answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What type of special computer connects one Lan to another Lan?

A LAN Bridge. It is not a special computer per say.

A LAN bridge connects two or more LANs at layer two in the OSI network model. The LAN bridge receives packets from a LAN segment connected to one port and forwards them to another LAN segment connected to a different port. While a LAN bridge serves the purpose of extending network range, it also relieves the problem of congestion that multiple devices can cause on a single Ethernet segment.

How can you do inter vlan communication in a L3 D-link switch model is DGS 3612g?

inter_vlan routing on d'link DGS3612 is automatic,you just creates vlan and tag them to the port access and trunk

What can verify TCP IP is installed?

TCP/IP can be verified as installed and operating by using the 'ping' command against the localhost address:

ping 127.0.0.1

or

ping localhost

What function does the tcp protocol perform for a network connection?

it formats messages in segments

it reassembles messages at the destination

it creates a virtual circut between end user applications

When refering to a hub or switch what is a port?

Port in hub/switch refers to the interface where you connect your computers.

What is a good switch for computer networks?

For home or office?

I'd recommend cisco for office and probably netgear for the home.

If you use a router to network a cable modem do you lose connection speed since you are using multiple PC's?

I would imagine you would see a decrease in performance if you had several computers all online requesting data at once, but most small home networks wouldn't even notice another couple of users surfing around.

yes i belive.

What type of cabling could be used for the vertical or backbone cabling?

im going to assume your talking about computer networking which in this case would be RISER. In ceiling would be plenum

What IP address class does the address 128.0.31.50 belong to?

Value of first octet = 1-127 Class A

128-191 Class B

192-223 Class C

Also there are class D and E addresses, which can't be assigned to hosts.

Why is it important to hide IP addresses to protect a network?

It would be important to hide the IP address because you can't attack what you can't see ...

How do you make connection over LAN cable that have distance over 200 meters?

The maximum distance a utp cable can handle is 100 m.

If you need to bridge over 200 meter and you can only utp cable, you will need to put in enough hubs or switches so that the length of utp cable is never more than 100 m.

You can forego of the utp cable and make use of COAX cable. A good quality cable will transmit signals over around 300 m. distance.

You can forego of the utp cable and make use of fiber optic cable. Then you can transmit signals over a 40 km distance.

Wireless Microwave and WiMax would be an option to cover the distance using radio waves.

Characteristics and functions of file transfer protocol?

FTP is a simple network protocol based on Internet protocol and also a term used when referring to the process of copying files when using FTP technology.

To transfer files with FTP, you use a program often called the "client." The FTP client program initiates a connection to a remote computer running FTP "server" software. After the connection is established, the client can choose to send and/or receive copies of files, singly or in groups. To connect to an FTP server, a client requires a username and password as set by the administrator of the server. Many public FTP archives follow a special convention for that accepts a username of "anonymous."

Simple FTP clients are included with most network operating systems, but most of these clients (such as FTP.EXE on Windows) support a relatively unfriendly command-line interface. Many alternative freeware / shareware third-party FTP clients have been developed that support graphic user interfaces (GUIs) and additional convenience features. In any FTP interface, clients identify the FTP server either by its Ip address (such as 192.168.0.1) or by its host name.

FTP supports two modes of data transfer: plain text (ASCII), and binary. You set the mode in the FTP client. A common error when using FTP is attempting to transfer a binary file (such as a program or music file) while in text mode, causing the transfered file to be unusable.

What is dhcp relay service?

hope this would help: http://www.tech-faq.com/dhcp-relay-agent.shtml

The local host can send packets on the local network?

The localhost address is designed to verify that the software for networking has been installed and is operating correctly. It does not pass any packets to the network.

How does a DMZ enhance network security for an organization?

A DMZ allows external customer access to designated internal resources.

The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network. The name is derived from the term "demilitarized zone", an area between nation states in which military action is not permitted.

What is a PDU?

In networking, PDU means "protocol data unit", and it is the generic name of the "packets" of data used at different levels of the network. Using the numbering of the OSI layers:

At layer 2, the PDUs are called "frame". Example: An Ethernet frame, a frame-relay frame.

At layer 3, the PDUs are called "packets". Example: An IP packet.

At layer 4, the PDUs are called "segments". Example: A TCP segment, a UDP segment.

What is an echo-request?

An echo-request is a sort of ICMP (Internet Control Messaging Protocol). This protocol is used to check and control the IP packet traffic.

For example, ping and traceroute packets are echo requests.

Trending Questions
How do you find out your broadcast gateway network ID netmask and IP addresses for use with setting up network or internet settings? What header that has source of 13357 and destination port of 23? What is NUFNET as a classification of computer network? What kind of problems are caused by excessive broadcasts traffic on a network segment? What is the router static routes cisco 6.8.1? What are the advantages of using a LAN? Which one of the following varieties of NAT utilizes different ports to map multiple IP addresses to a single globally registered IP address? What network hardware allows most traffic collisions? Which set of commands will enable a network administrator to remotely manage a LAN switch? What is the difference between the ATM and ip? What does a distance vector routing protocol let a router know about remote networks? When we say 100 Mbps unmanaged switch does 100 Mbps specify the capacity of the entire switch or individual port? How many subnets of 300 hosts can be created on a network of IP address 172.16.1.0? Which command ensures that packet with a destination address within an unknown subnet of a directly attached network os routed to the next hop specified by the default route on the router? What are the valid hosts for the subnet on which the address 172.16.4.14 255.255.252.0 resides? What is a server that accepts HTTP requests from clients? What are the requirement to make peer to peer network? Is a device that manages traffic between two networks? Disadvantage of virtual private network? Which type of network connects smart devices or consumer electronics within a range of about 30 feet (10 meters) and without the use of wires or cables.?