225.225.225.0 and 120.12.10.3 on the same network?
255.255.255.0 is subnet mask and 120.12.10.13 is ip address.
Does all link layer protocols need addresses?
In some way, shape, or form, every device on a network needs an address, regardless of the OSI layer being used. Otherwise there is no way to deliver a frame to the correct device.
Why is it important for networks to be able to maintain a unique address?
For identification.
If 2 networks suddenly had the same IP address, information might bedelivered to the wrong one of them.
What is purpose of a subnet mask?
A subnet is a shortened term for a sub-network. It is part of the Internet Protocol, or IP services used in computer technology. It is an integral part of the system, and it has been around since even before the World Wide Web.
How does a client determine the host name of the client computer?
Most operating systems have a methodology for determining the host name of a client. On the command line, the command is usually 'hostname', for both Windows and Unix/Linux.
From the GUI Windows perspective, looking at the System or Computer properties will reveal the hostname.
What device can you use for having maximum bandwith in a PC connected in a network?
Router having maximum bandwidth in network. and in network fiberoptic cable having max bandwidth for data travaling
What kinds of attacks involve intercepting and modifying network packets?
1) Man-in-the-middle
2) TCP/IP hijacking
What devices are needed to create an ad hoc connection and what mode does this type of network use?
An ad-hoc network is a wireless network in which all connections are wireless. The only devices required are wireless network interface cards in all of the devices that want to participate in the network.
if the LAN is connected to another LAN over a wide distance using point to point links then it becomes part of the WAN (but it doesn't become a WAN by itself).
found it!!
ok, for anyone who needs the answer..
"you configure CFP by a two-step process. Go to Security/Tasks/Add a Zone; give it a name and define the IP range (or go with the default, which is the entire subnet). Then go to Security/Tasks/Define a New Trusted Network; use the Zone you just created. This will put two rules at the top of Network Monitor; the first will Allow IP Out from Any to Zone, and the 2nd will Allow IP In from Zone to Any - this allows unencumbered communication across your LAN."
What is the telltale factor for ascertaining where faults in a cable lie?
Impedance.
Depending on the cable type, it may also be possible to use a device called a "reflectometer", which sends a pulse down the wire and calculates the distance based on how long it takes for the signal to bounce back. This type of device works best for coaxial type cable.
What do you understand by broadcast network?
When a packet arrives at the network layer on the sender's device, it is encapsulated into a frame whose destination MAC address is all fs (FF-FF-FF...). The switch connected to the sender's device recognizes the all fs MAC address as a broadcast message and hence forwards it to all its ports.
Identify the command used to display information on routing-table updates and route-cache updates?
route#debug ip routing
What are the main advantages and disadvantages of using a layered network architecture?
The following are the advantages of a layered architecture:
Layered architecture increases flexibility, maintainability, and scalability. In a Layered architecture we separate the user interface from the business logic, and the business logic from the data access logic. Separation of concerns among these logical layers and components is easily achieved with the help of layered architecture.
Multiple applications can reuse the components. For example if we want a windows user interface rather than a web browser interface, this can be done in an easy and fast way by just replacing the UI component. All the other components like business logic, data access and the database remains the same. Layered architecture allows to swap and reuse components at will.
Layered architecture enables teams to work on different parts of the application parallely with minimal dependencies on other teams.
Layered architecture enables develop loosely coupled systems.
Different components of the application can be independently deployed, maintained, and updated, on different time schedules.
Layered architecture also makes it possible to configure different levels of security to different components deployed on different boxes. sO Layered architecture, enables you to secure portions of the application behind the firewall and make other components accessible from the Internet.
Layered architecture also helps you to test the components independently of each other.
The following are the disadvantages of a layered architecture:
There might be a negative impact on the performance as we have the extra overhead of passing through layers instead of calling a component directly.
Development of user-intensive applications can sometime take longer if the layering prevents the use of user interface components that directly interact with the database.
The use of layers helps to control and encapsulate the complexity of large applications, but adds complexity to simple applications.
Changes to lower level interfaces tend to percolate to higher levels, especially if the relaxed layered approach is used.
How switch faster as compare to hub?
Most of the time, a switch will send information only to the destination, while a hub will send to all of its ports. That makes the hub inefficient - in a hub, only one computer can transmit at a time.
Most of the time, a switch will send information only to the destination, while a hub will send to all of its ports. That makes the hub inefficient - in a hub, only one computer can transmit at a time.
Most of the time, a switch will send information only to the destination, while a hub will send to all of its ports. That makes the hub inefficient - in a hub, only one computer can transmit at a time.
Most of the time, a switch will send information only to the destination, while a hub will send to all of its ports. That makes the hub inefficient - in a hub, only one computer can transmit at a time.
What device separates collision domains?
Bridges, Switches and Routers will all separate collision domains.