How do you know which bits are host bit in a subnet mask?
Since a subnet mask is used to separate the network id from the host id, any 1 bits indicate the network portion and the 0 bits indicate host portion. As an example, in the subnet mask:
255.255.0.0
This indicates the first two octets are used for the network, and the last two octets (ipV4) are used for host portion of an address.
How telnet function in OSI model?
Telnet is an application layer protocol (Layer 7). Its functionality is similar to any of the layer 7 protocols, including DHCP, DNS, FTP, etc.
What software can be used to explore other computers on a network even the computer has a password?
On a well secured system it is not possible to intrude without Knowing or Cracking the password.
Network Management or Antivirus Server Software can help if the Admin Password are known for the systems.
UTP stands for Unshielded Twisted Pair.
This is a type of cable which has the shielding above the twisted cables for EMI/EMC protection.
1000 BASE-TX
1000 BASE-SX
What disadvantages of gateway?
1, Gateways require greater processing limits due to protocol conversion.
2, They are slower than other network devices.
3, Installation and configuration of Gateway is more difficult, therefore requires special technicians.
4, It is more expensive than other devices.
1 Networks provide the benefits to the user Is there any area where networks are not beneficia?
They would not be beneficial in any area that has no need or requirement to share resources or to enforce security and policy (on the network).
There are multiple connection options for a Network Printer.
1. The Printer can be attached to a Router and be available to all of the Network's Computers that can access that router.
2. If the printer is attached to Computer "A" (via USB or WiFi) any Computer on the Network that can access Computer "A" can be allowed to access the Printer. Of course Computer "A" MUST be up and running.
What are functions and features of osi reference model?
OSI functions Application - To provide the user with an application service Presentation - For translation and formatting of data Session - For control of logical flow between end-points Transport - Transparent end-to-end transmission of data Network - Routing and connection control Data-link - To maintain relaibale point-to-point connection Physical - Tranmission of bits through a physical medium
How many lan gauges could Herenery speak?
Hernery does not have wife no more because he divsord them all.
The datagram length field in an IPv4 datagram contains which numeric value?
Total number of bytes in the datagram, including the header.
The length of an IP datagram itself is technically measured in bytes. The length field represents the size of both the header and the data portions of the datagram.
Superscope
NNTP · SIP · SSI · DNS · FTP · Gopher · HTTP · NFS · NTP · SMPP · SMTP · SNMP · Telnet ·
To help AstroTech Components company to get their network running again would be a simple solution. The network is saturated, it seems like they are dealing with a collapsed backbone topology using a router or a switch as the single central connection point for multiple subnetworks. Failure in the central router or switch can bring down the entire network, I would check to make sure the central router and switch are in working condition and also I would Segment the network with vlans by department. Or move the 10GBase-T hosts to their own dedicated switch, creating a new LAN.
-Jaskaran Singh Walia
What similarities do peer-to-peer and client-server networks have?
Both use the same medium to send and recieve information.