answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What is the most popular signaling protocol used on traditional circuit switched PSTN connection?

SIP. Page 549 network+

PAGE 549 SENTENCE 2 STATES " THE VERSION OF SIP MOST POPULAR TODAY, 2.0" IT DOES NOT SAY IT WAS THE MOST POPULAR SIGNALING PROTOCOL USED ON TRADITIONAL CIRCUIT-SWITCHED PSTN CONNECTION PAGE 548 NOTE " ON THE CIRCUIT-SWITCHED PORTIONS OF THE PSTN, A SET OF STANDARDS ESTABLISHED BY THE ITU KNOWN AS SS7 (SIGNALING SYSTEM 7) TYPICALLY HANDLES CALL SIGNALING"

Connection reset by peer?

You will usually see this message when you have timed out of a session on a network, or the connection was interrupted for some reason.

What are the standardized protocols for call control and media mapping in network multimedia communication over packet-based networks. Describe them?

1)H.323 which is recommended by the ITU Telecommunication Standardization Sector (ITU-T) which is also incorporates signaling protocols, TCP-based Q.931 and H.245 for call control and registration admission status (RAS) for controlling user access.

2) Session initiation protocol (SIP)

3) IETF

4) TRIP and ENUM

for full details plz search google or website of "cisco"

Is stp used on lan?

Yes, STP is used in LANs where EM interference is present.

Tally 5.4 to tally 7.2 data transfer?

1. Take a backup from Tally 5.4 & place the backup on the Desktop.
2. Start Tally 7.2.
3. Click on F3 (cmp info) and chose the restore option.
4. Select the Tally 5.4 backup file from the Desktop.
5. During restore, Tally 7.2 will ask whether you want to convert (rewrite) the old data into 7.2. Click- Yes.

Hope that helps,

Kishore Thaakur

What is the value of an E.Pluribus unum with a W?

You're going to have to give us a lot better description, at least the denomination, since this motto is on a lot of US coins. The only one that I can think of right now that could have a W mintmark is the proof $1 silver eagle. I might guess that it is a Walking Liberty half dollar which has this motto and a W as the designer's signature on the reverse. As you can tell from looking at your pocket change, all U.S. coins carry the motto E Pluribus Unum ("From many, one") so this isn't a distinguishing characteristic. As noted in the answer above, you need to supply the denomination, date, and mintmark as starting points.

Discuss the consequences if a connection fails in a bus topology?

Any connection failure in a bus topology will result in the network becoming unusable due to signal bounce in the affected cable.

How are networks classified?

Network architectures are sometimes classified into two broad categories:

· client-server architectures,

· peer-to-peer architectures.

In the client-server architectural model, a system is decomposed into client and server processors or processes. Servers provide computational resources (or services), which clients consume. Typically a server provides services to many clients. It is also common for clients to consume services from multiple services. Stated otherwise, there is generally a 1:M relationship between a server and its clients, and it is sometimes the case that there is a 1:M relationship between a client and the servers that it uses. The client-server architectural model supports the separation of functionality based on the service concept.

Client-server architectures are commonly organized into layers referred to as "tiers".

Tiered Architectures· Two-tier architectures. The system architecture consists of a data server layer and an application client layer. Data access computation is associated with the data server layer, and the user interface is associated with the client application layer. If most of the application logic is associated with the client application logic, it is sometimes referred to as a "fat client." If it is associated with the data access server, the application client layer is sometimes referred to as a "thin client."

· Three-tier architecture. The system architecture consists of data server layer, an application server layer and a client application layer. The application server layer facilitates the separation of application logic from presentation, and promotes distributed processing.

· Multi-tier architecture. The system architecture is a superset of a three-tier architecture, and includes additional layers for data and/or application servers.

Peer-to-Peer ArchitecturesIn a peer-to-peer architecture model, a system is decomposed into computational nodes that have equivalent capabilities and responsibilities. This division is in contrast to a client-server architectural model, where client and server nodes are divided into server and client roles.

An example of a peer-to-peer architecture is a system of intelligent agents that collaborate to collect, filter, and correlate information.

Sometimes layered ("tiered") and peer-to-peer architectures are combined, where the nodes in particular layers are in peer-to-peer relationships. For example, a multi-tiered architecture might include an enterprise management layer, consisting of peer nodes for such things as network management, event management, database management, Web sever management, and workload balancing.

What can verified by successfully pinging the reserved loop back address on a host?

The only thing that pinging the local loopback adapter on a host will prove is that the TCP/IP stack is installed and operating correctly. It will not diagnose a faulty NIC.

Do firewalls prevent pinging?

I think, Most of the time to play online games or open up new things it says to "Disable Your Firewall" Of course you disable it and the game works. Of Course, Say if you play online servers like the popular server "XBCConnect" Just an Example, But to open that Server you would need to disable your "Firewall" I think that can prevent Pinging depends on if your running your firewall and it's pinging try turning it off and see if it's pinging. But Sometimes you will just have to reset your router for better connection and less ping. To reset your router "Unplug the AC Adapter Cord" looks like a head phone jack cord or wire. But other times you might need to simpily Restart your computer. Make sure you know what your doing with your cords so you don't mess them up though. I hope this Answer helps you It was the best answer i could give. ------ Firewalls are highly configurable. Depending on the manufacturer, its default behavior may be to drop ICMP (ping) packets. There really is no standard rule on the subject. There are probably thousands of different types of firewalls. In general, though, if you are on the "inside" (protected network) of a firewall, your pings will not be prevented.

What class License do APIPA addresses use?

APIPA addresses are in the range 169.254.0.1 through 169.254.255.254.

These would be in the Class B address range.

Lans can be connected bydevices called?

LAN can be connected by routers . A router can be used to connect to LAN's .a LAN to a WAN and LAN to Internet.

What are the advantages of operating a separate high-speed network to support video editing applications in addition to the existing network?

Video editing and transferring those files over a network (e.g. to a NAS device or server) can use tremendous amounts of bandwidth and can slow down other network operations like file sharing, internet browsing, etc, while video data is being transferred across the network. Running a seperate network dedicated to video editing applications will ensure that your normal network does not become congested and slow while video data is being transferred across the network. Furthermore it allows you to ensure that the video network is being operated with the highest-grade networking technology available (e.g. gigabit, 10 gigabit, fiber optic, etc) without having to upgrade the entire network. The third advantage that I can see is security. A seperate physical network is much more difficult to intrude upon than a subnetwork that's part of a larger physical connection of cables and switches.

How does a packet from one LAN node find its way to a recipient on the same LAN?

If you have a hub then the packet is sent to every computer, and only the right computer will read it. The rest just quietly ignore it. Obviously this poses a major security risk.

If its a switch then the switch has a table which tells it which address matches which port. So when the packet arrives, the switch checks the destination address then it goes to the table and gets the corresponding port and then sends the packet accordingly.

A router works similarly enough. Except a router can do alot more complex operations.

A DHCP service must be authorized?

The service needs to be running, and the scope needs to be authorized before addresses may be given out.

How you can connect a WiMax internet USB to a switch?

You would have to make use of a computer that connects both the WiMax usb and a network cable to connect to the switch.

Then, in windows, you need to bridge the 2 connections.

How many PC that can put on class c?

Class C have 8 bit use for host address. So we have 2^8=256 address, but the first and the last one is not used for host => 256-2=254 PC (or host)

What does the Controller Area Network actually do?

The Controller Area Network also known as CAN works ad a message transmission station to direct buses and other publicly funded vehicles on where to go and what locations they need to be at.