When saving a file to your school network are you using a wan or lan how do you know?
When saving a file to your schools network, you are using a LAN, because it is a local are network. A WAN uses wide area networks, such as connecting two offices in two different locations.
What are the benefits to using a layered model to describe network protocols and operations?
-Assists in protocol design, because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below.
-Fosters competition because products from different vendors can work together.
-Prevents technology or capability changes in one layer from affecting other layers above and below.
-Provides a common language to describe networking functions and capabilities.
How can the subnet mask for a class C address be represented?
255.255.255.0 - in decimal representation
11111111.11111111.11111111.00000000 - binary representation (3 bytes with all the bits equal to 1, the last byte with all the bits equal to 0)
/24 - binary short representation (the number of bits equal to 1)
TCP:
1.reliable transport between
sending and receiving
process
overwhelm receiver
sender when network
overloaded
minimum throughput
guarantee, security
required between client and
server processes
UDP:
between sending and
receiving process
reliability, flow control,
congestion control,
timing, throughput
guarantee, security,
or connection setup,
What is the decimal range of the first octet of all possible Class C IP addresses?
Class B - 128 - 191
What is the maximum distance of RS 485?
It depends on the wires' diameter you use, and the network topology you will use. Generally say the bigger the diameter you use, the distance longer. But it is the best you use it in BUS of hand in hand. If you use RS485 in tree or star network, it can not be long because of the signal's reflex on lines. What i said above must be twisted-pair, otherwise the distance can not by far. Also you need to consider the data rate you use. the lower data rate you use the longer distance you will get. But all above i said, even in the best condition, RS485 is only 300~500 meters long. If longer distance you need, you have to consider other way, such as RS485 module which use other technology to expand the distance, just only RS485 interface but not RS485 signal on the lines. For example, the PWBS01H series module i used before. It makes RS485 be 3000m distance, also supports tree or start network topology. here is the link for PWBS01H series module.
slideshare.net/eddiegao/bestrong-rs485-powerbusmodules
What is used pass the packets between networks?
There is 3 "main" ones.
UDP, TCP, and ARP.
UDP - Used for very fast messaging between servers
TCP - Used for things like chats, http, etc..
ARP - "Address Resolution Protocol" this is what's used to make it so that you are assigned an IP address..
There are thousands, literally, of protocols out there. Those are just the ones I believe fallinto this category.
What is meant by the term 'stand alone computer?
Got a hack that really works!
Post this on 5 pages.
Login to Club Penguin.
Press f3 and f6 8 times.
and you get a golden puffle
Read more: Is_there_a_code_for_club_penguin_elite_puffle_that_has_not_been_used_yet
Is 192.256.257.1 a valid ip address?
No. 255 is the highest octet. as know that th highest octet is the 255 and the third octet of this IP is more then standard so we can see it is not valid ip address the valid for this is: 192.255.255.1
What distance does local area network cover?
You have been asked to design the entire cabling system for a medical instrument manufacturer's new central warehouse. The company already has three buildings within two city blocks, and the warehouse will be its fourth building. Currently, the buildings run on separate networks, but the company would like to be able to exchange data among them. For example, the Quality Control Department in building 1 would like to be able to access servers in the Research Department in building 2. In addition, the Sales Department in building 3 wants to conduct video training sessions for its representatives
in the field via the Internet. Next door, in the warehouse, 50 shipping and packing personnel in the Fulfillment Department will be riding up and down the aisles on forklifts pulling inventory off the shelves on a daily basis.
What kind of transmission media would you recommend for each different building
and department of the medical instrument company and why?
What type of media would you recommend using to connect the buildings and why?
Finally, what kind of media should the company request from its ISP for connecting
the corporate WAN to the Internet?
What are the two types of switches used in circuit switching?
Crossbar Switch: A Crossbar Switch connects n inputs to m outputs in a grid, using electronic micro-switches (transistors) at each cross point. The major limitation of this design is the number of crosspoints required. Connecting n inputs to m outputs using a crossbar switch requires n * m crosspoints. For example, to connect 1000 inputs to 1000 outputs requires a crossbar with 1,000,000 crosspoints. A crossbar with this number of crosspoints is impractical. Such a switch is also inefficient because statistics show that, in practice, fewer that 25 percent of the crosspoints are in use at any given time. The rest are idle.
Multistage Switch: The solution to the limitations of the crossbar switch is the Multistage Switch, which combines crossbar switches in several stages. In multistage switching, devices are linked to switches that, in turn are linked top other switches.
The design of a multistage switch depends on the number of stages and the number postages required (or desired) in each stage.
How does the NIC of a receiving PC use the destination MAC address?
The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).
The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).
The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).
The receiving NIC must check that the destination MAC of a frame is the same as the MAC of the receiving NIC. If it isn't, the NIC isn't the intended destination, and it will just ignore the frame (unless it is set to "promiscuous mode", in which case it will accept all frames).
The five elements of data communication?
The five components are sender, receiver, protocol, medium and message
What is the speed of twisted pair wiring?
This depends on what "type" of twisted pair. Category 5 ( CAT5 ) cable can transmit up to 100 Mb/s, while Category 6 can transfer up to 1 Gb/s ( 1,024 Mb/s )
The most common twisted pair is CAT5, and CAT5e, used in home networks, business networks, and some multi-line telephone lines.
