Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Statement Regarding Satellite Connections Is Accurate?
What statement regarding satellite connections is accurate? A satellite connection is an order between the upstream and the downstream data which is shared with the help of the satellite. The hardware device has the antenna and the receiver which catch and send the signal of the satellite. A questioRead more
What statement regarding satellite connections is accurate?
A satellite connection is an order between the upstream and the downstream data which is shared with the help of the satellite. The hardware device has the antenna and the receiver which catch and send the signal of the satellite. A question has been raised here about satellite: Which statement regarding satellite connection is accurate? And the answer is the satellite requires the line of sight of connectivity.
Let’s discuss the satellite connection in detail so we get the complete concept of the connection. Those who want to know must read it to the end!
Satellite connection
The satellite connection is wireless which is further divided into multiple dishes in the world and in space as well. With the help of it we can access every corner of the world .it keeps the world connected to each other by giving them the entire knowledge and up-to-date information of the systems.
Satellite connection is quite good for the developing and rural areas because there is no need for the cables modem. The satellite is useful at the time when there is a lack of basic equipment only the battery power supply can be on the computer and make it useful for work with satellite internet connection.
Working of the satellite connection
In the satellite connection, a dish is located at the ground station which is known as the internet provider, the satellite in space, and the other dish is present ant the receiver side VSAT. This is the string of the connection which spreads over miles in thousands.
For the proper connection, the satellite has to be 22,300 miles from the earth’s surface, and it has to be revolved around at the same speed of earth rotation which makes it stationary in space, due to this the communication between the satellites is possible. The satellite internetwork in a way like land-based internet which sends the data from point-to-point. But the delay in the signals which travel in space is different from the land-based. While the working of the satellite is efficient and the cost is less but it covers a small area rather than land-based.
Pros and cons of satellite connection
Cons:
PROS
What Are The Two Main Methods For Encrypting Network Traffic On The Web?
What are the two main methods for encrypting network traffic on the web? SSL and SHTTP. SSL and HTTPC. DSL and HTTPD. HTML and SHTTP. Answer: the methods for the encryption of the network traffic on the web are SSL (secure sockets layer) which is the combo of HTTP and SSL, gives encryption and safeRead more
What are the two main methods for encrypting network traffic on the web?
Answer: the methods for the encryption of the network traffic on the web are SSL (secure sockets layer) which is the combo of HTTP and SSL, gives encryption and safe identification of the internal server, SHTTP (secure hypertext transfer protocol).
Now that you got your answer let’s take a look at the encryption such as what is encryption? What are the types of encryption? How does it work? So that the user has a thorough knowledge of it and the network remains safe and secure.
Encryption and its importance
Encryption is the process to transform the true message into another form so that in case of attack the important information will remain safe and secure. The process of encryption and decryption is called cryptography. The data which is not encrypted is called the plain text while the encrypted data is known as the ciphertext and they are transformed to their exact meaning with the help of the key.
The ciphertext has the variable which is key in the encrypting algorithm and it makes the unique output .when the outsider tries to attack the message, he has to know which kind of cipher is used to encrypt the message and the key which act as a variable in the algorithm. The time is taken to find the key and cipher make the encrypting process secure.
Encryption has an important role in security. Let’s take a look at the few important aspects of it in the following:
Working of the encryption:
The sender has to decide the cipher method and the variable as the key which is used in the coding and decoding. There are two forms of the cipher one is a symmetric cipher while the other one is an asymmetric cipher.
The symmetric cipher uses a single key it is also known as the shared key because it is used both by the receiver and the sender. This method of encryption is fast and the most used method is the advanced encryption standard (AES).
The asymmetric method is known as the public key encryption because it used different keys one is for the sender and the other is for the receiver. RSA is the most common asymmetric algorithm
How does the encryption use?
Encryption’s main purpose is to keep the data safe and persistent. When someone uses the ATM or mobile for the transaction the encryption keeps the information safe from being relayed. Businesses are using encryption methods to keep the sensitive information being leaked or damaged in case of a data breach. as we know in encryption technique there are three main parts one is data, encryption engine, and the key, and all these components are placed in the same location in the laptop. While in application structure the components are placed in different locations to keep the whole system to be damaged due to the fault of the one component.
See lessWhich Key Combination Allows A User To Abort Setup Mode?
Which key combination allows a user to abort setup mode? The setup mode is interrupted by the key combination of Ctrl-C which helps the user to abort the mode. Let’s talk about the setup mode and how to put an echo dot in the setup mode? In the following discussion, so read it to the end. What is seRead more
Which key combination allows a user to abort setup mode?
The setup mode is interrupted by the key combination of Ctrl-C which helps the user to abort the mode. Let’s talk about the setup mode and how to put an echo dot in the setup mode? In the following discussion, so read it to the end.
What is setup mode?
In today’s world, companies have the option to start the setup mode. The mode helps the organization to make the changes in roles and classes and it is quite useful because it replaces many processes of the governance meetings etc. in the setup modes any notification for the modification in the roles and circles are not sent. The governance meeting or the Asynchronous proposal are not entered into the setup mode. The modification and the changes in the setup mode are done by the admin only.
Echo Dot in the Setup mode
For the Echo, dot you need to install the Alexa app on the IOS or android devices. Along with the turned off of echo open the Alexa and follow the steps defined below:
when the echo mode powers on for the first time, the echo device will go to the setup mode automatically. in the mode, the echo dot connects to the Alexa with the help of Bluetooth. When it is connected connect it to the WIFI network. The Echo dot does not work without the WIFI connection. Once the Echo dot is selected then you can give the command to Alexa and use its skills.
A question has been asked: why the Echo Dot does not go to the setup mode? The answer is that someone has already set the mode and you just need a WIFI connection. If your echo has been owned by someone else and you will want complete control of the Alexa app then reset your device which will restore its default setting and follow the instructions for the setup. The setup of the app is different according to the generations.
See lessWhich Ipv6 Network Prefix Is Only Intended For Local Links And Can Not Be Routed?
Which IPv6 network prefix is only intended for local links and cannot be routed? 2002: :/3 FE80 :: /10. FED0: :/10. FC00: :/7. Answer: The local-link prefix for IPV6 which is only intended for local links and cannot be routed is FE80: :/10. A device with only this address can communicate with deviceRead more
Which IPv6 network prefix is only intended for local links and cannot be routed?
Answer: The local-link prefix for IPV6 which is only intended for local links and cannot be routed is FE80: :/10. A device with only this address can communicate with devices on the same network and not with the devices on a different network.
Let’s further discuss the link-local address exact meaning and its role on IPV6. those Who are interested will read the topic to the end.
What is the local-link address?
In networking, the local-link address is for that host who is connected within the network and allows the communication between them. The process which is associated with the link-local address is called stateless address autoconfiguration or automatic private ip addressing known as APIPA. However, the local-link address is not considered as unique apart from their network part that is the reason the routers do not forward packets in local-link origin or the destination. The local link for IPV4 starts from 169.254.0.0/16 (169.254.0.0 to 169.254.255.255) while in IPV6 the starts with the block FE80: :/10.
How to address the local-link address?
The link-local is assigned can address manually or automatically by an administrator. In the internet protocol they are addressed with the help of stateless address autoconfiguration .it is a process that selects the stochastic procedure by choosing the link-local address values and assigning them the pseudo address randomly which is different from other sessions.
In IPV6 the local link is addressed from the interface media access control with rule base method. IPV4 is used when there is no external stateful mechanism of the configuration address present i.e., the dynamic host configuration protocol.
IPv6 local-link address
As you know the local-link address which is assigned or reserved for IPv6 is fe80: :/10 and it is for unicast. From the 64 bits local-link addresses the first 10 bits (1111111010) are fixed for IANA-reserved for local-link address, and the subnet ID is zero. Apart from IPv4, the local-link address is needed by the IPv6 in each interface of the network, even if the routable addresses are appointed. The host of the IPv6 has various IP addresses which are allocated to the IPv6 present interface.
For the DHCP and many other protocols of the IPv6 sublayer functions the local-link addresses are needed. For the packets reaches to the exact destination the local-link address is attached with the host and the zero index is also present in the address. The addresses are allocated by automatic (stateless) and manual. The autoconfiguration as stateless address autoconfiguration worked with neighbor discover protocol (NDP) and the addresses are made with routing prefix and the specific identifier of the network interface.
From the NDP the router host gives the information related to the configuration to the related link attached with the interface which also allows the IP addresses to receive the interface for either local or global. The specification is given by addressing the methodology of selection.
See lessWhich Solution Would Help A College Alleviate Network Congestion Due To Collisions?
Which solution would help a college alleviate network congestion due to collisions? A firewall that connects two internet providers. A router with five Ethernet ports. A router with two ethernet ports. A density switch with a high port. Answer: Switches give the micro segmentations which reduce colRead more
Which solution would help a college alleviate network congestion due to collisions?
Answer: Switches give the micro segmentations which reduce collision in a way that one device with the same ethernet bandwidth does not affect the other network device. The connectivity is fast with a density switch with a high port.
What is port density?
The port density is defined as the number of ports that are present on a switch. On a single device, the fixed or estimated port that is assisted by the switches is 48 in numbers. It contains an option of having four additional ports for SFP (small form-factor pluggable) devices. With high density, a fixed space is used effectively. If you have 2 switches then and each switch has 24 ports then 46 devices are connected with it and a few of the ports of the switches are damaged or lost by connecting with other networks. However, if you have a switch with 48 ports then 47 devices are connected with it and one port is for other networks and one power outlet is required for it.
Most of the modular switches use high-port densities with extras multiple switch port line cards.ie some of the 6500 catalyst switches assist 1000 switch ports. Big organizations use high-port density switches to make effective use of space and power. Without it, the switch needs extra fixed-configuration switches for adjusting the devices which are needed in the network interface, and they use a lot of space and power. Those who built the network must take into the consideration of uplink bottleneck. A constant configuration switches use additional ports for bandwidth. A single-modular switch uses less bandwidth because the backplane of the chassis gives the required bandwidth to board the connected devices with switch port line cards.
Few of the high port density switches are KS-616F and KS-624F and have two optic slots. They are built because they consume less power and reduce the traffic on the network, less in cost, and give the solution to almost every problem. Some of the features are discussed in the following sections:
Which Two Tasks Can Be Performed By A Local Dns Server? (Choose Two.)
Which two tasks can be performed by a local DNS server? (Choose two.) It gives an IP address to the localhost. Data can be transferred between two devices in the network. For an internal host, it can map name-to-IP addresses. Forward the name resolution protocol for internal servers. It can reclaimRead more
Which two tasks can be performed by a local DNS server? (Choose two.)
Answer: The task which is performed by the DNS is it gives the TP address for domain i.e.www.xyz.com the other one is it can forward the message which is not solved in another network to give the domain name for the translation of the IP address. The information of the local device IP address is given by DHCP. The files are shared with the help of the file transfer protocol and POP is used for the reclamation of the mail messages.
In this further topic let’s study what is DNS and how to configure it in local servers. so stay connected to the end of the topic.
Domain name system (DNS)
The main function of the Domain Name System is to transform the domain name such as xyz.com to the numerical value in hexadecimal which is the address for the server. For example, if the IP address is 127.0.0.0 and you act by requesting the domain name then the system will act A DNS to find the address of the server for contact.
The devices will cache the DNS response and before the actual request the new domain visit will sustain the DNS round trip, and all this happens at the level of the OS and it is invisible to the users ISPs the security measure will handle the DNS server. And with the default router setting, you can probably depend on the ISPs.
What is the reason to run your DNS?
The main reason to run your DNS is that you can get control over your network, and the goal is to construct the network-level domain mappings. By designing the router to use the DNS of your awn will allow one of your devices to connect or get access to 192.168.0.101 with the help of http://web.server.
With your DNS you can make the setting centralized at one place rather than applying them Sigle in /etc./hosts on every device.it will apply to almost everything you can connect to the network along with embedded hardware which gives s the way to modify the routing stack.
Configuration of the local DNS server
For the configuration of the local DNS server for DNS forwarder, you can first design the ETP DNS server IP addresses and the DNS server in the security. The steps are discussed in the following:
Which Two Things Can Be Determined By Using The Ping Command? (Choose Two.)
Which two things can be determined by using the ping command? (Choose two.) It can determine the routers of the source and destination. The router IP address of the neighbor destination device. The average time taken by the packets to reach the destination and return the response to the source. TheRead more
Which two things can be determined by using the ping command? (Choose two.)
Answer: The ping is the command which gives the reaction on time between the echo request was sent to the host and the echo response was received from the destination. can measure network performance. And a ping determines that the intended host was reachable on the network.
What is the ping command?
The ping is the command line prompt that checks the source computer’s ability whether it can reach the destination computer or not.it away to determine whether the computers can transmit through the network along with another computer or network device. Some other works for the ping command are determining the network status and different hosts checking the problem related to the hardware or software, testing and handling the networks.
Working of the ping command
The ping command works with protocol internet control message protocol (ICMP) echo request sent to the destination through the network and wait for the response. When it is issuing a signal went to the specific point or address and when it went to the destination then it confirms by sending the echo reply packet.
Two functions have been performed in it one is to check the availability of the destinated host, another is to find the RTT (round-trip time) which shows the time taken by the destination to send the reply.it can measure in a millisecond and the process begins when the request was sent to the server and terminated with the response that the request is received on the server.
The ping command sends the various request by default and also show the result, that the echo ping is received by giving the response from the server.it can show the bytes and the time taken by the response or time-to-live.
The IP address is pinged by the 172.168.9.13 address, and if it is a success then it is on and the communication between the machines happens. If the ping is completed but the reply comes late then it shows that the network is congested or there is a speed issue. With the network speed, the ping has a standard.
Ping commands
Some of the ping commands which are used are discussed in the following section:
-t: This command is used to ping the target and terminate by typing the CTRL+C.
-a: The ping will solve the problem related to the hostname of the target IP address.
-n count: The command will set the echo request numbers, from 1 to 4294967295 and by default, this ping will send 4 if it is not working.
-I size: This ping is to set the size in bytes of the request frames from 32 to 65,527. by default, it will send the 32-byte echo request if it is not working.
See lessWhat Security Violation Would Cause The Most Amount Of Damage To The Life Of A Home User?
What security violation would cause the most amount of damage to the life of a home user? On the Email server the a security denial. Duplication of the worms and bugs in a computer. The capture of the potential data leads to identity theft. Malware leads to spam emails. Answer: on the personal compuRead more
What security violation would cause the most amount of damage to the life of a home user?
Answer: on the personal computer the email server denial the duplication of the worms the bugs, malware which bring to the spam email could cause frustration, invasive, and very annoying. while the theft of identity is life-changing, and the security solution must be implemented to protect the PC from this kind of damage and threat.
What is the security violation?
A security violation is also known as a security breach which means the incidents that cause the access of the unrecognized person to the data of computers, applications, and network devices.it happens when the intruder enters into the system with methods that bypass the security process.
Moreover, there is a difference between the security and data breach, the security breach is considered under break-in while the data breach happens by getting someone personal information, data, etc. The personal information is valuable because people might send it to your competitors or sell it on the dark web such as the name and the credit card number are sold which further use in criminal activity such as robbery.
The security breach and security incidents are also different the incident happens due to the attack of the bugs virus, malware, or worms. The DDOS attack or the employee losing the laptop somewhere is not considered under the security violation.
Simply the security violation is the breach of security rules, procedures, instructions, and the regulation it does not matter how big the security breach is just report it to the office so the PC is protected from any further damage. A few examples of the security breach are listed below :
Which Two Definitions Accurately Describe The Associated Application Layer Protocol? (Choose Two.)
Which two definitions accurately describe the associated application layer protocol? (Choose two.) SMTP- It can transfer web pages from web servers to clients. Telnet- It gives remote access to the servers and the networking devices. DNS- solve the internet names with IP addresses. FTP- It transportRead more
Which two definitions accurately describe the associated application layer protocol? (Choose two.)
Answer:
The definition which accurately describes the associated application layer protocol is Telnet which gives remote access to the servers and the networking devices. While the DNS solves the internet name to IP addresses.
Along with the answer, now let us describe different applications layer and their commands in this topic. That’s why stay connected to the end of the discussion.
Application layer of the OSI Model
The application layer is the upper layer of the OSI model, along with the help of this layer people or users will interact with the PC. It gives various services to its users.IT contains the communication protocol which manages the transmission over the network. The protocol describes the process of the client and servers on the end system. Protocols of Application layer narrates:
Protocol of Applications Layer:
Some of the application layers protocols are defined in the following section:
TELNET:
Teletype Network assists in terminal emulation. The Telnet clients can easily access the resources of the Telnet server. It can manage the files on the network. The devices like the switch’s initial setup are maintained by it. with the command of it, it can communicate with remote devices. The port number for the telnet is 23.
Command:
telnet [\\Remote server]
TFTP:
TFTP stands for the trivial file transfer protocol, it is also called the stripped-down version of FTP but the modification is that you can easily find what you want to know. The technology which transfers the file among network devices and the simple FTP, the port number is 69.
Command
tftp [ options…] [host [port]] [-c command]
NFS (Network File System):
Network file systems initiate the file system over the internet and then interact with those files because they are mounted locally. It allows the system administrator to integrate the sources on the centralized server over the network. The port number is 2049 for NFS.
Command
service nfs start
See lessWhich Phrase Describes An Ftp Daemon?
Which phrase describes an FTP daemon? It is a distinct FTP program. A program that runs on the FTP server. The program runs on FTP clients. An app that requests the data from the server of FTP. Answer: An FTP server is run on the FTP daemon which is a program that gives the FTP services to the end-uRead more
Which phrase describes an FTP daemon?
Answer: An FTP server is run on the FTP daemon which is a program that gives the FTP services to the end-users and they must have the FTP client program because they request it.
Let’s further study the FTP server and the FTP daemon what is their purpose? How do they describe it? That’s why stay connected to the end to obtain a thorough knowledge of the topics.
What is an FTP daemon?
The file transfer protocol daemon (FTPD) is the server process for the DAPRA internet FTP protocol. The server utilizes the transmission control protocol and focuses on the port which is specified for the FTP services. It can secure the software and also run the UNIX operating system.
The authentication of a file that is transferred to the client and the android’s ports are also managed by it. The file interpretation according to the “globbing” and allow the end-users to use the metacharacters i.e., *, [], {}, ~.
Syntax:
/usr/sbin/ftpd [ -d ] [ -D DataConnTimeOut ] [-e][ -f ] [ -ff ] [ -k ] [ -l ] [ -U ] [ -t TimeOut ] [ -T MaxTimeOut ] [ -s ] [ -u OctalVal ] [-q [-C]] [-c] [-H].
inetd usually initiates the ftpd daemon and the command line along with SRC commands managed the ftpd daemon.
Description of the FTP daemon
/usr/sbin/ftpd is the file transfer protocol server program. The modification in the FTP daemon happens with system management interface tool (SMIT) or with the SRC (system resource controller) by changing the /etc/inetd.conf or /etc/services file.by type the ftpd on command line is not necessary.it is started with default when it is not commanded in /etc/inetd.conf file.
The information required by the inetd comes from the /etc/inetd.conf file or with /etc/services file. If someone wants to change the /etc/inetd.conf or /etc/services file, then run refresh -s inetd or kill-I inetdPID command which informs the inetd daemon about the modification of its configurated files.
The file name is also extended by the ftpd daemon along with the convention of the csh command. because the command permits use of characters like * asterisk, question marks, square brackets [], curly brackets {} and the tilde ~.
for the FTP subtree there are some of the recommendations of the rules in the following:
~ftp:
It can form the home directory for the superuser and be unwritten by someone.
~ftp/bin:
It also makes for the superusers and is unwritten by someone. The conversion commands are installed here. the 1 s service which is presented to assist LIST command is mode 111.
~ftp/pub:
This directory is made by mode 777 and owned by FTP. if an unknown person tries to access any file with an unrecognized account, then the use puts them in the directory.
See less