Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Farwa Khalid

Bronze
Ask Farwa Khalid
183 Visits
0 Followers
0 Questions
Home/ Farwa Khalid/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: February 3, 2022In: Q & A

    What Feature Does Ripng Support That Is Not Supported By Rip?

    Farwa Khalid
    Farwa Khalid Bronze
    Added an answer on March 31, 2022 at 11:42 pm

    What Feature Does Ripng Support That Is Not Supported by Rip? Supernetting 32-bit addresses IPv6 Gigabit Ethernet Answer: IPv6 is not supported by RIP. Routing information protocol: It is one of the former distance-vector routing protocols (it regulates the best route for a data packet in a data netRead more

    What Feature Does Ripng Support That Is Not Supported by Rip?

    • Supernetting
    • 32-bit addresses
    • IPv6
    • Gigabit Ethernet

    Answer:

    IPv6 is not supported by RIP.

    Routing information protocol:

    It is one of the former distance-vector routing protocols (it regulates the best route for a data packet in a data network based on distance) which engages hope count. Its device has a limitation on the number of hops that permit the path from source to destination. The maximum number of hops permits by routing information protocol is 15. It confined the network size that is supported by routing information protocol. To avoid incorrect routing information generation, it implements the hold-down mechanism, route poisoning, and split horizon.

     RIPv1 routers:

    Every 30 seconds the routing table in RIPv1 routers is updated. In early progression, the size of the routing table is small and the traffic was not enough. When the network increase in size the traffic also increases to break in every 30 seconds. In routing protocol (RIP) routing information, the protocol is not the best choice in a networking environment. It is easy to set up because it does not need any parameters like in other protocols.

    IPv6:

    It is the new production internet protocol standard that replaces IPv4. It is used today by many internet devices. Every device like computer, phones need a numerical IP address for communication. IPv4 the original IP address is now out of order. The function of IPv6 is similar to IPv4 is to give unique internet protocol addresses to devices for communication with each other.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: February 3, 2022In: Q & A

    What Do Well-Chosen Subnets Accomplish?

    Farwa Khalid
    Farwa Khalid Bronze
    Added an answer on March 31, 2022 at 11:41 pm

    What Do Well-Chosen Subnets Accomplish? Routing efficiency is reduced by ensuring that IP address spaces are not mathematically correlated For easier communication, IP address spaces overlap Network documentation is very easy to manage The network affects the whole network, which makes it more diffiRead more

    What Do Well-Chosen Subnets Accomplish?

    • Routing efficiency is reduced by ensuring that IP address spaces are not mathematically correlated
    • For easier communication, IP address spaces overlap
    • Network documentation is very easy to manage
    • The network affects the whole network, which makes it more difficult to define

    Answer:

    chosen subnets accomplished the network documentation is very easy to manage.

    Subnets:

    Subnets also called subnetwork it is the subparts of an internet protocol network. It is the piece of segments of a large network. Subnets are the partition of an internet protocol network into smaller segments. Subnetting is the practice of dividing the network into more subnetworks is called subnetting. Computers with the same subnets are addressed in the same bit group in internet protocol addresses. The outcome of this logical subdivision of an IP address into two departments one is network number or routing prefix and the other one is rest field or host identifiers. The rest field is a unique identifier for host-specific or network interfaces. With the assistance of routers, traffic is exchanged between subnetworks or subnets when the prefix of the source address and the destination address are different. Routers are just a physical boundary between subnets.

    Advantages of subnets:

    The advantages of subnetting vary in each development scenario.

    • It is mandatory to allot address space effectively.
    • Subnetting enhances the efficiency of routing.
    • Its benefits in network management when in large organization subnetworks are controlled by a different organization.
    • Subnets can be ordered in a hierarchical architecture.
    • It also does business with organizational network space into a tree-like structure.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: February 3, 2022In: Q & A

    What Protocol Is Commonly Used To Request Configuration Files From Another Computer?

    Farwa Khalid
    Farwa Khalid Bronze
    Added an answer on March 31, 2022 at 11:41 pm

    What Protocol Is Commonly Used to Request Configuration Files from Another Computer? Answer: The protocol commonly used to request configuration files from another computer is trivial file transfer protocol (TFTP). Trivial file transfer protocol: It is a simple and effective protocol for transferrinRead more

    What Protocol Is Commonly Used to Request Configuration Files from Another Computer?

    Answer:

    The protocol commonly used to request configuration files from another computer is trivial file transfer protocol (TFTP).

    Trivial file transfer protocol:

    It is a simple and effective protocol for transferring data servers used to X-terminals and routers through (UDP) Users Data Protocol is known as a trivial file transfer protocol. It is designed for lightweight file transfer but is primarily used for transferring short configuration files to other devices over a dedicated link.

    Although TFTP and (FTP) File Transfer Technology, (HTTP) Hyper Text Transfer Protocol sounds similar but trivial file transfer protocol works differently from others. Although TFTP is built on File Transfer Technology it is a different protocol from FTP. The difference between these two is TFTP protocol use (UDP) user data protocol which is not stable while (TCP) Transmission Control Protocol is used by (FTP) File Transfer Technology to stable or secure information.

    TFTP was early structured to read and write files by using servers. It is a multi-functional protocol to do many different tasks.

    Uses of TFTP configuration:

    TPTP configuration used in IT pros and Sysadmins.

    • File transfer
    • Without a hard drive remote-booting
    • Codes upgrading
    • Back up the network configuration
    • Reserves IOS images
    • Without disk booting PCs
    • Back up router configuration files

    After a workstation has been started from a network card ROM trivial file transfer protocol download a program and then hasten it from a central server.

    TFTP transfer modes:

    Currently, three modes of transfer are supported by the Trivial File Transfer Protocol.

    • Mail
    • Octet
    • Netascii

    Through pairs of cooperating hosts, supplementary modes can also define. By using TFTP a transfer starts on request to read the files or write a file. When the request is granted by the servers’ the connection opens up and the file is transferred at a fixed clock length of 512 bytes. It allows connection from TFTP clients for sending and receiving.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: February 3, 2022In: Q & A

    What Are The Three Primary Goals Of Network Security?

    Farwa Khalid
    Farwa Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    What Are the Three Primary Goals of Network Security? The three main objectives of network security are Confidentiality Integrity Availability CIA triangles are mostly used to represent these three supports of network security. As we know in a network there present a huge number of unsafe vulnerabilRead more

    What Are the Three Primary Goals of Network Security?

    The three main objectives of network security are

    • Confidentiality
    • Integrity
    • Availability

    CIA triangles are mostly used to represent these three supports of network security.

    As we know in a network there present a huge number of unsafe vulnerabilities. During communication, there is a lot of chances data can be hacked by hackers. It may attack the channel to obtain data or even rejoin the incorrect message to attain its aims. So, network security secures our computers during communication. Network security preserves the network and data, integrity, usability and reliability. Network security safeguards the computers from threats and ensures the safety of data.

    • Confidentiality:

    The purpose of this security point is to protect data business from unofficial persons. The data is either saved or in motion. So, this part of network security “confidentiality” ensures that data access is only to official persons who are authorized to utilize that data.

    • Integrity:

    The function of integrity is to data stability and keep up and secure accuracy. It guarantees that data is authentic and it will not hack or changed but the attackers will access the authorized person only. Data is authentic and genuine without even a minor change it is the same by the sender and received by the recipient.

    • Availability:

    This is the third goal of network security “Availability”. The purpose of this in network availability is to ensure network resources, sources and data are only approachable to legal users.

    So, the three goals of network security are to make sure that data is safe and intimate. It will only access authorized persons to use that data.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: February 3, 2022In: Q & A

    What Are The Three Windows Settings Critical To Securing A Computer That Need To Be Verified?

    Farwa Khalid
    Farwa Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    What Are the Three Windows Settings Critical to Securing a Computer That Needs to Be Verified? The three main analytical windows that are part of systematic continuation which protect the computer when needs to verified as follows Window updates Anti-virus software Network location security settingRead more

    What Are the Three Windows Settings Critical to Securing a Computer That Needs to Be Verified?

    The three main analytical windows that are part of systematic continuation which protect the computer when needs to verified as follows

    • Window updates
    • Anti-virus software
    • Network location security setting

     Window updates: 

    It is an assistance provided by Microsoft as a function of continuation and provides assistance support for the components of windows. The assistance comes up with addition in software or alteration to fasten errors, it increases the performing efficiency of window components and intensifies the computing affair. Microsoft update is the broad version of this service its function is to change window updates. For all the operating systems and Microsoft, it provides service and patches. On the second Tuesday of every month patches and others are released through window updates.

    Operation of window updates:

    These are the following uses of window updates

    • It updates Microsoft windows and all other Microsoft programs.
    • It provides window protection from virus attacks by updating the security.
    • It can also use to approach the history update to show all previous history that is installed on a computer with the assistance of the windows update service.

    There are different updates windows used nowadays like windows 11, windows 10, and Windows XP.

    Anti-virus software:

    anti-virus software is specially designed to remove, detect and protect from virus software. It automatically runs once it gets installed to protect the computers from malicious attacks. It also protects from worms, spyware, and trojan horses to protect hardware and files and block website.

    Functions:

    Different types of anti-virus software are made by different companies to perform a crucial function.

    • It examines the important files.
    • It enables you to plan examines.
    • It provides access to begin a scan on your computer.
    • It notified you about a virus attack automatically ask permission to clean the files.

    Network location security setting:

    Network security network deals with privacy protection during data transmission and different types of end-to-end encryption and authentication. Always choose a strong password for network connections.

    Network location is an outline for assembly the network and it shares the setting when you are applied for connection. When you connected to network location it provides access to different features like network discovery, file sharing, and printer sharing.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: February 3, 2022In: Q & A

    What Is The Name Of The Policy Outlining Procedures To Combat Dumpster Diving?

    Farwa Khalid
    Farwa Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    What Is the Name of The Policy Outlining Procedures to Combat Dumpster Diving? Recycling Password management Disposal and destruction Need to know   Answer:  The name of the policy that outlines the procedures for dealing with waste diving is Disposal and Destruction. Dumpster diving: It is a techniRead more

    What Is the Name of The Policy Outlining Procedures to Combat Dumpster Diving?

    • Recycling
    • Password management
    • Disposal and destruction
    • Need to know

      Answer: 

    The name of the policy that outlines the procedures for dealing with waste diving is Disposal and Destruction.

    Dumpster diving:

    It is a technique that is used to recover all the information that is used to attack a computer network from predisposed items. It is hunting information from other’s trash. It is a widespread technique that is not only limited to hurting someone else information’s, passwords and entrance codes, phone information. The social engineering technique is used by an attacker to obtain entrance to the network.

    Disposal policy:

    Dumpster diving can be prevented from learning something important from trash the recommended policy is disposal policy in which before recycling all the papers and printout are shredded in a machine, it ensures all the data is deleted from media storage. Provide awareness to the staff about the peril of unhandled trash.

    From media storage information is recovered the hardware of the disposed of computer is a jackpot for attackers. The improperly erased drives easily recovered contain important certificates and passwords. With the help of new technology without storage, media tools are available like trusted platform module data sworn by a company. Attackers also can identify the manufacturing of equipment by using hardware.

     Steps Prevention from dumpster diving:

    Through processes, the attack from dumpster diving can be prevented this should be clearly explained to the employees. A lot of care is needed to handle trash properly.

    Convenient shredding: Provides access to employees for shredding that are placed next to recycling bins. Home shredders are provided to those employees who work from home.

    • Awareness:

    It is necessary to educate employees about social engineering methods and proper disposal. To use old computers and to take the printout to homes are not allowed to the employees.

    • Locked trash:

    To prevent dumpster diving Tash should be locked and secure till it is not ready to pick up.

    • Secure storage media:

    It includes shredding compact discs, disk drives erasers, and demagnetize storage.

    • It is necessary to use documented inactivate process which makes sure that all the data is deleted from computers before being disposed of.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: February 3, 2022In: Q & A

    What Is The Maximum Amount Of Throughput Provided By An Oc-12?

    Farwa Khalid
    Farwa Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    What Is the Maximum Amount of Throughput Provided by An Oc-12? 51.84 Mbps 622.08 Mbps 244.16 Mbps 155. 25 Mbps  Answer:  OC12 transmission rates are up to 622.08 Mbps.It is mostly used in (WAN) wide area network connections by ISPc. It equals 4 OC3s. What is optical carrier transmission? It is a netRead more

    What Is the Maximum Amount of Throughput Provided by An Oc-12?

    • 51.84 Mbps
    • 622.08 Mbps
    • 244.16 Mbps
    • 155. 25 Mbps

     Answer: 

    OC12 transmission rates are up to 622.08 Mbps.It is mostly used in (WAN) wide area network connections by ISPc. It equals 4 OC3s.

    What is optical carrier transmission?

    It is a network line transmission it must not use by a large ISP it should local connection and smaller. The average internet customer also used the connection speed like web hosting companies buy assistance from larger companies.

    The optical cable is used for connecting the robot to the control box. It must be resistant to oil and heat type uncover multi-pin robot cable. It is a type of attached wiring cable like used in the wiring in the robot. Heat-resistant polyvinyl chloride is used by these cables to meet the needs of the factory automation environment. For Core wire identification marks numbering ways are used for ease of wire working.

    OC-12 application:

    • It is a certain range of digital signals that can be transmitted on the SONET optical fiber network.
    • There is a different magnitude of optical fiber it relays on the rate of data that can convey the specific signal.
    • It has widespread bandwidth which is why used in an enormous network foundation. Due to this bandwidth ant kinds of applications are run.
    • The large file is easily transferred and vanishes the data easily.
    • For data and voice, optical cable 12 is used for both due to the large bandwidth. It is the strong back for any intensive applications like an internet service provider.
    • It helps in business evaluation to identify what kind of assistance is necessary to take into reflection. Firstly, evaluate the data and voice and number of traffics.
    • Optical cable 12 helps to save money by proper planning in business by evaluating traffic data and voice both.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: February 3, 2022In: Q & A

    In An 802.11 Data Frame What Is The Size Of The Frame Check Sequence Field?

    Farwa Khalid
    Farwa Khalid Bronze
    Added an answer on March 15, 2022 at 1:13 pm

    In An 802. 11 Data frames What is the size of the frame check sequence field? In 802. 11 data frame, the size of the frame check sequence field is 6 bytes. Data frame: The frame is a basic structure that comprises the disciplines. The basic frames do not provide any more information and details. TheRead more

    In An 802. 11 Data frames What is the size of the frame check sequence field?

    In 802. 11 data frame, the size of the frame check sequence field is 6 bytes.

    Data frame:

    The frame is a basic structure that comprises the disciplines. The basic frames do not provide any more information and details. The simplest framing is Ethernet framing gives some basic information but 802.11 framing is more advanced and involved due to its wireless medium. There are different types of frames like

    • Data frames
    • Control frames
    • Management frames

    Data frames are used to carry high-level agreement data in a body frame. Based on function different types of frames are classified. BSS are managed by management frames; access control is the function of control frames and data frames contain a network of 3–7-layer information. Data frames are differentiated from other frames that depend on contention-free service. IBSS can never be used by other contention contain frames.

    Alteration in data framing theme:

    Different types of data frames are used by 802.11 all different frames are depending on whether the assistance is contention-based or contention-free. The function of Contention-free frames is to appreciate and separate other frames. It is also used to save spaces interface. The contention-free frame integrates the task for efficiency. It also transmitted the data. There are different kinds of data frames are.

    Data:

    Frame body can be moved from one station to another is the single aim of this simple frame. Subtypes of data frames are transmitted in contention-based periods.

    Null:

    When changes occur in power-saving status in 802.11 used mobile station to report the entry points. When a mobile station not working then the role of access points is to moderate the stations. When no data are sent by the mobile station then it can use the null frame along with the ability of power management. Entry points should not transmit null frames and not enter into sleeping mode.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 11 12 13

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}