answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

How do you get rid of port 80?

AnswerIf the port has been blocked by a proxy or a firewall there are good chances that port 443 (ssh) is allowed , you can run a https client on your home computer and have it connect it to some ssh server to have access to the internet

You can check if port 443 is allowed at http://port443.icannotconnect.com

What is the most popular type of networking cable?

P2P (peer-to-peer) networks are more often used in the home because they cost less than clitn/server network and are easier to configure and maintain.

in other words STRIAGHT THROUGH

Why are subnets necessary?

For more efficient usage of IP addresses.

Instead of an ISP assigning a customer an entire class C of IPs (255 addresses), they can assign them a smaller subnet of 8 or 16 addresses instead, only as many as the customer needs.

How do you block traffic attempting to exit a LAN?

Generally traffic exiting a LAN is controlled at the router or firewall by setting rules in the configuration files for the router or firewall restricting what IP addresses traffic can be sent to, what devices outbound traffic can be sent from. You can also set rules controlling what outbound ports, protocols, and services will be blocked or allowed. Generally the best way to configure is "deny all and allow by exception" where all traffic is blocked by default and then rules are inserted to allow exceptions for specific traffic. You would also insert settings into the Access Control List.

What is the purpose of shielding and twisting in the UTP cables?

Shielding is not available for UTP cable; it would be for STP cable.

Both cable types use twists in the wire pairs. The twists help to eliminate crosstalk, which happens when a signal from one wire "bleeds" into another wire, causing interference.

Is URL and IP address are the same thing?

URL and IP address are not the same thing, iP is Internet Protocol, a protocol used for communicating data across a packet-switched internetwork using the Internet Protocol Suite, also referred to as TCP/IP.

Uniform Resource Locator (URL) is a Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it. In popular usage and in many technical documents and verbal discussions it is often incorrectly used as a synonym for URI,

The best-known example of a URL is the "address" of a web page on the World Wide Web, e.g. http://www.harddiskdriverepair.com. and its ip is 216.65.21.62, on this ip there may be have many different domain[url].

How can you connect the PCs to the Wireless access point?

To set up a good wireless router access point, you will need internet service. Once you plug your internet cable into the appropriate spot on the router and install the software, you should be able to quickly follow the directions on the screen to setting up your home's wireless network.

What is the subnet address when ip address is 192.168.14.100?

The subnet depends on the IP addresses of the computers you are trying to connect. In most instances, a subnet of 255.255.255.0 is sufficient enough to get the job done. Subnets only really need to be configured if you are trying to connect multiple network IP distribtuions.

What is meant by single broadcast domain and single collision domain?

A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium or through repeaters, in particular, when using early versions of Ethernet. A network collision occurs when more than one device attempts to send a packet on a network segment at the same time. Collisions are resolved using carrier sense multiple access with collision detection in which the competing packets are discarded and re-sent one at a time. This becomes a source of inefficiency in the network.[1]

Only one device in the collision domain may transmit at any one time, and the other devices in the domain listen to the network in order to avoid data collisions. Because only one device may be transmitting at any one time, total network bandwidth is shared among all devices. Collisions also decrease network efficiency on a collision domain; if two devices transmit simultaneously, a collision occurs, and both devices must retransmit at a later time.

Collision domains are found in a hub environment where each host segment connects to a hub that represents only one collision domain and only one broadcast domain. Collision domains are also found in wireless networks such as Wi-Fi.

Modern wired networks use a network switch to eliminate collisions. By connecting each device directly to a port on the switch, either each port on a switch becomes its own collision domain (in the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full duplex links.

A broadcast domain is basically a VLAN. The broadcast domain defines how far a Layer-2 broadcast will propagate on the network, which is to say the broadcast will hit every device on the VLAN, or every device on the "subnet". Routers block broadcasts by design. If you need to leave your broadcast domain (get off your local subnet) then you jump up to layer 3 and go through a router to talk to machines on some other broadcast domain. The layer 2 broadcast will typically traverse all hubs, bridges and switches in a single VLAN. If you question was in the context of using a "single broadcast domain" just be careful not to do that for a relatively large network with several hundred or thousands of nodes, or the network performance and/or the end-station performance will suffer because of all the broadcast traffic.

Why is LAN advantageous?

Access to a LAN (a local-area network) is important for any networking, such as accessing the Internet, sharing data with other computers in the same house, sharing a printer, and many other useful functions.

However, a computer can be perfectly useful without Internet or local network access. For example, you could still use it to create software, digital art, text documents, manage your digital photos or music collection, and many other tasks.

What commands will show the route that packets take across the network?

tracert is the perfect function for you. E.x:

CMD

{

tracert 192.168.1.1

}

That will allow you to see where your data packet has traveled.

The 192.168.1.1 is only an example.

Hope this answer has helped you! :D

What are the two factors used to determine the different category UTP cable?

To test whether a cable deserves to be called, for example, "category 5e", an alternating current ("signal") is injected at different frequencies on each pair of wires, and measurements are made, how much energy crosses over to other pairs of wire. The less energy crosses over, the better. The higher cable categories use the same methods, but they have more stringent requirements.

To test whether a cable deserves to be called, for example, "category 5e", an alternating current ("signal") is injected at different frequencies on each pair of wires, and measurements are made, how much energy crosses over to other pairs of wire. The less energy crosses over, the better. The higher cable categories use the same methods, but they have more stringent requirements.

To test whether a cable deserves to be called, for example, "category 5e", an alternating current ("signal") is injected at different frequencies on each pair of wires, and measurements are made, how much energy crosses over to other pairs of wire. The less energy crosses over, the better. The higher cable categories use the same methods, but they have more stringent requirements.

To test whether a cable deserves to be called, for example, "category 5e", an alternating current ("signal") is injected at different frequencies on each pair of wires, and measurements are made, how much energy crosses over to other pairs of wire. The less energy crosses over, the better. The higher cable categories use the same methods, but they have more stringent requirements.

What is the max Ethernet speed for cat3?

The max speed is 100mb on Cat3 cable. We have it here and have hooked a fluke up to it as well as plugged a laptop directly in switch at a gig speed.

What is the max distance of 802.11n router?

The max distance of a 802.11n router is approximately 100 feet. This distance is usually considerably shorter in most homes due to interference.

What is a network hub/switch?

A hub is a repeater reading electronic signals from a cable and replicating them on all other interfaces (broadcast).

a switch operates at Layer 2 of the OSI model forwarding frames to their destination/next hop only (rather than to every address connected like a hub).

Switches facilitate simulcast (1 to 1), Multicast (1 to many) and broadcast (1 to all).

Describe how packet loss can occur at output ports?

Output ports can transmit only a single packet in a unit of time (the packet transmission time), the arriving packets will have to queue for transmission over the outgoing link. There could be more packets arriving from the switching fabric at the output port while the output port is still working on sending the packets that are already on the queue. Eventually, the number of queued packets can grow large enough to exhaust the memory space at the output port, in which case packets are dropped or lost.

What is the difference of cat 5 and cat 5e?

Difference between a cat 5 5e and 6 networking cable?

Cat5 cable is broken into two separate categories: Cat5 and Cat5E cables. Cat5 has become obsolete in recent years, due to its limitations compared to Cat5E and Cat6 cables. Although the Cat5 cable can handle up to 10/100 Mbps at a 100MHz bandwidth (which was once considered quite efficient), the newer versions of Cat cables are significantly faster.

Cat5E cable (which stands for "Cat5 Enhanced") became the standard cable about 15 years ago and offers significantly improved performance over the old Cat5 cable, including up to 10 times faster speeds and a significantly greater ability to traverse distances.

Cat6 cables have been around for only a few years less than Cat5E cables. However, they have primarily been used as the backbone to networks, instead of being run to workstations themselves. The reason for this (beyond cost) is the fact that, while Cat6 cables can handle up to 10 Gigabits of data, that bandwidth is limited to 164 feet - anything beyond that will rapidly decay to only 1 Gigabit (the same as Cat5E).

Cat6A is the newest iteration and utilizes an exceptionally thick plastic casing that helps further reduce crosstalk. The biggest distinguishing difference between Cat6 and Cat6A cables is that Cat6A can maintain 10 Gigabit speeds for the full 328 feet of Ethernet cable.

What is class D default sub net mask?

Seems to me, I'm still learning, that the Class D subnet mask would be 224.0.0.0 or 1110 0000.0000 0000.0000 0000.0000 0000 in binary. The Internet has been using classless subnets for a while now, so it may not be as relevant as it once was.