answersLogoWhite

0

📱

Local Area Network

Questions concerning the setting up, troubleshooting and operation of wired LANs used by businesses and other organizations

4,003 Questions

What is client-server database?

A client-server database is the relationship between two computer programs. One makes a service request (client) and the other (server) fulfills the request.

Differences between collision detection and collision avoidance?

CSMA/CD (carrier sense multiple access/collision detection) CD (collision detection) defines what happens when two devices sense a clear channel, then attempt to transmit at the same time. A collision occurs, and both devices stop transmission, wait for a random amount of time, then retransmit. This is the technique used to access the 802.3 Ethernet network channel. This method handles collisions as they occur, but if the bus is constantly busy, collisions can occur so often that performance drops drastically. It is estimated that network traffic must be less than 40 percent of the bus capacity for the network to operate efficiently. If distances are long, time lags occur that may result in inappropriate carrier sensing, and hence collisions.

CSMA/CA (carrier sense multiple access/collision avoidance) In CA (collision avoidance), collisions are avoided because each node signals its intent to transmit before actually doing so. This method is not popular because it requires excessive overhead that reduces performance.

Are ethnet and lan connections the same?

Ethernet and LAN connections are pretty much the same thing. They are local internet connections.

What are the disadvantages of circuit switching?

The major disadvantage in using packet switching is that it takes longer than other methods to transfer data. In most cases this will be fairly insignificant but it can be a factor when dealing with real-time video and require additional technology to obtain the required quality. With most alpha and numeric data, packet switching is a perfectly suitable way of transferring data quickly and safely with minimum risk.

What is port 69 why is it used and how to unblock it?

Port 69 is just one of thousands of ports inside your "firewall".It is used sometimes by viruses and certain programs to get information or to sneak in and mess up or break your computer.You can unblock it via your firewall menu.

UDP Port 69 refers to Trivial File Transfer Protocol (TFTP), a file transfer protocol (FTP), implemented on User Datagram Protocol (UDP), that uses a very small amount of memory, so it was used to boot hardware devices that had no real data storage devices (fixed disk/hard drives). TFTP only reads and writes files (or mail) from/to a remote server. It cannot list directories, and currently has no provisions for user authentication, so unblocking the protocol might open a vulnerability to attacking your workstations. However, if you're sure you want to do this, you simply create a new rule, or modify existing rules, on your firewall(s), choosing whether you want to block the protocol inbound, outbound or both.

Simple Network Management Protocol in breaf explain?

SNMP is structured communication protocol which follows TLV sequence.

What does the subnet mask separate?

The subnet mask separates the network id from the client id in the IP address for a sender or receiver.

Is 192.168.250.10 a Public IP address?

No it's a reserved IP address for local/internal networks.

There are other reservations and they are:

10.0.0.0 through to 10.255.255.255

172.16.0.0 though to 172.31.0.0

192.168.0.0 through to 192.168.255.0

The IP range 127.0.0.0 to 127.255.255.255 is also reserved as loopback address

If you want see what your external facing IP address is there are many web sites that will do this including:

(see related link).

What are the advantages and disadvantages of Application layer?

The Application Layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. This layer interacts with software applications that implement a communicating component. Such application programs fall outside the scope of the OSI model. Application layer functions typically include identifying communication partners, determining resource availability, and synchronizing communication. When identifying communication partners, the application layer determines the identity and availability of communication partners for an application with data to transmit. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exist. In synchronizing communication, all communication between applications requires cooperation that is managed by the application layer.

Why is ping not always the most reliable test for connectivity on a network?

Security restrictions could be in place.

The lack of a ping response could be because of security restrictions and not because of nonoperational elements of the network.

Why Hub comes on Physical Layer device?

A hub is a layer 1 (physical) device because it does not use any part of the packet header to direct the packet to the right destination, it just broadcasts to all connected computers.

What would the subnet mask be in dotted decimal notation for a Class C address if there were 30 hosts per subnet?

For 30 hosts, you need 5 bits (or more) for the host. That is, the 5 (or mor) rightmost bits in the subnet mask must be equal to zero; the remaining bits are 1, like this:

11111111.11111111.11111111.11100000

Now, just convert this to decimal (convert each of the parts, separated by dots, using Windows scientific calculator, or another scientific calculator).

For 30 hosts, you need 5 bits (or more) for the host. That is, the 5 (or mor) rightmost bits in the subnet mask must be equal to zero; the remaining bits are 1, like this:

11111111.11111111.11111111.11100000

Now, just convert this to decimal (convert each of the parts, separated by dots, using Windows scientific calculator, or another scientific calculator).

For 30 hosts, you need 5 bits (or more) for the host. That is, the 5 (or mor) rightmost bits in the subnet mask must be equal to zero; the remaining bits are 1, like this:

11111111.11111111.11111111.11100000

Now, just convert this to decimal (convert each of the parts, separated by dots, using Windows scientific calculator, or another scientific calculator).

For 30 hosts, you need 5 bits (or more) for the host. That is, the 5 (or mor) rightmost bits in the subnet mask must be equal to zero; the remaining bits are 1, like this:

11111111.11111111.11111111.11100000

Now, just convert this to decimal (convert each of the parts, separated by dots, using Windows scientific calculator, or another scientific calculator).

Connecting multiple routers on a network in a home environment?

It can be done, just as it might be in a corporate environment. They would be on different networks in your house, if that is what you want.