Find possibility of setting up wireless network in building

Assignment Help Computer Networking
Reference no: EM1369687

Imagine you are a wireless network contractor, and you are meeting with a potential client over lunch to discuss the possibility of setting up a wireless network in the client's building. She mentions that she has heard of the OSI model but does not fully understand it and asks you to explain it to her. She has limited technical background. How would you describe the OSI model to somebody like this potential client who does not have a technical background? Come up with an analogy, if you wish, that will help clarify your explanation. Note: If you decide to use an analogy, it should be original and not based on the example provided.

Respond to your classmates by acting as though you are the potential client. Critically review their explanation and ask for clarification, more detail, or examples. Provide positive and constructive feedback, or identify points with which you agree or disagree.

Reference no: EM1369687

Questions Cloud

Information assets to estimate for risk management purposes : If the organization has three information assets to estimate for risk management purposes which vulnerability must be estimated for additional controls first? Which vulnerability must be evaluated last?
What determines price elasticity of demand for a product : What determines price elasticity of demand for a product. key determinants of price elasticity of demand are as follows: i. Availability of close substitutes- gas stations across street, very elastic.
What does production look like : If a person can either fish or chop coconuts for subsistence, what does production look like.
Is this due to taxes or is it more fundamental : Y at PPP is only 0.05. It is well-known that investment rate dierenHSL39502.bmpe when measured at a common set of prices while very small when measured at domestic prices.
Find possibility of setting up wireless network in building : Assume you are a wireless network contractor, and you are meeting with potential client over lunch to explain possibility of setting up wireless network in client's building.
Why he did not foresee for number of t-shirt stores : What he didn't foresee was that number of T-shirt stores in South Padre would jump from roughly 10 to 40 within two years. Now he laments.
Show the economic development implications : Define enterprise zones and explain the utilization of these zones by your chosen government and the state within which the government exists.
Evaluate net purchases and cost of goods purchased : Evaluate net purchases and cost of goods purchased - Prepare the journal entries to record these tranactions on the books of Rebecca Company using a precpetual inventory system.
What happens to demand for dollars vs demand for a currency : When US assets are more attractive to foreign investors, what happens to demand for dollars vs demand for a foreign currency.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain tcp-ip protocol and file transfer protocol

"Choose one of the key terms ie TCP/IP protocol, File transfer protocol,OSI model,wireless workstation) and write a paper about it. Apply the following criteria:

  Computing successive values of congestion window

Determine successive values of congestion window in bytes?

  How to interconnect two areas using twisted-pair ethernet

Provided that both engineering and front office areas use 10BaseT (twisted-pair Ethernet), how might you interconnect two areas?

  Explain way to connect workstations to mainframe computer

Other building a mainframe computer. What is the best way to connect the workstations to the mainframe computer? Explain your reasoning and all the possible solutions you considered.

  Explaining telecommunications asset life cycle model

Explain in scholarly detail role of telecommunications operations functions in Telecommunications Asset Life Cycle Model concept?

  Tools and processes for scanning vulnerabilities

Write down the tools and processes for scanning and removing possible vulnerabilities?

  Difference between tcp and udp

List the primary differences between the TCP and UDP. Would you recommend UDP or TCP for the voice over IP phone call? Justify your choice.

  Sketching lan with operation over a distance

You have been asked to sketch a LAN with operation over a distance of about 100m.

  Write characteristics of smtp-pop3-tcpprotocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols? What are they used for?

  Computing depreciation using three-year macrs rates

Depreciation will be calculated using the 3-year MACRS rates of 33%, 45%, 15%, and 7% for the first through the fourth year, respectively. Looner Industries' marginal tax rate is 40%, and its cost of capital is 10%. Should the plant be built?

  Use a straight-through cable to connect to hub

Assuming you use a straight-through (not a crossover) cable, what port on hub A will you use to connect it to hub B?

  Purpose of key tag in rrsig resource record

Determine the purpose of the key tag in the RRSIG resource record.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd