What is the differences between Internet and intranet and Extranert?
Internet, Intranet ,and Extranet
There's one major distinction between an intranet and the Internet: The Internet is an open, public space, while an intranet is designed to be a private space. An intranet may be accessible from the Internet, but as a rule it's protected by a password and accessible only to employees or other authorized users.
From within a company, an intranet server may respond much more quickly than a typical Web site. This is because the public Internet is at the mercy of traffic spikes, server breakdowns and other problems that may slow the network. Within a company, however, users have much more bandwidth and network hardware may be more reliable. This makes it easier to serve high bandwidth content, such as audio and video, over an intranet.
(unless you work for the United States Marine Corps. Then you don't get to watch video's. And they Block 80% of any kind of "fun" or entertaining website available on the Internet)
The Extranet is a portion of an organization's Intranet that is made accessible to authorized outside users without full access to an entire organization's intranet.
_____________________________________**************______________________________________
Above are good points of differences between internet intranet and extranet
But Here are 10 good clear cut differences
conceptsimplified.com/compare/difference-between-internet-intranet-and-extranet/
Briefly outline how a modem works?
poooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
What is a common reason for network failure?
Applications are disrupted by network failures more than by power shortages or problems with physical components, it has been asserted.
Figures from industry analyst Freeform Dynamics indicate that only software component failures account for more application outages.
Disadvantages of the GSM technologies?
According to Cellular News, call quality problems, including dropped calls and missed calls are common problems with GSM technology. These problems result directly from the technology in use. GSM technology cannot accommodate as many callers on a single cell tower as the more modern CDMA technology. This means that callers in areas where there are not a preponderance of cell towers may find that the call problems on GSM will be more common.
ZDNet UK reports that GSM has a serious security flaw, demonstrated by a hacker who was able to intercept phone calls from a number of GSM-based cellular phones. The problem is based directly on the technology according to this hacker and his solution was to "turn off" the GSM technology (only the older 2G technology though) that is commonly used by people all over the world. The problem is largely mitigated however by the use of the more modern 3G technology that is commonly used (as of November, 2010) on many GSM phones.
Another problem with GSM is a network problem rather than a consumer problem, though it is a consumer problem for those who don't want to see a proliferation of cellular towers. As previously noted, GSM technology can handle fewer callers on a single cellular tower. Therefore, networks who work with GSM must find ever more areas to built GSM cellular towers, causing them to have problems with costs and locations. By the same token, some consumers who prefer not to see a proliferation of cellular towers consider this a problem because the cellular towers must be placed in more and more urban areas, potentially spreading more radiation and causing what some consider a blight on the landscape.
What are advantages of connecting computers and devices on a network?
There are many advantages to connect devices and computers to a network. One advantage is sharing a printer over a network. You can print from several different computers with only on printer and that saves the hassle of transferring files and pictures back and forth to print them the expense of purchasing multiple printers. Also you can share certain files and documents on a network.
What is a TCP session termination?
TCP stands for Transmission Control Protocol. It is responsible for sending data and ensuring it gets to its locaton. In order to do this TCP checks to make sure a line is open to send data, if it is then it sends the data, then waits for a message to ensure the data made it to its location. Hence the term TCP session is open when the data is sent and then the TCP session is closed once the data is confirmed that it arrived safely. This is a simplified explanation, pick up any book on Networking and it will explain it to you in detail. TCP/IP is the internet, it is the only protocol used on the Internet because it is so reliable.
What is the maximum cable length for a 100 baseT Ethernet?
100BASE-T has a data trasnfer rate up to 100 Mbps. 100BASE-T is based on the older Ethernet standard. Its 10 times faster than Ethernet it is also called Fast Ethernet. The 100BASE-T standard is IEEE 802.3u
What technology is use in L2 and L3 switches?
Basically a layer 2 switch operates utilizing Mac addresses in it's caching table to quickly pass information from port to port. A layer 3 switch utilizes IP addresses to do the same.
While the previous explanation is the "What", for folks in networking the following "How" is far more interesting.
Essentially, A layer 2 switch is essentially a multiport transparent bridge. A layer 2 switch will learn about MAC addresses connected to each port and passes frames marked for those ports. It also knows that if a frame is sent out a port but is looking for the MAC address of the port it is connected to and drop that frame. Whereas a single CPU Bridge runs in serial, todays hardware based switches run in parallel, translating to extremly fast switching.
Layer 3 switching is a hybrid, as one can imagine, of a router and a switch. There are different types of layer 3 switching, route caching andtopology-based. In route caching the switch required both a Route Processor (RP) and a Switch Engine (SE). The RP must listen to the first packet to determine the destination. At that point the Switch Engine makes a shortcut entry in the caching table for the rest of the packets to follow. Due to advancement in processing power and drastic reductions in the cost of memory, today's higher end layer 3 switches implement a topology-based switching which builds a lookup table and and poputlates it with the entire network's topology. The database is held in hardware and is referenced there to maintain high throughput. It utilizes the longest address match as the layer 3 destination.
Now when and why would one use a l2 vs l3 vs a router? Simply put, a router will generally sit at the gateway between a private and a public network. A router can perform NAT whereas an l3 switch cannot (imagine a switch that had the topology entries for the ENTIRE Internet!!). In a small very flat network (meaning only one private network range for the whole site) a L2 switch to connect all the servers and clients to the internet is probably going to suffice. Larger networks, or those with the need to contain broadcast traffic or those utilizing VOIP, a multi network approach utilizing VLANs is appropriate, and when one is utilizing VLANs, L3 switches are a natural fit. While a router on a stick scenario can work, it can quickly overtax a router if there is any significant intervlan traffic since the router must make complicated routing decisions for every packet that it recieves.
What is the highest transmission speed attainable using the best twisted-pair cable?
The maximum is 1 Gbps (CAT-5e, CAT-6), the maximum distance without attenuation is 100 m.
On a switch each port is its own collision domain, therefore collisions do not happen.
What network device can be used to segment a network to increase performance?
a) A router
b) A switch
c) All of the above
What hardware do you need for LAN?
When you are setting up a local area network, also know as a LAN, you need to be sure that you have all of the correct hardware before you begin. If you do not, you will not be able to complete the setup. There are not all that many pieces that are needed, so it should not be hard for you to find the things that you need. With a little bit of time, you will be able to establish a network in your home, school, or place of business that will help people to connect with one another and communicate at a high level.
The first thing that you need to purchase is a central server. All of your computers will be hooked into this. It provides the main hub that stores all of the data and ties all of the computers together. Some people will even have such extensive networks that they will need multiple servers to hold all of the information that they possess. If this is the case in your situation, you can buy a few servers and a server switch. They can then be connected with ethernet cables to form a server base.
Next, you need to get one of two types of routers. You can either get a hard-wired router that requires all of the computers to be connected to it with cables, or you can get a wireless router that allows them to connect from remote locations. Wireless routers are the more popular choice in the modern day because they help to reduce the amount of materials that you need. They also make it possible for mobile computers such as laptops to connect to the network from anywhere.
Finally, you just need to get a number of console computers. These are the devices through which people will connect to the network. All computers will not be allowed. A password will be required. You can program the console computers that you buy to automatically remember any passwords that you have established. This will enable your employees or family members to access the network with ease, but it will also keep out all potential intruders.
Distinguish between udp and tcp protocol found in transport layer?
TCP (Transmission Control Protocol) is considered to be a 'reliable' protocol for the transport of data. This is because it uses a applies a conversation mechanism that involves establishing a connection (a process known as 'hand-shaking') before sending the data and waiting for the receiving computer to reply.
If the receiving computer didn't get the complete data (e.g. it didn't arrive or it was corrupted) then it will request that the sending computer retransmits the data.
UDP (User Datagram Protocol) is considered to be an 'unreliable' protocol because it does not bother with the hand-shaking or the error checking. Data is transmitted and is assumed to arrive at the other end. It's up to the Application Layer (not the Transport Layer) on the receiving computer to sort out the datagrams that arrive and check that they're not corrupted.
IF the receiving computer is going to request missing or damaged UDP packets then it's up to the application to do so, not the Transport layer.
255.255.0.0 Class B 128.0.0.0 - 191.254.254.254 default subnet 255.255.0.0
Why is important to analyze data check and identify problems on the LAN?
If you are using a guaranteed reliable delivery method for transport such as TCP, each side (sender-receiver) has to be checking for successful transport of a packet. If the packet was not received correctly the sender needs to be notified so it can retransmit it.
It is only important for these things if you are using a protocol that insists on reliability. There are other transport models that don't care about the reliability of the transfer and don't have to check or identify problems.
What is the pin for belkin router f5d7234-4 v3?
the pin code is on the label in the back of the unit ...my is 45216909..but once I used this code, my wireless still recognize the pin..any solution?
When attempting to network my computers, I was prompted to enter an 8-digit pin which is supposedly found on the bottom of the router. It wasn't, of course. So I called Belkin (877 736 5771) and was told that they could assist in resetting my router's pin, to effect a bypass which would allow me to network, in the absence of m router pin. I didn't proceed for unrelated reasons. Anyway, if you don't have your pin, and need it, call Belkin. 'Hope this helps.
Distance limitation UTP cabling?
Generally speaking about 100 meters. Though I always recommend go about 85-90 meters, that way if there's ever problems your not left wondering if it has anything to do with line attentuation.
Simple answer is:
In order to connect to your switch or to do some troubleshooting of the links connected to the switch you require an ip add binded on the switch, therefore to access it or troubleshoot any link connected to it an ip add is used.
Detailed answer:
For Example lets consider a scenario in which a switch connected to 2 diff sites, A & B. Both A & B are using point to point ip to communicate with each other and are assigned a single VLAN 100 to pass through the switch.
Suppose if site B gets down due to any reason and you want to confirm it, you will access your switch and shutdown the port connected to site A because you are about to bind site A's ip address to your vlan interface, finally you will bind the ip address of site A to interface vlan 100 and then ping site B, if the ping response is not successful it means the problem exists in the path & vice versa. This detailed answer is just to clear the concept.
Regards,
Engr. Emad ul Haq
What is a purpose of default gateway?
When users sign into the internet they may not realize they are using a series of gateways to access their favorite websites. A default gateway is used a lot in office settings where a lot of computers need to be connected to both their internal network and the internet.
Is IP address 172.32.1.100 public or private?
Private IP address ranges:
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
Definitely private =)
This is a Class B public address because the first octet ranges from 128 and 191.
Sorry! 172.16.50.100 falls in the category of private ip networks.
How does TCP and IP address works on networking?
TCP/IP is composed of layers, wherein each layer is responsible for performing certain operations on the data it receives and passing it to the higher layers. Each layer deals with certain issues related to the transmission of data and renders certain services to its higher layers.
The TCP/IP model consists of the link layer, the Internet layer, the transport layer and the application layer. Each layer consists of a set of protocols that function on the level of that layer. The link layer protocols are responsible for connecting the nodes in a network. The Internet layer consists of protocols, specifications and methods that are used to transport data packets across the network. The transport layer protocols deal with the transmission of data packets between source and destination network hosts. The application layer, the topmost layer in TCP/IP, directly interacts with application services. Thus, we see that TCP/IP functions at all the levels of communication between the components of a network. It is truly, the heart of network communication.
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the sub net mask and default gateway.
For any further detail, so you can visit this website:http://www.iyogibusiness.com
Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain necessary TCP/IP configuration information from a DHCP server.
If you want to more further detail so you can visit this website:http://www.iyogibusiness.com DHCP (Dynamic Host Configuration Protocol) is a network protocol that enables a server to automatically assign an IP address to a computer.