International mobile station equipment identity shortly named as IMEI is a no. that is used to identify stolen devices.it is usually printed inside the battery compartment of a phone & is ued to make phone useless to deny misuse if it is stolen whther the sim is changed or not.It can be found diectly by dialling *#06#.
The application layer (layer 7) is responsible for file transfer operations.
In a local area network access to the network is controlled by what?
In a local area network many things can control access. It depends whitch method is being used. In a tipical home network/internet envirement using a router, modem, and a client or multiple client pcs. In this case the modem calls for a DNS and IP witch allows right to the modem from the ISP servers. Next the router askes for the modem to forward the DNS protocals and ip to the router and turns the public IP to a Public and uses usually DHCP witch assingns attached devices a private ip witch usaully starts with a 192.168.1 or 0.2-255. and logs the Mac address from the clients. Next the client pcs configures with the DNS protocals and allows data transfers through open ports in the firewall.
What allows IPv6 hosts to map host names to IP addresses?
DNS - it handles both IpV4 and IPv6 addressing.
How do you pull up server desktop from workstation?
To do this you need to be running some type of remote desktop protocol (RDP) in Windows, or the equivalent in Unix/Linux.
You can enable this in a server and use the client to connect to the server which will show the server's desktop on the workstation. Terminal services can also be used for this purpose.
There are also several third-party packages which will accomplish this as well. When you log into the server using RDP or its equivalent you will see the desktop of the server.
When two computers connected with Crossover Cable they can not share their resources?
The purpose of a crossover cable is to supply the output of one computer as the input to another. As such the most certainly can share their resources. This is done to:
A router that has 4 ports will require how many IP addresses?
It depends on how many interfaces of router are connected to other networks. If a router is connected to two network, it will have 2 IP addresses. In a router having 4 ports it can connect to maximum 4 networks. In this case it will have 4 IP addresses.
255.255.255.0
A subnet mask that would divide the 172.31.0.0 network into as many subnets as possible and support 600 uers on each subnet would be 255.255.255.0. Each subnet can communicate with each other through the gateway.
Why you need to prevent DHCP server to distribute IP Address range?
Admin access. Generally there are DHCP settings to control the distribution of IP addresses. It varies from device to device.
Pros and cons of cat6 cabeling?
Cat6 cable is very similar to Cat5e cable. It is, simply put, just held to a stricter standard than Cat5e cable. Since Cat6 is made to a higher standard than Cat5e it will support higher speed transfers. Cat5e cable can be used for networks up to a 1Gbps speed while Cat6 is currently rated for up to 10Gbps speed. Cat7 takes this even further and supports 40Gbps. For normal usage on networks up to 1Gbps and no run being longer than 100 meters, Cat5e is completely sufficient for the network. To ensure forwards compatibility it may be worthwhile to install Cat6 cable while you're at it so you don't hit a speed cap in your network down the road.
90 meters
What are the primary functions specified by all transport layer protocol?
Conversation Multiplexing
Segmentation and Rassembly
Error Checking
Does A peer-to-peer network requires a central server?
NO. In a true peer to peer there is no server.
What are four major components of a packet switch and their function?
input port, output port, routing processor, switching fabric
What is token based media access?
Token-based media access is a controlled media access method in which computers pass a special sequence of bits between them; only the node holding this token can transmit on the network. After transmitting its data, or if it has no data to transmit, a node passes the token to the next computer on the network.
Neeraj
List application layer protocols?
1) SMTP- simple mail transfer protocol
2) GMTP- Group mail transfer protocol
3) FTP- File Transfer Protocol
4) TFTP- Trivial File Transfer Protocol
5) User Process
How you can connect a computer to another computer by a single networking cable?
You have to have a special cable which is "cross connection cable" or something like that.
Will the PC network speed increase if hub is replaced with switch?
Any speed difference will not be detectable. Check that the hardware is all capable of 100mbps. If most components are capable of 100MBPS but a couple components are only working at 10MBPS, the entire network will run slower. Also, when some components that your computer want to access are turned off the network will noticably slow. For example, if your computer wants access to a printer on another computer, your computer may run noticably slower.
What is ping 127.0.0.1 checking?
This ping command checks that the TCP/IP stack is installed and working correctly.
Why are Ethernet II frames preferred over Ethernet 802.3 frames on contemporay lans?
They can support multiple higher-layer protocols, and Ethernet 802.3 frames cannot.
When the host portion of an IP address is all binary ones?
The host portion of an IP address of all zeros indicates that you are referring to 'this network'. For example, the address 145.5.0.0 means the network 145.5