What is the decimal range of the first octet of all possible Class C IP addresses?
Class B - 128 - 191
What is the maximum distance of RS 485?
It depends on the wires' diameter you use, and the network topology you will use. Generally say the bigger the diameter you use, the distance longer. But it is the best you use it in BUS of hand in hand. If you use RS485 in tree or star network, it can not be long because of the signal's reflex on lines. What i said above must be twisted-pair, otherwise the distance can not by far. Also you need to consider the data rate you use. the lower data rate you use the longer distance you will get. But all above i said, even in the best condition, RS485 is only 300~500 meters long. If longer distance you need, you have to consider other way, such as RS485 module which use other technology to expand the distance, just only RS485 interface but not RS485 signal on the lines. For example, the PWBS01H series module i used before. It makes RS485 be 3000m distance, also supports tree or start network topology. here is the link for PWBS01H series module.
slideshare.net/eddiegao/bestrong-rs485-powerbusmodules
What is used pass the packets between networks?
There is 3 "main" ones.
UDP, TCP, and ARP.
UDP - Used for very fast messaging between servers
TCP - Used for things like chats, http, etc..
ARP - "Address Resolution Protocol" this is what's used to make it so that you are assigned an IP address..
There are thousands, literally, of protocols out there. Those are just the ones I believe fallinto this category.
What is meant by the term 'stand alone computer?
Got a hack that really works!
Post this on 5 pages.
Login to Club Penguin.
Press f3 and f6 8 times.
and you get a golden puffle
Read more: Is_there_a_code_for_club_penguin_elite_puffle_that_has_not_been_used_yet
Is 192.256.257.1 a valid ip address?
No. 255 is the highest octet. as know that th highest octet is the 255 and the third octet of this IP is more then standard so we can see it is not valid ip address the valid for this is: 192.255.255.1
What distance does local area network cover?
You have been asked to design the entire cabling system for a medical instrument manufacturer's new central warehouse. The company already has three buildings within two city blocks, and the warehouse will be its fourth building. Currently, the buildings run on separate networks, but the company would like to be able to exchange data among them. For example, the Quality Control Department in building 1 would like to be able to access servers in the Research Department in building 2. In addition, the Sales Department in building 3 wants to conduct video training sessions for its representatives
in the field via the Internet. Next door, in the warehouse, 50 shipping and packing personnel in the Fulfillment Department will be riding up and down the aisles on forklifts pulling inventory off the shelves on a daily basis.
What kind of transmission media would you recommend for each different building
and department of the medical instrument company and why?
What type of media would you recommend using to connect the buildings and why?
Finally, what kind of media should the company request from its ISP for connecting
the corporate WAN to the Internet?
What are the two types of switches used in circuit switching?
Crossbar Switch: A Crossbar Switch connects n inputs to m outputs in a grid, using electronic micro-switches (transistors) at each cross point. The major limitation of this design is the number of crosspoints required. Connecting n inputs to m outputs using a crossbar switch requires n * m crosspoints. For example, to connect 1000 inputs to 1000 outputs requires a crossbar with 1,000,000 crosspoints. A crossbar with this number of crosspoints is impractical. Such a switch is also inefficient because statistics show that, in practice, fewer that 25 percent of the crosspoints are in use at any given time. The rest are idle.
Multistage Switch: The solution to the limitations of the crossbar switch is the Multistage Switch, which combines crossbar switches in several stages. In multistage switching, devices are linked to switches that, in turn are linked top other switches.
The design of a multistage switch depends on the number of stages and the number postages required (or desired) in each stage.
How does the NIC of a receiving PC use the destination MAC address?
The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).
The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).
The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).
The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).
The five elements of data communication?
The five components are sender, receiver, protocol, medium and message
What is the speed of twisted pair wiring?
This depends on what "type" of twisted pair. Category 5 ( CAT5 ) cable can transmit up to 100 Mb/s, while Category 6 can transfer up to 1 Gb/s ( 1,024 Mb/s )
The most common twisted pair is CAT5, and CAT5e, used in home networks, business networks, and some multi-line telephone lines.
What advantages does token ring have over Ethernet?
ring topology uses token ring i.e one way communication which passes the token with header and Destination address into the network.If one client in the network just disconectd from the network then the the entire network collapse. For this problem FDDI is used for fault tolorence Where as ethernet works much efficiently in packet delivering
What network model ensures that no computer on the network has more authority than another?
peer-to-peer
- When both ends of a serial WAN link are configured to run the PPP encapsulation method they establish a session based on the 3 steps below:
Step 1
- Link establishment and configuration negotiation
- In this phase LCP opens the connection between the two interfaces and negotiates configuration options. this phase is done once the receiving router sends a configuration-acknowledgment frame back to the router who first initiates the connection...
Step 2
- Link quality determination (optional)
- In this phase LCP tests the link between the routers to determine if the quality is sufficient to bring up the network layer protocol.
Step3
- Network Layer Protocol configuration negotiation
- After step 2 ends, the appropriate NCP can separately configure the network layer protocols, and bring the protocol up and down at any given time. If LCP closes the link between the routers it will inform the network layer protocol so that it can take action in regards to the interfaces.
