How to interconnect two areas using twisted-pair ethernet

Assignment Help Computer Networking
Reference no: EM1368752

Company is planning a new network. Engineers in the design shop must have connections to accountants and salespeople in the front office, but all routes between the two areas must traverse the shop floor, where welders and metal-stamping equipment create potent amounts of EMI (Electro Magnetic Interference) and RFI (Radio Frequency Interference).

Given that both the engineering and the front office areas use 10BaseT (twisted-pair Ethernet), how might you interconnect the two areas? Assuring that the network has immunity from interference, reevaluate your choice citing the best medium(s) to use.

After the previous section of the network is complete, a CEO realizes that if the loading dock connects to the network, the dock workers could log incoming and outgoing shipments and keep the inventory more current. Even though the loading dock is nowhere near the shop floor, the dock is 1100 feet from the front office. What kinds of cable will work to make this connection? Choose the best medium for this project.

Reference no: EM1368752

Questions Cloud

Computing time take to send file over a direct link : Assume the file is sent continuously as one big message. How long does it take to send file assuming it is sent continuously.
Operations management-responding to difficult customers : Write a memo directive to your field manager Tom Billingsley. Advise him of the events at the Stewart residence and reiterate your company's policy regarding pairing new experienced employees on work assignments.
Question about marginal propensity to consume : The marginal propensity to consume equals 0.3, and the marginal propensity to import is 0.1. If Americans suddenly increase their desire for European cars and the MPm raise to 0.3,
Prepare the request for proposal : Prepare the request for proposal (RFP) and techniques used to evaluate the proposals - several other key project decision makers to review the approach you are going to take on the project.
How to interconnect two areas using twisted-pair ethernet : Provided that both engineering and front office areas use 10BaseT (twisted-pair Ethernet), how might you interconnect two areas?
Determine the relationship between the mpc and the mps : If consumption increases through $12 billion when real disposable income raise by $15 billion, What is the value of the MPC? Determine the relationship between the MPC and the MPS?
Find error in total net income : Describe why the understatement of inventory by 66,000 at then end of 2004 results in an understatement of equity by same amount in that year.
Draw flow chart to compute arithmetic operation : While drawing flow chart, you require to add little more functionality as follows like during any computations of any arithmetic operation, if result exceeds 2000 or comes equal to 100, user must input the data again
Punishment is not for the condemnation of the guilty : Business - what does this mean to you and how could you apply it to your subordinates

Reviews

Write a Review

Computer Networking Questions & Answers

  Social effect of online social networks

What is the social effect of online social networks? 200 words Describe an experience in facebook. at least 100 words.

  Security issues

Provide an example explaining the best use of Virus, Encryption, VPN, Firewall securities, when and why?Which security areas you are using and applying to your securities? Also explain why?

  Reason to include padding block when padding is not required

It is considered good practice for the sender to pad every message, including messages in which the final message block is already complete. What is the motivation for including a padding block when padding is not needed.

  Design lan with operation over a distance

You have been asked to design a LAN with operation over a distance of about 100m. Compare and contrast twisted pair cable, coaxial cable, fiber-optics.

  Small internet works

Prepare a network simulation

  Hypothetical company trying to certify at top secret level

Hypothetical company (make up one for this problem) for your system (for example: operating system) that you are trying to certify at the TOP SECRET level?

  Maintaining current employers connection to internet

Assume you are responsible for selecting and maintaining your current employers connection to the Internet. Take some time to research routing protocols

  Attack can be detected and mitigated by stateless firewall

For each of the following attacks, say whether the attack can be detected and mitigated (to a significant degree) by a stateless or stateful firewall. Explain briefly.

  Explain authentication and authorization

Explain authentication and authorization. Which depends on the other? How and why are these processes more complex in a modern networked organization.

  Networking the computers

Cathi required to network three computers for herself and her roommates, Sharon and Emily. She decided that a(n) (1)___________________ network was the right kind to install in their dorm suite since a(n) (2)____________________ network was too co..

  Benefits of authentication scheme

An example of when a failure may occur is if the clinet's MAC address is explicitly excluded in the AP/router configuration. What are the benefits of this authentication scheme?

  Protocol implementations to permit all nodes to communicate

Illustrate how many protocols and protocol implementations are required to permit all nodes to communicate?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd