Assignment 1

335 words - 2 pages

The copper phone wire has very limited bandwidth. It was designed to provide 3,000Hz bandwidth, perfectly adequate for a voice signal. Fiber links offer over 1,000 times more bandwidth capacity and can be carried over 100 times the distance than copper can.
The chart pictured here shows the specific advantages Fiber has over copper wiring in regards to bandwidth and distance.

When it comes to LANs or premises cabling, a lot of controversy, a lot of "positioning" and a ...view middle of the document...

The wire most use for LANs is a lot younger than fiber optics. Fiber use is over 20 years old, but computer networks on unshielded-twisted-pair cable (UTP) have only been around about 15 years. In that time, UTP has gone through at least 5 generations, each time to keep up with the incrementing bandwidth requisites of LANs; the ever evolving technology of LAN wire is hardly the “telephone wire” that the majority think of it as.

Below is a chart showing the LANs growth in capacity
LAN | Bandwidth |
Ethernet | 10 Mb/s |
FDDI | 100 Mb/s |
Fast Ethernet | 100 Mb/s |
ATM | 55, 155 Mb/s |
Gigabit Ethernet | 1,000 Mb/s (1 gigabit/s) |
10 Gigabit Ethernet | 10 Gb/s |

But still, even with all the efforts that copper cabling manufactures have made to stay relevant in todays LAN structuring, installation is a problem that most face if one needs the maximum performance offered.
A number of magazine articles and even a representative of AMP have been recently quoted as saying that as much as 80-90% of all Cat 5 cabling was improperly installed and would not provide the rated performance. Contractors have been quoted as saying that 40% of their Cat 6 installations pass certification tests. It seems that copper cabling used in LAN is preferred when used in the short distance, and is ideal for wiring a LAN’s...

Other Papers Like Assignment 1

Eco100 Assignment 1

919 words - 4 pages Strayer University Professor Page ECO100 Assignment 1 Alcohol abuse is a major problem in today’s society. With a down an economy, there are more and more people turning to alcohol while actually helping the local package store to thrive. Economist may see it differently. They may see it as a way; first they will “Use Assumptions to Simplify”. (O'Sullivan, A., Sheffrin, S. M., & Perez, S. J. (2012)) Why are these people drinking? Is it

Week 1 Homework Assignment

829 words - 4 pages Will Davis July 13, 2014 Week 1 Homework Assignment Which economic system is best suited for handling a crisis of epic proportions (hurricane, flood, blizzard, forest fire, etc.)? Why? NIMS (National Incidence Management System) also known as FEMA. When there is a natural disaster, emergency crews (fire department, ambulance, police etc.) is usually the first help on the scene to help people out. Socialism system offers the best solution for

Bus 508 Assignment 1

2258 words - 10 pages ASSIGNMENT 1 ENTREPRENEURIAL LEADERSHIP Submitted by Joachim Carvelle to PROFESSOR DELONTE October 23, 2011 BUS 508 ENTREPRENEURIAL LEADERSHIP The spectrum of entrepreneurial approaches reflects a combination of profit-oriented and social responsibility-oriented perspectives. At one end is the approach where the profit motive eclipses social responsibility, for example Steve Jobs of Apple, Inc. At the other end is the approach

Sec 320 Week 1 Assignment

619 words - 3 pages Week 1 assignment 1) Threat, risk, hazard, and peril all fall under the same category but have different meanings. A threat is an intention of causing harm. A risk is a situation with possible danger. A hazard is danger or risk itself. Peril is severe and abrupt danger. I will build a scenario to show the use of these words in proper context. A military network does not have a physical firewall nor a software based antivirus. The threat is

Unit 2. Assignment 1. Dhcp Troubleshooting

287 words - 2 pages Unit 2. Assignment 1. DHCP Troubleshooting Dear Junior Admin: My first question would be what have you done to this point about the issue? What OS are the computers running that have not picked up the new DHCP scope? Start by checking the DHCP setting and configurations are they all correctly configured? Try renewing the IP addresses on the workstations that have not picked up the scope it maybe do to the IP lease agreement. The

Unit 3. Assignment 1. Network Topology Paper

396 words - 2 pages Unit 3. Assignment 1. Network Topology Paper Hierarchical layout defines how the network topology is structured physically and logically. In physical topology all devices and components are placed in various locations depending on the layout. Logical topology is the flow of data throughout the layout. There are many variations of network topologies that can be implemented. The most common network topologies are star, bus, and ring. Star

Mhe 512 Module 1 Case Assignment

1972 words - 8 pages Trident University Module #1 – Case Assignment MHE 512 – Disaster Relief Objectives:  For this case you are discuss the response by government, NGOs and volunteer groups to Hurricane Katrina. The question for you to answer is whether or not the organizational structure for disaster response for the City of New Orleans, State of Louisiana, and FEMA was adequate to effectively respond to a Cat. 3 - 5 hurricane on August 26th, 2005. As you

Assignment 1

942 words - 4 pages Academic Help 1. WHAT ARE THE 6 MATH LABS AVAILABLE FOR STUDY IN THE CENTER FOR MATHEMATICS EXCELLENCE? HINT. CLICK THE RUNNING START LINK AND LOOK UNDER OTHER MATH CONTENT. a. Self Assessment b. ALEKS Math Refresher c. Pre-Algebra Review d. Algebra 1 e. Algebra 2 f. Introduction to Statistics 2. Which three reviewing services are available to students through the Center for Writing Excellence? a. Write Point b. CWE

Assignment 1

1183 words - 5 pages Question #1: It is believed that Danle’s decision to omit disclosure relating to the class-action litigation was not appropriate for the fiscal year ended December 31, 2009. This conclusion was reached because both litigations were determined to not be “probable” and thus need not be accrued for (as required by ASC 450-20-25-2), yet Danle’s legal counsel concluded that the litigation could “potentially but not probably” cause a future loss. The

Assignment 1

1134 words - 5 pages Hershey’s Sweet Mission-Performance Management System Recommend the redesign of Hershey’s performance management system to appeal to the diverse groups that it employs. The redesign of Hershey’s performance management system is set up to look at employee’s skill sets on specific projects for the organization. This redesign is an effort, in which the people of the company set goals and track the progress of projects which would measure

Assignment 1 - 1064 words

1064 words - 5 pages outlined on the UN website under Agenda 21 (Bayer 2010). The recommendations are: 1. Improve technologies to reduce or eliminate stockpiles of toxic, dangerous and unstable substances. a. Environmental risks are reduced, due to the reduction of volatile substances. b. Workers face fewer occupational hazards. c. The concerns of communities and special interest groups are reduced. Bayer has paid heed to lessons learnt in the past (see

Related Essays

Unit 1 Assignment 1

272 words - 2 pages Tina Nunez NT1330 Unit 1. Assignment 1 Windows 2008 Network Services Domain name system (DNS) is a naming service used on any device that can connect to the internet. It translates fully qualified domain names of websites into IP addresses for the device. There are DNS records such as address (A, AAAA) records, name server (NS) records and mail exchanger (MX) records stored in the DNS server. Regardless of how many hosts, the DNS is a

Week 1 Assignment 1

1019 words - 5 pages Week 1 Assignment 1 Michael Conley ITT Technical Institute Abstract This paper will be identifying, analyzing, and explaining five likely threat/vulnerabilities for the scenario given. I will go into detail on what you should do to lower the risk or vulnerability. The last thing I will talk about in this paper is what you should do to try and make it better and more secure

Is3230 Unit 1 Assignment 1

642 words - 3 pages ITT TECHNICAL INSITITUTE Access Security / IS3230T Unit 1 Assignment 1.1 Identification, Authentication, and Authorization Techniques. Access Security / IS3230T There are numerous techniques that the Information Technology industry can use in order to substantiate an entities identity, have the ability to authenticate that entity and provide the appropriate authorization for that entity to have access to a

Unit 3 Assignment 1

731 words - 3 pages Short Answer: 1. What two things must you normally specify in a variable declaration? a. variable type b. identifier i. int n; // type - int, identifier - n 2. What value is stored in uninitialized variables? c. is a variable that is declared but is not set to a definite known value before it is used. Algorithm Workbench Review: 3. Write assignment statements that perform the following operations with