Explain why you would propose connecting all current and

Assignment Help Computer Networking
Reference no: EM13468151

You are a recently hired consultant for a NCF, the Networking Consulting Firm, and your first consulting assignment is at Ocper, Inc. Upon arriving at the client, you learn from the president that there is no one dedicated to information technology or networking on the staff and there are 20 Windows peer-to-peer client computers all connected via coax cabling. The president also indicates that the company plans to double in size over the next two years, but she is weary of drastically changing the computing environment. Write a 2-3 page paper in which you:

Describe what changes you would suggest in terms of the current network type/structure and how you would lay out the benefits of the changes you recommend.

Describe why you would suggest connecting all current and new client computers using twisted pair cable instead of staying with the current coax wiring structure.

Discuss the possibility of using fiber optic cable instead of either twisted pair cable or staying with the existing coax wiring structure.

Research the costs involved with making these changes to the network (not including the cost for buying more computers) and determine whether or not there is a cost benefit.

Your assignment must:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format.

Reference no: EM13468151

Questions Cloud

What are some examples of ethnically or racially organized : what are some examples of ethnically or racially organized crime? how do these differ from contemporary youth gangs?
Explain the long-term consequences of using bio-fuels : what are the long-term consequences of using bio-fuels?discuss a situation you have experienced where a psychological
Write academic goals and how do outcomes andor features of : now that you are near the end of that introductory step you may be asking whats next? when does my degree program
Provide a description of the physical process required for : several planets in our solar system have a global magnetic field i.e. a magnetosphere. provide a description of the
Explain why you would propose connecting all current and : you are a recently hired consultant for a ncf the networking consulting firm and your first consulting assignment is at
Do you think mandatory arrest policies reduce incidents of : do you think mandatory arrest policies reduce incidents of domestic violence? what in your opinion can society do to
Research the web to recognize a systemssoftware development : research the web to identify a systemssoftware development lifecycle. in a report format discuss selected sdlc by
Approximately how many murders are there in the us in any : the two violent index crimes ofnbsprobbery and murder. see the data on pagenbsp242 and 248-249. the justice dept.
Compares and contrast the contemporary health care : write a 1050-1400 word paper that compares and contrast a contemporary health care facility or physicians office

Reviews

Write a Review

Computer Networking Questions & Answers

  Find the mean of the numbers in the array

Input a list of positive numbers (terminated by 0) into an array, find the mean (average) of the numbers in the array, and output the result. Use a subprogram to input the numbers, a function to find the mean, and a subprogram to output the resul..

  Explain how to troubleshoot a network

You have been hired to aid troubleshoot a network. Users in this customer site have being experiencing intermittent problems.

  Determine about the crash if rip and ospf is used

Large wide area network covers United States and has multiple nodes in evey state. Node in Denver crashes completely. How do other nodes in the country determine about the crash if RIP is used? If OSPF is used?

  Why do we pursue technologies

Why do we pursue technologies, such as those associated with virtual reality? Going back to one of our definitions of technology, what problem are we trying to solve? What are the risks associated with these technologies?

  List all the five nonproprietary internet applications and

q1. list five nonproprietary internet applications and the application-layer protocols that they use.q2. what

  Investigate methods by which user gain access to network

Investigate the methods by which users could gain access to the network. Pay particular attention to: The problems of having open access for all users.

  Security risk assessment is an invaluable tool in an it

security risk assessment is an invaluable tool in an it professionals quest to protect a companys information assets.

  Find length of longest consecutive sequence of os in input

Input stream to 4B/5B block encoder is 0100 0000 0000 0000 0000 OOOI. Answer the following questions: Determine length of longest consecutive sequence of Os in input?

  Conduct a swot analysis by examining the strengths

select one 1 of the following topics in which you will base your responses in the form of a term papernetwork

  Explaining security domain boundaries for personal computer

Recognize and explain Trust/Security Domain boundaries that may be suitable to personal computer (workstation) security in a business context.

  What is the definition of information security what

part 1 review questions what is the definition of information security? what essential protections must be in place to

  Question 1 ten high-technology batteries are tested for 200

question 1 ten high-technology batteries are tested for 200 hours each. one failed at 20 hours all others completed the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd