What does the term network-aware application mean and List a few examples?
Some end user applications are "Network Aware" , meaning they implement the application layer protocols and are able to communicate directly with the lower layers of the protocol stack. Email clients and web browsers are examples of these applications.
Virtual Circuit
Can there be collisions on a switch?
Yes.
If a host is set for half duplex it can experience collisions. In this case it could try sending packets at the same time it is receiving packets.
I can't think of any other situation that would cause collisions to take place on a switch.
Which type twisted pair cable will you use to connect router to router?
UTP (unshielded twisted pair) Cat5 or Cat6.
How is ARP reply message different from that of ARP request message?
An ARP request is a broadcast Ethernet packet, that is, a packet sent onto the local physical network that all attached devices will receive. A device sends an ARP request to make the query "what is the MAC address (a.k.a. hardware address, link layer address, etc.) of this IP address (a.k.a Layer 3 address, logical network address, etc.)?"
An ARP reply is an unicast Ethernet packet, sent from the device that currently owns the specified IP address, back to the device which sent the ARP request. That is, no other device will receive this packet. The ARP reply answers the requester's question, saying "IP address x.x.x.x is associated with MAC address xx:xx:xx:xx:xx:xx".
What tool is used to configure a DHCP scope?
For a Windows based system you use the DHCP MMC snapin console. This is installed when the DHCP server service is installed.
For Linux and Unix based systems you can edit the DHCP configuration file in /etc
What is a hard loop back test?
A hard loopback test in telco speak is a simple device that connects the transmit tip side of a circuit to the receive tip side, and the transmit ring side to the receive ring side to complete a loop where the circuit is actually sending and receiving to itself. The device is usually an RJ45x plug that a tech will modify and place into a D-mark jack. By doing this, say in a T-1 circuit, you end up with a monitoring situation where the remote end tester can send and receive patterns to check whether a circuit is taking any errors. This can also be achieved by sending a loop pattern to a piece of equipment causing it to go into a loop for testing. But the hard loop is a physical piece placed into the circuit usually where the customer plugs his equipment. Mike Q Special Equipt Installer --GTE/Verizon 30 years
What is NetWare connectionless protocol?
First let me explain the difference between connection oriented and connectioinless oriented. We'll use you as an example, Lets say you want to send an email to your friend in Australia. You need a system called a protocol to set up your system before you send the message. First a connection has to be made with your buddies Internet supplier, then once the connection is made you can send your email, then you want to make sure he got your email and then you want to end the session so someone else can use the system. On a connection protocol, the protocol first establishes a connection, then waits for a signal from the receiver to make sure the system is clear, then the data is sent, then it waits for a signal to say the data was received, then the session is closed. On a connectionless protocol, the session is established, the data is sent, and then the session is closed. So there is no confirmation if the data was received. That is what connectionless means, Netware uses a Transport protocol called IPX which is a connectionless protocol. So that is where the name came from.
What two tools can be used to remove dust from inside a computer case?
The best way to dust off a computer case is either with compressed air, or a static-free cloth of some sort. You want to avoid vacuum cleaners or furniture polish because they could damage the computer.
How does TCP try to avoid network meltdown?
No, TCP is responsible for reliable transport delivery. It doesn't know about network congestion (other than flow control caused by ICMP messages).
What is the range of usable hosts for the subnet containing IP address 135.17.20.1?
NetRange: 135.17.0.0 - 135.17.255.255
CIDR: 135.17.0.0/16
How many Categories of UTP cable exist?
Seven different UTP Cable..
Category 3, Category 4, Category 5, Category 5e, Category 6, Category 6e, & Category 7...
What is metropolitan area network?
A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN). The term is applied to the interconnection of networks in a city into a single larger network (which may then also offer efficient connection to a wide area network). It is also used to mean the interconnection of several local area networks by bridging them with backbone lines. The latter usage is also sometimes referred to as a campus network.
What are the proper requirements for a 10Base2 network?
The requirements for a 10Base2 network:
RG58u Coaxial cable
T-connectors
BNC's
Terminators
Ground, usually a ground chain
Internetworking with Cisco and Microsoft Technologies pg. 226 and 227
Star
How do geographers define the concept of overpopulation?
They define it as a surplus in the human population in the ecumene.
How do X - 25 gateways link hosts and LANs?
Remote LANs can communicate with host mainframes using X.25 gateway. For that a Gateway PC with an adapter Card functions as a cluster conroller and runs special gateway software that contains QLLC protocol.
What is the maximum number of bits that can be borrowed to create a subnet for a Class C network?
You can borrow 6 bits. Which would create a 255.255.255.252 subnet mask, but this subnet only contains 2 usable IP addresses.
7 bits would be 255.255.255.254, but that subnet is too small to have any use in the real world.