1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frozen [14]
4 years ago
3

Design an Ethernet network to connect as a single client PC to a single server. Both the client and the server will connect to t

heir workgroup switches via UTP. The two devices are 900 meters apart. They need to communicate at 800 Mbps. Your design will specify the locations of any switches and the transmission link between the switches.

Computers and Technology
2 answers:
fomenos4 years ago
3 0

Answer:

We would need 3 switches to connect a single client PC to a single server.

  • Connect server to switch 1        (225 m)
  • Connect switch 1 to switch 2     (225 m)
  • Connect switch 2 to switch 3    (225 m)
  • Connect switch 3 to client PC   (225 m)

Explanation:

The maximum distance for ethernet connection is approximately 100 meters for transmission speeds up to 1000 Mbps but the distance may be increased if we add network switches between the client PC and the server.

After the addition of network switches, the distance may be increased up to 200 meters plus 10 to 30 meters more without any substantial decrease in transmission speed.

So we have 900 meters of distance between the client PC and the server.

The Ethernet network may be designed as below:

  • Connect server to switch 1        (225 m)
  • Connect switch 1 to switch 2     (225 m)
  • Connect switch 2 to switch 3    (225 m)
  • Connect switch 3 to client PC   (225 m)

Total distance covered = 225 + 225 + 225 + 225

Total distance covered = 900 meters

Therefore, we would need 3 switches to connect a single client PC to a single server.

The layout of the design is illustrated in the attached diagram.

Sergio039 [100]4 years ago
3 0

Answer:

hi

Explanation:

You might be interested in
Draw the flowchart to calculate the area of the rectangle 50m length and width 30m.​
marta [7]

Answer:

---- ----

Explanation:

1) Start

2) Rectangle: Read Length and Width.

3) Calculate

4) Print (Calculate)

8 0
3 years ago
PLEASE HURRY!!<br> Look at the image below
djverab [1.8K]

Answer:

The function usernameMaker.

Explanation:

strFirst is a local variable in the function usernameMaker since it is an argument that is passed into that function. This means that the scope of strFirst is the function usernameMaker, since it cannot be accessed anywhere else in the code.

Hope this helps :)

8 0
3 years ago
Ideally, Internet of Things (IoT) devices have the ability to:
Stella [2.4K]

Answer:

I believe the answer would be D

8 0
3 years ago
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
What type of Windows server has Active Directory installed and is responsible for allowing client computers access to domain res
Basile [38]

Answer:

Domain controller                    

Explanation:

  • A domain controllers is a server which acknowledges authentication requests and validates users access on the computer network in order to use the resources.
  • This is done by the domain controller by verifying the username and password.
  • It also allows user to access the other domain and also access the resources of other domain.
  • For example there is a network of multiple computers and each computer requires authentication i.e user is asked to provide the username and password.
  • Authenticating every computer and managing is not easy so a computer is appointed this task of authentication other computers.
  • This computer  is called domain controller which can easily maintain these authentication details of the users.
  • The authentication information (login details) of users, computers and shared resources is saved in Active Directory database.
  • If a user requests access to the resource via login then the login details (username and password) of the user should match with that stored in the Active Directory in order to grant access to the user.
  • Domain controller enables resources sharing and is good for large networks and provides with improved security.
4 0
3 years ago
Other questions:
  • What is a organisation in office technology
    7·1 answer
  • ASAP
    12·1 answer
  • These are the characteristics of good blogs.
    11·1 answer
  • A university wants to install a client-server network. Which feature do you think is important for them as they set up the netwo
    7·1 answer
  • What is the Code of Conduct/Ethics for the company/of Department of Defense?
    7·1 answer
  • Which of the following office online apps is most effective for creating multi media presentation
    10·2 answers
  • Identify the four basic categories of hardware in a microcomputer system. system unit, modem, ram, and microprocessor system uni
    5·1 answer
  • "In about 100 words, describe the idea behind software as a service (SaaS). In your answer, include at least three examples of e
    10·1 answer
  • Which two men developed the steam engine?
    8·1 answer
  • REM Its an exam program
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!