answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

Topologies of computer networking?

Star network,ring network,tree network,bus network

What is the maximum distance of RS 485?

It depends on the wires' diameter you use, and the network topology you will use. Generally say the bigger the diameter you use, the distance longer. But it is the best you use it in BUS of hand in hand. If you use RS485 in tree or star network, it can not be long because of the signal's reflex on lines. What i said above must be twisted-pair, otherwise the distance can not by far. Also you need to consider the data rate you use. the lower data rate you use the longer distance you will get. But all above i said, even in the best condition, RS485 is only 300~500 meters long. If longer distance you need, you have to consider other way, such as RS485 module which use other technology to expand the distance, just only RS485 interface but not RS485 signal on the lines. For example, the PWBS01H series module i used before. It makes RS485 be 3000m distance, also supports tree or start network topology. here is the link for PWBS01H series module.
slideshare.net/eddiegao/bestrong-rs485-powerbusmodules

What is used pass the packets between networks?

There is 3 "main" ones.

UDP, TCP, and ARP.

UDP - Used for very fast messaging between servers

TCP - Used for things like chats, http, etc..

ARP - "Address Resolution Protocol" this is what's used to make it so that you are assigned an IP address..

There are thousands, literally, of protocols out there. Those are just the ones I believe fallinto this category.

Is 192.256.257.1 a valid ip address?

No. 255 is the highest octet. as know that th highest octet is the 255 and the third octet of this IP is more then standard so we can see it is not valid ip address the valid for this is: 192.255.255.1

What distance does local area network cover?

You have been asked to design the entire cabling system for a medical instrument manufacturer's new central warehouse. The company already has three buildings within two city blocks, and the warehouse will be its fourth building. Currently, the buildings run on separate networks, but the company would like to be able to exchange data among them. For example, the Quality Control Department in building 1 would like to be able to access servers in the Research Department in building 2. In addition, the Sales Department in building 3 wants to conduct video training sessions for its representatives

in the field via the Internet. Next door, in the warehouse, 50 shipping and packing personnel in the Fulfillment Department will be riding up and down the aisles on forklifts pulling inventory off the shelves on a daily basis.

What kind of transmission media would you recommend for each different building

and department of the medical instrument company and why?

What type of media would you recommend using to connect the buildings and why?

Finally, what kind of media should the company request from its ISP for connecting

the corporate WAN to the Internet?

What are the two types of switches used in circuit switching?

Crossbar Switch: A Crossbar Switch connects n inputs to m outputs in a grid, using electronic micro-switches (transistors) at each cross point. The major limitation of this design is the number of crosspoints required. Connecting n inputs to m outputs using a crossbar switch requires n * m crosspoints. For example, to connect 1000 inputs to 1000 outputs requires a crossbar with 1,000,000 crosspoints. A crossbar with this number of crosspoints is impractical. Such a switch is also inefficient because statistics show that, in practice, fewer that 25 percent of the crosspoints are in use at any given time. The rest are idle.

Multistage Switch: The solution to the limitations of the crossbar switch is the Multistage Switch, which combines crossbar switches in several stages. In multistage switching, devices are linked to switches that, in turn are linked top other switches.

The design of a multistage switch depends on the number of stages and the number postages required (or desired) in each stage.

How does the NIC of a receiving PC use the destination MAC address?

The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).

The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).

The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).

The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).

The five elements of data communication?

The five components are sender, receiver, protocol, medium and message

What is the speed of twisted pair wiring?

This depends on what "type" of twisted pair. Category 5 ( CAT5 ) cable can transmit up to 100 Mb/s, while Category 6 can transfer up to 1 Gb/s ( 1,024 Mb/s )

The most common twisted pair is CAT5, and CAT5e, used in home networks, business networks, and some multi-line telephone lines.

What advantages does token ring have over Ethernet?

ring topology uses token ring i.e one way communication which passes the token with header and Destination address into the network.If one client in the network just disconectd from the network then the the entire network collapse. For this problem FDDI is used for fault tolorence Where as ethernet works much efficiently in packet delivering

What steps does PPP go through when the other end of serial link is configured with PPP encapsulation?

- When both ends of a serial WAN link are configured to run the PPP encapsulation method they establish a session based on the 3 steps below:

Step 1

- Link establishment and configuration negotiation

- In this phase LCP opens the connection between the two interfaces and negotiates configuration options. this phase is done once the receiving router sends a configuration-acknowledgment frame back to the router who first initiates the connection...


Step 2

- Link quality determination (optional)

- In this phase LCP tests the link between the routers to determine if the quality is sufficient to bring up the network layer protocol.

Step3

- Network Layer Protocol configuration negotiation

- After step 2 ends, the appropriate NCP can separately configure the network layer protocols, and bring the protocol up and down at any given time. If LCP closes the link between the routers it will inform the network layer protocol so that it can take action in regards to the interfaces.

- TERMS -


PPP = Point-to-Point Protocol

LCP = Link Control Protocol

NCP = Network Control Protocols

- hope this helps :)

- miirii

What is Dora in networking?

The DHCP Server keeps all the information and data base about the DHCP Cliencts. And it works as folows. ________ ________ | | <-----D------------> Discover-------------> | | |DHCP | <-----O------------> Offer----------------> |DHCP | |SERVER | <-----R------------> Request--------------> |CLIENT | |________| <-----A------------> Acknowledgement------> |________|

I want further answers regarding this. please do send me.

1. DHCP automatically Discover the systems , 2. Server Send the offer to the client systems ,

3. Client send the Request to Server System,

4. last one Acknowledgement send by Server to Client

I would like to make an amendment to that so that it is somewhat further understood in it's entirety.

1st: Hardware sends a broadcast asking for information regarding DHCP servers within the network (or Sub-net of course).

2nd. DHCP server responds saying "Hey, I'm here!"

3rd. Hardware sends a query for an IP address (not the same as the request phase.)

4th. DHCP server comes back with "Here ya go, you can have xxx.xxx.xxx.xxx if you want it!"

5th. Hardware decides that's what it wants, so it requests a lease for that IP address.

6th. DHCP server acknowledges the request and assigns a lease time to that piece of hardware (identified by it's MAC address).

1st through 3rd is done through MAC as the hardware has no IP address and cannot communicate through IP. To do those communications before the IP addresses are assigned they use UDP packets with Source and Destination MAC addresses as beginning and end-points. And DHCP servers don't discover the hardware added, the hardware discovers the DHCP servers.

That's DORA in a nutshell.

How do you provide security for VPN?

VPN is a security measure of the data transmission. So the weak point would be :

1. How strong is the data transmission encryption.

2. How adequate is the endpoint security.

3. Overall how good is the policy Protection of networks & their services from unauthorized modification,destruction, or disclosure , & provision of assurance that the network performs its critical functions correctly & there are no harmful side-effects.Network security includes providing of data integrity.

Answer Network security comprises the measures a company takes to protect its computer system, and it is a prime concern for every company that uses computers. Compromised network security means a hacker or competitor may gain access to critical or sensitive data, possibly resulting in data loss, or even complete destruction of the system.

Even the owner of the VPN server can not physically see what information is held on its server - as for me it's pretty good security.

However, this does not mean that you should use unverified VPN services.

I use this: boxpn.com and I'm satisfacted- speed and cost is very ok.

And if we talk about security, OpenVPN protocol will help you (by the way, in boxpn, he is present).

What are two characteristics of the data link layer?

Allows the upper layers to access the media using techniques such as framing.

Controls how data is placed onto the media and is received from the media using techniques such as media access control (MAC) and error detection.

What is the Network layer in the OSI?

Layer 7:Application Layer

Defines interface to user processes for communication and data transfer in network

Provides standardized services such as virtual terminal, file and job transfer and operations

Layer 6:Presentation Layer

Masks the differences of data formats between dissimilar systems

Specifies architecture-independent data transfer format

Encodes and decodes data; Encrypts and decrypts data; Compresses and decompresses data

Layer 5:Session Layer

Manages user sessions and dialogues

Controls establishment and termination of logic links between users

Reports upper layer errors

Layer 4:Transport Layer

Manages end-to-end message delivery in network

Provides reliable and sequential packet delivery through error recovery and flow control mechanisms

Provides connectionless oriented packet delivery

Layer 3:Network Layer

Determines how data are transferred between network devices

Routes packets according to unique network device addresses

Provides flow and congestion control to prevent network resource depletion

Layer 2:Data Link Layer

Defines procedures for operating the communication links

Frames packets

Detects and corrects packets transmit errors

Layer 1:Physical Layer

Defines physical means of sending data over network devices

Interfaces between network medium and devices

Defines optical, electrical and mechanical characteristics

What command in the Windows Command prompt will map a network drive?

net use X: //computername/sharingpath

Where X: is the drive letter you want to map, and a sample path would be //MY-PC/sharedfolder

What is one purpose of the TCP three-way handshake?

The three-way handshake in Transmission Control Protocol (also called the three message handshake) is the method used to establish and tear down network connections. This handshaking technique is referred to as the 3-way handshake or as "SYN-SYN-ACK" (or more accurately SYN, SYN-ACK, ACK). The TCP handshaking mechanism is designed so that two computers attempting to communicate can negotiate the parameters of the network connection before beginning communication. This process is also designed so that both ends can initiate and negotiate separate connections at the same time.

How can you set up up local area network?

Setting up computer networking on a home machine is simple, especially if you have a router. You're going to want to synchronize all of the machines on your network with your router and make sure that they all have stable connections. That's all there really is to it.

What is the services and protocol for the following ports port 21 port 25 port 80 and port 110?

21 port - FTP (File Transfer Protocol)

25 port - SMTP (Simple Mail Transfer Protocol)

110 port - POP3 (Post Office Protocol used by email clients)

80 port - HTTP (World wide web Portocol)

Services: port 21- FTP, port 25- Secure shell, Port 80- Web Server and port 110-Web Server

Protocol: port 21-FTP, port 25- SSH, port 80- HTTP and port 110- POP2

Can you connect two wireless Access points?

You can connect to your access point through its default that may be 192.168.2.1 (or some thing ) depending on your device model, Midrar Ullah

What are VLANs used for?

VLANs provide the capability so virtually segregate traffic on a network. VLANs work by tagging traffic packets and ensuring that packets with separate VLAN IDs are only available at ports which have been configured for that VLAN ID.

Trending Questions
Which firewall ports needs to be open for 'computer management--connect to another computer' to work? A useful TCP utility to test for connectivity is? What extends a private network across public networks? What is the default subnet mask for ip address 192.168.1.254? What is subnet mask and default gateway? Which layer of the osi model is responsible for code formatting and coversion and graphic standards? Which network component is most vulnerable to performance problems? You are designing a 100Base-T network to connect groups of workstations in two different offices in your building the offices are approximately 250 meters apart if you only use reapeaters? How do you enter the router brl-04fpu admin site if it cannot load up the page as it is configured as static ip while im using pppoe adsl? What does a great advantage of a VPN provide? Exterior routing protocol example? What are the main stages of a system development life cycle SDLC? What is Computer network Polling? What is difference between Transport layer and data link layer? What is the default network ip address? What is a non proprietary network protocol? What is the difference between a hub and a switch? You are designing a 100Base-t network to connect groups of workstations in two different offices in your building The offices are approximately 250 meters apart If you only use repeating devices to? Difference between CAN and LIN communication protocol? What protocol allows hosts to exchange messages to indicate problems with packet delivery?