answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What if there are no mac addresses and all adapters use ip addresses?

Ethernet devices are identified by their MAC address, not an IP address. If their were no MAC address incorporated into the device then it is not following the rules define for the ethernet protocol. It would not be an ethernet network adapter or it would be a defective ethernet network adapter.

As the LANs are designed for arbitrary network layer protocols, not just IP, so if the adapters are assigned with IP addresses rather than MAC addresses, than it will be difficult for adapters to support other network layers. Even if the adapters use entire network layer addressing schemes, they will need to be reconfigured every time they are powered up. So it is imperative to use neutral MAC address independent of network layer addressing schemes in order to ensure better performance of network.

ACL stands for?

ACL stands for Anterior Cruciate Ligament

Why does the ping 192.168.0.1 -l 50 is not pinging?

You are not connected to the network or your firewall is blocking the ping.

What are the various types of compilers used in computers?

Compiler can be divided into following four main types.

1. one pass compilers

2. multi pass compilers

3. load and go compiler

4. optimizing compilers

Why your server have a Internet but your client no Internet?

I assume your server is a gateway... One of the reasons is that it is not configured properly or one or more services have failed require attention of network administrator.

Exterior routing protocol example?

BGP border gateway protocol is the most commoly use exterior gateway protocol. EGP are used by ISP's and are being routed from a private network to the internet and to its destination private network.

Do you need Juniper Network on your home computer?

The Juniper "Network Connect" VPN software is used to create a secure connection between your remote computer (e.g. at home) and the CWSL network. One of the primary uses of this software is to create a secure connection (a.k.a. "VPN tunnel") that allows you to access your office workstation via Remote Desktop (if you are authorized to do so by your supervisor). VPN stands for Virtual Private Network.For more Information about Juniper Networks Visit at juniperexams.com

Is smtp is a tcp ip protocol used for network management?

SMTP is simple mail transport protocol. SNMP is simple network management protocol that is UDP based.

What if you lost your LAN settings?

Settings on a LAN are not stored in any one place; for disaster recovery planning any configuration information should be written down. Most settings for devices on a LAN come from the DHCP server, so backing up that server would preserve most of the typical LAN settings.

What is the difference between a share permission and security permission?

A Share permission defines who can access a resource, a security access defines what they can do.

What are examples of SSIDs?

Most WAP devices (Wireless Access Point) come configured with a default SSID. They may have names such as 'linksys', 'cisco', '2wire', etc.

What is the strength of coax for the Ethernet?

Coax has a better security protection because it's usually shielded. Also range for Coax is for thinnet about 175 meters for thicknet about 400 meters.

How are private IP addresses handled on the internet?

Private IP Addresses are not used for internet data traffic but are intended to be used specifically on internal networks called intranets.

What types of network traffic do modern networks carry and how this changed human interactions?

wPorn. This has changed human interactions by increasing the amount of wanking the adult male does and decreases the amount of said time spent with his female counterpart.

Business application of computer notes?

computer application mean is all types of computer work can easily written and notes in the computer that is called computer application