answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What is the maximum cable length for a 100 baseT Ethernet?

100BASE-T has a data trasnfer rate up to 100 Mbps. 100BASE-T is based on the older Ethernet standard. Its 10 times faster than Ethernet it is also called Fast Ethernet. The 100BASE-T standard is IEEE 802.3u

What technology is use in L2 and L3 switches?

Basically a layer 2 switch operates utilizing Mac addresses in it's caching table to quickly pass information from port to port. A layer 3 switch utilizes IP addresses to do the same.

While the previous explanation is the "What", for folks in networking the following "How" is far more interesting.

Essentially, A layer 2 switch is essentially a multiport transparent bridge. A layer 2 switch will learn about MAC addresses connected to each port and passes frames marked for those ports. It also knows that if a frame is sent out a port but is looking for the MAC address of the port it is connected to and drop that frame. Whereas a single CPU Bridge runs in serial, todays hardware based switches run in parallel, translating to extremly fast switching.

Layer 3 switching is a hybrid, as one can imagine, of a router and a switch. There are different types of layer 3 switching, route caching andtopology-based. In route caching the switch required both a Route Processor (RP) and a Switch Engine (SE). The RP must listen to the first packet to determine the destination. At that point the Switch Engine makes a shortcut entry in the caching table for the rest of the packets to follow. Due to advancement in processing power and drastic reductions in the cost of memory, today's higher end layer 3 switches implement a topology-based switching which builds a lookup table and and poputlates it with the entire network's topology. The database is held in hardware and is referenced there to maintain high throughput. It utilizes the longest address match as the layer 3 destination.

Now when and why would one use a l2 vs l3 vs a router? Simply put, a router will generally sit at the gateway between a private and a public network. A router can perform NAT whereas an l3 switch cannot (imagine a switch that had the topology entries for the ENTIRE Internet!!). In a small very flat network (meaning only one private network range for the whole site) a L2 switch to connect all the servers and clients to the internet is probably going to suffice. Larger networks, or those with the need to contain broadcast traffic or those utilizing VOIP, a multi network approach utilizing VLANs is appropriate, and when one is utilizing VLANs, L3 switches are a natural fit. While a router on a stick scenario can work, it can quickly overtax a router if there is any significant intervlan traffic since the router must make complicated routing decisions for every packet that it recieves.

What hardware do you need for LAN?

When you are setting up a local area network, also know as a LAN, you need to be sure that you have all of the correct hardware before you begin. If you do not, you will not be able to complete the setup. There are not all that many pieces that are needed, so it should not be hard for you to find the things that you need. With a little bit of time, you will be able to establish a network in your home, school, or place of business that will help people to connect with one another and communicate at a high level.

The first thing that you need to purchase is a central server. All of your computers will be hooked into this. It provides the main hub that stores all of the data and ties all of the computers together. Some people will even have such extensive networks that they will need multiple servers to hold all of the information that they possess. If this is the case in your situation, you can buy a few servers and a server switch. They can then be connected with ethernet cables to form a server base.

Next, you need to get one of two types of routers. You can either get a hard-wired router that requires all of the computers to be connected to it with cables, or you can get a wireless router that allows them to connect from remote locations. Wireless routers are the more popular choice in the modern day because they help to reduce the amount of materials that you need. They also make it possible for mobile computers such as laptops to connect to the network from anywhere.

Finally, you just need to get a number of console computers. These are the devices through which people will connect to the network. All computers will not be allowed. A password will be required. You can program the console computers that you buy to automatically remember any passwords that you have established. This will enable your employees or family members to access the network with ease, but it will also keep out all potential intruders.

Distinguish between udp and tcp protocol found in transport layer?

TCP (Transmission Control Protocol) is considered to be a 'reliable' protocol for the transport of data. This is because it uses a applies a conversation mechanism that involves establishing a connection (a process known as 'hand-shaking') before sending the data and waiting for the receiving computer to reply.

If the receiving computer didn't get the complete data (e.g. it didn't arrive or it was corrupted) then it will request that the sending computer retransmits the data.

UDP (User Datagram Protocol) is considered to be an 'unreliable' protocol because it does not bother with the hand-shaking or the error checking. Data is transmitted and is assumed to arrive at the other end. It's up to the Application Layer (not the Transport Layer) on the receiving computer to sort out the datagrams that arrive and check that they're not corrupted.

IF the receiving computer is going to request missing or damaged UDP packets then it's up to the application to do so, not the Transport layer.

Why is important to analyze data check and identify problems on the LAN?

If you are using a guaranteed reliable delivery method for transport such as TCP, each side (sender-receiver) has to be checking for successful transport of a packet. If the packet was not received correctly the sender needs to be notified so it can retransmit it.

It is only important for these things if you are using a protocol that insists on reliability. There are other transport models that don't care about the reliability of the transfer and don't have to check or identify problems.

What is the pin for belkin router f5d7234-4 v3?

the pin code is on the label in the back of the unit ...my is 45216909..but once I used this code, my wireless still recognize the pin..any solution?

When attempting to network my computers, I was prompted to enter an 8-digit pin which is supposedly found on the bottom of the router. It wasn't, of course. So I called Belkin (877 736 5771) and was told that they could assist in resetting my router's pin, to effect a bypass which would allow me to network, in the absence of m router pin. I didn't proceed for unrelated reasons. Anyway, if you don't have your pin, and need it, call Belkin. 'Hope this helps.

Distance limitation UTP cabling?

Generally speaking about 100 meters. Though I always recommend go about 85-90 meters, that way if there's ever problems your not left wondering if it has anything to do with line attentuation.

Interface VLAN 1 has ip address of 192.168.1.2 255.255.255.0 and the default gateway of 192.168.1.1. why does interface VLAN 1 require an ip address in this this LAN?

Simple answer is:

In order to connect to your switch or to do some troubleshooting of the links connected to the switch you require an ip add binded on the switch, therefore to access it or troubleshoot any link connected to it an ip add is used.

Detailed answer:

For Example lets consider a scenario in which a switch connected to 2 diff sites, A & B. Both A & B are using point to point ip to communicate with each other and are assigned a single VLAN 100 to pass through the switch.

Suppose if site B gets down due to any reason and you want to confirm it, you will access your switch and shutdown the port connected to site A because you are about to bind site A's ip address to your vlan interface, finally you will bind the ip address of site A to interface vlan 100 and then ping site B, if the ping response is not successful it means the problem exists in the path & vice versa. This detailed answer is just to clear the concept.

Regards,

Engr. Emad ul Haq

What is a purpose of default gateway?

When users sign into the internet they may not realize they are using a series of gateways to access their favorite websites. A default gateway is used a lot in office settings where a lot of computers need to be connected to both their internal network and the internet.

Is IP address 172.32.1.100 public or private?

Private IP address ranges:

10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255

Definitely private =)

This is a Class B public address because the first octet ranges from 128 and 191.

Sorry! 172.16.50.100 falls in the category of private ip networks.

How does TCP and IP address works on networking?

TCP/IP is composed of layers, wherein each layer is responsible for performing certain operations on the data it receives and passing it to the higher layers. Each layer deals with certain issues related to the transmission of data and renders certain services to its higher layers.

The TCP/IP model consists of the link layer, the Internet layer, the transport layer and the application layer. Each layer consists of a set of protocols that function on the level of that layer. The link layer protocols are responsible for connecting the nodes in a network. The Internet layer consists of protocols, specifications and methods that are used to transport data packets across the network. The transport layer protocols deal with the transmission of data packets between source and destination network hosts. The application layer, the topmost layer in TCP/IP, directly interacts with application services. Thus, we see that TCP/IP functions at all the levels of communication between the components of a network. It is truly, the heart of network communication.

What is DHCP?

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the sub net mask and default gateway.

For any further detail, so you can visit this website:http://www.iyogibusiness.com

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain necessary TCP/IP configuration information from a DHCP server.

If you want to more further detail so you can visit this website:http://www.iyogibusiness.com DHCP (Dynamic Host Configuration Protocol) is a network protocol that enables a server to automatically assign an IP address to a computer.

Why was the TCP IP model developed?

The main theme of dividing the protocol into layers is to explain the rules of each layer specifically. This helps in putting various functions in separate modules and at the same time hiding the details of what they do and how they do it from other layers. This way we could improve the performance of one function or even change it all together, without having to change the whole protocol stack.

Which three statements best describe a Local Area Network (LAN)?

A LAN provides network services and access to applications for users within a common organization.Each end of the network is generally connected to a Telecommunication Service Provider (TSP).
Local Area Network it cover small geographic area like home, office and other grouped of building.

What is the difference between Cat 5 and cat 6 cables?

Hello All,

There is one major Diffrence between cat6 and cat7 , and this deference is cat 6 has 100 MBPS network speed and cat7 has 1 GBPS network speed.

Regards

-Amol N Gajare

What is LAN Network Connector?

LANs are networks that connect devices, like computers and printers, over short distances typically within an office premises or campus.Communication devices are connected through cables within a distance of 2000 feet.Newer terms like Wireless Local Area Network(WLAN) and Blutooth technology are also associated with LAN today.

What connector is commonly used on CAT 3 cable?

The standard connector for Ethernet cable is called the RJ45 by everybody. The fact this not actually and RJ45 but is in fact a 8P8C in irrelevant to common usage.

cat5, cat5e, and cat6 are common specifications for unshielded twisted pair used in Ethernet cabling.

Cat5e is useful for distances of up to 100 meters ( you can get a bit more distance out of it) and speeds of up to 1gigabit per second. While cat6 can handle speeds of up to 10 gigabits per second there is no real use for cat6 outside of data centers or as backbone in large environments as the 10Gb equipment is frightfully expensive and a very very fast internet connection of 20 megabits per second is 500 times slower.

This is probably too much information but there you go. f:)

How many ports in hub and a switch?

I don't think it has to be anymore than 2, but it can be quite a few. The problem with a hub say for a computer like a usb hub is that each device receives less power and they are all sharing the same port, its like hooking 5 computers to one modem.