Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Maryam Khalid

Bronze
Ask Maryam Khalid
60 Visits
0 Followers
0 Questions
Home/ Maryam Khalid/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: October 3, 2021In: Q & A

    What Statement Regarding Satellite Connections Is Accurate?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:56 pm

    What statement regarding satellite connections is accurate? A satellite connection is an order between the upstream and the downstream data which is shared with the help of the satellite. The hardware device has the antenna and the receiver which catch and send the signal of the satellite. A questioRead more

    What statement regarding satellite connections is accurate?

    A satellite connection is an order between the upstream and the downstream data which is shared with the help of the satellite. The hardware device has the antenna and the receiver which catch and send the signal of the satellite. A question has been raised here about satellite: Which statement regarding satellite connection is accurate? And the answer is the satellite requires the line of sight of connectivity.

    Let’s discuss the satellite connection in detail so we get the complete concept of the connection. Those who want to know must read it to the end!

    Satellite connection

    The satellite connection is wireless which is further divided into multiple dishes in the world and in space as well. With the help of it we can access every corner of the world .it keeps the world connected to each other by giving them the entire knowledge and up-to-date information of the systems.

    Satellite connection is quite good for the developing and rural areas because there is no need for the cables modem. The satellite is useful at the time when there is a lack of basic equipment only the battery power supply can be on the computer and make it useful for work with satellite internet connection.

    Working of the satellite connection

    In the satellite connection, a dish is located at the ground station which is known as the internet provider, the satellite in space, and the other dish is present ant the receiver side VSAT. This is the string of the connection which spreads over miles in thousands.

    For the proper connection, the satellite has to be 22,300 miles from the earth’s surface, and it has to be revolved around at the same speed of earth rotation which makes it stationary in space, due to this the communication between the satellites is possible. The satellite internetwork in a way like land-based internet which sends the data from point-to-point. But the delay in the signals which travel in space is different from the land-based. While the working of the satellite is efficient and the cost is less but it covers a small area rather than land-based.

    Pros and cons of satellite connection

    Cons:

    • The major cons of the satellite connection are bad weather because it affects the signals and the quality is damaged due to this.
    • The ping rate is low which means the speed or the distance signals take to reach the hardware device.
    • VPNs are not compatible with satellite internet.
    • The satellite internet is quite expensive.

    PROS

    • The speed of the satellite is faster and mostly it depends on the package we get bit the 10X speed of it is faster than the dialup.
    • The cables modem is not necessary for satellite connection.
    • The bandwidth is quite high which protects the speed of the internet.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: October 3, 2021In: Q & A

    What Are The Two Main Methods For Encrypting Network Traffic On The Web?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:55 pm

    What are the two main methods for encrypting network traffic on the web? SSL and SHTTP. SSL and HTTPC. DSL and HTTPD. HTML and SHTTP. Answer: the methods for the encryption of the network traffic on the web are SSL (secure sockets layer) which is the combo of HTTP and SSL, gives encryption and safeRead more

    What are the two main methods for encrypting network traffic on the web?

    • SSL and SHTTP.
    • SSL and HTTPC.
    • DSL and HTTPD.
    • HTML and SHTTP.

    Answer: the methods for the encryption of the network traffic on the web are SSL (secure sockets layer) which is the combo of HTTP and SSL, gives encryption and safe identification of the internal server, SHTTP (secure hypertext transfer protocol).

    Now that you got your answer let’s take a look at the encryption such as what is encryption? What are the types of encryption? How does it work? So that the user has a thorough knowledge of it and the network remains safe and secure.

    Encryption and its importance

    Encryption is the process to transform the true message into another form so that in case of attack the important information will remain safe and secure. The process of encryption and decryption is called cryptography. The data which is not encrypted is called the plain text while the encrypted data is known as the ciphertext and they are transformed to their exact meaning with the help of the key.

    The ciphertext has the variable which is key in the encrypting algorithm and it makes the unique output .when the outsider tries to attack the message, he has to know which kind of cipher is used to encrypt the message and the key which act as a variable in the algorithm. The time is taken to find the key and cipher make the encrypting process secure.

    Encryption has an important role in security. Let’s take a look at the few important aspects of it in the following:

    • Confidential: it keeps the message safe by encoding it.
    • Authenticity checks the originality of the message.
    • Integrity makes sure that the message is constant when it was sent.

    Working of the encryption:

    The sender has to decide the cipher method and the variable as the key which is used in the coding and decoding. There are two forms of the cipher one is a symmetric cipher while the other one is an asymmetric cipher.

    The symmetric cipher uses a single key it is also known as the shared key because it is used both by the receiver and the sender. This method of encryption is fast and the most used method is the advanced encryption standard (AES).

    The asymmetric method is known as the public key encryption because it used different keys one is for the sender and the other is for the receiver. RSA is the most common asymmetric algorithm 

    How does the encryption use?

    Encryption’s main purpose is to keep the data safe and persistent. When someone uses the ATM or mobile for the transaction the encryption keeps the information safe from being relayed. Businesses are using encryption methods to keep the sensitive information being leaked or damaged in case of a data breach. as we know in encryption technique there are three main parts one is data, encryption engine, and the key, and all these components are placed in the same location in the laptop. While in application structure the components are placed in different locations to keep the whole system to be damaged due to the fault of the one component.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: October 3, 2021In: Q & A

    Which Key Combination Allows A User To Abort Setup Mode?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:55 pm

    Which key combination allows a user to abort setup mode? The setup mode is interrupted by the key combination of Ctrl-C which helps the user to abort the mode. Let’s talk about the setup mode and how to put an echo dot in the setup mode? In the following discussion, so read it to the end. What is seRead more

    Which key combination allows a user to abort setup mode?

    The setup mode is interrupted by the key combination of Ctrl-C which helps the user to abort the mode. Let’s talk about the setup mode and how to put an echo dot in the setup mode? In the following discussion, so read it to the end.

    What is setup mode?

    In today’s world, companies have the option to start the setup mode. The mode helps the organization to make the changes in roles and classes and it is quite useful because it replaces many processes of the governance meetings etc. in the setup modes any notification for the modification in the roles and circles are not sent. The governance meeting or the Asynchronous proposal are not entered into the setup mode. The modification and the changes in the setup mode are done by the admin only.

    Echo Dot in the Setup mode

    For the Echo, dot you need to install the Alexa app on the IOS or android devices. Along with the turned off of echo open the Alexa and follow the steps defined below:

    • Click on the device in the Alexa app.
    • Click on the + sign on the right corner on top.
    • Tap on the Add device.
    • Pint on the Amazon Echo and click on it.
    • Click on Echo, Echo Dot, Echo Plus, and other options.
    • When you connect the Echo Dot with the power supply turn it on and then wait for the blue light to turn to orange.
    • Click yes on the app.
    •  In the available devices click on the Echo Dot.
    •  Select the WIFI network and click continue.
    •  Follow the prompts in the app for the finishing of the setting. Then choose select when the configuration message for the setting appears.

     when the echo mode powers on for the first time, the echo device will go to the setup mode automatically. in the mode, the echo dot connects to the Alexa with the help of Bluetooth. When it is connected connect it to the WIFI network. The Echo dot does not work without the WIFI connection. Once the Echo dot is selected then you can give the command to Alexa and use its skills. 

    A question has been asked: why the Echo Dot does not go to the setup mode? The answer is that someone has already set the mode and you just need a WIFI connection. If your echo has been owned by someone else and you will want complete control of the Alexa app then reset your device which will restore its default setting and follow the instructions for the setup. The setup of the app is different according to the generations.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: October 3, 2021In: Q & A

    Which Ipv6 Network Prefix Is Only Intended For Local Links And Can Not Be Routed?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:55 pm

    Which IPv6 network prefix is only intended for local links and cannot be routed? 2002: :/3 FE80 :: /10. FED0: :/10. FC00: :/7. Answer: The local-link prefix for IPV6 which is only intended for local links and cannot be routed is FE80: :/10. A device with only this address can communicate with deviceRead more

    Which IPv6 network prefix is only intended for local links and cannot be routed?

    • 2002: :/3
    • FE80 :: /10.
    • FED0: :/10.
    • FC00: :/7.

    Answer: The local-link prefix for IPV6 which is only intended for local links and cannot be routed is FE80: :/10. A device with only this address can communicate with devices on the same network and not with the devices on a different network.

    Let’s further discuss the link-local address exact meaning and its role on IPV6. those Who are interested will read the topic to the end.

    What is the local-link address?

    In networking, the local-link address is for that host who is connected within the network and allows the communication between them. The process which is associated with the link-local address is called stateless address autoconfiguration or automatic private ip addressing known as APIPA. However, the local-link address is not considered as unique apart from their network part that is the reason the routers do not forward packets in local-link origin or the destination. The local link for IPV4 starts from 169.254.0.0/16 (169.254.0.0 to 169.254.255.255) while in IPV6 the starts with the block FE80: :/10.

    How to address the local-link address?

    The link-local is assigned can address manually or automatically by an administrator. In the internet protocol they are addressed with the help of stateless address autoconfiguration .it is a process that selects the stochastic procedure by choosing the link-local address values and assigning them the pseudo address randomly which is different from other sessions.

    In IPV6 the local link is addressed from the interface media access control with rule base method. IPV4 is used when there is no external stateful mechanism of the configuration address present i.e., the dynamic host configuration protocol.

    IPv6 local-link address

    As you know the local-link address which is assigned or reserved for IPv6 is fe80: :/10 and it is for unicast. From the 64 bits local-link addresses the first 10 bits (1111111010) are fixed for IANA-reserved for local-link address, and the subnet ID is zero. Apart from IPv4, the local-link address is needed by the IPv6 in each interface of the network, even if the routable addresses are appointed. The host of the IPv6 has various IP addresses which are allocated to the IPv6 present interface.

    For the DHCP and many other protocols of the IPv6 sublayer functions the local-link addresses are needed. For the packets reaches to the exact destination the local-link address is attached with the host and the zero index is also present in the address. The addresses are allocated by automatic (stateless) and manual. The autoconfiguration as stateless address autoconfiguration worked with neighbor discover protocol (NDP) and the addresses are made with routing prefix and the specific identifier of the network interface.

    From the NDP the router host gives the information related to the configuration to the related link attached with the interface which also allows the IP addresses to receive the interface for either local or global. The specification is given by addressing the methodology of selection.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: October 3, 2021In: Q & A

    Which Solution Would Help A College Alleviate Network Congestion Due To Collisions?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:55 pm

    Which solution would help a college alleviate network congestion due to collisions? A firewall that connects two internet providers. A router with five Ethernet ports. A router with two ethernet ports. A density switch with a high port.  Answer: Switches give the micro segmentations which reduce colRead more

    Which solution would help a college alleviate network congestion due to collisions?

    • A firewall that connects two internet providers.
    • A router with five Ethernet ports.
    • A router with two ethernet ports.
    • A density switch with a high port. 

    Answer: Switches give the micro segmentations which reduce collision in a way that one device with the same ethernet bandwidth does not affect the other network device. The connectivity is fast with a density switch with a high port.

    What is port density?

    The port density is defined as the number of ports that are present on a switch. On a single device, the fixed or estimated port that is assisted by the switches is 48 in numbers. It contains an option of having four additional ports for SFP (small form-factor pluggable) devices. With high density, a fixed space is used effectively. If you have 2 switches then and each switch has 24 ports then 46 devices are connected with it and a few of the ports of the switches are damaged or lost by connecting with other networks. However, if you have a switch with 48 ports then 47 devices are connected with it and one port is for other networks and one power outlet is required for it.

    Most of the modular switches use high-port densities with extras multiple switch port line cards.ie some of the 6500 catalyst switches assist 1000 switch ports. Big organizations use high-port density switches to make effective use of space and power. Without it, the switch needs extra fixed-configuration switches for adjusting the devices which are needed in the network interface, and they use a lot of space and power. Those who built the network must take into the consideration of uplink bottleneck. A constant configuration switches use additional ports for bandwidth. A single-modular switch uses less bandwidth because the backplane of the chassis gives the required bandwidth to board the connected devices with switch port line cards. 

    Few of the high port density switches are KS-616F and KS-624F and have two optic slots. They are built because they consume less power and reduce the traffic on the network, less in cost, and give the solution to almost every problem. Some of the features are discussed in the following sections:

    • They give the 16 or 24 10 /100 Mbps speed with half and full-duplex auto ports.
    • Gives the extra RJ-45 jackets for easy TP uplink connection.
    • Assist a full-duplex mode.
    • Assist with LED indication to show the TP port, Fiber Port, etc.
    • The module of the fiber optic is present in different media types such as MT-RJ.
    See less
    • 1
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: October 3, 2021In: Q & A

    Which Two Tasks Can Be Performed By A Local Dns Server? (Choose Two.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:54 pm

    Which two tasks can be performed by a local DNS server? (Choose two.) It gives an IP address to the localhost. Data can be transferred between two devices in the network. For an internal host, it can map name-to-IP addresses. Forward the name resolution protocol for internal servers. It can reclaimRead more

    Which two tasks can be performed by a local DNS server? (Choose two.)

    • It gives an IP address to the localhost.
    • Data can be transferred between two devices in the network.
    • For an internal host, it can map name-to-IP addresses.
    • Forward the name resolution protocol for internal servers.
    • It can reclaim the email messages.

    Answer: The task which is performed by the DNS is it gives the TP address for domain i.e.www.xyz.com the other one is it can forward the message which is not solved in another network to give the domain name for the translation of the IP address. The information of the local device IP address is given by DHCP. The files are shared with the help of the file transfer protocol and POP is used for the reclamation of the mail messages.

    In this further topic let’s study what is DNS and how to configure it in local servers. so stay connected to the end of the topic.

    Domain name system (DNS)

    The main function of the Domain Name System is to transform the domain name such as xyz.com to the numerical value in hexadecimal which is the address for the server. For example, if the IP address is 127.0.0.0 and you act by requesting the domain name then the system will act A DNS to find the address of the server for contact.

    The devices will cache the DNS response and before the actual request the new domain visit will sustain the DNS round trip, and all this happens at the level of the OS and it is invisible to the users ISPs the security measure will handle the DNS server. And with the default router setting, you can probably depend on the ISPs.

    What is the reason to run your DNS?

    The main reason to run your DNS is that you can get control over your network, and the goal is to construct the network-level domain mappings. By designing the router to use the DNS of your awn will allow one of your devices to connect or get access to 192.168.0.101 with the help of http://web.server.

    With your DNS you can make the setting centralized at one place rather than applying them Sigle in /etc./hosts on every device.it will apply to almost everything you can connect to the network along with embedded hardware which gives s the way to modify the routing stack.

    Configuration of the local DNS server

    For the configuration of the local DNS server for DNS forwarder, you can first design the ETP DNS server IP addresses and the DNS server in the security. The steps are discussed in the following:

    • In the main menu of the security connector tap on 7.
    • Then tap on the configure local DNS server and press Enter.
    • Tap on C to continue.
    • If the configuration is shown then tap on C and edit the configuration of the Local DNS server.
    • In DNS tap on IP address and then DNS servers then tap on Enter.
    • You can add a maximum of three IP addresses then Enter D to confirm and tap on Enter.
    • Tap on Y and press the enter key for the confirmation of the modification.
    • After it taps on the random key to go back to the DNS forwarder menu.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: October 3, 2021In: Q & A

    Which Two Things Can Be Determined By Using The Ping Command? (Choose Two.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:54 pm

    Which two things can be determined by using the ping command? (Choose two.) It can determine the routers of the source and destination. The router IP address of the neighbor destination device. The average time taken by the packets to reach the destination and return the response to the source. TheRead more

    Which two things can be determined by using the ping command? (Choose two.)

    • It can determine the routers of the source and destination.
    • The router IP address of the neighbor destination device.
    • The average time taken by the packets to reach the destination and return the response to the source.
    • The destined device is easily accessible with the network.
    • The average time to take the router between the path of the source and destination to respond.

    Answer: The ping is the command which gives the reaction on time between the echo request was sent to the host and the echo response was received from the destination. can measure network performance. And a ping determines that the intended host was reachable on the network.

    What is the ping command?

    The ping is the command line prompt that checks the source computer’s ability whether it can reach the destination computer or not.it away to determine whether the computers can transmit through the network along with another computer or network device. Some other works for the ping command are determining the network status and different hosts checking the problem related to the hardware or software, testing and handling the networks.

    Working of the ping command

    The ping command works with protocol internet control message protocol (ICMP) echo request sent to the destination through the network and wait for the response. When it is issuing a signal went to the specific point or address and when it went to the destination then it confirms by sending the echo reply packet.

    Two functions have been performed in it one is to check the availability of the destinated host, another is to find the RTT (round-trip time) which shows the time taken by the destination to send the reply.it can measure in a millisecond and the process begins when the request was sent to the server and terminated with the response that the request is received on the server.

    The ping command sends the various request by default and also show the result, that the echo ping is received by giving the response from the server.it can show the bytes and the time taken by the response or time-to-live.

    The IP address is pinged by the 172.168.9.13 address, and if it is a success then it is on and the communication between the machines happens. If the ping is completed but the reply comes late then it shows that the network is congested or there is a speed issue. With the network speed, the ping has a standard.

    Ping commands

    Some of the ping commands which are used are discussed in the following section:

    -t: This command is used to ping the target and terminate by typing the CTRL+C.

    -a: The ping will solve the problem related to the hostname of the target IP address.

    -n count: The command will set the echo request numbers, from 1 to 4294967295 and by default, this ping will send 4 if it is not working.

    -I size: This ping is to set the size in bytes of the request frames from 32 to 65,527. by default, it will send the 32-byte echo request if it is not working.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: October 3, 2021In: Q & A

    What Security Violation Would Cause The Most Amount Of Damage To The Life Of A Home User?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:54 pm

    What security violation would cause the most amount of damage to the life of a home user? On the Email server the a security denial. Duplication of the worms and bugs in a computer. The capture of the potential data leads to identity theft. Malware leads to spam emails. Answer: on the personal compuRead more

    What security violation would cause the most amount of damage to the life of a home user?

    • On the Email server the a security denial.
    • Duplication of the worms and bugs in a computer.
    • The capture of the potential data leads to identity theft.
    • Malware leads to spam emails.

    Answer: on the personal computer the email server denial the duplication of the worms the bugs, malware which bring to the spam email could cause frustration, invasive, and very annoying. while the theft of identity is life-changing, and the security solution must be implemented to protect the PC from this kind of damage and threat.

    What is the security violation?

    A security violation is also known as a security breach which means the incidents that cause the access of the unrecognized person to the data of computers, applications, and network devices.it happens when the intruder enters into the system with methods that bypass the security process.

    Moreover, there is a difference between the security and data breach, the security breach is considered under break-in while the data breach happens by getting someone personal information, data, etc. The personal information is valuable because people might send it to your competitors or sell it on the dark web such as the name and the credit card number are sold which further use in criminal activity such as robbery.

    The security breach and security incidents are also different the incident happens due to the attack of the bugs virus, malware, or worms. The DDOS attack or the employee losing the laptop somewhere is not considered under the security violation.

    Simply the security violation is the breach of security rules, procedures, instructions, and the regulation it does not matter how big the security breach is just report it to the office so the PC is protected from any further damage. A few examples of the security breach are listed below :

    • Sometimes the important file or the locker remains unlocked when you are bot around cause the security violation.
    • Kept the file on the desk of the unidentified person, or area.
    • Transferring the classified file without any authorization is a security violation.
    • Identity cards for security may be lost.
    • Place the organized data somewhere else but not in the work area.
    • Give access to the important files, information to any person without the verification or person identity.
    • By giving important information on the telephone rather than the mobile phone is considered under security violation.
    • To mark the organized documents properly.
    • Do not remove the important document according to the proper procedures.

     

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: October 3, 2021In: Q & A

    Which Two Definitions Accurately Describe The Associated Application Layer Protocol? (Choose Two.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:54 pm

    Which two definitions accurately describe the associated application layer protocol? (Choose two.) SMTP- It can transfer web pages from web servers to clients. Telnet- It gives remote access to the servers and the networking devices. DNS- solve the internet names with IP addresses. FTP- It transportRead more

    Which two definitions accurately describe the associated application layer protocol? (Choose two.)

    • SMTP- It can transfer web pages from web servers to clients.
    • Telnet- It gives remote access to the servers and the networking devices.
    • DNS- solve the internet names with IP addresses.
    • FTP- It transports the email messages.
    • HTTP- It gives the IP addresses to the networking devices.

    Answer: 

    The definition which accurately describes the associated application layer protocol is Telnet which gives remote access to the servers and the networking devices. While the DNS solves the internet name to IP addresses.

     Along with the answer, now let us describe different applications layer and their commands in this topic. That’s why stay connected to the end of the discussion.

     Application layer of the OSI Model

    The application layer is the upper layer of the OSI model, along with the help of this layer people or users will interact with the PC. It gives various services to its users.IT contains the communication protocol which manages the transmission over the network. The protocol describes the process of the client and servers on the end system. Protocols of Application layer narrates:

    • The message types either it is request or response messages.
    • The syntax or structure of messages such as the message field and how they are depicted.
    • Semitics or meaning of the message, the information which is the message shows.
    • The rules for the message transferal are also outlined by protocol.

    Protocol of Applications Layer:

    Some of the application layers protocols are defined in the following section:

    TELNET:

    Teletype Network assists in terminal emulation. The Telnet clients can easily access the resources of the Telnet server. It can manage the files on the network. The devices like the switch’s initial setup are maintained by it. with the command of it, it can communicate with remote devices. The port number for the telnet is 23.

    Command:

    telnet [\\Remote server]

    TFTP:

    TFTP stands for the trivial file transfer protocol, it is also called the stripped-down version of FTP but the modification is that you can easily find what you want to know. The technology which transfers the file among network devices and the simple FTP, the port number is 69.

    Command 

    tftp [ options…] [host [port]] [-c command] 

    NFS (Network File System):

    Network file systems initiate the file system over the internet and then interact with those files because they are mounted locally. It allows the system administrator to integrate the sources on the centralized server over the network. The port number is 2049 for NFS.

    Command 

    service nfs start

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: October 24, 2021In: Q & A

    Which Phrase Describes An Ftp Daemon?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:53 pm

    Which phrase describes an FTP daemon? It is a distinct FTP program. A program that runs on the FTP server. The program runs on FTP clients. An app that requests the data from the server of FTP. Answer: An FTP server is run on the FTP daemon which is a program that gives the FTP services to the end-uRead more

    Which phrase describes an FTP daemon?

    • It is a distinct FTP program.
    • A program that runs on the FTP server.
    • The program runs on FTP clients.
    • An app that requests the data from the server of FTP.

    Answer: An FTP server is run on the FTP daemon which is a program that gives the FTP services to the end-users and they must have the FTP client program because they request it.

    Let’s further study the FTP server and the FTP daemon what is their purpose? How do they describe it? That’s why stay connected to the end to obtain a thorough knowledge of the topics.

    What is an FTP daemon?

    The file transfer protocol daemon (FTPD) is the server process for the DAPRA internet FTP protocol. The server utilizes the transmission control protocol and focuses on the port which is specified for the FTP services. It can secure the software and also run the UNIX operating system.

    The authentication of a file that is transferred to the client and the android’s ports are also managed by it. The file interpretation according to the “globbing” and allow the end-users to use the metacharacters i.e., *, [], {}, ~.

    Syntax:

    /usr/sbin/ftpd [ -d ] [ -D DataConnTimeOut ] [-e][ -f ] [ -ff ] [ -k ] [ -l ] [ -U ] [ -t TimeOut ] [ -T MaxTimeOut ] [ -s ] [ -u OctalVal ] [-q [-C]] [-c] [-H].

    inetd usually initiates the ftpd daemon and the command line along with SRC commands managed the ftpd daemon.

    Description of the FTP daemon

    /usr/sbin/ftpd is the file transfer protocol server program. The modification in the FTP daemon happens with system management interface tool (SMIT) or with the SRC (system resource controller) by changing the /etc/inetd.conf or /etc/services file.by type the ftpd on command line is not necessary.it is started with default when it is not commanded in /etc/inetd.conf file.

    The information required by the inetd comes from the /etc/inetd.conf file or with /etc/services file. If someone wants to change the /etc/inetd.conf or /etc/services file, then run refresh -s inetd or kill-I inetdPID command which informs the inetd daemon about the modification of its configurated files.

    The file name is also extended by the ftpd daemon along with the convention of the csh command. because the command permits use of characters like * asterisk, question marks, square brackets [], curly brackets {} and the tilde ~.

    for the FTP subtree there are some of the recommendations of the rules in the following:

    ~ftp:

    It can form the home directory for the superuser and be unwritten by someone.

    ~ftp/bin:

    It also makes for the superusers and is unwritten by someone. The conversion commands are installed here. the 1 s service which is presented to assist LIST command is mode 111.

    ~ftp/pub:

    This directory is made by mode 777 and owned by FTP. if an unknown person tries to access any file with an unrecognized account, then the use puts them in the directory.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 20 21 22 23 24 … 29

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}