Question

Explain ways to get a WAN connection for a home user Explain functions of a network...

Explain ways to get a WAN connection for a home user

Explain functions of a network core

Explain in details the outcome of the tracert, ping and ipconfig /all commands

Homework Answers

Answer #1

Ways to get a WAN connection for a home user

A wide area network is a telecommunication network that extends over large geographical area for primary purpose of computer networking. Nowadays WAN is usually using over frequently.

It simple words we can get a WAN connection by contacting local internet service providers. For example, we have a lot of internet service providers like Airtel, ACT fiber. These providers provide the internet according to the location. If your location eligible for a WAN connection then you can a WAN connection.

In WAN connection they will provide different types. Like LAN, optical fiber and wireless. LAN is almost a common one. Optical fiber is a latest technology for getting internet to our homes. This is a simple step for getting WAN connection for home user.

Functions of the network core

A core network is telecommunication network's core part, which provides numerous services to customers who are interconnected by access network. Its key function is to direct telephone calls over the public-switched telephone network. This term is also known as network core or backbone network.

So the main function of the network core is to direct telephone calls.

It will give communication between primary nodes.

Network core is also known as backbone network.

  • Aggregation: The top degree of aggregation can be seen in service provider network. Next within the core nodes is the distribution networks, followed by the edge networks.
  • Authentication: It will determine whether a user demands a service from the telecom network
  • Call Control or Switching: It will give feature span of the call depending on signal
  • Charging: It will process and charges the data created by multiple network nodes.
  • Service Invocation: It executes service invocation task for its customers. Service invocation may occur in mostly call forwarding by the users or call waiting.
  • Gateways: It is used in core network for accessing networks. The functionality depends on type of network.

Tracert command:

From the above screenshot you can get information.

ping command

IP Config

Ipconfig gives ip addresses, mac address. These are like identities of a electronic device. Host name means host which gives internet, subnet mask, dns servers, gate way are related to the WAN or any internet connection. These are entrances or connection to our computer and internet servers.

Thank you...

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
User information flows are transferred over an end-to-end connection in a packet switched network. The connection...
User information flows are transferred over an end-to-end connection in a packet switched network. The connection is routed from the source access node via one intermediate node to the destination access node across two back-to-back physical circuits inside the network, in addition to being transmitted across the interfaces between the user and the access node on the source and destination side. Assume that all physical circuits operate at the same transmission speed and have the same bit error rate p....
Prompt: Explain how "Hardware and Software worked together with 4 Functions, making computers capable of creating,...
Prompt: Explain how "Hardware and Software worked together with 4 Functions, making computers capable of creating, saving and re-using meaningful information" works using the terms below. To get all the points your explanation MUST include all the terms in the lists, but you should not merely define the terms. You should use them to explain how computers work, including details like the differences between storage and memory as well as a hard disk and SSD. Required Terms in Written Response:...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of...
1. By convention, how are configuration files separated from regular files? (NOTE: A practical effect of the separation is that they are not displayed by the default version of the ls command)                         a. the prefix "rc" (rc.filename)               c. the extension .cfig                         b. a dot (.) at the beginning                    d. by having the SUID bit set 2. The IP address which is reserved for local loopback (equivalent to "localhost") is:                         a. 255.255.255.0                                   c. 192.168.70.1...
I did already posted this question before, I did get the answer but i am not...
I did already posted this question before, I did get the answer but i am not satisfied with the answer i did the code as a solution not the description as my solution, so i am reposting this question again. Please send me the code as my solution not the description In this project, build a simple Unix shell. The shell is the heart of the command-line interface, and thus is central to the Unix/C programming environment. Mastering use of...
You will write a program that loops until the user selects 0 to exit. In the...
You will write a program that loops until the user selects 0 to exit. In the loop the user interactively selects a menu choice to compress or decompress a file. There are three menu options: Option 0: allows the user to exit the program. Option 1: allows the user to compress the specified input file and store the result in an output file. Option 2: allows the user to decompress the specified input file and store the result in an...
Complete this in C++ and explain what is being done. 1      Introduction The functions in the...
Complete this in C++ and explain what is being done. 1      Introduction The functions in the following subsections can all go in one big file called pointerpractice.cpp. 1.1     Basics Write a function, int square 1(int∗ p), that takes a pointer to an int and returns the square of the int that it points to. Write a function, void square 2(int∗ p), that takes a pointer to an int and replaces that int (the one pointed to by p) with its...
1. Vim commands: a. How do you auto indent your program? b. Explain what the following...
1. Vim commands: a. How do you auto indent your program? b. Explain what the following commands do: dd, y3, p, :set cindent (1 pt) VIM exercises These exercises on the computer need to be repeated by each student in the pair. This is to ensure that both students understand how to get around in Linux!!! For this part of the lab, you will create a .vimrc file that will help you develop your C++ programs using VIM. First, we...
There are two reflective essays from MED students during their third year internal medicine clerkship. One...
There are two reflective essays from MED students during their third year internal medicine clerkship. One student sees each connection to a patient as like the individual brush strokes of an artist and the other sees gratitude in a patient with an incurable illness and is moved to gratitude in her own life. (WORD COUNT 500) Reflect on both essays and then choose one and describe how the student grew from the experience. Then explain what you learned as a...
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation....
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation. case:    W17400 APIGEE: PEOPLE MANAGEMENT PRACTICES AND THE CHALLENGE OF GROWTH Ranjeet Nambudiri, S. Ramnarayan, and Catherine Xavier wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be...