answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

Fibers that are straight and look like strong cables?

There are two types of fibers that are straight and look like strong cables. One of them is elastic fibers. The second is collagen fibers.

Where is the toshiba laptop wireless communication switch?

It depends on the Toshiba. Not all actually have physical switches, but on those laptops that do a good place to look is on the IR (infra-red) receiver, which usually looks like a small panel of glossy black plastic, somewhere on the very bottom of the front panel below the keyboard. On the M30 series and similar laptops the IR panel is close to the left-hand edge, and the tiny sliding wireless switch is on the panel's bottom right-hand corner, almost in line with the bottom edge of the machine. If you run your fingers along the entire length of the bottom edge you should find it by touch.

What is the max distance of a Wide area network?

The max distance of a WAN, is not limited any longer, because a WAN is connected over terrain and under or over water ways. At any give time a WAN can be as large as the seven continents or as small as one state.

Information obtained from Advanced Networking Systems book published by Pearson Custom Publishing.

A network technician must reduce the amount of broadcast traffic on the network while maintaining full connectivity between all different network segments Which device should the administrator deploy?

This device is called a ROUTER. Routers are by default configured to not pass the broadcast traffic to another networks to which it connects.

But by some means it could be also a SWITCH - sometimes it can be configured to filter different type of network traffic.

As A Networking Administrator what are the daily responsibilities in Active Directory Services?

Active Directory contains information about the resources of a domain, usually available via a network. Therefore the duties and responsibilities would be for creation and maintenance of passwords, group policies of the domain, group membership of users, and other duties of that nature.

2) AS A NETWORK ADMIN, YOU SHOULD CHECK REPLICATION BETWEEN SERVERS IS HAPPENING PROPERLY OR NOT

What are charcteristics of the three basic types of Klippel Feil syndrome?

In type I, all of the cervical and upper thoracic vertebrae are fused together into one block. In type II, one or two pairs of cervical vertebrae are fused together. In type III, there is lower thoracic or lumbar fusion

What cable generally contains eight wires with either four or eight wires being used to transmit data?

Any category twisted pair cable uses 8 wires for transmitting and receiving data. However, only 4 of the 8 wires are actually used for data transmission.

What is a possible reason that host a and host b are unable to communicate outside the local network?

Because they need a device to communicate with a distant network through. These devices are called gateways, and are normally routers. The hosts on a segment need to have knowledge of the gateway device in order to communicate outside the segment.

In most environments, the local network will have an internal addressing scheme, one that is not routable on the internet, so there needs to be a device that can translate the internal addresses (non routable on the internet) into external addresses (routable on the internet). Of course this device needs to be connected to both the internal network and the external network to be able to send traffic between them.

How is a FDDI network like a Token Ring network How is it different?

Both Token Ring and FDDI use the concept of a ring topology structure. However, Token Ring is used in a LAN, and FDDI is used in a MAN.

Token Ring is implemented with copper cable (UTP cable) and FDDI uses Fiber Optic cable.

Finally, the protocols are very different between the two. FDDI uses a synchronous type of transmission, where Token Ring uses an actual token (a 3 character packet) to control who has access to transmit or receive on the network. FDDI does not use this technique.

What is the difference between connecting to a router through the console port or through the telnet program?

If you connect to the router via the console port then you are physically making a connection with a physical cable to the router. This implies you have to be close to the router itself.

Using telnet allows you to connect to the router from anywhere in the network, and doesn't require a physical cable connection.

Where would a client-server network would be used?

All company networks these days are client-server networks. A server is no more then a computer offering one or more services to other computers. Such service can be as simple as file sharing, printing or access to the internet. A lot of people also have a client-server network at home. Many people have a computer system or NAS offering file storage for all computer systems, or have a computer allowing others to use it's printer

What is UPT CAT5e Cable used for?

it is not UPT ,it is UTP which stands Unshielded Twisted Pair. The UTP is mainly used for network cabling i.e; LAN cabling.

What are the main categories of tiwsted pairs cables?

there are 2 categories of twisted pair calbes

1. un-sheilded twisted pair (UTP)

2. Sheilded twisted pair (STP)

What is the access method for star topologies?

Most star topologies use CSMA/CD for a Local Area Network. WANs and MANs are different and use completely different access methods.

Provide a specification for workstation?

The specification for your network workstations is dictated by what you will be using the workstation for, by available workspace for the workstation, by cost, by network management concerns and security considerations. The specification can be a strict item by item list of components or a simple "AMD or Intel mini tower PC with 2.4 GHZ or faster processor, 512 MB or greater ram and 80 GB or larger hard drive" It's all about what you need them to do. Many companies select the vendor first, often based on discount from list price, support guarantees, etc., and then work with the vendor to find the appropriate hardware and software for the customer's needs.

What is the likely impact of moving a conventional company architecture to a completely converged network?

What is the likely impact of moving a conventional company architecture to a completely converged network?

• Local analog phone service can be completely outsourced to cost-effective providers.

• The Ethernet VLAN structure is less complex.

• A shared infrastructure is created resulting in a single network to manage.

• QoS issues are greatly reduced.

• There is less bandwidth competition between voice and video streams

Can you have more than one wireless router in your home but they are different makes...e.g... Belkin and netgear or netgear n lynski?

It depends on what kind of network configuration you are going to choose. If you want to have just to routers with independent DHCP servers, you are good to go. If you want to create "bridge" configuration, I might have serious problems. It's well known that routers from different companies do not work well in the "bridge". When they do it's rather an exception.

Why give 1 in last of default gateway?

A general industry rule of thumb is to use the first IP address in a range for the default gateway address. That would be .1 for most classful, non-subnetted networks.

Why are different network standards and protocols necessary?

Different protocols are needed for different systems to "talk" to each other. Protocols are used to communicate, authenticate and used for error detection and recovery.

TCP/IP is the most common protocol, and is actually two distinct protocols, married together (TCP (Transmission Control Protocol) and IP (Internet Protocol). Each protocol does a different "job". Others, such as FTP (File transfer protocol) are used for specific duties to be performed.

The protocol allows computers to talk to each other by setting the "ground rules". It allows for data to flow back and forth between the computers.

Imagine two people talking on the phone....one talks the other listens, then they reverse, and the talker becomes the listener. That is a Protocol! What happens when they both talk? Neither hears what the other says? What happens if the both listen, but not talk...no "data' is exchanged.

Standards are totally different, although related.....they are ground rules set by a commission so that hardware is compatible amongst similar computers, and assures interoperability. This is done (usually) to ensure backwards compatibility and compatibility from vendor to vendor. Again, imagine if each company made its own "protocol standard" and didn't allow it to talk with another's "protocol standard". That company would become very rich by being the sole provider, or out of business because nobody would bye it because of its uniqueness.

Wrapping it up...standards and protocols are what allow different computers, from different companies, running different software to communicate with each other. It's what made networking possible.