Question
IT 120 Spring 2017, Homework 2 Due on Friday, March 3, 2017 at 1:05 pm in class (Late assignment will not be accepted). How many
IT 120
Spring 2017, Homework 2
Due on Friday, March 3, 2017 at 1:05 pm in class (Late assignment will not be accepted).
How many links are required for a full-mesh topology with 6 devices? (10 pts)
Your office currently uses CAT 6 unshielded twisted pair (UTP) in its local area network. Your boss wants you to evaluate switching the local area network to fiber. (10 pts)
List two advantages of sticking with UTP.
List two advantages of switching to fiber.
What is your recommendation? Why?
A type of cabling passes signals from 20 MHz to 300 MHz. What is the bandwidth of this cabling? (10 pts)
A structured cabling installation connects a computer in a work area to a switch in the telecommunications room. Put the components of the installation in order, starting from the switch and ending at the computer. 1 is closest to the switch and 5 is closest to the host (10 pts)
_______ horizontal cabling
_______ patch cable in the telecommunications room
_______ patch cable in the work area
_______ patch panel
________ wall outlet
Assume you provide the tech support for your office, which uses a wired Ethernet. One user reports that his computer is working but he cannot access anything using the network. All other users have no problems. (10 pts)
Do you suspect that the problem is in one computer or a shared resource? Why?
List two possible failures that may cause this problem.
Complete the switch table below. (10 pts)
A switch and a NIC are negotiating a connection. The switch operates at 10Mbps, 100 Mbps, and 1000 Mbps. The switch supports both half-duplex and full-duplex connections. The NIC operates at 100 Mbps and 1000 Mbps. The NIC supports half-duplex connections. After the negotiation, what speed will the link operate at? Will it be full-duplex or half-duplex? (10 pts)
The standard wired Ethernet uses CSMA/CD but WiFi uses CSMA/CA. Why the difference? (10 pts)
Contrast the following methods of WiFi Security: MAC address filtering, wireless authentication, and data encryption. (10 pts)
Identify the medium used by each type of connection or protocol. The choices are unshielded twisted pair, coaxial cabling, fiber optics, and radio waves. (10 pts)
802.11 WiFi ______________
Cable modem ______________
OC-1 connection _______________
DSL ______________
FIOS _______________
Modern Ethernet (two answers) _______________ or
_______________
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started