Network Project Analysis


Question Description

Assignment Details:

please read these three questions carefully AND answer each question with three pages for each one .

. The assignment should be answering with 3 pages for each questions .

Grammar is important .

Use 2-3 scholarly sources,.

Unformatted Attachment Preview

1. Identify the types of connectivity devices being used in the local area network at your school or workplace, and describe why they're being used. Are any of the devices net- work managed ? How do your network administrators use the information collected from the managed devices? 2. Identify the network protocols that are used in the local area network at your school or workplace. Why were these protocols chosen for your network? Was IPX ever imple- mented in your local area network? Why? If your network is using IP what address class(es) is being used? Why? See if you can find out if and how Class D and Class E addresses are used in your network. 3-Identify how IP addresses are assigned in the local area network at your school or workplace. Were any other methods used to assign IP addresses prior to the current configuration? Why was the current configuration chosen? ...
Purchase answer to see full attachment

Tutor Answer

School: UCLA

Hi, kindly find attached

Student's Name
Lecturer's Name
Network Project Analysis
Question One
Modern workplaces have integrated networking devices in their workstations, my
workplace is not exclusion too, being a communication company it heavily relies on these
devices for efficiency. Amongst the networking devices used at the office are: A LAN cable,
network hub, network switch, modems, network routers, bridges, and repeaters. The LAN cable
is used to connect all the computers used at the workstation to the local area network. With the
LAN cable, it is used to manage the other computers wherever they are. It enables the IT support
team to be vigilant and provide timely support in case of any breakdowns that can be
experienced at the workstation (Eisenreich, Dan & Brian, 7). With the cable, it is possible to
monitor all the workers' actions on the computers to prevent unauthorized access to confidential
information. It also helps in the prevention of misuse of the firm's computers by the workers
accessing inappropriate materials while at the workstation.
Being a communication company, the company transfers very many files across its
system and outside the system. The company has networking devices called the networking hubs
which are very essential when it comes to data transfer. Moreover, the networking hub connects
multiple network hosts to facilitate the smooth transfer of data from one computer to another.

The transmission of data is done in the form of packets on the secured computer network. When
the data is sent to the network hub, the hubs role is to copy it and then send it to all ports
connected to it. Using a networking hub saves time when it comes to the transmission of data in
the company's systems from a department to another. There will be no need for independent data
transfer, but a single command on a networking hub will transfer the data to the selected ports.
Another device used at the workstation that is similar to the networking hub is the
networking switch. Sometimes the information or the data to be transmitted to all the
departments of the company should not be accessible to everyone as a whole and only needs
relevant transmission to specific personnel at the workplace. For this reason, a forwarding device
will not be very effective, but a device that filters data before sending it will be more appropriate.
That is the functionality of a networking switch at the workplace. Whenever there is essential
information to be relayed across all the employees of the company but limiting the information
to the relevancy of the posts the workers are holding, the networking switch will be used to filter
the data before sending it to ensure that there is confidentiality (Eisenreich, Dan & Brian, 7).
At the workplace, we have back up internet connecting devices whenever the Wi-Fi
connection is low. Employees will use modems to access internet connection whenever the
connections are law, and there is the need for fast speed computer access. Moreover, when any
worker likes its access to authorized but confidential information at the office, he or she will use
the modems instead ...

flag Report DMCA

Goes above and beyond expectations !

Similar Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors