Proxy servers prevent external users from identifying the IP addresses of an internal network. They make a network virtually invisible to external users, who cannot identify the physical location of a network without knowledge of the correct IP address.
Posted Date:- 2022-07-20 11:25:11
Following are some of the common applications of using Hemming code:
<> Shielding wire
<> Embedded Processor
<> Computer Memory
<> Open connectors
Posted Date:- 2022-07-20 11:24:43
You can achieve a secure computer network in the following ways:
<> Install a reliable and updated antivirus program across the network
<> Ensure firewalls are setup and configured properly
<> Monitor firewall performance
<> Ensure User authentication
<> Update passwords regularly, every quarter
<> Create a virtual private network (VPN)
Posted Date:- 2022-07-20 11:23:47
Perquisites to configure a server are:
<> LAN card should be connected
<> Root (partition on which window is installed) should be in NTFS format.
<> A server should be configured with a static IP address.
Posted Date:- 2022-07-20 11:22:31
Following are the three main network protocols supported by Windows RRAS services:
Posted Date:- 2022-07-20 11:20:56
RAS (Remote Access Services) refers to any combination of hardware and software to enable remote access to tools or information that typically reside on a network of IT devices.
Posted Date:- 2022-07-20 11:19:35
Data encapsulation is the process of breaking down information into smaller, manageable chunks before their transmission across the network.
Posted Date:- 2022-07-20 11:13:48
Standard ACLs are source-based, whereas extended ACLs are source- and destination-based.
Posted Date:- 2022-07-20 11:13:14
The source route is defined as a sequence of IP addresses that are used to identify the route of a datagram. You can also involve the source route in the IP datagram header.
Posted Date:- 2022-07-20 11:12:40
The following parameters define the path selection:
<> Longest prefix match
<> Minimum AD (administrative distance)
<> Lowest metric value
Posted Date:- 2022-07-20 11:12:19
Following are the different ways to exchange data:
Posted Date:- 2022-07-20 11:10:51
In a static IP address, a computer (or another device) is always configured to use the same IP address, whereas, in a dynamic IP address, the IP address can change periodically and is managed by a centralized network service.
Posted Date:- 2022-07-20 11:10:18
There are three essential topologies: Star, Bus, and Ring.
Posted Date:- 2022-07-20 11:09:11
There are two major type of networks: Server-based network and Peer-to-peer network.
Posted Date:- 2022-07-20 11:08:47
This is among the popularly asked networking interview questions. The firewall â€˜listensâ€™ for what information packets are trying to leave or enter the computer system. Blocking can be done based on various criteria, such as the IP to which they are destined, the type of port used to send them, or the application of origin.
One of the most complex aspects of using firewalls lies in their configuration, in deciding what types of connections are blocked and which ones are not.
Posted Date:- 2022-07-20 11:08:18
A firewall is a network security system, responsible to manage network traffic. It uses a set of security rules to prevent remote access and content filtering. Firewalls are used to protect the systems or networks from viruses, worms, malware, etc. Firewalls are usually of two types â€“
Physical â€“ A physical firewall or hardware firewall is a physical device, sits between the external network and the server. They analyze incoming traffic and filter out any threats to the device. Widely used in institutions and large companies.
Logical â€“ A logical or software firewall can exist anywhere on the subnet and protects hosts anywhere on the subnet without rewiring. They only protect the computer on which they are installed, and in many cases, they are integrated into the operating system itself.
Posted Date:- 2022-07-20 11:07:51
The limited range of frequencies of signals that a line can carry is called the bandwidth. Bandwidth is often confused with Internet speed when it is actually the volume of information that can be sent over a connection in a measured amount of time, calculated in megabits per second (Mbps).
Logically the bandwidth of our network will be decisive for its quality and speed. The more bandwidth we have, the better, since the faster we can transfer data.
Posted Date:- 2022-07-20 11:07:30
An Internet Protocol address (IP address) is a numerical unique address of a device in a network. IP is a datagram-oriented connectionless protocol, therefore each packet must contain a header with the source IP address, the destination IP address, and other data in order to be delivered successfully.
Posted Date:- 2022-07-20 11:01:03
When a signal travels through a medium, it loses some of its energy due to the resistance of the medium. This loss of energy is called attenuation.
When a signal travels through a medium from one point to another, it may change the form or shape of the signal. This is known as distortion.
Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.
Posted Date:- 2022-07-20 11:00:46
Beaconing is the process that allows a network to self-repair network problems. This is among the important networking interview questions and you must prepare for the related terminologies as well.
Posted Date:- 2022-07-20 11:00:27
A MAC (Media Access Control) address is the unique 48-bit hardware address of a LAN card, usually stored in the ROM of the network adapter card.
The MAC address is a unique identifier that manufacturers assign to a network card or device. It is also known as a physical address represented by hexadecimal digits. Each MAC address is unique worldwide and, in theory, they are fixed for each device.
Each MAC address includes six pairs of numbers. The first three pairs help to identify the manufacturer and the next three to the specific model. It is important to bear in mind that a computer may have a variety of hardware to connect to networks; thus, it is common to have a MAC address for Ethernet, one for Wi-Fi, and another for Bluetooth.
Posted Date:- 2022-07-20 11:00:07
Frame Relay supports the multiplexing of traffic from multiple connections over a shared physical link. It uses hardware components that include router frames, bridges, and switches to pack data into individual frame relay messages. Each connection uses a 10-bit Data Link Connection Identifier (DLCI) for unique channel addressing.
Posted Date:- 2022-07-20 10:59:51
The different features of Frame Relay are:
<> Frame Relay is a connectionless service, which means that every data packet that passes over the network contains address information
<> Frame Relay is a service that is provided with a variety of speeds from 56 Kbs to 25 Mbs. Although the speeds most used for the service are currently 56 Kbs and 1,544 Mbs
<> The frames are of variable length and go up to 4,096 bytes
<> Frame Relay is considered a broadband ISDN service
<> It operates at high speed (1,544 Mbps to 44,376 Mbps).
<> It operates only on the physical and data link layers. Therefore, it can be easily used on the Internet.
<> It has a large frame size of 9000 bytes. Therefore, it can accommodate all local area network frame sizes.
<> Frame Relay can only detect errors (at the data link layer). But there is no flow control or error control. It operates in the data link layer.
Posted Date:- 2022-07-20 10:59:22
Frame Relay is a data link layer digital packet-switched network protocol technology designed to connect local area networks (LANs) and transfer data over wide area networks (WANs). Frame Relay shares some of the same underlying technology as X.25.
Posted Date:- 2022-07-20 10:58:39
This is among the important networking interview questions. Network topology is the physical or logical arrangement in which the devices or nodes of a network (e.g. computers, printers, servers, hubs, switches, routers, etc.) are interconnected with each other over a communication medium. It consists of two parts â€“ the physical topology, which is the actual arrangement of the cables (the media), and the logical topology, which defines how the hosts access the media.
Posted Date:- 2022-07-20 10:58:22
The Domain Name System (DNS) is a central part of the internet, providing a way to match names (a website youâ€™re seeking) to numbers (the address for the website). Anything connected to the internet â€“ laptops, tablets, mobile phones, and websites â€“ has an Internet Protocol (IP) address made up of numbers.
Posted Date:- 2022-07-20 10:58:08
A â€˜subnetâ€™ is a generic term for a section of an extensive network, usually separated by a bridge or a router. It also works for the networkâ€™s broadcast domains, manages traffic flow, and helps increasing network performance. Uses of the subnet in networking include:
<> Relieving network congestion
<> Reallocating IP addresses
<> Improving network security
Posted Date:- 2022-07-20 10:57:52
The different types of cables used in networks are â€“
<> Unshielded Twisted Pair (UTP) Cable
<> Shielded Twisted Pair (STP) Cable
<> Cable Installation Guides
<> Coaxial Cable
<> Fibre Optic Cable
<> Wireless LANs
Posted Date:- 2022-07-20 10:57:13
Network cables can connect two computers or computer systems directly. A cable is a cord that is made up of different conductors, which are insulated from each other. This cord is usually protected by a wrap for better strength and flexibility.
Posted Date:- 2022-07-20 10:56:31
Boot to LAN is most often used when you are doing a fresh install on a system. What you would do is setup a network-based installer capable of network-booting via PXE. Boot to LAN enables this by allowing a pre-boot environment to look for a DHCP server and connect to the broadcasting network installation server.
Environments that have very large numbers of systems more often than not have the capability of pushing out images via the network. This reduces the amount of hands-on time that is required on each system, and keeps the installs more consistent.
Posted Date:- 2022-07-20 10:55:46
By default, all VLANs are allowed on the trunk link and you must remove by hand each VLAN that you don't want traversing the trunked link.
Posted Date:- 2022-07-20 10:55:34
Virtual Trunk Protocol (VTP) is used to pass a VLAN database to any or all switches in the switched network. The three VTP modes are server, client, and transparent.
Posted Date:- 2022-07-20 10:53:40
Very simply, a WLAN is a wireless or radio frequency extension of a LAN. Some WLANs however, such as ad-hoc networks have no wired components. Generally these networks are based on the IEEE 802.11 protocol suite but can also consist of proprietary communication protocols.
Posted Date:- 2022-07-20 10:53:19
Basically all that is needed is a transmitting device, which connects to the Internet and operates in one of the unlicensed frequency bands, and a receiver (typically a PCMCIA card), which connects to your computer. But it's not that easy.
There are many current products that have been designed with specific uses in mind. Some are very simple, and others very sophisticated. It's sort of like asking what kind of computer does someone need? Well it really depends on what it's being used for. Is it processing large amounts of data, maybe just used for surfing the web, possibly holding top-secret information! It's obvious that the type of job dictates the type of equipment needed. Are you confused yet? Don't worry! LBA has the expertise to help you decide what is the right system for your business application.
Posted Date:- 2022-07-20 10:53:02
All products that conform to IEEE 802.11 standards maintain some interoperability. Products that carry the Wi-Fi certification are tested to verify a base level of interoperability.
Posted Date:- 2022-07-20 09:18:46
The next release of LANwriter will provide this facility of connecting to an Active Directory server on the network for user management.
Posted Date:- 2022-07-20 09:18:14
Administration of all aspects of LAN writer is done via a web browser from within the LAN writer application itself.
Posted Date:- 2022-07-20 09:17:57
Every user is required to have a valid login account before using LANwriter to write data. User validation is against the WindowsXP security database of the computer hosting LANwriter. Users are of different kinds and there are ascending levels of security privileges.
For eg. Admins have full control while Normal users can only compile data writing jobs and write them only after Approvers give approval.
Posted Date:- 2022-07-20 09:17:35
LANwriter being a browser-based application can be accessed over the internet if the LANwriter host is published as a virtual server behind your firewall. However this accessibility is best used for approving jobs remotely rather than for creating jobs which requires actual bulk file transfer over the network and cannot be done through the browser.
Posted Date:- 2022-07-20 09:16:43
We can absolutely have too many APs and this can actually be more troublesome than too few APs. When devices on the same channel are co-located without enough channel separation the result is wasted equipment and reduced performance.
Posted Date:- 2022-07-20 09:16:28
LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN). Most LANs connect workstations and personal computers. Each node (individual computer) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data. Users can also use the LAN to communicate with each other, by sending e-mail or engaging in chat sessions.
Posted Date:- 2022-07-20 09:16:13
YES ! Setup is very easy. Even a lay computer user will be able to install LANwriter without any difficulty, thanks to the intelligent setup program that automatically installs the required system components and guides and prompts the user in a friendly way to input appropriate information as and when necessary. After the initial installation is done, the basic LANwriter setup may be further configured from any machine on the network via a web browser.
Posted Date:- 2022-07-20 09:16:00
LANwriter is installed on a WinXPP workstation equipped with a CD-Burner, USB Ports for flash drives and connectivity to the Internet for FTP . A LAN user wanting to write a CD or transfer data to a pen drive or an FTP server, starts up the browser on his machine and points it to a web application running on the LANwriter sever, logs in and is guided along by the software in transferring files to the LANwriter workstation.
He then creates a data transfer job and asks LANwriter to write the data to the chosen destination viz. CD, Pen drive or Ftp server. LANwriter executes the writing job in a queued manner and stores the information about the job in a database and safely archives the files to an archive location for future reference and reuse. LANwriter thus keeps a detailed record of the History of all data writing jobs and acts as a secure data publishing system for the enterprise.
Posted Date:- 2022-07-20 09:15:48
An access point or AP is the infrastructure device that contains a wired network interface and one or more radio interfaces that bridges data between the air and the wire.
Posted Date:- 2022-07-20 09:14:35
NETBIOS is a programming interface that allows I/O requests to be sent to and received from a remote computer and it hides the networking hardware from applications.
NETBEUI is NetBIOS extended user interface. A transport protocol designed by microsoft and IBM for the use on small subnets.
NETBIOS is a programming interface that allows I/O request to be send to and received from a remote computer and it hides the networking hardware from applications.
NETBEUI is a netBIOS extended user interface. A transport protocol designed by Microsoft and IBM for the use on small subnets.
Posted Date:- 2022-07-20 09:13:41
PING stands Packet Internet Gopher. This is a utility for ensuring connectivity between computers . ICMP protocol works behind this utility. Under it , sending node sends packets to destination node and reply is received if there is proper communication between two.
PING : Packet Internet Gropper
it's a diagnostic utility , which diagnose devices connectivity.
it use ICMP: Internet Control Messaging protocol to send echo requests ( usually 4 packets) and receive echo replies (4 packets)
Posted Date:- 2022-07-20 09:13:22
Also called a regenerator, it is an electronic device that operates only at physical layer. It receives the signal in the network before it becomes weak, regenerates the original bit pattern and puts the refreshed copy back in to the link.
Posted Date:- 2022-07-20 09:12:57
In the baseband transmission, the entire bandwidth of the cable is consumed by a single signal. In broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously.
In baseband transmission we transmit digital signal without converting it into analog, here a low pass channel is used.
In broadband transmission we transmit digital signal by converting it into analog. here a band pass channel is used.
Posted Date:- 2022-07-20 09:12:24
VLAN is technology in which we can administratively assign different ports of same layer to switch to different subnet works.
Posted Date:- 2022-07-20 09:12:09
A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport.
Lan stands for local area network. A number of systems connected in a physical connectivity in a limited geographical location that is called lan. It provides full time connective.
Posted Date:- 2022-07-20 09:11:59