CIS 505 Week 6 Discussions STR

$10

Description

CIS 505 Week 6 Discussions STR

CIS 505 Week 6 Discussion 1

Asynchronous Transfer Mode (ATM) was made for multimedia applications or similar items due to the large bandwidths they carried.  ATM is better suited for applications using real-time transmission of video signals.  If ATM is preferred, a significant overhead is involved in integration into the ATM layers. The fastest ATM products at the moment operate at 622Mbit/s.

Gigabit Ethernet offers routine improvements for prevailing networks without having to change the cables, protocols and applications already in use. Gigabit Ethernet advantage is basically its origin in the proven technology of Ethernet.  Meaning it is fully compatible with existing Ethernet technologies. This means a performance enhancement for existing networks without having to change the cables, protocols and applications already in use. Users can therefore work on the basis that migration from Ethernet to Gigabit Ethernet will be very easy and transparent. Applications that run through Ethernet will also work by Gigabit Ethernet. At 1000Mbit/s, Gigabit Ethernet is almost twice as fast as ATM.  Speeds are seamlessly transmitted at a higher rate.

Compare and contrast the advantages of Fast Ethernet, Gigabit Ethernet, and 10-Gbps Ethernet.

Fast Ethernet carries traffic at a rate of 100Mbit per second.  When Fast Ethernet was upgraded by improving the speed and reducing the bit.

10-Gbps advantage is the speed. It has better hardware and rack space efficiency, simple virtualization, and greater scalability. In standard Ethernet, bit was transmitting in one second and in Fast Ethernet it takes 0.01 microsecond for one bit to transmit.

Gigabit Ethernet is another term of Ethernet in computing network, for carrying on the traffic at the rate of 1billion bits per second. This method is expressed in the IEEE 802.3 standard and is presently being used as the fortitude in many enterprise networks. Gigabit is carried primarily on optical fiber.  Optical fiber is the medium that transmit information when light pulses along a glass or plastic strand or fiber.

Connecting Gigabit Ethernet using the lower speed Ethernet mechanisms is easy because one can use LAN switches or routers to modify one physical line speed to the other. Gigabit Ethernet uses 64 – 1514-byte packets IEEE 802.3 frame format which is found in Ethernet technologies and Fast Ethernet. Changes are not necessary because the frame format and size are the same. This mutative advancement track permits Gigabit Ethernet to be flawlessly joined into current Ethernet and Fast Ethernet networks.

CIS 505 Week 6 Discussion 2

Wireless LAN.  Please respond to the following:

  • Analyze the characteristics of wireless LANs and assess the security concerns of this technology in organizations such as universities or hospitals. Identify additional areas of concern for organizations that implement a wireless LAN. Then, explain whether the implementation of a WAN would solve these problems. Explain your rationale.
  • Rank the following IEEE 802.11 standard addresses in order of importance with the first one being the most important. Justify the reason for your chosen order.
    • Association
    • Re-association
    • Disassociation
    • Authentication

A Wireless LAN performs a malleable data communication system regularly increasing satisfactorily than interchanging a wired LAN within a edifice or college grounds.  WLANs use radio frequency to conduct and obtain data over the air, diminishing the essential for wired correlations.

Wireless safekeeping is vital. Wireless indicators often circulate afar tangible obstacles, the peril of someone struggling to force an entry using the wireless foundation is sophisticated paralleled to someone attaining sensible admittance to a wired port.

Guests and Personnel should be placed on different Wi-Fi networks so that important information cannot fall into the wrong hands. One’s goal to provide sufficient Wi-Fi signal only to the areas where it’s required. If one has Wi-Fi signal that extends outside structure ramparts and out into communal cosmoses, one chances of alluring potential threats from criminals who may try to interrupt one’s network or impede with the wireless signal. Limiting Wi-Fi signal would solve this issue.

Association: Once authentication is complete, mobile devices can associate (register) with an AP/router to gain full access to the network. Association allows the AP/router to record each mobile device so that frames are properly delivered. Association only occurs on wireless infrastructure networks, not in peer-peer mode. A station can only associate with one AP/router at a time.

http://www.intel.com/content/www/us/en/support/network-and-i-o/wireless-networking/000006508.html

Disassociation: A station or access point may invoke the disassociation service to terminate an existing association. This service is a notification; therefore, neither party may refuse termination. Stations should disassociate when leaving the network. An access point, for example, may disassociate all its stations if being removed for maintenance.

http://www.informit.com/articles/article.aspx?p=24411&seqNum=7

Re-association: The re-association service enables a station to change its current state of association. Re-association provides additional functionality to support BSS-transition mobility for associated stations. The re-association service enables a station to change its association from one access point to another. This keeps the distribution system informed of the current mapping between access point and station as the station moves from one BSS to another within an ESS. Re-association also enables changing association attributes of an established association while the station remains associated with the same access point. The mobile station always initiates the association service.

http://www.informit.com/articles/article.aspx?p=24411&seqNum=7

Authentication: 802.11 authentication is the first step in network attachment. 802.11 authentication requires a mobile device (station) to establish its identity with an Access Point (AP) or broadband wireless router. No data encryption or security is available at this stage.

The Institute of Electrical and Electronics Engineers, Inc.(IEEE) 802.11 standard defines two link-level types of authentication:

  • Open System
  • Shared Key

http://www.intel.com/content/www/us/en/support/network-and-i-o/wireless-networking/000006508.html

 

Course Tutor helps in providing the best essay writing service. If you need 100% original papers for CIS 505 Week 6 Discussions STR, then contact us through call or live chat.

CIS 505 Week 6 Discussions STR

Best HLT 490 Professional Capstone Project Full Course
CIS 505 Week 6 Discussions STR

ACCT 553 DeVryBIAM 500 DeVryCIS 500 STRCIS 558 STRENG 105 GCUFIN 390 DeVryFIN 504 GCUHCA 545 GCUHCA 699 GCUHLT 306 GCUHLT 362 GCUHLT 555 GCUHLT 610 GCUHLT 665 GCUHOSP 594 DeVryHRM 600 DeVryMAT 144 GCUMGMT 600MGT 599 STRMGT 655 GCUMKT 373 GCUPSY 362 GCUPSY 565 GCUPSY 575 GCUPSY 665 GCUSOC 102 GCUSOC 320 GCUSOC 372 GCUSOC 412 GCUNSG 6440 SUHIM 515 GCUNSG 4029 SUHIM 615 GCUNSG 3029 SUNSG 4055 SUNSG 6630 SUNSG 6005 SUCRMJ 310PSY 510 GCUCRMJ 300 DevryCRMJ 425SPD 200 GCU, HLT 490 GCU ,ECH 340 GCUECH 440 GCUECH 355 GCUECH 350 GCULDR 461 GCUECH 425 GCUREL 212 STR, ,SCI 115 STR ,CIS 505 STR

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Add to cart