What are the ways to configure DNS Zones?
If using Windows, start the DNS snap in via administrative tools and right-click Forward Lookup Zones to create a new zone. A wizard will start impromptu you for the information needed. Additionally, an Active Directory integrated DNS server can be made by creating a DNS server, starting the DNS manager, and changing the zone type to be Active Directory stored.
Which two layers of the OSI model have the same functions as the TCP model network layer?
physical & data link layers
What port number is used to HTTP?
The Standard Port & Default is Port 443. You may however configure secure HTTP on another port through some software such as Servers (Apache, IIS, Xampp,etc)
Which of the following is an example of asset management on a client server network?
The question is incomplete. There are no options given (for "which of the following") to answer this question.
Which two layers of the OSI model do NICs belong?
Primarily in the Physical (first) layer to be the transciever for the Line, but many cards
these days also have acceleration and cache MAC-IP addresses and and speed up
ARP requests and translation to IP Addresses which are at the Link (second) Level.
Which is the network id for an ip address of 172.17.67.85 using the default subnet mask?
ip addresses from 172.16.0.0 thru 172.31.255.255 are private and do not route on the internet.
What is the subnet mask for ip address 5.5.65.12?
Smaller than 65.56.0.0/14. With just the IP, there is no way to know the netmask. We can see that Level 3 owns that address and their block is a /14.
It could be a /30 with a gateway of 65.56.25.18.
it could be a /29 with a gateway of 65.56.25.18-22.
In short, there is no way to definitively know the netmask from the IP only.
What network technologies does not use circuit switching?
Packet Switching - Computer Communications (Digital)
Circuit Switching was used for old fashioned telephony. At present, many companies use VOIP (Packet Switching) for voice communications.
Name 2 networking devices that transmit packets based on MAC address?
A MAC address is used as a unique identifier that is assigned to network interfaces. Two networking devices that transmit packets based on MAC addresses are switches and bridges.
Can a workstation computer be configured to browse the Internet and yet NOT have a default gateway?
If we are using public ip address, we can browse the internet. If it is having an intranet address a gateway is needed as a router or firewall to communicate with internet.
***********************************************
Without default gateway you cannot browse internet. It doesnt matter if you are on public or private network. Default Gateway is required to route your IP packets from your network to the other networks.The Data Link Layer of OSI reference model provides the service of error detection and control to higher layers. It accomplishes this task by having the sender break input data into data frames and transmit sequentially and process acknowledgement frames.
It have two sub layers:-
1. Logical Link Control sublayer
2. Media Access Control sublayer
Define and describe the two parts of a mac address?
The first 6 digits is the OUI(Organizationally Unique Identifiers given by vendors and then the last 6 digits are used to represent the NIC uniquely with the OUI value.
What cable often associate with a bus topology network?
Local Area Network Cable usually associate with a bus topology network. In a Bus topology network simple LAN cables are used with LAN Hubs ( i.e. having a collection of LAN ports ) which in turn connect many systems with the server systems. LAN cables are available in various length ranging from 1meter onwards.
What are broadcast domains created with?
A broadcast domain is created any time you connect several clients together via a network connectivity device, such as a hub or switch or bridge. They would all be in the same broadcast domain for every client connected to them.
Since a router does not forward broadcast messages, it creates different broadcast domains.
Is 255.255.255.254 a vaild subnet mask?
It's valid and it's called a noncontiguous subnet mask since the 16 bits for
the subnet mask are not contiguous. The RFC's, however, recommend against
using noncontiguous subnet masks.
What is the logical topology used for ethernet architecture?
Topology: physical ring of trees, logical ring
How do you network two computers that are about 150 ft apart?
You could hard wire the two together but it's easier to go wireless. each computer must be capable of wireless reception, if they are not go buy one or two usb adapters for hooking up to the computer. They come with software that takes you step by step to install the software so no worries there. Also buy a wireless router, linksys, dlink, belkin, netgear etc., plug ethernet line from cable modem into router instead of computer. You can install the software (sometime they want you to install it first before hooking up the router but you can just go to 192.168.0.1 or 192.168.1.1 in your web browser and go from there. Just remember you would probably want to enable encryption, 64 bit is fine. Enter a SSID unique to your desires 9Just name it something you like) and the generate the keys there'll be for rows of key number and letters remember the first row because you'll need it to log on next time you want to join you new network. There is a checkbox so that the key will be remembered so that you won't have to re-enter it every time you join your network. It'll do it automatically but no one outside of your two computer will get in. Tada!
You need: ethernet card cable cat5 4 port hub
Put the ethernet card in the computer. Then connect the cables from both computers to the hub and then from the cable modem to the hub. That should do it.
if you both want to be able to use the internet access, then the easiest way is purchase a network card(ethernet), some CAT5 cable(as previously mentioned), and a router(linksys, d-link, etc). first install the network card in the machine without one. then connect the cable modem to the routers WAN port, it should be labeled that. then in ports 2 and 3, use the CAT5 cable to connect to the yours and your partners computers. after that follow the instructions in the routers manual on final configurations(should be mostly automatic), and you're done.
While wireless is a great, inexpensive, and easy way to network, its speed and throughput is limited (56kbps-108kbps on average for 'turbo mode' links). So you could use the 1 gigabit ethernet copper wire solution (1000kbps) and get more potential speed, but if you have enterprise grade servers on a business campus say, buildings apart, that need more speed and throughput than 1Gb ethernet can provide, you can connect your servers using 10GbE fiberoptic links, using 10GbE fiber PCIe cards. The IEEE standard for 1000base-LX (long range) fiber is about 5km distance, and the 1000base-SX (short range) fiber can reach around 550m distance using the larger diameter 50 micron fiber. Keep in mind that most people's average computer uses a PCI bus for add-in cards, and the regular 32-bit PCI bus is not even fast enough to keep up with true 1Gb speeds, so that is why they only make the 10GbE cards to fit computers with PCIe buses on the motherboards. The rest of the computer needs to be pretty beefy too, in order to even be able to run even near the speeds that the network card is capable of.
How do you use peer to peer networking?
Peer-to-peer is a type of network design where all devices support roughly equivalent capabilities.
Peer-to-peer networking (also known simply as peer networking) is in contrast to client/server networking, where certain devices have responsibility for providing or
"serving" network information and other devices consume or
otherwise act as "clients" of those servers.
What class is the IP address 210.23.67.102?
Class B
Class A are octets beginning in numbers 1-126
Class B are octets beginning in numbers 128-191
Class C are octets beginning in numbers 192-223
Which network topology uses least amount of cabling?
As for most things, the lowest cost version of something is also the simplest version of something. In this case, that would be the bus network topology.
What is Fast packet switching?
fast packet switching: A packet switching technique that increases the throughput by eliminating overhead. Note 1: Overhead reduction is accomplished by allocating flow control and error correction functions to either the user applications or the network nodes that interface with the user. Note 2: Cell relay and frame relay are two implementations of fast packet switching.
Denial of service is preventing a system from providing resources or services to intended authorized clients.
Advantage of TCP: reliable data transport. Lost packets are re-sent. For this reason, many protocols that transfer data rely on TCP; this includes FTP, HTTP, and several e-mail protocols.
Disadvantage of TCP: The extra overhead makes the transmission slower. When transmission speed is more important than reliability, UDP is used instead. This is the case with phone and video transmissions over the Internet.
Advantage of TCP: reliable data transport. Lost packets are re-sent. For this reason, many protocols that transfer data rely on TCP; this includes FTP, HTTP, and several e-mail protocols.
Disadvantage of TCP: The extra overhead makes the transmission slower. When transmission speed is more important than reliability, UDP is used instead. This is the case with phone and video transmissions over the Internet.
Advantage of TCP: reliable data transport. Lost packets are re-sent. For this reason, many protocols that transfer data rely on TCP; this includes FTP, HTTP, and several e-mail protocols.
Disadvantage of TCP: The extra overhead makes the transmission slower. When transmission speed is more important than reliability, UDP is used instead. This is the case with phone and video transmissions over the Internet.
Advantage of TCP: reliable data transport. Lost packets are re-sent. For this reason, many protocols that transfer data rely on TCP; this includes FTP, HTTP, and several e-mail protocols.
Disadvantage of TCP: The extra overhead makes the transmission slower. When transmission speed is more important than reliability, UDP is used instead. This is the case with phone and video transmissions over the Internet.
What Types of network topology and give examples of each topology?
Network Topology refers to the way that cables and other pieces of hardware connect to one another. There are four common "base" types of topologies: bus, ring, star, and mesh. There are other types as well, but these are referred to as "hybrid topologies." The most commonly used network topology is a hybrid topology called the Star Bus Topology.