Connecting computers in a local area network

Assignment Help Computer Networking
Reference no: EM1379639

Assume you are asked to head a non computerized department (Suppose a business situation and briefly describe it). You need ten computers and would like to connect them to each other. What are the steps you consider to follow? And what are the additional equipment/software you would purchase and why?

Now suppose you would like to connect the internal network you devised in Q1 to the outside world. What are the steps you consider to follow? And what are the additional equipment/software you would purchase and why? What new opportunities would you have by opening your network to the outside world present? What uses would you put it for?

Optional Questions
What are the productivity issues of the Internet for management? What are the security challenges of the Internet for management? What are the regulatory challenges of the Internet for management?

 

Reference no: EM1379639

Questions Cloud

Arrangement of subnet masks : An organization has a class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:
Discussion about networking a small business : Assume you have been employed as a consultant to suggest a retailing corporation about ways in which it can use networking technology to enhance its business.
Research proposal topic : You need to  select and present their own researchable topic for the research proposal in this course .Students are not limited to the topic suggestions listed in exercise 1 on page 76.Complete exercises 1-9 on page 76 in the text to help you sel..
Difference between wats and leased lines : Discuss the differences between Wide Area Telecommunications Service and leased lines?
Connecting computers in a local area network : Assume you are asked to head a non computerized department and you need ten computers and would like to connect them to each other.
Solving networking and security issues : Assume you have been hired through a big restaurant called Habibi's. Habibi's has a small network of 20 consumer workstations and a Windows Server 2003.
Home networking solutions : Question:  The Thomsons all have their own separate computers at home. The problem is, there is only one printer, and it is attached to Bob's computer.
Discussion on web open and free : Tim Berners Lee is known as father of the Web. In The Man who Invented the Web in 2005 it states that Berners Lee has fought to keep it open, non proprietary and free.
Strategy planning for corporate : In another year, after all assignments are completed, you consider to convert back to a volunteer basis with AllTechComm, and to discover more profitable employment, preferably with a major company.

Reviews

Write a Review

Computer Networking Questions & Answers

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Company-s interpretation of requirement of system

You have taken job with a software user who has contracted previous employer to develop a system for them. You discover that your company's interpretation of requirements is different from interpretation.

  Determining entropy of ciphertext message

A crypto device encrypts each message into 20 bits of ciphertext.What is the entropy of the plaintext message? What is the entropy of the ciphertext message?

  What is theoretical maximum channel capacity

What is the theoretical maximum channel capacity (Kbps) of traditional telephone lines (POTS)? Will that be the actual maximum channel capacity?

  Typical signal sequence in a synchronous connection

A typical signal sequence in synchronous connection contains significant amount of information in addition to just intended message or data.

  Address type certification certification issue with company

Type-1 certification (TOP SECRET) focuses on Development Methodology. How would you address this certification issue with your hypothetical company (make up one for this problem) for your system

  Kind of security drill typical in organization

Which kind of security drill do you believe is the most typical in an organization? Which type of security drill do you believe is the most effective? Why?

  Explaining telecommunications asset life cycle model

Explain in scholarly detail role of telecommunications operations functions in Telecommunications Asset Life Cycle Model concept?

  How third-party plug-ins change process of diagnosing errors

How does third-party plug-ins change process of diagnosing and troubleshooting errors within application? What steps would you take in diagnosing the application which has been changed from its original state?

  Attacks on servers on one of company-s departments

After reading about attacks on servers like to ones used in one of company's departments, the CIO has asked you to come up with a report as to what.

  Determine number of samples are included in each packet

Assume that sender sends silence suppressed RTP stream of G.711 audio to receiver. During talk spurt 20 msecs chunks of quantized audio samples are encapsulated. Determine number of samples are included in each packet?

  How many registers available for use by input parameters

Each register window has 32 registers, of which 10 are global variables and 10 are local variables. How many registers would be available for use by input parameters?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd