Your manager has assigned you and two other engineers to do

Assignment Help Computer Networking
Reference no: EM13466483

You work for a University that has over 3500 students on campus. The you supports about 600 staff and faculty that are also supported on the same network. The university presently uses an analog phone system and the administration is looking to deploy voice over IP solution. Before they move forward, they want to ensure that the environment can support the technology. Your manager has assigned you and two other engineers to do some do an assessment of the network and based on the assessment results. Recommend an appropriate solution to support VoIP in the network.

Create a 2-3 page report that includes the following:

Switch assessment and requirement
QoS requirement if needed and why
POE requirements and support
Appropriate network subnet design

Description how traffic will be handled based on your design proposal.

Reference no: EM13466483

Questions Cloud

Explain how does a vlan and firewall combination help you : you are the senior network architect for a large corporation. the company has offices in l.a. new york and miami. the
What are the key social issues contributing to the need for : what are the key social issues contributing to the need for cj practitioners? list at least 3 key social issues and
Explain and critically comment on the various forms of : explain and critically comment on the various forms of european union law how such forms of eu law are implemented
If you are assigned a supervisory role at work how can you : if you are assigned a supervisory role at work how can you motivate employees to become excited about assuming
Your manager has assigned you and two other engineers to do : you work for a university that has over 3500 students on campus. the you supports about 600 staff and faculty that are
What is the benefit of knowing your personal competencies : what is the benefit of knowing your personal competencies and personality profile? how can you maximize this benefit in
Based on the topics covered in this course evaluate the : 1. analyze the -bases for a termination for default? and give an example of its application.2. compare and contrast the
You are the network manager for a local university each and : you are the network manager for a local university. every year you are audited to ensure that you are meeting with sox
What is the benefit of knowing your personal competencies : what is the benefit of knowing your personal competencies and personality profile? how can you maximize this benefit in

Reviews

Write a Review

Computer Networking Questions & Answers

  Implement windows network infrastructure

How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized (considering how group policy will be used and users will be organized)?

  Outline the design of a wireless network

Outline the design of a wireless network to support user mobility over a wide area. Include in your answer a discussion of addressing, routing and the used of fixed versus ad hoc network access nodes or base stations.

  Research and recommend writing guide-forensics organization

Your manager has asked you to research and recommend a writing guide that examiners in your computer forensics organization will use for all official written reports.

  What types of cable work to make connection in front office

Although loading dock is nowhere near shop floor, dock is 1100 feet from front office. What types of cable will work to make this connection? What type would you select and why?

  Probability of collision in computer network

In CSMA/CD, after the 6th collision, what is the probability that a node chooses k=7? The result k=7 corresponds to a delay of how many seconds on a 10 Mbps Ethernet?

  Transmit file using binary exponential backoff algorithm

Two CSMA/CD stations are each attempting to transmit long (multiframe) files. After each frame is sent, they contend for channel using binary exponential backoff algorithm.

  What is the server ip address

Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 12 addresses.

  Choose to run over tcp rather than udp

Describe why an application developer might choose to run over TCP rather than UDP. Suppose host A is sending host B a large file over a TCP connection. If the acknowledge number for a segment of this connection is y, then the acknowledge number for ..

  Consider the following system enforcing bibas strict

consider the following system enforcing bibas strict integrity policy for a software vendor.the defined integrity

  How the equation will be used step by step

Draw a simple graph to show conflict degree. Use channels as colors and show the algorithm step by step to color the graph. Explain what does thismean i.e. what have you constructed?

  Find data transmission rate in bits per second of system

Assume that the airliner carries 10,000 kg of those floppies at the speed of 1000 km/h over the distance of 5000 km. Determine the data transmission rate in bits per second of this system?

  Using microsofts threat analysis amp modelling tool create

using microsofts threat analysis amp modelling tool create a threat model for your own blog setup. additionally explain

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd