Unit 2 Assignment 2

Satisfactory Essays
Michael Sherman
IS3120 Unit 2 Assignment 2

The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand. A VLAN-enabled Ethernet network will require several devices to operate correctly. First, switches will need to be connected to the network’s assets and be configured to section them off into the correct VLANs. Cabling will be needed to connect the assets to the switches, switches to each other, and the switches to the router. Routers will be required so the VLANs can communicate with each other and be able to communicate outside the network. In just over thirty years, the Ethernet standard has grown exponentially. In 1980, the standard was only 10MB, which is unheard of today. Today, the standard is 100 Gbit, which is a growth of 10,000 times what it once was. The rate of progression is still climbing, with 1 Tbit Ethernet standards being in the works. For a network requiring 100Mbps on 8 computers, I would suggest a 1000Mbps/1Gbit Ethernet standard at a minimum. This would allow all 8 computers to communicate at the same time at 100Mbps with bandwidth left over. It would keep the network from being bogged down by the data transfers that would be required.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 2 Assignment 2

    • 257 Words
    • 2 Pages

    Unit 2 Assignment 2: Microsoft Environment Analysis 1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Unit 2 Assignment 2

    • 711 Words
    • 3 Pages

    BUSINESS ADMINISTRATION LEVEL 2 - TECHNICAL CERTIFICATE Unit 2 – assignment 2 1. Understand how to make and receive calls 2.1 Describe the different features of telephone systems and how to use them.• Call holding- places a caller on hold so you can undergo another duty. This could be to find paperwork, find client/customer details, retrieve information from another member of staff or contact another colleague to divert the call along to. • Call waiting- lets you know when…

    • 711 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    UNIT 2 Assignment 2

    • 1272 Words
    • 6 Pages

    Unit 2 Assignment 2: Computer Basics Review 1. Which of the following terms is the closest synonym to the term computer networking? a. Telecom 2. Ann uses her email address, me@here.com, to send an email to Bob, whose email address is you@there.com. The message contains a few paragraphs of text. Which of the following will be important to the process of making sure that Bob receives this email? b. Bob’s incoming email server 3. According to the chapter, which of the following concepts happens…

    • 1272 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 457 Words
    • 2 Pages

    Unit 2 Assignment 2 Global Limited has the reputation as one of the world’s leading providers of infrastructure information systems, software, and services around the world. Global’s clients range from world-wide enterprises to startup companies across all industry sectors, including financial services, manufacturing, transportation, and public services. Information is an organization’s most valuable asset, yet traditional security practices have either not provided adequate protection of information…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    Unit 2 Assignment 2: Vulnerability of a Cryptosystem 1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 2 Assignment 2

    • 1761 Words
    • 6 Pages

    Unit 2 Assignment 2 1.1 Analyse the role and use of initial and diagnostic assessment in agreeing individual learner goals During my role as a trainer it is important that each new learner has a starting point from where to commence the training. This can be found by the use of initial assessment procedure. Initial assessment is a vital link to the learning process, it is a formal and informal process that identifies each learners starting point. It helps to identify learner’s current levels of…

    • 1761 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 340 Words
    • 2 Pages

    Internet Explorer could allow Information Disclosure. Windows XP 975497 CVE-2009-3103: Vulnerabilities in SMB could allow remote code execution. Windows Vista Service Pack 1 and 2 98343 CVE-2010-0817: Vulnerability in SharePoint could allow elevation of privilege. Microsoft SharePoint Version 2.0 2. Only two from the five listed in question one are privileged elevation. 2264072 CVE-210-1886 and 98343 CVE-210-0817. They are of importance but not considered a high priority issue.…

    • 340 Words
    • 2 Pages
    Powerful Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 1463 Words
    • 6 Pages

    An access control policy should be established, documented and periodically reviewed, based on business needs and external requirements. Access control policy and associated controls should take account of: - Security issues for particular data systems and information processing facilities, given business needs, anticipated threats and vulnerabilities; - Security issues for particular types of data, given business needs, anticipated threats and vulnerabilities; - Relevant legislative, regulatory…

    • 1463 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    unit 2 assignment 2

    • 506 Words
    • 3 Pages

    Active Directory integrated zones must be hosted by Domain Controllers (DCs), and all Active Directory integrated zones are primary zones. Given this, we’re really talking about where to place Domain Controllers servicing the additional role of DNS server. Determining where to place DCs/DNS servers isn’t always straight-forward. However, as a rule of thumb, I take the view that any branch location that’s going to be utilize Active Directory services (authentication, file services, etc), benefits…

    • 506 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 2 assignment

    • 15807 Words
    • 77 Pages

    NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes…

    • 15807 Words
    • 77 Pages
    Satisfactory Essays