Why is camera transmission not making it to security program

Assignment Help Computer Engineering
Reference no: EM131713722

Assignment: Applying Concepts

Scenario: Stingy IP Camera

Suppose you arrive at work one morning to find a new service ticket waiting in your inbox. The day before, two new surveillance IP cameras were installed outside a data closet in a newly renovated office building. These IP cameras transmit their feed over the network to the Security Department. Security is receiving the feed from one camera with no problem. However, they're not getting anything from the other camera. As far as the security system is concerned, the camera doesn't exist.

After confirming the lack of data feed in the monitoring program, you ping the camera but get no response. Knowing the camera is new, your next stop is the camera itself. Knowing that rebooting a device often solves problems, your first move is to pull out the ladder, climate up to the camera, and hit the power button to reboot it. You've brought along your laptop and, while the camera is rebooting, you connect to the LAN in that building to check the feed again. From this vantage point, the camera is working fine. The feed is coming through clearly now. Thinking you've solved the problem, you return to your desk and notify security that the camera is fixed. Unfortunately, they disagree. When you pull up the security program again, the camera feed isn't there. You know it was working a few minutes ago back at the camera. So why isn't it visible in the security program?

As you do a little more exploration, here are some of the things you find:

• The feed from the other camera installed at the same time on the same IAN is still coming through fine.
• All the other nodes you've tested on that LAN are fully functional and responding to
• There are no errors reported on the LAN that hosts the security program.

Why is the camera's transmission not making it to the security program? Below are several possible resolutions. Select the best one and explain your reasoning:

a. The Ethernet cable from the camera to the network is malfunctioning and should be replaced.

b. The security program doesn't recognize the authenticity of the camera's data, so a static route should be configured from the camera to Security's LAN.

c. The switch for the cameras' LAN is inadequate for the amount of traffic on the LAN now that the new cameras have been added. The switch should be replaced with a more powerful device.

d. The camera's NIC is malfunctioning and should be replaced.

e. The camera's default gateway is misconfigured or unreachable and should be corrected.

f. The Ethernet cable leading from the camera to the network is placed too closely to some nearby fluorescent lights, which is causing interference in the transmission. The cable should be relocated farther away from the lights.

g. Power fluctuations in that building's data closet are causing intermittent problems with the devices on that LAN. The UPS servicing that closet should be replaced.

Reference no: EM131713722

Questions Cloud

How do our institutions affect economic activity : Identify authoritative academic, governmental, advocacy group, and media resources - Evaluate the quality of resources
Discuss about the implementing a value-added strategy : Provide examples of three value-added support strategies geared toward helping a nursing home to implement a goal of providing a safe and caring environment.
Review problem related to current population survey : Computers and Internet. A U.S. Census Bureau report (August 2000, Current Population Survey) found that 51.0% of homes had a personal computer and 41.5%.
Aboriginals should be integrated similar to immigrants : Do you think that Aboriginals should be integrated similar to immigrants? If not, what would have been the best approach?
Why is camera transmission not making it to security program : Why is the camera's transmission not making it to the security program? Below are several possible resolutions. Select the best one and explain your reasoning:
Discuss public health programs and public health policy : The HIV/AIDS epidemic has been a major driver of change for public health programs and public health policy
Olympic games of europe contributions : How is the Olympic Games of Europe contributions to the world from 3500 BCE to 1500 CE influence to he world's today.
Identify potential to impact human services practices : impact human services practices. What are some challenges to applying or integrating Dr. Seligman's Theory to human services practices
What kind of graph might be used to display the data : Streams. As part of the course work, a class at an upstate NY college collects data on streams each year. Students record a number of biological, chemical.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd