answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What routing protocols have the poorest convergence time?

You might try reading the PDF found at:

http://www.thinkmind.org/download.php?articleid=sysmea_v3_n34_2010_5


This will probably give you the information you seek.

What is the router static routes cisco 6.8.1?

for R1-ISP

network - 192.168.23.0

mask - 255.255.255.192

next hop - 192.168.23.121 (R2's S/0/0/0 IP Address)

for R2-Central

network - 0.0.0.0

mask - 0.0.0.0

next hop - 192.168.23.122 (R1's S/0/0/0 IP Address)

Your R2-Central is right but your R1-ISP is wrong Sir!

correct R1-ISP

network - 172.16.0.0

mask - 255.255.254.0

next hop - 172.16.3.97

Why can't a network 192.168.1.136 with subnet for six client addresses connect?

IP Address

Additional info:

The IP address for a client may not be on the correct subnet; it is possible that the subnet mask is incorrect.

What is tokens as in token ring networks?

The token is a special 3 byte sequence that indicates the state of the ring; it may mark the ring as in-use, or free (anyone can use it), or health status.

Any client needs to have access to the token before transmitting or receiving on the ring network.

How do you tell if the network requires wpa2?

In the list of available networks, right click the one you want to check and check properties. You will see all required information.

What are the advantages of FDDI over token ring?

Although they both use a rotating ring setup, the FDDI uses two to achieve better results and less chance of failure. FDDI also uses a timed protocol that leads to differences in frame format and how station traffic is controlled.

What does protocol binding order refer to?

Protocol binding order refers to the order in which a protocol will be matched to a data packet. If, for example, you have a network connection which is running several different protocols it is important to tell the system which protocol to try first.

If you are using Netware, TCP/IP, and any other protocols on the same network, if 70% of your network traffic (as an example) is TCP/IP, then you want the network operating system software to check if a packet is a TCP/IP packet first, and if not, try the other networking protocols.

With the binding order, you tell the adaptor the order of checking for the correct network protocol, starting with the one with the most traffic, and going down from there.

How do you find MBPS?

There are two (or three) schools of thought on this.

In base 2 (binary) there are 1024 bits in a kilobit, and 1024 kilobits in a megabit. So in that case you would divide by 1024 to convert kilobit to megabit.

Most often, especially in the media and common use of the public, you see base 10 (decimal) where 1 megabit = 1000 kilobit. This is not preferred, but its very common. In that case you would divide by 1000 to convert kilobit to megabit.

What operates at layer 3 of the osi model and uses 32bit IP address in an atempt to send incoming signals to the correct destination network?

actually each and every service is run by port numbers and these port numbers are generated dynamically and attached to the IP address for example

source address 1.1.1.1:1280 destination address 4.2.2.2:80

in above case the web server which runs on port 80 receives the request from 1.1.1.1:1280 and sends the relative info to the same 1.1.1:1280

hence the data is send to the particular system,

likewise the different services will run behind the scenes uses only one IP address

isolated by port numbers

What does it take to be an archetect?

You need these qualification to become a architect:

  • Design talent
  • Engineering ability
  • Social awareness
  • Business aptitude
  • Legal knowledge

Why is promiscuous mode operation important for protocol analysis?

It allows the protocol analyzer to capture and inspect all traffic on the network medium, including errors and malformed packets

What would you recommend for the core switches?

Depending on the size of the network and actual traffic requirements technically a "core layer switch" can scale from a 2960 all the way up to and beyond a 6500.

How do you play roadrash on LAN?

yes we can play roadrash on lan......I have tried this