How often are network standards reviewed

Assignment Help Computer Networking
Reference no: EM131114128

Lab Report

Use a red colored font for you answers.

Place the answers below the questions

1. How often are network standards reviewed? The standards are reviewed and updated approximately every 5 years.

2. What category of UTP cabling is the minimum for a telephone cable?Cat 5 is used for telephone cable, before Cat 5, Cat 3 was used.

3. What category of cabling should be installed as a best practice for a telephone cable?Cat 5

4. What is the problem with leaving abandoned cable in place in a building?It creates a fire hazard because of the extra combustible material.

5. Why must the twisting in the individual wires be maintained in a UTP cable?

6. How many wires does a gigabit cable use?

7. Is the labeling standard commonly used or not used?

8. Grounding should be attached to what in the building?

9. Horizontal cabling connects what areas to each other?

10. What is a plenum rated cable?

11. What is a riser tube used for?

12. What is the code for plenum rated horizontal cable?

13. How many wires in a UTP cable does Fast Ethernet use?

14. How many inches should separate UTP cable from 120 volt electrical cable?

15. What is the reason for grounding jumpers on each connection in ladder rack?

16. Why should overfilling of a riser tube be avoided?

17. Is the grounding of equipment a safety or a performance concern?

18. What are the current recognized horizontal cabling categories?

19. May an existing Category 5 cable be used to make network connections?

20. In the example used here what does the firestop material consist of?

21. In what circumstances will poorly installed cabling still function?

22. Why should the outer cover on a UTP cable be maintained in place?

23. Does cable labeling impact network performance?

24. May CM cable be used in the plenum space?

25. Why should a plastic riser tube not be used?

Reference no: EM131114128

Questions Cloud

Why is reliability important in research : Why is reliability important in research? Why is validity important in research? Consider the time and resource constraints you may have with your proposal.
Question regarding the bullwhip effect : DQ1 - Describe "the Bullwhip Effect" and speculate as to how the outsourcing of supply chain processes can impact the complexity of managing those processes.
How else might search parameters be defined : Discuss the way in which Chimel v. California (1969) defined what officers may search, when they may search, and why. Why are such directives necessary and how do they help individual suspects but may hinder police activity. How else might search ..
Describe how this location is used in the films : Paragraph #1 should identify the particular kind of cite site or location. Who uses it and how is it used? What is its history and what associations are connected with it? This paragraph sets up the symbolic and historical associations of the site..
How often are network standards reviewed : How often are network standards reviewed? What category of UTP cabling is the minimum for a telephone cable?Cat 5 is used for telephone cable, before Cat 5, Cat 3 was used.
Question regarding the political business cycle : Why might eliminating the FED's independence lead to a more pronounced political business cycle?
Which realization requires the least number of gates : Consider a 1-bit version of the digital comparator shown in Figure P6.1.41. Note that the operation of this circuit is such that whichever output is 1 gives the desired magnitude comparison.
How effective is the partnership between it and the business : Overall, how effective is the partnership between IT and the business at Hefty Hardware? Identify the shortcomings of both IT and the business.
Analyzing the burglar modus operandi : In a 2- to 3-page paper please answer the following questions: As the investigator in this case, what you can learn from analyzing the burglar's modus operandi (MO)

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe how a user could discover that his isp is doing

Suppose further that this ISP is deliberately dropping 25% of the packets used in its competitors VOIP system when those packets are going through this ISP's routers. Describe how a user could discover that his ISP is doing this

  Explaining telecommunications asset life cycle model

Explain in scholarly detail role of telecommunications operations functions in Telecommunications Asset Life Cycle Model concept?

  How to submit the assignment lsjdkljflkjs ksdkfksdfksdkjfkj

lsjdkljflkjs ksdkfksdfksdkjfkj kdsjfk kdjfk jsdkfj kdjfkjsdkfjksdjkfjkdsjf k sd lsjdkljflkjs ksdkfksdfksdkjfkj kdsjfk

  Count back from the secondary after last frame

If the poll bit is on in the sixth frame, what will be the N(R) count back from the secondary after the last frame? Assume error-free operation.

  What network connectivity do propose between the sites

what network connectivity do you propose between the sites? How will this support the disaster-recovery vision and the need to replicate data between the sites?

  How your wireless network is configured and protected

For your wireless router at your home, run the setup program and show to the class how your wireless network is configured and protected.support your ppt with 2 or 3 snapshots.

  Prepare and save documents using word processing software.

Explore the Internet to discover at least two additional sites (other than Microsoft) that offer clipart, either free or for a price.

  Create a visio drawing of the network

Focus on topologies, any internetworking or segmentation, and additional support of other services (e.g.: video, telephonic etc.) You may use part of first paper to connect ideas. Create a Visio drawing of the network to the point of presence (PO..

  Provide a physical design for hhs

Create a project scope document that details appropriate business requirements, IT goals, and project parameters for the given scenario - Integrate routing and remote services into a Windows network design.

  Create subnet assignment which give contiguous address space

Provide subnet assignment which gives contiguous address space to each department. (b) Do same in (a) but with department B having 70 hosts.

  Prepare a business cover letter

Prepare a business cover letter to the school district superintendent - An introductory paragraph that states the purpose of the letter.

  How many domains of cloud security are there

How many domains of cloud security are there? Briefly describe each. What are the categories that CSA uses to classify the cloud domains? Briefly describe each.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd