answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What is a public ip different then network id?

An "ip address" is a complete source or destination address that has a network id portion and a client or host portion.

The network id is just a piece of the IP address.

So, a public ip is an IP address that can be routed, whereas the network id is just a part of the public ip. They aren't different; the network id is part of the ip address.

What will happen when you use a straight through cable to connect your computer to the fast ethernet interface of a router?

that depends.

A router network interface is the same as a computer interface, so without a cross-over cable, your computer and router will both try to send data on the same pair of wires which doesn't work.

But, some routers are smart enough to sense that data is arriving on the wrong pair of wires and it will automatically swap its transmit and receive paths to make it work.

fm

When not to use TCP?

Because of the overhead, TCP should not be used as a transport mechanism if the user or endpoints do not require reliable delivery, but are more interested in speed than quality.

Drag the networking terms on the left and drop them into their appropriate layer on the right?

This type of question is impossible to answer. We at WikiAnswers have no way to view the diagram, page, or picture that you are referring to.

What is the maximum speed at which data can be transmitted between two nodes?

The speed of light is the limit for the transmission of information. As for the bandwidth (the number of bits per second that are transmitted), fiber optics currently exist that allow 40 Gbps; experimentally, higher bandwidths have already achieved, but this is not standardized. It is also possible to connect several of those in parallel, to achieve even higher bandwidths.

Which topologies used in supercomputer?

Several different topologies are used in supercomputing. A mesh architecture is one of the more common topologies out there. Mesh architectures are particularly well suited to applied simulations. The canonical example is a simulation of ocean weather patterns where each node in the supercomputer will represent (and handle calculations for) a specific patch of ocean, such as a 10x10 square mile sector. In this example, each patch of ocean must communicate information, such as wind speed and temperature to other neighboring nodes and in turn, must update the sector parameters based on information received by its neighbors.

Other example topologies include the master/slave architecture where one node serves to aggregate and process results from all other nodes. There are also ring topologies, tree topologies, and hypercube topologies. By far the fastest communicating, and most expensive topology is the all-to-all topology where every node is connected to every other node. This works fine in superomputers with 20 nodes, but in the largest supercomputers, trying to connect thousands of nodes each to the other thousands of nodes becomes practically impossible. Hence why there are other topologies.

What network use star topology?

Star topology:- In this topology all PC are connected with the central device. Central may be HUB and SWITCH. Star widely use in all over word. Ring topology:- In this ring topology all PC are connected in the frame of ring are close Ring topology use MSAU each PC has a two never road one is called up Stream and called down stream. It used token passing Matterhorn which implement the token ring network. " Is the best of star topology".

Which device directs signals to all other nodes on a LAN?

A hub or repeater will repeat signals to all other devices on a LAN. In addition, any broadcast packet will be repeated to all other nodes of a LAN as well.

What is the difference between IGP and EGP?

IGP stands for Interior Gateway Protocol...and EGP- Exterior gateway protocol

As name suggests..that IGP works for Intra-Autonoumus system...and EGP works between two Autonoumous system

IGP examples: RIP,OSPF,EIGRP

EGP: IS-IS,BGP...

Explain the Distance Vector Routing Protocols and its features?

Distance Vector means that Routers are advertised as vector of distance and direction. 'Direction' is represented by next hop address and exit interface, whereas 'Distance' uses metrics such as hop count.

Routers using distance vector protocol do not have knowledge of the entire path to a destination. Instead DV uses two methods:

  1. Direction in which or interface to which a packet should be forwarded.
  2. Distance from its destination.

What are the routing metrics for OSPF?

OSPF uses cost as its routing metric .

cost is calculated for every outgoing interface of a router through which packets transfer.

it is calculated by the formula

cost = 100000000/(bandwidth of output interface)

most likely bandwidth of serial int is 1544kb= 1544000 bytes

PS: all cost calculation to be done in bytes for ease

What is the maximum counting speed of a 4 bit binary counter which is composed of a flip flop with a propagation delay of 25nano seconds?

Assuming you are running in synchronous mode, a counter with a propagation time of 25 ns can run up to 40 MHz. Since there are other gates involved, I would consider a margin of safety to be 20 MHz.

What is queuing time?

the time between the arrival of material at a workstation and the start of work on it

What are two reasons you would use DHCP on your network?

The Dynamic Host Configuration Protocol (DHCP) is a network management protocol commonly used for (among other things) assigning dynamic IP addresses to network clients. The primary benefit of using this technology is you can take a finite amount of IP address space and partition it out to transient users as it is needed, reclaiming addresses no longer in use. The use of DHCP also saves end users and desktop administrators from manually assigning IP addresses to systems. Let's look at how DHCP works.

When configuring DHCP, the network administrator sets a value known as the DHCP lease. This is the amount of time a system may retain an IP address without contacting the DHCP server. When the time expires, the system must reach out to the server and request a renewal of the DHCP lease. Generally speaking, DHCP leases are set to a long period of time (measured in days) on stable networks where the same systems are generally present from day-to-day. On the other hand, networks with many transient users (such as public hotspots) typically have short lease times to allow the efficient reuse of addresses.

DHCP churn is a term used to describe the fact that different systems may obtain the same IP address from a DHCP server when the first system's lease expires. This really isn't a problem, except in two special cases:

  1. You're trying to track systems for some purpose and don't have access to the DHCP logs. For example, if you're maintaining a spam blacklist and a spamming system shows up on your blacklist with a DHCP-provided address, you may inadvertently block future users of that address from sending mail.
  2. You're a researcher measuring the prevalence of some phenomenon across the Internet and use IP addresses to track systems. If a single system exhibits your target behavior, but has many different dynamically assigned addresses, it might skew your results.

The bottom line is, unless you're in one of those two very special cases, DHCP churn isn't a big deal. You should set your DHCP lease lifetime based upon your expected users needs and not worry about this issue.

*This answer was taken from the related link.

How do you fix icmp?

The question does not make sense; ICMP isn't broken - it is the protocol for informing other devices or users that there are problems on the network, or for control messages in general.

How many collision domains exist in a network with 15 hosts interconnected by means of a hub?

For any amount of clients connected to a hub you will get a total of 1 collision domain. A hub is a device that simply repeats all of the signals from the ports and does not separate clients into separate collision domains.

Trending Questions
Do devices connected to the Internet have a unique IP address.? Which cable have less attenuation? What is the beginning ip address of this network id 198.162.10? Why wont my digital id match up with my i.p address to allow me to load .exe? What protocols operates in the network osi layer and is able to communicate with the transport osi layer and the data link layer? How can you connect between two switch without router? What is vpn hard token? How many bits class A networks are reserved for private address space? How do you prevent signal interference with other electrical devices? What part of 192.168.10.51 is the Network ID assuming a default subnet mask? How can I disconnect someone from my internet who is using it without permission. I do not have physical access to it? How does a host know a data packet was not received? What are the advantages and disadvantages of NFS server? Which port is used by ICMP? Why does the switch between Host and the router not require configuration with an IP address to forward packets? Which part of an IP address identifies a specific device on a network? If you have decided to change FTP port number on the server from its default number 23 for better security what will be the result of this change? What is the computer that host resources for use by other system on the network? If you use a router to network a cable modem do you lose connection speed since you are using multiple PC's? What command should be added to the end of an access list 150 to allow other data packets to enter and exit the router?