answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

When saving a file to your school network are you using a wan or lan how do you know?

When saving a file to your schools network, you are using a LAN, because it is a local are network. A WAN uses wide area networks, such as connecting two offices in two different locations.

What are the benefits to using a layered model to describe network protocols and operations?

-Assists in protocol design, because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below.

-Fosters competition because products from different vendors can work together.

-Prevents technology or capability changes in one layer from affecting other layers above and below.

-Provides a common language to describe networking functions and capabilities.

How can the subnet mask for a class C address be represented?

255.255.255.0 - in decimal representation

11111111.11111111.11111111.00000000 - binary representation (3 bytes with all the bits equal to 1, the last byte with all the bits equal to 0)

/24 - binary short representation (the number of bits equal to 1)

Suppose you wanted to do a transaction from a remote client to a server as fast as possible Would you use UDP or TCP Why?

TCP:

1.reliable transport between

sending and receiving

process

  1. flow control: sender won’t

overwhelm receiver

  1. congestion control: throttle

sender when network

overloaded

  1. does not provide: timing,

minimum throughput

guarantee, security

  1. connection-oriented: setup

required between client and

server processes

UDP:

  1. unreliable data transfer

between sending and

receiving process

  1. does not provide:

reliability, flow control,

congestion control,

timing, throughput

guarantee, security,

or connection setup,

Topologies of computer networking?

Star network,ring network,tree network,bus network

What is the maximum distance of RS 485?

It depends on the wires' diameter you use, and the network topology you will use. Generally say the bigger the diameter you use, the distance longer. But it is the best you use it in BUS of hand in hand. If you use RS485 in tree or star network, it can not be long because of the signal's reflex on lines. What i said above must be twisted-pair, otherwise the distance can not by far. Also you need to consider the data rate you use. the lower data rate you use the longer distance you will get. But all above i said, even in the best condition, RS485 is only 300~500 meters long. If longer distance you need, you have to consider other way, such as RS485 module which use other technology to expand the distance, just only RS485 interface but not RS485 signal on the lines. For example, the PWBS01H series module i used before. It makes RS485 be 3000m distance, also supports tree or start network topology. here is the link for PWBS01H series module.
slideshare.net/eddiegao/bestrong-rs485-powerbusmodules

What is used pass the packets between networks?

There is 3 "main" ones.

UDP, TCP, and ARP.

UDP - Used for very fast messaging between servers

TCP - Used for things like chats, http, etc..

ARP - "Address Resolution Protocol" this is what's used to make it so that you are assigned an IP address..

There are thousands, literally, of protocols out there. Those are just the ones I believe fallinto this category.

Is 192.256.257.1 a valid ip address?

No. 255 is the highest octet. as know that th highest octet is the 255 and the third octet of this IP is more then standard so we can see it is not valid ip address the valid for this is: 192.255.255.1

What distance does local area network cover?

You have been asked to design the entire cabling system for a medical instrument manufacturer's new central warehouse. The company already has three buildings within two city blocks, and the warehouse will be its fourth building. Currently, the buildings run on separate networks, but the company would like to be able to exchange data among them. For example, the Quality Control Department in building 1 would like to be able to access servers in the Research Department in building 2. In addition, the Sales Department in building 3 wants to conduct video training sessions for its representatives

in the field via the Internet. Next door, in the warehouse, 50 shipping and packing personnel in the Fulfillment Department will be riding up and down the aisles on forklifts pulling inventory off the shelves on a daily basis.

What kind of transmission media would you recommend for each different building

and department of the medical instrument company and why?

What type of media would you recommend using to connect the buildings and why?

Finally, what kind of media should the company request from its ISP for connecting

the corporate WAN to the Internet?

What are the two types of switches used in circuit switching?

Crossbar Switch: A Crossbar Switch connects n inputs to m outputs in a grid, using electronic micro-switches (transistors) at each cross point. The major limitation of this design is the number of crosspoints required. Connecting n inputs to m outputs using a crossbar switch requires n * m crosspoints. For example, to connect 1000 inputs to 1000 outputs requires a crossbar with 1,000,000 crosspoints. A crossbar with this number of crosspoints is impractical. Such a switch is also inefficient because statistics show that, in practice, fewer that 25 percent of the crosspoints are in use at any given time. The rest are idle.

Multistage Switch: The solution to the limitations of the crossbar switch is the Multistage Switch, which combines crossbar switches in several stages. In multistage switching, devices are linked to switches that, in turn are linked top other switches.

The design of a multistage switch depends on the number of stages and the number postages required (or desired) in each stage.

How does the NIC of a receiving PC use the destination MAC address?

The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).

The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).

The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).

The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).

The five elements of data communication?

The five components are sender, receiver, protocol, medium and message

What is the speed of twisted pair wiring?

This depends on what "type" of twisted pair. Category 5 ( CAT5 ) cable can transmit up to 100 Mb/s, while Category 6 can transfer up to 1 Gb/s ( 1,024 Mb/s )

The most common twisted pair is CAT5, and CAT5e, used in home networks, business networks, and some multi-line telephone lines.

What advantages does token ring have over Ethernet?

ring topology uses token ring i.e one way communication which passes the token with header and Destination address into the network.If one client in the network just disconectd from the network then the the entire network collapse. For this problem FDDI is used for fault tolorence Where as ethernet works much efficiently in packet delivering

What steps does PPP go through when the other end of serial link is configured with PPP encapsulation?

- When both ends of a serial WAN link are configured to run the PPP encapsulation method they establish a session based on the 3 steps below:

Step 1

- Link establishment and configuration negotiation

- In this phase LCP opens the connection between the two interfaces and negotiates configuration options. this phase is done once the receiving router sends a configuration-acknowledgment frame back to the router who first initiates the connection...