- TERMS -
PPP = Point-to-Point Protocol
LCP = Link Control Protocol
NCP = Network Control Protocols
- hope this helps :)
- miirii
The DHCP Server keeps all the information and data base about the DHCP Cliencts. And it works as folows. ________ ________ | | <-----D------------> Discover-------------> | | |DHCP | <-----O------------> Offer----------------> |DHCP | |SERVER | <-----R------------> Request--------------> |CLIENT | |________| <-----A------------> Acknowledgement------> |________|
I want further answers regarding this. please do send me.
1. DHCP automatically Discover the systems , 2. Server Send the offer to the client systems ,
3. Client send the Request to Server System,
4. last one Acknowledgement send by Server to Client
I would like to make an amendment to that so that it is somewhat further understood in it's entirety.
1st: Hardware sends a broadcast asking for information regarding DHCP servers within the network (or Sub-net of course).
2nd. DHCP server responds saying "Hey, I'm here!"
3rd. Hardware sends a query for an IP address (not the same as the request phase.)
4th. DHCP server comes back with "Here ya go, you can have xxx.xxx.xxx.xxx if you want it!"
5th. Hardware decides that's what it wants, so it requests a lease for that IP address.
6th. DHCP server acknowledges the request and assigns a lease time to that piece of hardware (identified by it's MAC address).
1st through 3rd is done through MAC as the hardware has no IP address and cannot communicate through IP. To do those communications before the IP addresses are assigned they use UDP packets with Source and Destination MAC addresses as beginning and end-points. And DHCP servers don't discover the hardware added, the hardware discovers the DHCP servers.
That's DORA in a nutshell.
How do you provide security for VPN?
VPN is a security measure of the data transmission. So the weak point would be :
1. How strong is the data transmission encryption.
2. How adequate is the endpoint security.
3. Overall how good is the policy Protection of networks & their services from unauthorized modification,destruction, or disclosure , & provision of assurance that the network performs its critical functions correctly & there are no harmful side-effects.Network security includes providing of data integrity.
Answer Network security comprises the measures a company takes to protect its computer system, and it is a prime concern for every company that uses computers. Compromised network security means a hacker or competitor may gain access to critical or sensitive data, possibly resulting in data loss, or even complete destruction of the system.
Even the owner of the VPN server can not physically see what information is held on its server - as for me it's pretty good security.
However, this does not mean that you should use unverified VPN services.
I use this: boxpn.com and I'm satisfacted- speed and cost is very ok.
And if we talk about security, OpenVPN protocol will help you (by the way, in boxpn, he is present).
What are two characteristics of the data link layer?
Allows the upper layers to access the media using techniques such as framing.
Controls how data is placed onto the media and is received from the media using techniques such as media access control (MAC) and error detection.
What is the Network layer in the OSI?
Layer 7:Application Layer
Defines interface to user processes for communication and data transfer in network
Provides standardized services such as virtual terminal, file and job transfer and operations
Layer 6:Presentation Layer
Masks the differences of data formats between dissimilar systems
Specifies architecture-independent data transfer format
Encodes and decodes data; Encrypts and decrypts data; Compresses and decompresses data
Layer 5:Session Layer
Manages user sessions and dialogues
Controls establishment and termination of logic links between users
Reports upper layer errors
Layer 4:Transport Layer
Manages end-to-end message delivery in network
Provides reliable and sequential packet delivery through error recovery and flow control mechanisms
Provides connectionless oriented packet delivery
Layer 3:Network Layer
Determines how data are transferred between network devices
Routes packets according to unique network device addresses
Provides flow and congestion control to prevent network resource depletion
Layer 2:Data Link Layer
Defines procedures for operating the communication links
Frames packets
Detects and corrects packets transmit errors
Layer 1:Physical Layer
Defines physical means of sending data over network devices
Interfaces between network medium and devices
Defines optical, electrical and mechanical characteristics
What command in the Windows Command prompt will map a network drive?
net use X: //computername/sharingpath
Where X: is the drive letter you want to map, and a sample path would be //MY-PC/sharedfolder
What is one purpose of the TCP three-way handshake?
The three-way handshake in Transmission Control Protocol (also called the three message handshake) is the method used to establish and tear down network connections. This handshaking technique is referred to as the 3-way handshake or as "SYN-SYN-ACK" (or more accurately SYN, SYN-ACK, ACK). The TCP handshaking mechanism is designed so that two computers attempting to communicate can negotiate the parameters of the network connection before beginning communication. This process is also designed so that both ends can initiate and negotiate separate connections at the same time.
How can you set up up local area network?
Setting up computer networking on a home machine is simple, especially if you have a router. You're going to want to synchronize all of the machines on your network with your router and make sure that they all have stable connections. That's all there really is to it.
What is the services and protocol for the following ports port 21 port 25 port 80 and port 110?
21 port - FTP (File Transfer Protocol)
25 port - SMTP (Simple Mail Transfer Protocol)
110 port - POP3 (Post Office Protocol used by email clients)
80 port - HTTP (World wide web Portocol)
Services: port 21- FTP, port 25- Secure shell, Port 80- Web Server and port 110-Web Server
Protocol: port 21-FTP, port 25- SSH, port 80- HTTP and port 110- POP2
Can you connect two wireless Access points?
You can connect to your access point through its default that may be 192.168.2.1 (or some thing ) depending on your device model, Midrar Ullah
VLANs provide the capability so virtually segregate traffic on a network. VLANs work by tagging traffic packets and ensuring that packets with separate VLAN IDs are only available at ports which have been configured for that VLAN ID.