Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

is there any stop by step solution that displays most of the formulas


If a Satellite with a radius of 5.3m transmitted a message at the frequency of 1.3 MHz to the earth station. Determine; 

i.     The wavelength, and time, in the hour of the transmission

ii.    The centrifugal force of the satellite

iii.    The attenuation of the transmission 


Configure the network as follows:




1) Configure ISR g0/0/1 for DHCP




2) Enable NAT to NAT internal network to ISR G0/0/1 interface (PAT)




3) Verify that PCs can ping cisco.com

1) Use COP and LLOP to verify inks.


2) Verify which ports are forwarding and blocking (spanning tree)


3) Optimize spanning tree with Core1 being root for odd VLANs and Core2 the root for even VLANs.


4) Configure Etherchannel on the core switches.


5) Core switches should support layer 3 interVLAN routing:


VLAN 1 = Core 1 = 10.1.1.251/24, Core 2 = 10.1.1.282/24


VLAN 10 © Core 1 = 10.1.10.251/24, Core 2 © 10.1.10,.252/24


VLAN 20 = Core 1 = 10,1.20.251/24, Core 2 = 10.1.20.252/24


VLAN 30 = Core 1 = 10.1.30.251/24, Core 2 = 10.1.30.252/24


VLAN 100 = Core 1 = 10.1.100.251/24, Core 2 = 10.1.100.252/24


6) Access layer switches will only have management P addresses in VLAN 1:

3) Switch 1 = 10.1.1.1/24


Switeh 2 = 10.1.1.2/24


Switch 3 = 10.1.1.3/24


Analyze the condition that can lead to satellite path diversity


Discuss the elements or components of a computer system that an operating system manages.


Discuss the three input-output communication techniques that are used in computer systems.


How do you think organizational structure and business strategy impact information system development and management? Explain your answer

Cite a situation in which you can apply the knowledge of peer-to-peer network and client/server network.


Cybersecurity

Describe a fake login management scenario. Identify several authentication practices. Are passwords becoming obsolete?



LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS