Discuss the possibility of using fiber optic cable instead

Assignment Help Computer Networking
Reference no: EM13463678

Assignment 1: The Benefits of Twisted Pair Cable Due Week and worth 100 points You are a recently hired consultant for a NCF, the Networking Consulting Firm, and your first consulting assignment is at Ocper, Inc. Upon arriving at the client, you learn from the president that there is no one dedicated to information technology or networking on the staff and there are 20 Windows peer-to-peer client computers all connected via coax cabling. The president also indicates that the company plans to double in size over the next two years, but she is weary of drastically changing the computing environment. Write a 2-3 page paper in which you: Describe what changes you would suggest in terms of the current network type / structure and how you would lay out the benefits of the changes you recommend. Describe why you would suggest connecting all current and new client computers using twisted pair cable instead of staying with the current coax wiring structure

Discuss the possibility of using fiber optic cable instead of either twisted pair cable or staying with the existing coax wiring structure. Research the costs involved with making these changes to the network (not including the cost for buying more computers) and determine whether or not there is a cost benefit.

Reference no: EM13463678

Questions Cloud

Design a calculator program that will add subtract multiply : design a calculator program that will add subtract multiply or divide two numbers input by a user.your program
Describe audience analysis why is it significant in : 1.describe how we can phrase a negative message so that is does not offend the recipient. why do we want to take your
Explain psychological factors which influence whether : choosenbspone of the following topicssmoking tobaccoalcohol abusedrug abusewritenbspa 500- to 750-word paper that
Conduct an internet search to locate an example of a : discussion question 1. conduct an internet search to locate an example of a private network and a public network. how
Discuss the possibility of using fiber optic cable instead : assignment 1 the benefits of twisted pair cable due week and worth 100 points you are a recently hired consultant for a
Design a grade average program by using raptor which will : design a grade average program using raptor that will produce the numerical grade average of test scores input by a
Forgiveness can be integral part in conflict resolution and : forgiveness can be an integral part in conflict resolution and even a strong factor in psychological and physical
Describe in detail all issues associated with layer 2 loops : after evaluating and completing support for high-definition ip cameras to enhance security for devry university you
Supporting an autonomous and positive face can be : supporting an autonomous and positive face can be challenging. there are times when an autonomous and positive face

Reviews

Write a Review

Computer Networking Questions & Answers

  What are the characteristics of tcp-ip- http protocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols?

  What is the minimum size of an icmpv4 packet

What is the minimum size of an ICMPv4 packet? What is the maximum size of an ICMPv4 packet?

  In the previous unit you learned about the importance of a

in the previous unit you learned about the importance of a well-designed and constructed user experience in the

  What types of services are available within the tcpip

write a 2- to 3-page memo to your supervisor discussing the following topicswhat types of services are available within

  Question 1awhat is your knowing for the term cyber weapon

question 1awhat is your knowing for the term cyber weapon? give an example of a cyber weapon.bhow was sony play station

  Determining entropy of ciphertext message

A crypto device encrypts each message into 20 bits of ciphertext.What is the entropy of the plaintext message? What is the entropy of the ciphertext message?

  Complete one paper summarizing the actions steps tools etc

complete one paper summarizing the actions steps tools etc. of the hacking techniques used to execute the attack on the

  Query and response for a complete dns query

Compare the time for a query and response for a complete DNS query and response (to all required nameservers) if M=1, M=2, and M=3.

  Describe effects of spyware and adware-security of internet

Describe the effects of spyware and adware. How has spyware and adware influenced public's confidence in security of the Internet?

  Several views to cybersecurity architecture

several views to Cybersecurity Architecture. Describe the Business View and the Architect's View through a business case example.

  Describe cost factor for hardware and software components

Create eight IP subnets and each IP subnet should suffice for twenty-two users. Use the class B private IP addresses. Also, define the broadcast address for the fourth subnet.

  Explaining significant obstacle to encryption

It is significant to know what issues are for encrypting data in the database. Comment on what you think is most significant obstacle to encryption. Describe your position.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd