Action-connected to switch refuse to communicate network

Assignment Help Computer Networking
Reference no: EM1362116

Linda has been assigned the job of connecting five computers to a network. The room holding the five computers has three network jacks that connect a switch in an electrical closet down the hallway. Linda decides to install a second switch in the room. The new switch has four network ports. She uses one port to connect the switch to a wall jack. Now she has five ports available. (two wall jacks and three switch ports). While installing and configuring the NICs in the five computers, she discovers that the PCs connected to the two wall jacks work fine, but the three connected to the switch refuse to communicate with the network. What could be wrong and what should she try next?

Reference no: EM1362116

Questions Cloud

What is the value of the electricity produced by battery : Batteries are rated in terms of ampere-hours (A · h). For example, a battery that can produce a current of 3.00 A for 5.00 h is rated at 15.00 A · h.
Journalize the treasury stock transactions : During 1st year of operations Klump Corporation had the following transactions pertaining to its common stock.
Describe why it is often asserted that that exporters suffer : Describe why it is often asserted that that exporters suffer when their home currencies appreciate in real terms against foreign currencies and prosper when their home currencies depreciate in real terms.
Does jennifer have a viable suit for breach of contract : Does Jennifer have a viable suit for breach of contract and Does the Statute of Frauds apply to any purported contract?
Action-connected to switch refuse to communicate network : PCs connected to the two wall jacks work fine, but the three connected to the switch refuse to communicate with the network. What could be wrong and what should she try next?
Explain why is an opinion leader a more credible source : Explain Why is an opinion leader a more credible source of product information than an advertisement for the same product
What is the speed of car move together after the collision : What is the speed of the 2 cars as they move together after the collision.
Elucidate price of waffle cones : Suppose that Iggi and Kurt begin trading ice cream and waffle cones with each other. Elucidate price of waffle cones (in terms of ice cream scoops) would benefit both Iggi and Kurt and make both individuals willing to trade.
Show legal issues in the hoffman v caterpillar case : Hoffman v Caterpillar - What were the two legal issues in the Hoffman v Caterpillar case and What did the court decide?

Reviews

Write a Review

Computer Networking Questions & Answers

  Security issues

Provide an example explaining the best use of Virus, Encryption, VPN, Firewall securities, when and why?Which security areas you are using and applying to your securities? Also explain why?

  Pros and cons of routers and switches

Explain to your team the differences between routers and switches. Compare them and list the pros and cons of using each type of hardware.

  Voip beneficial to an organization

Conduct Internet search to locate case study which illustrates how VoIP was beneficial to the organization. Why did organization need a VoIP solution?

  Systems analyst can help with project management tasks

Explain how systems analyst can help with project management tasks. Also, explain how new employee can contribute to tasks.

  Cbc-pad is block chiper mode of operation in rc block cipher

CBC-pad is a block chiper mode of operation used in RC5 block cipher, but it could be used in any block cipher. That is, if the original plaintext is an integer multiple of the block size, why not refrain from padding?

  Explaining sliding window protocol with the window size

Terminal A is sending data to terminal B using a sliding window protocol with the window size equal to 5 and the maximum sequence number equal to 6.

  How rdp file includes settings you configured in client

How can you tell from this experience that the RDP file includes the settings you configured in the client before you created the RDP file?

  Problems-mix statically and dynamically assigned addresses

Describe what types of problems could result from having a mix statically and dynamically assigned addresses on the same network.

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  Advantages-mobile computing technology to monitor patients

Analyze the advantages and disadvantages of using mobile computing technology to monitor patients.

  Access control is handled during routing process

Access control is handled at ____ layer during routing processrouter consults a list of rules before forwarding incoming packet to determine whether a packet meeting certain criteria.

  Benefits of authentication scheme

An example of when a failure may occur is if the clinet's MAC address is explicitly excluded in the AP/router configuration. What are the benefits of this authentication scheme?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd