How often are network standards reviewed

Assignment Help Computer Networking
Reference no: EM131114128

Lab Report

Use a red colored font for you answers.

Place the answers below the questions

1. How often are network standards reviewed? The standards are reviewed and updated approximately every 5 years.

2. What category of UTP cabling is the minimum for a telephone cable?Cat 5 is used for telephone cable, before Cat 5, Cat 3 was used.

3. What category of cabling should be installed as a best practice for a telephone cable?Cat 5

4. What is the problem with leaving abandoned cable in place in a building?It creates a fire hazard because of the extra combustible material.

5. Why must the twisting in the individual wires be maintained in a UTP cable?

6. How many wires does a gigabit cable use?

7. Is the labeling standard commonly used or not used?

8. Grounding should be attached to what in the building?

9. Horizontal cabling connects what areas to each other?

10. What is a plenum rated cable?

11. What is a riser tube used for?

12. What is the code for plenum rated horizontal cable?

13. How many wires in a UTP cable does Fast Ethernet use?

14. How many inches should separate UTP cable from 120 volt electrical cable?

15. What is the reason for grounding jumpers on each connection in ladder rack?

16. Why should overfilling of a riser tube be avoided?

17. Is the grounding of equipment a safety or a performance concern?

18. What are the current recognized horizontal cabling categories?

19. May an existing Category 5 cable be used to make network connections?

20. In the example used here what does the firestop material consist of?

21. In what circumstances will poorly installed cabling still function?

22. Why should the outer cover on a UTP cable be maintained in place?

23. Does cable labeling impact network performance?

24. May CM cable be used in the plenum space?

25. Why should a plastic riser tube not be used?

Reference no: EM131114128

Questions Cloud

Why is reliability important in research : Why is reliability important in research? Why is validity important in research? Consider the time and resource constraints you may have with your proposal.
Question regarding the bullwhip effect : DQ1 - Describe "the Bullwhip Effect" and speculate as to how the outsourcing of supply chain processes can impact the complexity of managing those processes.
How else might search parameters be defined : Discuss the way in which Chimel v. California (1969) defined what officers may search, when they may search, and why. Why are such directives necessary and how do they help individual suspects but may hinder police activity. How else might search ..
Describe how this location is used in the films : Paragraph #1 should identify the particular kind of cite site or location. Who uses it and how is it used? What is its history and what associations are connected with it? This paragraph sets up the symbolic and historical associations of the site..
How often are network standards reviewed : How often are network standards reviewed? What category of UTP cabling is the minimum for a telephone cable?Cat 5 is used for telephone cable, before Cat 5, Cat 3 was used.
Question regarding the political business cycle : Why might eliminating the FED's independence lead to a more pronounced political business cycle?
Which realization requires the least number of gates : Consider a 1-bit version of the digital comparator shown in Figure P6.1.41. Note that the operation of this circuit is such that whichever output is 1 gives the desired magnitude comparison.
How effective is the partnership between it and the business : Overall, how effective is the partnership between IT and the business at Hefty Hardware? Identify the shortcomings of both IT and the business.
Analyzing the burglar modus operandi : In a 2- to 3-page paper please answer the following questions: As the investigator in this case, what you can learn from analyzing the burglar's modus operandi (MO)

Reviews

Write a Review

Computer Networking Questions & Answers

  Plan identify potential causes of network failure

For each potential cause of network failure, create a plan with the necessary steps and required hardware to reduce the risk of failure. Include the cost and benefit comparison for each risk reduction plan to justify the plan.

  Kinds of business applications in networked business office

Write down types kinds of business applications would you deem significant in networked business office? What kinds of network servers and resources would be essential to run these business applications?

  Describe cdma used in gps-qualcomm satellite phone network

Describe CDMA (code division multiple access), that is used in GPS and Qualcomm satellite phone network, also other communication standards.

  Why do switched ethernet network improve network performance

The company vice president has just received an email from an associate with claims that 50,000 dollars needs to be wired to a location in Eastern Europe. You want to confirm that this email is indeed from the associate by identifying the message ..

  Calculate the overall speedup of a system

How is a Network Layer protocol different from a Transport Layer protocol and into which Class of networks do the following IP Addresses fall?

  The actual web host name

The actual web host name to which www.polito.it resolved was? What destination organization is the owner of record of www.polito.it

  Produce a test plan for the new inventory system

Produce a report detailing how you will manage the transition to the new platform so as to assure the quality of the process and hence the outcome.

  Identify and describe 3 types of computer networks be sure

data communication is an important aspect of modern life. in your own words please address the following in a 4-5 pages

  Define an extended network prefix

Define an extended network prefix that allows the creation of 44 Hosts on each subnet.a) List the network prefix and the equivalent Subnet Mask b) What is the maximum number of valid Hosts that can be assigned to each subnet AND the maximum number of..

  Case studythe ip version we are all using nowadays in our

case studythe ip version we are all using nowadays in our corporate networks and in the internet is ip version 4 short

  A simple implementation of the rsa algorithm

For subsequent new connections (new sessions) the server's public and private keys should be different. For this assignment you should use TCP, and you do not have to implement non-blocking communications.

  Examples of application layer protocols

Examples of application layer protocols and Cables and wireless transmissions are part of what OSI layer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd