Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
What Is a Cisco Core Switch?
What Is a Cisco Core Switch? Answer: The high capability switch that is located in the backbone or the network physical core. It acts as the gateway for the WAN (wide area network) and gives the end aggregation point and allocates the various aggregation module that works together. The core switchesRead more
What Is a Cisco Core Switch?
Answer: The high capability switch that is located in the backbone or the network physical core. It acts as the gateway for the WAN (wide area network) and gives the end aggregation point and allocates the various aggregation module that works together.
The core switches work in the public WAN to connect the switches that are located at the edge of the network. While in the LAN its work is to interconnect the workgroup switches whose capability is low and located in the geographics cluster form. The core switch is present at the central position in a network and must have the capacity to handle the load on it. The power it can hold is quite larger than the normal desktop switch.
The core switches work in the core layer of the network is the routing and data switching. The data is moved toward the bottom layer (distribution access layer) of the network and the entire network is based on the data that is routed and switched in the core switch. Normally various switches are present at the layer with the purpose of the huge data amount to be routed in the hierarchy. The multiple switches in the core layer also keep the crowd of the data packets because due to the crowded packets there might be a back-flow of the data which causes the core layer to malfunction.it is the main reason why the high-capacity switches are needed in the Ethernet hierarchy.
Some of the important core switches are listed in the following that need be to check for the effective performance:
Forwarding rate: The sore switches are responsible for the routing of a large amount of data so the forwarding rate must be high.it is the indication of the data packets that are transferred in a time. High forwarding rate switches are responsible for the core layer.
Qos: The quality of service helps in the release of packets with the help of strategy because the network has a huge amount of data that passes the QoS to help in the selection of the important packets.
Redundancy: The sudden failure is kept with the consideration of this factor. Some of the power modules increase redundancy.
Compatibility with the topologies: With the multiple cores switches the layer might be collapsed, and the switch has to perform the incompatibility with the topologies.
See lessWhat Is a Fiber Optic Cable?
What Is a Fiber Optic Cable? Answer: The fiber optic cable in telecommunication is the technique that is used for the information transmission in the form of light waves through the plastic or glass fiber. The fiber optic cable consists of the glass that is contained inside the plastic casing. For tRead more
What Is a Fiber Optic Cable?
Answer: The fiber optic cable in telecommunication is the technique that is used for the information transmission in the form of light waves through the plastic or glass fiber.
The fiber optic cable consists of the glass that is contained inside the plastic casing. For the larger geographic area and the high performance, the fiber optic cable is best to use, because related to the cable wires its bandwidth is greater and transfers data over a large distance. Most of the TV cable internet and the landlines are connected with the help of fiber optic cable. The signal is transmitted through it in light form and the light-emitting diodes are the ones that generate the signals.
Fiber optic contains more than one glass strand and they are thicker than a human hair. The core is the center of the cable that gives the path for the light signals. And the cladding is the layer that covers the core so that the signals won’t be lost and reflet within the glass and also help the signals to pass through the bends. The fiber optic cable has two modes one is single-mode and another one is multimode. the single-mode glass is this and the laser is used to generate the signals while the multimode uses the LED (light-emitting diode) and the glass is thick relative to the single-mode.
Some of the advantages of the fiber optic cable are listed in the following:
What Does Tcp Stand For In Networking?
What Does TCP Stand for In Networking? Answer: TCP stands for the transmission control protocol in the networking. The IP protocol work is to handle the data frames, while the TCP allows the two hosts to have the connection and the data streams sharing. The data packet delivery is guaranteed by TCPRead more
What Does TCP Stand for In Networking?
Answer: TCP stands for the transmission control protocol in the networking. The IP protocol work is to handle the data frames, while the TCP allows the two hosts to have the connection and the data streams sharing. The data packet delivery is guaranteed by TCP and that the packets are delivered in the same order they are sent from the receiver.
TCP is the connection-oriented which helps in the information exchange among two systems in the network, it is the common protocol that uses the Internet protocol and is called the TCP/IP protocol. On the internet, it is the default method and develop for the exact transmission.it works by breaking the message into frames to keep the entire resubmission of the message in case of failure, and the packets are again assembled in the same order at the destination. The packets are independent to use any route in case the destined route is busy or unavailable.
The TCP/IP models have a different layer that keeps the method standard and does the management by itself. The packets have to pass all the layer (four-layer) to reach the destination and for the understanding of the message, the TCP/IP move to the layer in the reverse form to get the message in the correct order.
Moreover, the TCP/IP is connection-oriented so it can create the connection in the devices and make them connected until the communication is finished.it can manage the message breaking, their routes, reassembling and forward to another device as the routers, hubs, switches, and at the end to the final destination. Other than the data exchange TCP work for the frames that are dropped, maintain the flow control, and makes sure the packets are safely at the destination.
TCP/IP uses the three-way handshake process for the creation of the connection between the server and the devices that allow various TCP sockets are transferred in either direction. The sever and the device has to SYNC and also ACK the frames before the transmission, and then the negotiation, separation and the frames transferal begin for TCP sockets.
See lessWhat Are Peripherals In a Computer?
What Are Peripherals in a Computer? Answer: The devices which are connected to the computer either they are internally or externally for the data transfer (in and out) of the system. The information when entering the system is displayed on the screen with the help of different accessory devices knowRead more
What Are Peripherals in a Computer?
Answer: The devices which are connected to the computer either they are internally or externally for the data transfer (in and out) of the system. The information when entering the system is displayed on the screen with the help of different accessory devices known as peripherals and also referred to as the I/O devices etc keyboard, printer.
The peripheral devices have no contribution to the primary function, it just helps the user access and checks the functionality. The peripheral is not the part of the core that’s why the computer works without it as well, but some of the devices such as the mouse keyboard are necessary for the user and computer connection. The peripheral devices might be named as the computer peripherals the input and output devices.
The peripheral devices connect with the help of I/O interfaces like the USB, COM, and some of the ports. Some of the peripheral devices are listed in the following:
The peripherals devices are divided into their parts which are input, output, and storage devices. The input devices work to translate or intercept the instruction which is given to it the end-user to the useful information which is understandable for the system. The monitor transforms the movement of the hands to the cursor which is easy to understand by the computer for effective OS operations.
The output devices that are the peripherals work to intercept the signals (digitals) to the valuable information which is useful for the users. The printer’s work is to transform the word file layout on the piece of paper and screens show the desktop. The projector speaker is the output peripherals device as well. There are a few devices that are both input and output like interfaces, modems, routers, etc. The storage devices work to keep the record of the data and store them such as DVD, and CD flash devices. Based on the location there are two types of the peripheral devices which are:
External peripheral: It is connected with the help of various cables. The general connection for it is the USB connection.
Internal peripherals: The hard disk is connected through a SATA cable, and the display port and the HDMI also help in the establishment of the connection.
See lessWhat Controls a Computer’s Basic Operations?
What Controls a Computer's Basic Operations? Answer: The basic operation of the computer is the input, processing, output, and storage device but the processor is the computer brain, it is also referred to as the CPU (central processing unit) and it is the form of the microchip. In the modern world,Read more
What Controls a Computer’s Basic Operations?
Answer: The basic operation of the computer is the input, processing, output, and storage device but the processor is the computer brain, it is also referred to as the CPU (central processing unit) and it is the form of the microchip.
In the modern world, everything is now online and there is nothing that is not happening with the help of the internet. With the advancement in the PCs, the fundamentals of the PC are forgotten which helps in modern technology. All of the advancement happens because the PC can perform the basic function. The computers’ basic functions are listed below with some of the details.
Input:
The computer is no doubt fast but still it requires the instruction from the end-user to do the processing of the data. the instruction is given to the system with the help of the different kinds of devices, but the most common are the keyboard and the mouse. Some of the other input devices are the webcam, scanners, etc.
Processing:
It is the nature of the computer to process the data with the use of a CPU (central processing unit) which is also called the processor, it is the computer brain. The task performs by the CPU are the arithmetic operation (in which the addition subtraction, multiplication, and division involve) and the logical operations (its work is to compare the two numbers).
Output:
The output displays the processed information given by the CPU. The result of the instruction is in the form of binary and the output is decoded so that it is understandable for the user. The output devices are the monitor, speaker, etc.
Storage devices:
The data and the information are stored in the storage devices before the processing. And the result of it is also stored in the storage before it is displayed. The storage devices are both internal and external. the storage devices are the registers, RAM, ROM, flash drives, disk, etc.
See lessWhat Is The Difference Between Routing Table And Forwarding Table?
What Is the Difference Between Routing Table and Forwarding Table? Answer: The forwarding table is the structure for the optimization of the process that looks at the address during the package transfer, and contains the MAC address information. The routing table's main purpose is to calculate the mRead more
What Is the Difference Between Routing Table and Forwarding Table?
Answer: The forwarding table is the structure for the optimization of the process that looks at the address during the package transfer, and contains the MAC address information. The routing table’s main purpose is to calculate the modification in the topology and the routing table has the IP address of the next hope.
Routing table:
A set of the rules that is present in the form of the table define the data packets’ movement such as their direction in an internet protocol. the device with the IP address must use the routing table such as the switches, router, etc.
The routing table contains the data which is required to move the packets to the best possible path for the destinated address. The packet has the data related to the source and destination. The devices get the instruction for packets forwarding to the next hop in a network through the routing table. The routing table entry contains the following entries:
Forwarding Table:
The forwarding table determines the process by the packets forwarded of the switch or router in a network they are also referred to as the flow tables. The forwarding tables are processed by matching the header field like the IP address of the destination and then forwarding the packet to the specific port. The open flow 1.0 contains the 12 headers filed of the packets which are useful in the table matching.it includes the MAC address of the source and destination, ether type, source and destination IP address, IP protocol, TCP source, and destination port. the open flow controller work by moving the match IP field in the table with the use of API open flow.
See lessWhat Does File Do In Linux?
What Does File Do in Linux? Answer: The file command in Linux defines the file type. the file might be readable by humans (ASCII text) or in MIME format. The commands check the argument with the purpose of the category. The Linux file command help to check the type of file that is not known or haveRead more
What Does File Do in Linux?
Answer: The file command in Linux defines the file type. the file might be readable by humans (ASCII text) or in MIME format. The commands check the argument with the purpose of the category.
The Linux file command help to check the type of file that is not known or have no extension. The file command has three tests which are:
Syntax of the file command:
The Linux file command is written as follows:
File [OPTION] [FILE]
Copy
The command might take more than one file name as an argument.
The files are classified with the help of the tests and the file type is discovered in the first test outcomes.in the simple form without any further option, the command shows the names of the file along with the type:
file /etc/groupCopy
/etc/group: ASCII text
Copy
To show just the file type use the -b (–brief) option:
file -b /etc/group copy
ASCII text
Copy
The result of the /etc/group file is in the form of a text file.
MIME-type format syntax:
The MIME file type is determined with the help of the following syntax:
-i (–mime) use is the option to check the mime type of a file:
file -i /var/www/index.htmlCopy
/var/www/index.html: text/html; charset=us-ascii
File commands in Linux:
Some of the file commands in a Linux are listed in the following table:
How Many Host Addresses Are Available On The 192.168.10.128/26 Network?
How many host addresses are available on the 192.168.10.128/26 network? 56 34 68 62 40 Answer: The prefix A/26 provides the total 6 bits that act as host, which offers 64 addresses because 64 is equal to 26 prefixes. by removing the broadcast and network addresses only 62 unstable hosts are availablRead more
How many host addresses are available on the 192.168.10.128/26 network?
Answer: The prefix A/26 provides the total 6 bits that act as host, which offers 64 addresses because 64 is equal to 26 prefixes. by removing the broadcast and network addresses only 62 unstable hosts are available.
Networking is the combination of the computer and other devices that are interconnected to provide information and also share resources. to find the particular devices in the network a specific address is used, which is known as an IP address and it has two portions one is host address (host address locate the devices in the subnet) and other network address (it can locate the subnet which is used by the host address).
On the device, the IP address is allocated to interfaces, which are used to interconnect the devices with the network. The interfaces must have an exceptional IP address because in case of the same IP address of the two devices the network will not be established. Let’s take a look at the example to simplify the concept. in the network, the PC is named e1,e2 e3, and e4 with the same allocated IP address 2.2.2.2/8. if the e1 computer needs to send the packets to e4 and both have the same address so the destination is set as 2.2.2.2/8.
Now the packets will pass through all the PCs and the destinated address is checked to find whether the message is for them, and all of the devices have the same IP address that’s why they will consider the message is for them ans start the processing. when the e2 and e3 find the message is not for them they will discard it and send it to e4, the reply process is the same as well. The network in which a huge amount of data is processed, the process makes the network down, that is the reason why the IP address is unique for each device.
See lessDisk Defragmenter Windows 7 How Many Passes?
Disk Defragmenter Windows 7 How Many Passes? Answer: The disk defragmenter in window 7 has passed from 1-2 to almost 30. if the third party is using then it can be set manually according to the need. It depends on the size of the disk, the speed of the processor, and fragmentation. Defragmentation wRead more
Disk Defragmenter Windows 7 How Many Passes?
Answer: The disk defragmenter in window 7 has passed from 1-2 to almost 30. if the third party is using then it can be set manually according to the need. It depends on the size of the disk, the speed of the processor, and fragmentation.
Defragmentation work by integrating the files that are fragmented in the hard drive. The files are considered fragmented when the data on the disk is written and no space left to handle the entire file. an algorithm is used to break the data so that it can fit in a space.
The defragments work by collecting the data parts and moving them toward the hard drive and bringing all the parts together in a file. The advantage of defragmentation is that it can enhance efficiency, make the data retrieval efficient, and the performance becomes improved due to it.it can also make the space by removing the junk and cleaning it.it is the opposite of fragmentation that makes the storage inefficient.
The tool of the defragmenter is discovered to solve the storage issue and they are already installed in some windows versions. The built-in work by arranging the hard drive storage by uniting the fragmented files that help to increase the computer efficiency. an auto schedular is used in the hard drive to make the defragmentation at a particular time. Some of the tools are present for defragmentation such as:
How To Set Gateway Of Last Resort?
How To Set Gateway of Last Resort? Answer: The ip default-network and ip route 0.0.0.0.0.0.0. 0 to repair the gateway of last resort on the router to which IP routing is allocated. The gateway of last resort is used by the router when there are no other paths to send IP packets. The routes that areRead more
How To Set Gateway of Last Resort?
Answer: The ip default-network and ip route 0.0.0.0.0.0.0. 0 to repair the gateway of last resort on the router to which IP routing is allocated.
The gateway of last resort is used by the router when there are no other paths to send IP packets. The routes that are present or listed in the routing table are called known routes, while those that do not exist in the table are moved toward the default route.
The gateway of the last resort in the routing table is the IP address which is to forward the packets through a route that is not listed in the table in the network. The steps to modify the default gateway are listed in the following:
The ip route 0.0.0.0.0.0.0.0 gives the router which knows how to get out. The default route means the ip route with address 0.0.0.0.0.0.0.0 or the default information originate, which means if the specified route is not present then the packets are sent toward x.x.x.x and the rest is taken care of by the router. in a network, the client uses the default gateway for the flow of traffic.it works by moving the traffic from the local subnet to others.it also works by establishing the connection between the local network and the internet
To find the default gateway the IP address is required if an error in the network occurs or make the changes in the router. In the MS the IP for the default gateway occurs through cmd with the “ipconfig “ command or with the help of the control panel. In Linux, command such as “netstat” or “ip route” are used to find the gateway address.
See less