What type of special computer connects one Lan to another Lan?
A LAN Bridge. It is not a special computer per say.
A LAN bridge connects two or more LANs at layer two in the OSI network model. The LAN bridge receives packets from a LAN segment connected to one port and forwards them to another LAN segment connected to a different port. While a LAN bridge serves the purpose of extending network range, it also relieves the problem of congestion that multiple devices can cause on a single Ethernet segment.
How can you do inter vlan communication in a L3 D-link switch model is DGS 3612g?
inter_vlan routing on d'link DGS3612 is automatic,you just creates vlan and tag them to the port access and trunk
What can verify TCP IP is installed?
TCP/IP can be verified as installed and operating by using the 'ping' command against the localhost address:
ping 127.0.0.1
or
ping localhost
Networks that connect people within a company to each other and to the company network are called?
internet
What function does the tcp protocol perform for a network connection?
it formats messages in segments
it reassembles messages at the destination
it creates a virtual circut between end user applications
When refering to a hub or switch what is a port?
Port in hub/switch refers to the interface where you connect your computers.
205.61.128.79
What is a good switch for computer networks?
For home or office?
I'd recommend cisco for office and probably netgear for the home.
An integrated router can normally perform the functions of which two other network devices?
Switch and access point
I would imagine you would see a decrease in performance if you had several computers all online requesting data at once, but most small home networks wouldn't even notice another couple of users surfing around.
yes i belive.
What type of cabling could be used for the vertical or backbone cabling?
im going to assume your talking about computer networking which in this case would be RISER. In ceiling would be plenum
What IP address class does the address 128.0.31.50 belong to?
Value of first octet = 1-127 Class A
128-191 Class B
192-223 Class C
Also there are class D and E addresses, which can't be assigned to hosts.
Network ID 10.10.128.0 and subnet mask 255.255.224.0 Which IP address range can be used?
Class A IP address.
Why is it important to hide IP addresses to protect a network?
It would be important to hide the IP address because you can't attack what you can't see ...
Thomas MErrill and Lawrence G. Roberts
How do you make connection over LAN cable that have distance over 200 meters?
The maximum distance a utp cable can handle is 100 m.
If you need to bridge over 200 meter and you can only utp cable, you will need to put in enough hubs or switches so that the length of utp cable is never more than 100 m.
You can forego of the utp cable and make use of COAX cable. A good quality cable will transmit signals over around 300 m. distance.
You can forego of the utp cable and make use of fiber optic cable. Then you can transmit signals over a 40 km distance.
Wireless Microwave and WiMax would be an option to cover the distance using radio waves.
Characteristics and functions of file transfer protocol?
FTP is a simple network protocol based on Internet protocol and also a term used when referring to the process of copying files when using FTP technology.
To transfer files with FTP, you use a program often called the "client." The FTP client program initiates a connection to a remote computer running FTP "server" software. After the connection is established, the client can choose to send and/or receive copies of files, singly or in groups. To connect to an FTP server, a client requires a username and password as set by the administrator of the server. Many public FTP archives follow a special convention for that accepts a username of "anonymous."
Simple FTP clients are included with most network operating systems, but most of these clients (such as FTP.EXE on Windows) support a relatively unfriendly command-line interface. Many alternative freeware / shareware third-party FTP clients have been developed that support graphic user interfaces (GUIs) and additional convenience features. In any FTP interface, clients identify the FTP server either by its Ip address (such as 192.168.0.1) or by its host name.
FTP supports two modes of data transfer: plain text (ASCII), and binary. You set the mode in the FTP client. A common error when using FTP is attempting to transfer a binary file (such as a program or music file) while in text mode, causing the transfered file to be unusable.
hope this would help: http://www.tech-faq.com/dhcp-relay-agent.shtml
The local host can send packets on the local network?
The localhost address is designed to verify that the software for networking has been installed and is operating correctly. It does not pass any packets to the network.
How does a DMZ enhance network security for an organization?
A DMZ allows external customer access to designated internal resources.
The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network. The name is derived from the term "demilitarized zone", an area between nation states in which military action is not permitted.
What cable would you use to connect two computers together using their NIC?
CROSSOVER
Im in CET too ;)
In networking, PDU means "protocol data unit", and it is the generic name of the "packets" of data used at different levels of the network. Using the numbering of the OSI layers:
At layer 2, the PDUs are called "frame". Example: An Ethernet frame, a frame-relay frame.
At layer 3, the PDUs are called "packets". Example: An IP packet.
At layer 4, the PDUs are called "segments". Example: A TCP segment, a UDP segment.
An echo-request is a sort of ICMP (Internet Control Messaging Protocol). This protocol is used to check and control the IP packet traffic.
For example, ping and traceroute packets are echo requests.