Preview

Nt1310 Unit 4 Lab 1 Essay

Satisfactory Essays
Open Document
Open Document
553 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 4 Lab 1 Essay
Eric Scantlebury
NT1310 Physical Networking
Unit 4 Lab 1: New building – Tools and Wiring
4/8/14

Now that we understand the codes and standards needed to create this building, it’s time to put stuff in it. Our task at hand is to start wiring the building for a new computer science and electrical engineering labs. This building will have a lot of devices that need to be connected to the school campus network and we will need a lot of tools to do it. First off I think since our building is going to be connected to a lot of students I believe that our best choice of cabling to connect to the building will be fiber-optics. This way the students and professors can access whatever they need as fast as possible from any location on campus. On the inside to save money I would run cat5e cables to each individual device. Running fiber-optics to each computer in the computer labs would take a lot of work since fiber is so hard to handle. This will allow them to do all kinds of test involving the network while not being too budget heavy.
…show more content…
This is where we will house our skeletal frame that holds our servers and networking equipment. We will run the horizontal cables to all of the room wall plates. We will leave the patch cables to the person in charge of the room arrangements. If there are multiple floors in the building we will install backbone cables through the risers so we can have another telecommunication room for the other floors. Depending on where the plenum is for the floor we will run the horizontal cables under the floor or on top of the false ceiling. If the plenum is over the false ceiling we will need to install a ladder rack and cable

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The following IP schema is designed to fit the needs of the Warehouse Company. The company has purchased and installed all of the required equipment for the network infrastructure. After consulting with their design team and gathering the required documentation and network designs, we are ready to proceed.…

    • 248 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Assignment

    • 381 Words
    • 2 Pages

    The first type of cable we will talk about is copper cabling. There are three main advantages in using copper cabling: (PoE, less expensive electronics and more flexibility). Power over Ethernet or PoE allows you to power phones, security cameras, Wireless Access Points (WAPs) and many other devices right through the networking…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It331 Unit 5 Essay

    • 593 Words
    • 3 Pages

    1) You have been asked to design a LAN with operation over a distance of about 100m. Compare and contrast twisted pair cable, coaxial cable, fiber-optics, and wireless for this application. You should create a table or flow chart which would facilitate choosing between these options depending on circumstances. The table or flow chart should be submitted as part of your document. You may not submit a separate file…

    • 593 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 5050 Words
    • 21 Pages

    This method is a very effective way of creating and maintaining a functioning multi-user network. It’s cost effective, and in terms of labour and parts required very simple to set up (Apart from the cable management) Another advantage of this type of network is…

    • 5050 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 6 Essay

    • 308 Words
    • 2 Pages

    Multiply the mass of each isotope by its natural abundance, expressed as a decimal, and then add the products.…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1310 Unit 3 Homework

    • 1253 Words
    • 5 Pages

    Q1) What does the shell ordinarily do while a command is executing? What should you do if you do not want to wait for a command to finish before running another command?…

    • 1253 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The line graph is used to describe how an object moves explaining relationship between time and distance traveled.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using the data from your class, create a class histogram based off of who won for each person/group.…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. One SMTP Server security threat is called a brute force attack. This security threat is identified by the way in which the attacker tries to break security. This is done by trying to guess the password through the mail server or other service working on your system using software that will use all possible combinations for the password until it guesses the correct one. (Hampton, 2011)…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Week 1 Assignment

    • 598 Words
    • 3 Pages

    Email might also be an option but the entire staff cannot function efficiently without a password for the computer, it might be better to use the phone.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It is an exception code which is suggestive of Windows registry corruption. 0x80070002 errors can start happening if the Windows registry has corrupted entries. Windows OS and Windows programs will fail to work unless you find a 0x80070002 fix.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3.1 Essay

    • 488 Words
    • 2 Pages

    MITM attacks are difficult to avoid because even if they are occurring you do not often know about them. The best we can do is mitigate the chance of them occurring by making it more difficult for attackers by using cryptographic techniques. This can then be followed up with other techniques to further enhance the secureness and private-ness of our communications. We want to protect against MITM attacks to keep our sensitive data private and avoid any negative implications that releasing this data may…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Existing campus locations should be connected to each other via fiber optic cable. Fiber optic cables are less expensive, there is less signal degrading, Non-flammable, and last but not least extremely lightweight compares to the competitors.…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Copper vs Fiber

    • 299 Words
    • 2 Pages

    So, you can use the fiber to connect from the main hub of the building to each switch on every level and you wouldn’t bend the fiber to its breaking point. Copper can be used to connect the rooms to the switch and you wouldn’t have to worry about having to break a piece of glass to go around or to wrap around a object. Just make sure your cable isn’t touching any florescent lighting or high levels of EMI.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    We installed our project on the virtual box program, through this program we installed the server and the client to withdraw, as we set Windows Server 2008 R2 and Windows 7 for the client, and give each one IP address. The virtual machine designed for one network in Ghantoot Group Company.…

    • 914 Words
    • 4 Pages
    Good Essays