Describe the features and benefits of csma-cd

Assignment Help Computer Networking
Reference no: EM1359563

A recent university graduate gets a job as a network administrator for a mid-size company that has a network with ring topology with UTP cable using the token passing access method. UTP is also the cable use to link one ring (segment) to another via hubs. The nodes connected to the network use ISA NICs. The company is using the IPv4 addressing scheme, and BOOTP is being used to assign addresses to network nodes

The new network administrator wants to switch to a star topology using fiber optic cable for backbone and distributed backbone. The network would use Ethernet architecture with the CMSA/CD access method. (You need to state which Ethernet standard he should recommend and why.)The network would use routers for connectivity devices instead of hubs. Also, he wants to switch to the IPv6 addressing scheme, and he wants to use DHCP to assign addresses to network nodes.

If he needs to leave a segment as a token ring, what connectivity device should he use so that would allow connecting two systems with different architectures? What does this type of device do that allow information from one system to be read by another. The OSI model layer at which connectivity device operate has an impact on what would be useful and how they impact the network. Include a discussion of which layer of the OSI model the connectivity devices mentioned in this question operate at and how that affects their function in the network.

What would be the benefits of the changes he wants to make? What would be the challenges? What objections might management have to making the changes and what would be his arguments in response to those objections?

For the purposes of this question you do not need to know about the token access method. You just want to explain the features and benefits of CSMA/CD. Also, your discussion of the backbone network choice should explain why that would be a good choice compared to other backbone networks.

Reference no: EM1359563

Questions Cloud

Confidentiality in the field of mental health : What types of conflicts can result from the counsellor's legal responsibility to respect a parent's right to be informed of counselling services and the ethical responsibility to maintain the confidentiality of the minor?
Problem definition in research : Explain why is the problem definition stage probably the most important stage in the research process?
Forward rate forecast : Suppose that you obtain a quote for a one year forward rate on the Mexican peso. Suppose that Mexico's one-year interest rate is 40%, while the United State
Operating income impact : The following product line information is for the Home Deal Company. The company is considering dropping its Children's product line due to poor operating income performance. Fixed expenses are allocated to each product line based on sales revenue..
Describe the features and benefits of csma-cd : For the purposes of this question you do not need to know about the token access method. You just want to explain the features and benefits of CSMA/CD.
Contextual issues-culture and personal bais : Step1: Determine whether an ethical legal issue needs to be address. Step 2: Address contextual issues such as culture and personal bais.
Proprietorships and partnerships : Critique the benefits and drawbacks of proprietorships and partnerships as a form of business organization.
Make a decision tree for the situation : Premium Airlines has recently offered to settle claims for a class-action suit, which was originated for alleged price fixing of tickets. The proposed settlement is stated as follows. Make a decision tree for the situation
Preventing under-applied overhead : Why might overhead be under-applied and how can you prevent it? Explain predetermined overhead rate and show its computation. What is the best allocate base to use and why? What factors do you consider when deciding on an allocation base?

Reviews

Write a Review

Computer Networking Questions & Answers

  How long does b takes to acknowledge

Assume that no packet or acknowledgement are dropped. Assume that A sends a packet to C and waits for its acknowledgement to come back from C. How long does it take until A gets that acknowledgement?

  Setting up the new network

How could you interconnect the two areas? Assuring that the network has immunity from the interference; re-evaluate your choice explaining the best medium(s) to utilize.

  Define the type of packet filters

Define the type of packet filters that you might build to capture traffic destined to you six critical Web servers?

  What were most important things cisco managers did right

What were the most important things Cisco managers did right, i.e., where had the ERP team been "smart'? How did Cisco manage unanticipated problems?

  How to access remoteapp applications from partner server

In the TS RemoteApp Manager console, there are currently two warning indicators showing in the Overview area. Will any of these warnings make it impossible to access your RemoteApp applications from your partner server?

  Explaining how networks can be safe from hacking

Explain/propose a new/possible idea on how these networks can be kept safe from hacking.

  Creating controller for new satellite

You are allocated to work on project to create controller for new satellite. To save money, manager evaluates you could reuse about 90% of the software.

  Incorporate new servers into environment

Explain how you would incorporate new servers into environment and how you would address what additional changes might be needed.

  Design the network for the public network

Your task is to design the network for the public network and select how to connect the two networks together.

  Cloud computing like elastic scalability and outsourcing

It also help business to use the best features of cloud computing like, elastic scalability and outsourcing. what are your toughts on the above statement? Do you agree or disagree?

  Information security and disaster recovery

Explain which concepts are the most significant to consider when designing information security policies and procedures.

  Brief description of rfc and its importance to internet

Choose an existing RFC and share it with the class by providing a brief description of the RFC and its importance to the Internet.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd