Executing the command switch port port-security mac-address 00C0.35F0.8301 on a port (F01) in interface configuration mode enables port security and sets a specific MAC address as the allowed device for that port. This means only the device with the MAC address 00C0.35F0.8301 will be permitted to send traffic through the port. If another device attempts to connect, the switch will either drop the traffic or shut down the port, depending on the configured violation action. This enhances network security by preventing unauthorized access.
WHAT IS downsizing client server computing?
"http://wiki.answers.com/Q/What_is_downsizing_and_client_server_computing" "http://wiki.answers.com/Q/What_is_downsizing_and_client_server_computing" "http://wiki.answers.com/Q/What_is_downsizing_and_client_server_computing"
Do you need to restart a router to enable port forwarding?
It strictly depends on the model. Most routers have to be restarted in order to enable port forwarding.
that gives you 16 subnets with 14 usable IPs for hosts that is because one is for subnet and one for broadcas in that subnet
for example: 192.168.1.0/28 - subnet number
192.168.1.15 -broadcast number
usable IPs for hosts - IPs between them that is 14
Can router be used as a server?
Generally, no, unless the router is part of a server based system. A router is a dedicated device to routing packets between networks or subnets. It has no traditional server function such as print or file serving, etc.
What does limited or no connectivity mean?
Limited or no connectivity means there is not enough connection to the Internet server. This could be because there are problems with the modem or you are not close enough to get proper service.
What is the functional difference between Token Ring Token Bus and FDDI?
There are no purely functional differences between a token ring token bus implementation and FDDI. In fact, the token bus is defined in IEEE 802.4, and FDDI's topology derives from that very standard. Think of FDDI as being a subset of 802.4. Refer to RFC 1042 (http://www.faqs.org/rfcs/rfc1042.html) for more details.
The remainder of my entry doesn't really apply to this question and is more subjective, but I do try to outline some other non-functional differences between the two standards.
Apart from functional differences, the obvious ones can be broken into a couple different parts off the top of my head: physical and application. The physical difference is that Token Ring pretty much uses coax cable as its medium while FDDI conspicuously uses fiber. From an application standpoint, Token Ring is short distance (coax has a maximum attenuation distance of 500 meters) while FDDI can traverse far greater distances while attaining greater throughput. As a result, FDDI would be much more scalable, supportive of many more users, and primarily used in large geographically-demanding environments but pricey; on the other hand, token ring would be for less scalable environments but cheaper.
Another non-functional difference would be noise immunizations. FDDI is inherently immune to most interferences that coax implementations would be heir to. Fluorescent lighting, various frequencies, and other causes of noise to fiber would not affect it in the same adverse manner that would apply to coax.
What are the three basic network categories?
Common examples of area network types are:
What is the spanning-tree network diameter on a cisco switch?
The default value for network diameter on a STP configuration is 7 (seven).
This value can be changed, using the command:
Switch(config)#spanning-tree vlan 1 root primary diameter 5
This command changes the network diameter 50 5 (five) hops from end to end
a third party firewall is any firewall that did not come with the computers operating system
What does a bit that is set to 0 in an ip subnet mask specify?
the corresponding bit in the ip address is a host bit
Packets exceed the medium's maximum packet size?
If the packet's "Do Not Fragment" flag is set, then the packet is discarded and the sender is notified. Otherwise, the packet is fragmented into several pieces and will continue on to its final destination.
Subnet: A portion of a network that shares a common address component. On TCP/IP networks, subnets are defined as all devices whose IP addresses have the same prefix. For example, all devices with IP addresses that start with 100.100.100. would be part of the same subnet. Dividing a network into subnets is useful for both security and performance reasons. IP networks are divided using a subnet mask.
Gateway: A gateway is a network point that acts as an entrance to another network. On the Internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computers of Internet users and the computers that serve pages to users are host nodes. The computers that control traffic within your company's network or at your local Internet service provider (ISP) are gateway nodes. Can transcode or allow different protocols to talk to each other.
How can you address prejudice and discrimination in the class?
Well prejudice means judging someone before you even get to know him/her and discrimination means saying names about that person, teasing him/her weather he is black or white or just different.
Why would an application use UDP instead of TCP?
UDP does not require as much resources as TCP but in the same time, it does not insure delivery of packets.
What is the discovery collection and analysis of evidence found on computers and networks?
Digital Forensics
Community Answer 1
What are computer networks? I'm glad you asked. A given company or organization may have more than one computer, and can arrange for these computers to be connected (in more than just the way all computers can connect by way of the internet) so that they share programs, have access to each other's data, etc.
__________________________________
Community Answer 2
A PC system is an arrangement of PCs associated together with the end goal of sharing assets. The most widely recognized asset shared today is association with the Internet. Other shared assets can incorporate a printer.
Explain the limitations of using wireless network?
Securities is where many wireless networks lost out.
Sometimes, wireless networks are unreliable - signals from wireless networking can suffer from interference beyond the control.
Wireless networks can be slower compared to wired networks
Compatibility - since it's a new technology component which are not made by the same company may not work together.
Weak signal strength due to some obstacles like heavy walls etc.
Additional range must be added using Repeaters and more access point. This leads to increase of cost.
MPLS is pretty complex, and the configuration will depend entirely on the device to which it's connected. Presumably, that's your ISP's router on the other end. They should tell you what configuration you need to use.
What allows IPv6 hosts to map host names to IP addresses?
DNS - it handles both IpV4 and IPv6 addressing.