more local networks . Computers connected to a WAN are often connected through public Computers connected to a wide-area network are often connected through public networks, such as the telephone system. Wanos network less the costs and accelerate more network speeds. Like this you can get more provider those are providing WAN services.

How many types of addresses in each network node?

there are two types of addresses: network addresses and physical addresses

How do i make my LAN IP static?

First, pick out the address you wish to permanently assign to the workstation, plus the subnet mask you are going to use.

Then, bring up the network adaptor properties and put the address in the dialog box (for Windows).

For Unix/Linux systems, using the ifconfig command allows you to assign a static address (see first part above) to any adaptor.

The secure socket layer protocol uses what port?

It depends on what SSL is being used for (HTTP, as in secure web pages; FTP; Telnet; etc.). Below is a non-exhaustive list of various port numbers used for protocols with SSL implemented: * HTTP: Port 443 * FTP (Data): Port 989 * FTP (Control): Port 990 * Telnet: Port 992 * IRC: Port 994 * pop3: Port 995 I hope this was the information you were looking for.

How do you connecting 2 computers as peer to peer connection use crossover cable?

First you need a crossover Ethernet cable which connects Transmit lines to Receive and Receive lines to Transmit on a 10/100BaseT connection. Both computers need to have Ethernet IP address set in same range (e.g. 10.0.0.x) and same Subnet Mask and Gateway. e.g. IP address can be 10.0.0.5 on one machine and on other it can be 10.0.0.7 .. After that both computers connected to each other through a cross cable can see each other and transfer/share data.

Full form of PING?

Full form of PING is:

Packet InterNet Groper

PING: Ping is defines as " the tools which is used to check the communication of between the systems, routers switches and also the Internet".

the syntax is:

ping ip address (or) ping system name (or) ping device name

The abbreviation of PING is : "Packet InterNet Goopher"

How many network IDs are there in a Class B IP address?

In a class B IP address, the first two bytes represent the network.

The first two bits are 1 and 0, which means that there are 214 (10 000000 00000000 to 10 111111 11111111) network possibilities, which is 16,384 possible networks. The networks available in class B are therefore networks going from 128.0.0.0 to 191.255.0.0.

The two bytes to the left represent the computers on the network. The network can therefore contain a number of computers equal to:

216-21 = 65,534 computers.

Whait is character-oriented protocol?

Character-oriented protocols are also known as byte oriented protocols. They are used in variable size framing by the Data link layer for data link control.

Data are 8-bit characters encoded in ASCII. Along with the header and the trailer, 2 flags are included in each frame (beginning and end of frame) to separate it from other frames. These flags are protocol dependent characters.

The important issue is how to differentiate when the data in the frame is the same as the flag? This means that how is the Receiver going to know that the frame content is actually the data not the flag?

A solution is to use a process called BYTE STUFFING. An extra byte is added to the data section of the frame, where the character sequence is the same as the flag. This is usually the escape character: ESC.

Of course if the data section also includes same sequence of characters as ESC another ESC character will be added to tell the receiver which section is data.

At receiver's end, this data section will be removed and be treated as a piece of data.

Clearly, this procedure does not account for 16-bit or 32-bit characters we use today, so we rely on bit-stuffing protocols (mostly).

How is LAN different from WAN?

LAN is internal. IE, your computer, router, modem.

WAN is external, such as your computer, a server on the internet, a corporate database.

Not to be confused with WLAN, which is wireless LAN

What is the max number of ports on a switch?

The minimum number of ports on most brands of switches is four. While there is no industry rule that limits the number of ports on a single switch, practical application has shown that a minimum of four ports is about right.

What is the color code of straight cable and cross cable with images?

I had to create patch cables in my Infotech class and had to memorize at least straight cables. starting from pin 1 (left to right)

Straight-Through: White-Green, Green, White-Orange, Blue, White-Blue, Orange, White-Brown, Brown

White-Green is pin 1 and Brown is pin 8

Cross-Over Cable: White-Orange, Orange, White-Green, Blue, White-Blue, Green, White-Brown, Brown