Report costs of upgrading a 40-hosts network with cat-5e utp

Assignment Help Computer Network Security
Reference no: EM133331730

Assignment:

Focusing on the physical part of the Los Angeles network, research and prepare a report on the costs of upgrading a 40-hosts network with Cat-5e UTP (5GBASE-T), NICs adaptable to the UTP cable, 4 work group switches, and one core switch. Include in your report the cost of a standard tool kit for yourself. Do not forget to include in the report any labor costs for installing the new wiring set up. Assume you can hire a wiring technician for $90 an hour. For the 40 hosts, assume the following;

a) One desktop computer in the president office, data show and one access point.

b) One desktop computer in the secretary office and shared printer with president office.

c) One desktop computer in each room of financial department, shared printer for whole department, and one access point.

d) One desktop computer in each room of HR department, shared printer for whole department, and one access point.

e) 21 desktop computers with shared printer, two servers and one access point in the open space floor area.

 

 

Reference no: EM133331730

Questions Cloud

Compute the current price of the bond using an assumption : Compute the current price of the bond using an assumption of semiannual payments. If Mr. Mitchell initially bought the bond at par value
What are your thoughts about innovation in shopping : What are your thoughts about innovation in shopping, Product Innovation, and the International Marketing Mix?
Which method is best to analyze an investment : Why is it more valuable to have money today than a year from now? Which method is best to analyze an investment? Justify your answer.
Describe the differences between debt and equity financing : Common or preferedistockholders get their dividend before Common stockholder or preferred stock holder Describe the differences between debt financing
Report costs of upgrading a 40-hosts network with cat-5e utp : Focusing on the physical part of the Los Angeles network, research and prepare a report on the costs of upgrading a 40-hosts network with Cat-5e UTP.
What is the local cash price in november : What is the local cash price in November? Will Mackenzie execute her call option or let it expire? Calculate the financial outcome of her action in the futures
Identify appropriate strategies for solving leadership : Identify and critique appropriate strategies for solving leadership and ethical problems in organizations.
How is the impact of a change in the underlying stock price : How is the impact of a change in the underlying stock price on the value of a stock option measured? An increase in an option strike price will have what type
Summarizing proposal for a corporate review committee : Summarizing Project Proposal for a corporate review committee. This proposal will include your executive summary and may also include a feasibility analysis

Reviews

Write a Review

Computer Network Security Questions & Answers

  What key elements are included in a x.509 certificate

What key elements are included in a X.509 certificate? What is the role of a CA in X.509? What different types of X.509 certificates exist?

  Understanding of penetration testing through research

Understanding of penetration testing through research and practical experience. This understanding is to be demonstrated by submission.

  Details of the attack on the playstation network

Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered.

  Why Diffie-Hellman key exchange

Why Diffie-Hellman key exchange is used for the latest version (i.e. 1.3) of this protocol?

  Examine a known vulnerability present in software

Examine a known vulnerability present in software running on a host-machine or network component. The vulnerability should be chosen from one of the topic areas

  What is the mutual information of the source and receiver

A source X sends 0's and 1's with probabilities π and 1-π, respectively, to a receiver Y. - What is the mutual information of the source and receiver?

  Equal rights amendment ratification

Should Equal Rights Amendment (ERA) ratification be achieved through approval of only three more states or should the process begin all over again?

  Outline one future trend in domestic and global terrorism

Outline one future trend in domestic and global terrorism. Why is it important to address this threat as time moves forward?

  Most difficult type of cyber attack to defend against

Consider how this information could be used by an organization for its security program. Was anything surprising to you - Post a message to the forum regarding your experience with any of the cyber attacks described in the text.

  The designers of s-aes got the ciphertext

Use the key 1010 0111 0011 1011 to encrypt the plaintext "ok" as expressed in ASCIIas 0110 1111 0110 1011. The designers of S-AES got the ciphertext 0000 0111 00111000. Do you?

  Discusses possible role of encryption in preventing breach

Write a 5-6-page research paper that discusses the possible role of encryption in preventing the breach described in the scenario. You may take either a pro or con position.

  Will they become cult heroes or viewed as dangerous criminal

Will they become cult heroes or be viewed as dangerous criminals? Will continuing to increase prosecution of these individuals help or hurt the situation?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd