Reference no: EM131086207
Setting up a wireless network
Check the attachments below. Having read the articles below, "Myths and Truths of Wireless Security" and "Setting up a wireless network"(link provided), create an appropriate network map diagram of YOUR home network. You may refer to Textbook, Data Communications and Networking by White(author) for diagrams.
1. Show wired and wireless connections.
2. Indicate the CAT x (i.e., CAT 5, CAT 5e, CAT 6, etc) cable in use and the wireless speed of your wireless router and all of your wireless computers and other devices that are in use (i.e., 802.11b, g, a, n, ac, etc).
3. Indicate what devices are being used to connect, for example motherboard, USB, network interface card, Bluetooth, etc.
4. Include all peripherals, iPods, tablets and phones (show all IP Addresses).
5. If you have your TV hooked up to the Internet (Smart TV) then show that as well.
6. Describe where your main firewalls are (both hardware-based and software-based).
7. Do NOT show the status of your ports.
8. Show the IP addresses for all of your connected computers/devices/peripherals, except for your router's public IP address.
9. Do NOT show MAC addresses.
The paper will consist of the diagram plus an explanation pages
LINK below for Setting up home network
https://windows.microsoft.com/en-us/windows/setting-wireless-network#1TC=windows-7
Advertising regulations in foreign market
: What steps should be considered with advertising regulations in that foreign market?" Use examples to illustrate and consider culture, religion, tradition, and form of government.
|
Broad range of talent management efforts
: Describe the broad range of talent management efforts that use software applications by reading The User's Voice: Understanding the Impact of Talent Management Software by Dr. K. Jones and hosted at IHRIM.org.
|
Can higher percentage of women have high blood pressure
: Survey on Inevitability of War A sample of 200 teenagers shows that 50 believe that war is inevitable, and a sample of 300 people over age 60 shows that 93 believe war is inevitable. Is the proportion of teenagers who believe war is inevitable dif..
|
Describe the set of actions that survive the elimination
: In the following game, Describe the set of actions that survive the iterated elimination of strictly dominated actions. Describe the set of actions that survive the iterated elimination of weakly dominated actions
|
Describe where your main firewalls are
: Describe where your main firewalls are (both hardware-based and software-based). Indicate what devices are being used to connect, for example motherboard, USB, network interface card, Bluetooth, etc.
|
What will is an immediate concern and what can wait
: What will is an immediate concern and what can wait? What additional types of assistance (other than initial 1st responders) would be helpful here? How would they be used?
|
What happens if the two-sample t test is used
: Does it appear that the true average difference between intake values measured by the two methods is something other than zero? Deter- mine the P-value of the test, and use it to reach a conclusion at signi cance level .05.
|
Define a business or management problem
: This week, you will define a problem or risk and provide objectives (this problem will be used in future weeks). Define a business or management problem and provide objectives.
|
Provide an access point for backdoor trojan horses
: By doing so, instant messengers can transfer worms and other malware, and also provide an access point for backdoor Trojan horses.
|