answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What network topology is mostly used in homes and businesses?

The network in the secondary building should also be star topology. It is the most common and very reliable. There will be twelve desktop computers in the building which should be connected to each other and the main building as well. So there should be Cat 6 cabling used in this building. The other networking equipment needed in the building is a wireless router which will help the mobility of the employees, a networking switch for all the workstations and the wall sockets into which the Ethernet cables will be plugged in. There will also be two sockets for the printers. There will be VoIP phones on the desks with the computers

What was the name of the first network and when was it introduced?

The Advanced Research Projects Agency Network (ARPANET) developed by ARPA of the U.S. Department of Defense was the world's first operational packet switching network, and the progenitor of the global Internet.

In the spring of 1967 at the University of Michigan, ARPA held its yearly meeting of the "principle investigators" from each of its university and other contractors. Results from the previous year's research was summarized and future research was discussed, either introduced by ARPA or the various researchers present at the meetings. Networking was one of the topics brought up at this meeting.

The Completion Report continues the story:

"At the meeting it was agreed that work could begin on the conventions to be used for exchanging messages between any pair of computers in the proposed network, and also on consideration of the kinds of communications lines and data sets to be used. In particular, it was decided that the inter-host communication 'protocol' would include conventions for character and block transmission, error checking and retransmission, and computer and user identification.

The initial ARPANET consisted of four IMPs (Interface Message Processors). They were installed at:

UCLA, where Leonard Kleinrock had established a Network Measurement Center (with an SDS Sigma 7 being the first computer attached to it). The Stanford Research Institute's Augmentation Research Center, where Douglas Engelbart had created the ground-breaking NLS system, a very important early hypertext system (with the SDS 940 that ran NLS, named 'Genie', being the first host attached). The UCSB (with the Culler-Fried Interactive Mathematics Centre's IBM 360/75, running OS/MVT being the machine attached). The University of Utah's Graphics Department, where Ivan Sutherland had moved (for a DEC PDP-10 running TENEX).

The first ARPANET link was established on November 21, 1969, between the IMP (Interface Message Processor) at UCLA and the IMP at SRI. By December 5, 1969, the entire 4-node network was connected

How does the switch learn the Mac address?

Each Ethernet frame sent from one computer to another includes the source and the destionation MAC addresses. It is from these addresses that the switch learns what device is connected to the port.

At first, the switch won't know the destination address; in that case, it will broadcast the frame through all of its ports. But soon it learns this information.

It is also possible, in some switches, to add the MAC address through configuration commands.

What is the type of network called that connects two computers directly together using a cross-over network cable?

If both PCs have ethernet cards, the best cable to use would be a crossover cable. A crossover cable is almost the same thing as a regular ethernet cable, except the wires inside the connector are reversed on one end. This reversing of the wires allows you to connect a crossover cable between two PCs without any other network equipment like a switch or a hub.

What is the difference between process switch and mode switch?

Process switch is switch the process state between the status like read, blocked ,suspend. Mode switch is the switch the process privilege between the mode like use mode, kernel mode. Generally a mode switch is considered less expensive compared to a process switch.

What is the major factor that makes coaxial cable less susceptible to noise than twisted-pair cable?

A coaxial cable is shielded from electrical interference signals whereas UTP (Unshielded Twisted Pair) cable is not. The random twisting with which UTP is manufactured works very well, however, in locations where the interference levels are relatively low, because its method of construction ensures that any interference affects both wires in the pair equally. It should also be mentioned that STP (Shielded Twisted pair) cable is also available and is sometimes specified for LANs (Local Area Networks) instead of coaxial cable. But the much greater volume of coaxial cable sold means that coaxial cable prices have been kept very competitive with STP. As STP tends to be more tricky to install - its shield has to be very carefully and correctly terminated at each end - coaxial tends to be used more than STP where noisier-than-normal interference conditions are present at a particular site. Since the 1990s NIC (Network Interface Card or Component) equipment has had extra logic cicuits within it to reject ambient interference much more effectively than equipment which was designed in the previous 20 years, so nowadays UTP can be used more extensively in locations where only STP or coaxial cable would have had to be used before. So, in relation to LANs in normal non-industrial office and domestic buildings, this exam question is now almost obsolete! However coaxial cable is still necessary to carry LANs in difficult environments such industrial plants; hospitals; undergound railway and road tunnels and mines; on board ships and aircraft, etc. and must also be used to carry signals for radio, televison, video and other applications which run at much high frequencies and bandwidths than LANs.

1 you notice an unusual spike in tcp and udp flows from a single internal source to multiple destinations what can i do describe in detail the steps you would take to determine the type of traffic?

Technically your question has a lot of unanswered questions: Is this a Windows PC? Is this a home or business ... you see my point? No one can fully answer this question with out knowing the network environment. In general - You need a TAP in the network; a TAP is a secure, known good, point from which to sniff the network traffic; simply trying to use host-based monitoring *may* not work correctly in all cases. Get a copy of WireShark -- get a clean (IE not infected PC) and learn how to use WireShark :) If you have a *lot* of traffic and you wish to *stop* or somehow control the flow of - then get a packet filtering stateful firewall. Or just hire a network security expert.

The dns protocol is at what layer of the OSI model?

DNS is an application layer protocol. The application layer of the OSI model is the layer closest to the user and provides network services to the applications of the user. Examples of protocols that operate at the application layer are: DNS, FTP, TFTP, SNMP, TELNET, RLOGIN, SMTP, MIME, NFS, FINGER, BOOTP and SMB.

Do devices connected to the Internet have a unique IP address.?

Yes. Each computer connected to the internet is assigned a unique internet protocol, or IP, address.

How do you use a wireless router?

This is a very hard question to answer because I do not know what router you are on about. Usually, most routers now will have a CD/DVD to help you set up your router.

Basically, what you really need to know when setting up your router is your internet login info, for example; name@dialbb.com. And of course the password. You can get this by phoning your internet provider.

A What are some of the benefits of mapped drives and shared folders in a home or small office network?

Mapped and/or shared folders on a network allow users to collaborate and share information by modifying the documents in the folders or by putting documents in the folder that is shared without realizing that the folder may not be on their machine, but it looks as though it is.

What device is used to send data between two networks?

If the message is going between two different networks then it must be routed (this includes different subnets of the same network as well). Routing is done by a router as the device.

What is the scope in computer hardware networking?

It varies from computer to computer.. It's sometimes infrared and sometimes iron sight.

If no dhcp server is available on a network what type of configuration must computers on the network use for assignments of IP addresses?

Usually the systems will be assigned an APIPA address in the range 169.254.x.y in order to use resources in their own LAN.

The APIPA configuration can also default to static IP addresses if necessary.

If APIPA is not being used then the only way to use the network is to manually assign a static IP address and all of the required settings.

What network topologies are most commonly used on today's networks?

star topology. Because they include a centralized connection point; can easily be moved, isolated, or interconnected with other networks; they are, therefore, scalable. For this reason, and because of their fault tolerance, the star topology has become the most popular layout used in contemporary LANs.

What is the difference between osi and iso model?

ISO stands for International standards organization.It is an organization for agreement on international standards of network communication world wide.

On the other hand OSI is a model for understanding and designing a network architecture.

What is commonly used to restrict access to a network based on the physical hardware address of the clients network device?

You can enable MAC address (also know as Physical Address) filtering. MAC address filtering has two modes:

1. Allow access to listed MAC addresses

2. Deny access to listed MAC addresses.

When can a domain local group be converted to a universal group?

Always, because it has no restrictions

when the domain functional level is

•Windows 2000 native or Windows Server 2003:

You can convert universal groups to domain local groups or to global groups

What is the difference between WiFi and wireles mesh networks?

A wireless mesh network really doesn't make sense; the mesh topology assumes that every node in the network has a connection to every other node, and is primarily used for fault tolerance.

With wireless technology there is no concept of a "connection", therefore having a mesh topology with a wireless network would be very difficult.

Wi-Fi is a wireless technology.

Can people get internet from fiber optic cables?

Verizon FiOS & Verizon Broadband Services offer blazing speed & crystal clarity of the 100% fiber optic Fios network & proven reliability for their TV, Internet & phone products that will exceed your expectations today & keep you connected down the road

cutt.ly/Ukhxvha