What advantages does token ring have over Ethernet?
ring topology uses token ring i.e one way communication which passes the token with header and Destination address into the network.If one client in the network just disconectd from the network then the the entire network collapse. For this problem FDDI is used for fault tolorence Where as ethernet works much efficiently in packet delivering
What network model ensures that no computer on the network has more authority than another?
peer-to-peer
- When both ends of a serial WAN link are configured to run the PPP encapsulation method they establish a session based on the 3 steps below:
Step 1
- Link establishment and configuration negotiation
- In this phase LCP opens the connection between the two interfaces and negotiates configuration options. this phase is done once the receiving router sends a configuration-acknowledgment frame back to the router who first initiates the connection...
Step 2
- Link quality determination (optional)
- In this phase LCP tests the link between the routers to determine if the quality is sufficient to bring up the network layer protocol.
Step3
- Network Layer Protocol configuration negotiation
- After step 2 ends, the appropriate NCP can separately configure the network layer protocols, and bring the protocol up and down at any given time. If LCP closes the link between the routers it will inform the network layer protocol so that it can take action in regards to the interfaces.
- TERMS -
PPP = Point-to-Point Protocol
LCP = Link Control Protocol
NCP = Network Control Protocols
- hope this helps :)
- miirii
The DHCP Server keeps all the information and data base about the DHCP Cliencts. And it works as folows. ________ ________ | | <-----D------------> Discover-------------> | | |DHCP | <-----O------------> Offer----------------> |DHCP | |SERVER | <-----R------------> Request--------------> |CLIENT | |________| <-----A------------> Acknowledgement------> |________|
I want further answers regarding this. please do send me.
1. DHCP automatically Discover the systems , 2. Server Send the offer to the client systems ,
3. Client send the Request to Server System,
4. last one Acknowledgement send by Server to Client
I would like to make an amendment to that so that it is somewhat further understood in it's entirety.
1st: Hardware sends a broadcast asking for information regarding DHCP servers within the network (or Sub-net of course).
2nd. DHCP server responds saying "Hey, I'm here!"
3rd. Hardware sends a query for an IP address (not the same as the request phase.)
4th. DHCP server comes back with "Here ya go, you can have xxx.xxx.xxx.xxx if you want it!"
5th. Hardware decides that's what it wants, so it requests a lease for that IP address.
6th. DHCP server acknowledges the request and assigns a lease time to that piece of hardware (identified by it's MAC address).
1st through 3rd is done through MAC as the hardware has no IP address and cannot communicate through IP. To do those communications before the IP addresses are assigned they use UDP packets with Source and Destination MAC addresses as beginning and end-points. And DHCP servers don't discover the hardware added, the hardware discovers the DHCP servers.
That's DORA in a nutshell.
How do you provide security for VPN?
VPN is a security measure of the data transmission. So the weak point would be :
1. How strong is the data transmission encryption.
2. How adequate is the endpoint security.
3. Overall how good is the policy Protection of networks & their services from unauthorized modification,destruction, or disclosure , & provision of assurance that the network performs its critical functions correctly & there are no harmful side-effects.Network security includes providing of data integrity.
Answer Network security comprises the measures a company takes to protect its computer system, and it is a prime concern for every company that uses computers. Compromised network security means a hacker or competitor may gain access to critical or sensitive data, possibly resulting in data loss, or even complete destruction of the system.
Even the owner of the VPN server can not physically see what information is held on its server - as for me it's pretty good security.
However, this does not mean that you should use unverified VPN services.
I use this: boxpn.com and I'm satisfacted- speed and cost is very ok.
And if we talk about security, OpenVPN protocol will help you (by the way, in boxpn, he is present).
What are two characteristics of the data link layer?
Allows the upper layers to access the media using techniques such as framing.
Controls how data is placed onto the media and is received from the media using techniques such as media access control (MAC) and error detection.
What is the Network layer in the OSI?
Layer 7:Application Layer
Defines interface to user processes for communication and data transfer in network
Provides standardized services such as virtual terminal, file and job transfer and operations
Layer 6:Presentation Layer
Masks the differences of data formats between dissimilar systems
Specifies architecture-independent data transfer format
Encodes and decodes data; Encrypts and decrypts data; Compresses and decompresses data
Layer 5:Session Layer
Manages user sessions and dialogues
Controls establishment and termination of logic links between users
Reports upper layer errors
Layer 4:Transport Layer
Manages end-to-end message delivery in network
Provides reliable and sequential packet delivery through error recovery and flow control mechanisms
Provides connectionless oriented packet delivery
Layer 3:Network Layer
Determines how data are transferred between network devices
Routes packets according to unique network device addresses
Provides flow and congestion control to prevent network resource depletion
Layer 2:Data Link Layer
Defines procedures for operating the communication links
Frames packets
Detects and corrects packets transmit errors
Layer 1:Physical Layer
Defines physical means of sending data over network devices
Interfaces between network medium and devices
Defines optical, electrical and mechanical characteristics
What command in the Windows Command prompt will map a network drive?
net use X: //computername/sharingpath
Where X: is the drive letter you want to map, and a sample path would be //MY-PC/sharedfolder