Step 2

- Link quality determination (optional)

- In this phase LCP tests the link between the routers to determine if the quality is sufficient to bring up the network layer protocol.

Step3

- Network Layer Protocol configuration negotiation

- After step 2 ends, the appropriate NCP can separately configure the network layer protocols, and bring the protocol up and down at any given time. If LCP closes the link between the routers it will inform the network layer protocol so that it can take action in regards to the interfaces.

- TERMS -


PPP = Point-to-Point Protocol

LCP = Link Control Protocol

NCP = Network Control Protocols

- hope this helps :)

- miirii

What is Dora in networking?

The DHCP Server keeps all the information and data base about the DHCP Cliencts. And it works as folows. ________ ________ | | <-----D------------> Discover-------------> | | |DHCP | <-----O------------> Offer----------------> |DHCP | |SERVER | <-----R------------> Request--------------> |CLIENT | |________| <-----A------------> Acknowledgement------> |________|

I want further answers regarding this. please do send me.

1. DHCP automatically Discover the systems , 2. Server Send the offer to the client systems ,

3. Client send the Request to Server System,

4. last one Acknowledgement send by Server to Client

I would like to make an amendment to that so that it is somewhat further understood in it's entirety.

1st: Hardware sends a broadcast asking for information regarding DHCP servers within the network (or Sub-net of course).

2nd. DHCP server responds saying "Hey, I'm here!"

3rd. Hardware sends a query for an IP address (not the same as the request phase.)

4th. DHCP server comes back with "Here ya go, you can have xxx.xxx.xxx.xxx if you want it!"

5th. Hardware decides that's what it wants, so it requests a lease for that IP address.

6th. DHCP server acknowledges the request and assigns a lease time to that piece of hardware (identified by it's MAC address).

1st through 3rd is done through MAC as the hardware has no IP address and cannot communicate through IP. To do those communications before the IP addresses are assigned they use UDP packets with Source and Destination MAC addresses as beginning and end-points. And DHCP servers don't discover the hardware added, the hardware discovers the DHCP servers.

That's DORA in a nutshell.

How do you provide security for VPN?

VPN is a security measure of the data transmission. So the weak point would be :

1. How strong is the data transmission encryption.

2. How adequate is the endpoint security.

3. Overall how good is the policy Protection of networks & their services from unauthorized modification,destruction, or disclosure , & provision of assurance that the network performs its critical functions correctly & there are no harmful side-effects.Network security includes providing of data integrity.

Answer Network security comprises the measures a company takes to protect its computer system, and it is a prime concern for every company that uses computers. Compromised network security means a hacker or competitor may gain access to critical or sensitive data, possibly resulting in data loss, or even complete destruction of the system.

Even the owner of the VPN server can not physically see what information is held on its server - as for me it's pretty good security.

However, this does not mean that you should use unverified VPN services.

I use this: boxpn.com and I'm satisfacted- speed and cost is very ok.

And if we talk about security, OpenVPN protocol will help you (by the way, in boxpn, he is present).

What are two characteristics of the data link layer?

Allows the upper layers to access the media using techniques such as framing.

Controls how data is placed onto the media and is received from the media using techniques such as media access control (MAC) and error detection.

What is the Network layer in the OSI?

Layer 7:Application Layer

Defines interface to user processes for communication and data transfer in network

Provides standardized services such as virtual terminal, file and job transfer and operations

Layer 6:Presentation Layer

Masks the differences of data formats between dissimilar systems

Specifies architecture-independent data transfer format

Encodes and decodes data; Encrypts and decrypts data; Compresses and decompresses data

Layer 5:Session Layer

Manages user sessions and dialogues

Controls establishment and termination of logic links between users

Reports upper layer errors

Layer 4:Transport Layer

Manages end-to-end message delivery in network

Provides reliable and sequential packet delivery through error recovery and flow control mechanisms

Provides connectionless oriented packet delivery

Layer 3:Network Layer

Determines how data are transferred between network devices

Routes packets according to unique network device addresses

Provides flow and congestion control to prevent network resource depletion

Layer 2:Data Link Layer

Defines procedures for operating the communication links

Frames packets

Detects and corrects packets transmit errors

Layer 1:Physical Layer

Defines physical means of sending data over network devices

Interfaces between network medium and devices

Defines optical, electrical and mechanical characteristics

What command in the Windows Command prompt will map a network drive?

net use X: //computername/sharingpath

Where X: is the drive letter you want to map, and a sample path would be //MY-PC/sharedfolder

Trending Questions
What are some disadvantages of using NetBIOS? In which layer of OSI model does GTP protocol stand? List of chennai local areas? Why is the OSI model useful in network design and assessment? Network ID 10.10.128.0 and subnet mask 255.255.224.0 Which IP address range can be used? Is LAN related to hotspots in wi fi and it is true that LAN is sharing data between computers within a narrow boundary like a restaurant and WAN is world wide or with a broader boundary? What is the Speed of fiber optics? Which two TCP IP properties must match on hosts in the same LAN if the hosts are to be able to communicate with each other? Which port is being used by YouTube? What is the name of the unique number that all devices on an IP network use to identify themselves and their location on the network? What is gigabit in relation to Ethernet? Is an international bank lan or wan? Why is auto-negotiation not recommended for use in critical network data paths? 1 you notice an unusual spike in tcp and udp flows from a single internal source to multiple destinations what can i do describe in detail the steps you would take to determine the type of traffic? How do you find the net id and host id of ip address 220.43.6.8? What does Modem Conexant do? Which network access method relies most often on a star-wired bus physical topology? How are computers located on a network? What is a network hub/switch? How many cables will be required from the MDF to the IDF to support the switches?