Expansion of network services

Assignment Help Operating System
Reference no: EM1379512

Question: Assume you have been hired through your local library to help them setup a LAN to connect their three library sites. The director of the library, Robert Jienwerski, has a good understanding of the jargon used by network installers and administrators. Robert is very excited about the project. During your first meeting with him, he wants you to come up with a feasibility study for the new network before committing a budget to the project. He gives you the following list of questions that he wants answered:

What expansion of network services and benefits might they achieve?
What LAN protocol and related transmission speed are most appropriate for the local libraries: Ethernet, Fast Ethernet or GB Ethernet?
What topology for the LANs and the WAN? What are their merits?
Explain the elements of the backbone.
What transmission media is required for the LAN? UTP or fiber? If UTP, what grade? What transmission media and devices are required to create a WAN?

 

Reference no: EM1379512

Questions Cloud

Comprehensive network installation plan : Determine the main steps that should be included in a comprehensive network installation plan. In your opinion, what are the 2most important steps in ensuring success of the network?
Network security case study : In this case study, you require to construct a network checklist to establish certain process that enable you and other network security specialists to assess a network from different possible threats and vulnerabilities.
Computer privacy related question : One of the main concerns with the expanding influence of information technology is issue of personal privacy. As more and more individuals and businesses are using computers to transact business and store data the protection of individual privacy is ..
Opportunity to improve reputation : Determine what security hole was exploited through criminal hackers to illegally access LexisNexis network, what method was employed. How did they turn a bad situatin into an opportunity to improve its reputation?
Expansion of network services : Assume you have been hired through your local library to help them setup a LAN to connect their three library sites.
Explain current technologies and issues : Assume you work for a cosmetics corporation and have been asked to manage a project team that will investigate whether or not your company should start to sell its products directly to customers through the internet.
Determine values of it industry certifications : Discuss briefly how IT certification works. What business arenas are IT certifications needed, security, or what technical problem is IT certification designed to solve?
Benefits and drawbacks of networked computers : Discuss the benefits of networked computers? What are the drawbacks? Describe similar characteristics between the internet and a group of networked computers.
Database statistics : In an RDBMS, how are the three phases parsing, execution, and fetching carried out? In general, in which phase would you tune a database? Determine database statistics and why are they important.

Reviews

Write a Review

Operating System Questions & Answers

  Explain decision variables in relation to linear programming

Explain the following terms in relation to linear programming problems- (1) decision variables (2) objective function

  Write the start-up steps in windows nt

Write the start-up steps in Windows NT. Provide estimate for the capital investment needed in computer forensics for a 2,000,000 population.

  Data abstraction for health it applications

Choose one database design model and discuss the benefits that model would bring to health information technology applications.

  Importance of maintaining security on a lan

Discuss what roles do firewalls and proxy servers play in network security? Determine the importance of maintaining security on a LAN?

  Operating system interfaces questions

Select one of the programs that comes with Vista in which you think your classmates would be interested. Determine what does the program do?

  Wireless internet security

Millions of American homes are prepared with wireless networks. Suppose if the network is not made secure, any nearby computer with a wireless card can use network.

  Advantages and disadvantages of major operating system

Consider the advantages and disadvantages of each major operating system that Amy might use on the Web server. In a one-page memorandum to Amy.

  P2p file distribution protocol

In the BitTorrent P2P file distribution protocol, the seed breaks the file into blocks, and the peers redistribute the blocks to each other.

  Focuses on software development process and life cycle model

Discuss how would you address this certification issue with your hypothetical firm for your system that you are trying to certify at the top secret level?

  Ethics with computer hackers

White Hat Cracking engage security testing by arrangement. Grey Hat Cracking seeks to identify insecure systems and inform administrators or users of vulnerabilities.

  Web security threats

Think about the given threats to Web security and explain how each is countered by a particular feature of SSL.

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd