answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What layers of the OSI model are implemented in hardware?

The physical and link layers (layers 1 and 2) are implemented in hardware. The remaining five layers use these two layers to communicate across a network, and are done by software.

A tcp connection is in 'established' state.................?

It is established after the 3-way handshake is complete and the channel is open between a sender and a receiver.

Why ip is called connectionless?

IP is connectionless because you don't want routing to reply to every routing request; it would slow things down to almost a stop. The router has to assume that the packet arrives where it was sent.

What are reasons why LANs are segmented?

LANs are segmented for the following reasons:

  1. Keeps traffic isolated on certain segments - that way a busy LAN segment cannot overload the entire LAN.
  2. Security - some packets are contained in the LAN segment and the rest of the network does not see the packet at all
  3. Legacy protocols - some older protocols may be in use in a certain part of the network but there is no reason for the entire network to see the packets they cannot understand
  4. Better troubleshooting - it is easier to identify where the problem is if the network is segmented
  5. Allows for better scalability if you need to add clients to a part of the network

How do you create work group?

Configuring a workgroup is easy - give the workgroup and name and use that name in the workgroup section for the computer identification. The other choice is for a client-server (domain) based network. Therefore you only have two choices for computer identification; either as a workgroup or as a domain (client/server).

What routing protocols have the poorest convergence time?

You might try reading the PDF found at:

http://www.thinkmind.org/download.php?articleid=sysmea_v3_n34_2010_5


This will probably give you the information you seek.

What is the router static routes cisco 6.8.1?

for R1-ISP

network - 192.168.23.0

mask - 255.255.255.192

next hop - 192.168.23.121 (R2's S/0/0/0 IP Address)

for R2-Central

network - 0.0.0.0

mask - 0.0.0.0

next hop - 192.168.23.122 (R1's S/0/0/0 IP Address)

Your R2-Central is right but your R1-ISP is wrong Sir!

correct R1-ISP

network - 172.16.0.0

mask - 255.255.254.0

next hop - 172.16.3.97

Why can't a network 192.168.1.136 with subnet for six client addresses connect?

IP Address

Additional info:

The IP address for a client may not be on the correct subnet; it is possible that the subnet mask is incorrect.

What is tokens as in token ring networks?

The token is a special 3 byte sequence that indicates the state of the ring; it may mark the ring as in-use, or free (anyone can use it), or health status.

Any client needs to have access to the token before transmitting or receiving on the ring network.

How do you tell if the network requires wpa2?

In the list of available networks, right click the one you want to check and check properties. You will see all required information.

What are the advantages of FDDI over token ring?

Although they both use a rotating ring setup, the FDDI uses two to achieve better results and less chance of failure. FDDI also uses a timed protocol that leads to differences in frame format and how station traffic is controlled.

What does protocol binding order refer to?

Protocol binding order refers to the order in which a protocol will be matched to a data packet. If, for example, you have a network connection which is running several different protocols it is important to tell the system which protocol to try first.

If you are using Netware, TCP/IP, and any other protocols on the same network, if 70% of your network traffic (as an example) is TCP/IP, then you want the network operating system software to check if a packet is a TCP/IP packet first, and if not, try the other networking protocols.

With the binding order, you tell the adaptor the order of checking for the correct network protocol, starting with the one with the most traffic, and going down from there.

How do you find MBPS?

There are two (or three) schools of thought on this.

In base 2 (binary) there are 1024 bits in a kilobit, and 1024 kilobits in a megabit. So in that case you would divide by 1024 to convert kilobit to megabit.

Most often, especially in the media and common use of the public, you see base 10 (decimal) where 1 megabit = 1000 kilobit. This is not preferred, but its very common. In that case you would divide by 1000 to convert kilobit to megabit.

What operates at layer 3 of the osi model and uses 32bit IP address in an atempt to send incoming signals to the correct destination network?

actually each and every service is run by port numbers and these port numbers are generated dynamically and attached to the IP address for example

source address 1.1.1.1:1280 destination address 4.2.2.2:80

in above case the web server which runs on port 80 receives the request from 1.1.1.1:1280 and sends the relative info to the same 1.1.1:1280

hence the data is send to the particular system,

likewise the different services will run behind the scenes uses only one IP address

isolated by port numbers

What does it take to be an archetect?

You need these qualification to become a architect:

  • Design talent
  • Engineering ability
  • Social awareness
  • Business aptitude
  • Legal knowledge