answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What is another name for the default gateway?

A "Default Gateway" refers to the Router to which your Local Area Network is connected to. This Router provides the link to the outside world (Internet or Wide Area Network). If this is a home PC situation then the Broadband Router is the Default Gateway.When your PC requests a network resource (webpage or server share) that is not on the local subnet the request is automatically forwarded to the Default Gateway which in turn forwards the request to the far end (Node) of that link. You can have many Gateways on your LAN, each providing a Route to a particular extenal network. All networks must have one of these Gateways as default so all other requests can be sent to it by "Default" this is where the term comes from.

What is the role of dhcp?

Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway. RFCs 2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many implementation details. DHCP allows hosts to obtain necessary TCP/IP configuration information from a DHCP server.
If you want to more further detail so you can visit this website:http://www.iyogibusiness.com

The most common type of home network is?

The word "type" here is a bit too broad; I'll try to answer this as best I can.

Wired: A typical home LAN is connected using CAT5e or CAT6 ethernet cable with RJ-45 ends. These sorts of networks can run at 10, 100, or 1000 Mbps speeds, though the most typical is 100 Mbps. The major advantage of a wired network is that it can run at higher speeds than wireless standards, especially if you're willing to shell out the extra cash for gigabit (1000 Mbps) devices.

Wireless: With the development of new wireless standards we have seen several different wireless speeds emerge: 11, 56, and 108 Mbps are the most common speeds, with 56 Mbps still being the most common. The main advantage of wireless networks tends to be portablility, though reception issues and speed are usually the major limiting factors.

A network uses a subnet mask of 255.255.255.0 has a computer on the network with an IP address of 120.12.12.3 Will the IP address 120.12.10.3 be on the network Explain your answer?

This is vague, but I'll try.

If a computer is on a network, and it's IP address is 120.12.12.3, with a subnet mask of 255.255.255.0, then that means that all computers/devices/printers that have IP addresses in the range of 120.12.12.1-120.12.12.254 are on the same network, and would be directly reachable without the need of a router. For instance, If there was a computer with IP 120.12.12.4, they could talk directly. But, if a computer with IP 120.12.13.15 wanted to communicate, it would first have to communicate to and through a router.

Subnet masks tell us what part of the IP address is the network portion and which is the host. A 255 in the first three octets tells us that the first three bytes/octets/portions of the IP address needs to be examined for a match. If they match then the computers can directly communicate, no match? They must traverse a router.

Why are switches preferable to hub in Ethernet network?

Switches are almost always faster than hubs and send out less data than hubs as well, these reason for this is the same; when a hub gets data from any connected device it sends the message to all connected devices, a switch just sends it to the device that it is for. As such switches are seen as "smarter" devices than hubs, which is another advantage.

What is the maximum length of a VGA cable?

Information deterioration only begins on a noticable level after the first 100 ft or so.

There are two factors that greatly affect the image quality. One is the VGA driver - the display card. Many are designed to drive only short distances and do not perform well above 10 to 20 feet. The other is the cable itself. VGA is a high resolution video signal and demands a properly designed cable to carry it over a long distance. Many short VGA cables do not comply with the transmission standards for long distances. They work over a length of 5 feet or so but for long distance transmission, 75 ohm co-ax cable is needed for each of the red, green and blue signals.

Given a proper video driver in the display card, several hundred feet is possible if the right grade of video cable is used to carry the signal. This type of cable is not a standard product in most cases, so it will need to be made to order. Standard cables over 100 feet are rare.

What are two advantages of modular chassis switches over fixed chassis switches?

Two advantages of modular chassis switches over fixed chassis switches are their ease of upgrade and their flexibility. Modules can be freely swapped to increase its capacity or capabilities based on ever changing demands.

How many twisted pairs are in Category 6 cable?

The question makes no sense. A cable cannot have volts in it. Voltage is measured across an element. I assume that you are asking what the voltage between the signal lines and the answer is dependent on what you are connected to. Gigabit ethernet is one level, 10/100 is another and so on.

What are the most common physical components of a network?

tae ka!kung sino man ikaw!Bwisit!

^^ this stupid guy doesnt know the answer... hes filipino luckily i know how to speak it he says: you are crap! whoever you are!... i dont know what Bwiwsit means. but the answer is a router or a phone line (you should be able to connect the phone line to your computer) a computer or laptop.

What is the function of network topology?

yes, network topology does matter to design a network. as we know that topology is a structure of network. without a topology network cannot be designed. we have to consider which topology to use and what does each topology does. different topology have its different features. if you want most secure connection use full mesh topology

What is sniffing in computer sense?

Sniffing is a computer network hacker term. On Ethernet networks data is sent in data packets. The packet includes the sending address, the data being sent, and the address it came from. Hackers are able to use a "sniffing" program to intercept those packets of data and read them.

How do subnet masks indentify that a network has been subnetted?

If (for example) the first 20 bits of the subnet masks are "1", then any IP address that shares the same 20 bits with the IP address of my computer is in the same subnet.

Note that a subnet only indicates the size of the current subnet, the subnet in which your computer (for example) is located. Other subnets of a network may have different sizes; this can't be ascertained just by looking at you IP address and subnet. Nor is it relevant for your computer: The computer only has to know that anything outside the subnet has to be sent first to the default gateway - the server or router that connects your subnet to the remainder of the net.

If (for example) the first 20 bits of the subnet masks are "1", then any IP address that shares the same 20 bits with the IP address of my computer is in the same subnet.

Note that a subnet only indicates the size of the current subnet, the subnet in which your computer (for example) is located. Other subnets of a network may have different sizes; this can't be ascertained just by looking at you IP address and subnet. Nor is it relevant for your computer: The computer only has to know that anything outside the subnet has to be sent first to the default gateway - the server or router that connects your subnet to the remainder of the net.

If (for example) the first 20 bits of the subnet masks are "1", then any IP address that shares the same 20 bits with the IP address of my computer is in the same subnet.

Note that a subnet only indicates the size of the current subnet, the subnet in which your computer (for example) is located. Other subnets of a network may have different sizes; this can't be ascertained just by looking at you IP address and subnet. Nor is it relevant for your computer: The computer only has to know that anything outside the subnet has to be sent first to the default gateway - the server or router that connects your subnet to the remainder of the net.

If (for example) the first 20 bits of the subnet masks are "1", then any IP address that shares the same 20 bits with the IP address of my computer is in the same subnet.

Note that a subnet only indicates the size of the current subnet, the subnet in which your computer (for example) is located. Other subnets of a network may have different sizes; this can't be ascertained just by looking at you IP address and subnet. Nor is it relevant for your computer: The computer only has to know that anything outside the subnet has to be sent first to the default gateway - the server or router that connects your subnet to the remainder of the net.

What is the difference between UTP and STP twisted pair cables?

* UTP for Unshielded Twisted Pair * STP for Shielded Twisted Pair * FTP for Foiled Twisted Pair * S/UTP for Screened Unshielded Twisted Pair * S/STP for Screened Shielded Twisted Pair * S/FTP for Shielded Foiled Twisted Pair

* UTP cable has no shielding, only an insulation around the cables * STP cable has a metal shield around each twisted pair, all pairs together are in the cable covered by insulation * FTP cable has a metal shield around all pairs - "the cable"- together * S/UTP cable has a metal shield around all pairs - "the cable"- together

(or would be the same as FTP) * S/STP cable has a metal shield around each twisted pair, and a metal shieldaround all pairs - "the cable"- together

(or would be the same as S/FTP) * S/FTP cable has a metal shield around each twisted pair, and a metal shield around all pairs - "the cable"- together

(or would be the same as S/STP) * UTP is unshielded, that's simple. * FTP and STP are ofted intermixed, sometimes S/UTP is also thrown in. In general it means the cable is shielded in one place. * S/FTP ans S/STP are of course often intermixed, both should get you a double shielded cable. * Unshielded twisted pair cable will do just fine if there are not too much electromagnic interferences (EMI), that's what the twisting is for. * Shielded cable will protect your signal better from interference. Though there are no guarantees of course, if the interference source is too strong it'll still influence things.

Things like big electro motors (an elevator engine), powerfull speaker systems (festival rig), strong light installations (that same festival rig) or a nearby high-power cable are some examples of interference sources. * Evidently unshielded cable is typically more flexible then shielded cable. * I have no idea what the practical difference between FTP and STP cable would be, but it might have something to do with the flexibility rather then with the shielding effectiveness. (): Shield

[]: Insulation

O: Conductor

[O][O]: One twisted pair of cables UTP

[ [O][O] [O][O] .... [O][O] ] FTP

[ ( [O][O] [O][O] .... [O][O] ) ] STP

[ ([O][O]) ([O][O]) .... ([O][O]) ] S/FTP

[ ( ([O][O]) ([O][O]) .... ([O][O]) ) ]

What is a global network of computers linked each other?

It's called the Internet, and no I'm not being sarcastic - that quite literally "is" the definition of the Internet:

a worldwide network of smaller computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange among the global community.

What is the difference between ipx spx and tcp ip?

It's very detailed. TCP and IPX are protocals that sort your data into a certain pattern so that you can transmit it over your line (phone, cable, ethernet, etc). The receiver than recongnized this specific pattern and can re-assemble the data back into it's original format. TCP and IPX are just types of patterns that are used to send data. TCP is used for your internet connection and your LAN. IPX is an older protocol that is dying out. It is still used in some video game interfaces. There is much more detail in the the exact way they organize data. I'm sure there are reports on this subject you can find on Google.

What types of data can be transmitted over a network?

Basically, any type of data. Data stored in computers is stored as 1's and 0's; such data ("digital data") can be encoded in such a way that it represent a wide variety of types of data, such as documents, images, sounds, videos, computer programs, and probably several other types of information. Any such data can be transmitted over a network. However, the network may impose a limit on how fast such data can be transmitted - or more accurately, with what bandwidth (measured in bits per second or some multiple, for example, Mbps). This may make it impractical, for example, to transmit high-quality movies over certain slower networks.

How does VPN provide secure communications?

VPN's are exactly about protecting your Internet connection via high-level security.

Many people generate the error of considering that utilizing a VPN can get rid of their require for an antivirus program. Although a VPN will not function as antivirus software as well as are not able to eliminate infections from your gadget, it can significantly decrease the possibilities that your computer will be impacted by malware or computer viruses. {

{Also|Additionally} Encryption {alone|only} {will not|will never} prevent your gadget from {becoming|getting} infected. Malware and spyware {can be|could be} {placed|positioned} on your computer by {many|numerous} different {websites|sites}, and {the end|the final} result {is that|is} these harmful programs and scripts {can really|can definitely} slow down your {browsing|searching}. {Because they|Simply because they} run in the background, malware programs are {hard|difficult} to detect. {That is why|This is why} you {need to|have to} implement frequent antivirus scanning of your machine to identify and remove harmful programs. This is prong two of your approach.