What is the wlan topology in use

Assignment Help Basic Computer Science
Reference no: EM131218113

1. Complete both parts A and B of the question below.

(A) Based on the figure below, what is the WLAN topology in use? In what way does the ISM band impact the topology? What must be done to ensure proper coverage of voice and video applications in the network?

The graphic above is made up of three access points that terminate on a wired network. The access points are placed adjacent to each other, each in its respective coverage area.

(B) Assume that the organization is using WEP Personal with a 128-bit WEP key. Come up with an example hexadecimal WEP key that will work in this scenario. Justify your answer.

2. Complete all parts of the question below.

(A) Identify the switches that will become the root bridge in the topology below. Explain how you arrive at that conclusion.

The graphic above is made up of four Cisco 2960 switches connected in a ring topology. SW1 on the left connects to SW2 via a FastEthernet 0/1 interface on both sides. SW2 connects to SW3 via a FastEthernet 0/2 interface on both sides. SW3 connects to SW4 via a Gigabit Ethernet 0/1 interface on both sides. SW4 connects to SW1 via a Gigabit Ethernet 0/2 on both sides. SW3 connects to a Hub via both its FastEthernet 0/1 and 0/3 interfaces.

(B) Identify all the link costs. Assume default link costs.

(C) Identify the root ports in the diagram and the designated ports.

(D) What ports will be used as alternate (ALTN) or blocked ports? What ports will be used as backup ports? Please explain how you arrive at this conclusion.

(E) How many instances of STP are running on the switches if we only have five VLANs? Assume default configuration of the Cisco switches. Explain your answer.

Reference no: EM131218113

Questions Cloud

How is the unix system call read actually invoked : In Unix-like operating systems, there is both a API library function named read(), and asystem call referred to as read in the Unix documentation. However, Unix system calls do notactually have names like a library function does.
Compare the impact of foreign aid on their broader economies : Essay topics for PUBH5752. There is considerable debate around the benefit of foreign aid for health outcomes in developing countries, particularly with regard to sustainability of programs. Select at least 2 recipient countries and compare the im..
Are the weights the same on earth and the moon : If the mass of a sliding block is tripled while a constant net force is applied, by how much does the acceleration decrease? Explain the difference between a vector and a scalar quantity. Give at least two examples of different variables that are v..
Evaluate the security posture of the organization : Evaluate the security posture of the organization and communicate the findings in an executive-level summary presentation and briefing memorandum.
What is the wlan topology in use : Based on the figure below, what is the WLAN topology in use? In what way does the ISM band impact the topology? What must be done to ensure proper coverage of voice and video applications in the network?
How much does the public policy issue cost americans : Describe and analyze the scope of the public policy concern. Be sure to address the following in your analysis.
The most valuable lesson from quarter : Why do people often settle for something less than excellent?-  What rewards can a person receive by creating excellence at work and in life?
What is the level of impact if the information label is low : What is the level of impact if the information label is LOW? What is the primary purpose of the Framework for Improving Critical Infrastructure Cybersecurity? Who provides and independent assessment of the security plan?
Are us ethical standards applicable worldwide : Are US ethical standards applicable worldwide? Explain your answer and provide examples. What are the consequences of failure to incorporate ethical considerations into global planning?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd