answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

Define and describe the two parts of a mac address?

The first 6 digits is the OUI(Organizationally Unique Identifiers given by vendors and then the last 6 digits are used to represent the NIC uniquely with the OUI value.

What cable often associate with a bus topology network?

Local Area Network Cable usually associate with a bus topology network. In a Bus topology network simple LAN cables are used with LAN Hubs ( i.e. having a collection of LAN ports ) which in turn connect many systems with the server systems. LAN cables are available in various length ranging from 1meter onwards.

What are broadcast domains created with?

A broadcast domain is created any time you connect several clients together via a network connectivity device, such as a hub or switch or bridge. They would all be in the same broadcast domain for every client connected to them.

Since a router does not forward broadcast messages, it creates different broadcast domains.

Is 255.255.255.254 a vaild subnet mask?

It's valid and it's called a noncontiguous subnet mask since the 16 bits for

the subnet mask are not contiguous. The RFC's, however, recommend against

using noncontiguous subnet masks.

How do you network two computers that are about 150 ft apart?

You could hard wire the two together but it's easier to go wireless. each computer must be capable of wireless reception, if they are not go buy one or two usb adapters for hooking up to the computer. They come with software that takes you step by step to install the software so no worries there. Also buy a wireless router, linksys, dlink, belkin, netgear etc., plug ethernet line from cable modem into router instead of computer. You can install the software (sometime they want you to install it first before hooking up the router but you can just go to 192.168.0.1 or 192.168.1.1 in your web browser and go from there. Just remember you would probably want to enable encryption, 64 bit is fine. Enter a SSID unique to your desires 9Just name it something you like) and the generate the keys there'll be for rows of key number and letters remember the first row because you'll need it to log on next time you want to join you new network. There is a checkbox so that the key will be remembered so that you won't have to re-enter it every time you join your network. It'll do it automatically but no one outside of your two computer will get in. Tada!

You need: ethernet card cable cat5 4 port hub

Put the ethernet card in the computer. Then connect the cables from both computers to the hub and then from the cable modem to the hub. That should do it.

if you both want to be able to use the internet access, then the easiest way is purchase a network card(ethernet), some CAT5 cable(as previously mentioned), and a router(linksys, d-link, etc). first install the network card in the machine without one. then connect the cable modem to the routers WAN port, it should be labeled that. then in ports 2 and 3, use the CAT5 cable to connect to the yours and your partners computers. after that follow the instructions in the routers manual on final configurations(should be mostly automatic), and you're done.

While wireless is a great, inexpensive, and easy way to network, its speed and throughput is limited (56kbps-108kbps on average for 'turbo mode' links). So you could use the 1 gigabit ethernet copper wire solution (1000kbps) and get more potential speed, but if you have enterprise grade servers on a business campus say, buildings apart, that need more speed and throughput than 1Gb ethernet can provide, you can connect your servers using 10GbE fiberoptic links, using 10GbE fiber PCIe cards. The IEEE standard for 1000base-LX (long range) fiber is about 5km distance, and the 1000base-SX (short range) fiber can reach around 550m distance using the larger diameter 50 micron fiber. Keep in mind that most people's average computer uses a PCI bus for add-in cards, and the regular 32-bit PCI bus is not even fast enough to keep up with true 1Gb speeds, so that is why they only make the 10GbE cards to fit computers with PCIe buses on the motherboards. The rest of the computer needs to be pretty beefy too, in order to even be able to run even near the speeds that the network card is capable of.

How do you use peer to peer networking?

Peer-to-peer is a type of network design where all devices support roughly equivalent capabilities.

Peer-to-peer networking (also known simply as peer networking) is in contrast to client/server networking, where certain devices have responsibility for providing or

"serving" network information and other devices consume or

otherwise act as "clients" of those servers.

What class is the IP address 210.23.67.102?

Class B

Class A are octets beginning in numbers 1-126

Class B are octets beginning in numbers 128-191

Class C are octets beginning in numbers 192-223

Which network topology uses least amount of cabling?

As for most things, the lowest cost version of something is also the simplest version of something. In this case, that would be the bus network topology.

What is Fast packet switching?

fast packet switching: A packet switching technique that increases the throughput by eliminating overhead. Note 1: Overhead reduction is accomplished by allocating flow control and error correction functions to either the user applications or the network nodes that interface with the user. Note 2: Cell relay and frame relay are two implementations of fast packet switching.

Preventing a system from providing resources or services to the intended authorized clients is a definition for?

Denial of service is preventing a system from providing resources or services to intended authorized clients.

What is the advantage of tcp?

Advantage of TCP: reliable data transport. Lost packets are re-sent. For this reason, many protocols that transfer data rely on TCP; this includes FTP, HTTP, and several e-mail protocols.

Disadvantage of TCP: The extra overhead makes the transmission slower. When transmission speed is more important than reliability, UDP is used instead. This is the case with phone and video transmissions over the Internet.

Advantage of TCP: reliable data transport. Lost packets are re-sent. For this reason, many protocols that transfer data rely on TCP; this includes FTP, HTTP, and several e-mail protocols.

Disadvantage of TCP: The extra overhead makes the transmission slower. When transmission speed is more important than reliability, UDP is used instead. This is the case with phone and video transmissions over the Internet.

Advantage of TCP: reliable data transport. Lost packets are re-sent. For this reason, many protocols that transfer data rely on TCP; this includes FTP, HTTP, and several e-mail protocols.

Disadvantage of TCP: The extra overhead makes the transmission slower. When transmission speed is more important than reliability, UDP is used instead. This is the case with phone and video transmissions over the Internet.

Advantage of TCP: reliable data transport. Lost packets are re-sent. For this reason, many protocols that transfer data rely on TCP; this includes FTP, HTTP, and several e-mail protocols.

Disadvantage of TCP: The extra overhead makes the transmission slower. When transmission speed is more important than reliability, UDP is used instead. This is the case with phone and video transmissions over the Internet.

What Types of network topology and give examples of each topology?

Network Topology refers to the way that cables and other pieces of hardware connect to one another. There are four common "base" types of topologies: bus, ring, star, and mesh. There are other types as well, but these are referred to as "hybrid topologies." The most commonly used network topology is a hybrid topology called the Star Bus Topology.

How do you get rid of port 80?

AnswerIf the port has been blocked by a proxy or a firewall there are good chances that port 443 (ssh) is allowed , you can run a https client on your home computer and have it connect it to some ssh server to have access to the internet

You can check if port 443 is allowed at http://port443.icannotconnect.com

What is the most popular type of networking cable?

P2P (peer-to-peer) networks are more often used in the home because they cost less than clitn/server network and are easier to configure and maintain.

in other words STRIAGHT THROUGH

Why are subnets necessary?

For more efficient usage of IP addresses.

Instead of an ISP assigning a customer an entire class C of IPs (255 addresses), they can assign them a smaller subnet of 8 or 16 addresses instead, only as many as the customer needs.

How do you block traffic attempting to exit a LAN?

Generally traffic exiting a LAN is controlled at the router or firewall by setting rules in the configuration files for the router or firewall restricting what IP addresses traffic can be sent to, what devices outbound traffic can be sent from. You can also set rules controlling what outbound ports, protocols, and services will be blocked or allowed. Generally the best way to configure is "deny all and allow by exception" where all traffic is blocked by default and then rules are inserted to allow exceptions for specific traffic. You would also insert settings into the Access Control List.

What is the purpose of shielding and twisting in the UTP cables?

Shielding is not available for UTP cable; it would be for STP cable.

Both cable types use twists in the wire pairs. The twists help to eliminate crosstalk, which happens when a signal from one wire "bleeds" into another wire, causing interference.

Is URL and IP address are the same thing?

URL and IP address are not the same thing, iP is Internet Protocol, a protocol used for communicating data across a packet-switched internetwork using the Internet Protocol Suite, also referred to as TCP/IP.

Uniform Resource Locator (URL) is a Uniform Resource Identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it. In popular usage and in many technical documents and verbal discussions it is often incorrectly used as a synonym for URI,

The best-known example of a URL is the "address" of a web page on the World Wide Web, e.g. http://www.harddiskdriverepair.com. and its ip is 216.65.21.62, on this ip there may be have many different domain[url].

How can you connect the PCs to the Wireless access point?

To set up a good wireless router access point, you will need internet service. Once you plug your internet cable into the appropriate spot on the router and install the software, you should be able to quickly follow the directions on the screen to setting up your home's wireless network.

What is the subnet address when ip address is 192.168.14.100?

The subnet depends on the IP addresses of the computers you are trying to connect. In most instances, a subnet of 255.255.255.0 is sufficient enough to get the job done. Subnets only really need to be configured if you are trying to connect multiple network IP distribtuions.

Trending Questions
Is there a program similar to network magic but free? What skills and knowledge do you hope to gain from your training in Computer Science from Australia? What is lan and wan? Which two types of media are useful for connecting two devices separated by a distance of 500 meters? Which network topologies have each computer connected to a central point? When a host on one network wants to communicate with a host on another network what ARP request does it send? What are advantages and disadvantages of combining the session presentation application layer in the osi model into one single application layer in internet? What is the default subnet mask for the IP address 176.43.52.18? True or False Most bus networks use coaxial cable as their physical medium? What part of this protocol controls the packet size and the transfer rate and reassenbles messages from received packets? Lan speed is measured in? What is IPv6 and when will it be used? The network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network Which protocols were used during the t? Differences between collision detection and collision avoidance? What are the seven layers in the Internet protocol stack? Three ways to classify networks are by? Several reasons to divide a network into subnets? Which of the following OSI layers does a Layer 3 switch operate at? What is a characteristic of a scalable network? What command displays the IP address subnet mask and default gateway of the system you are currently on?