Preview

Benefits of Twisted Pair Cable

Satisfactory Essays
Open Document
Open Document
703 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Benefits of Twisted Pair Cable
The Benefits of Twisted Pair Cabling
Brian Pettrie
Prof. Ntinglet-Davis
CIS175
July 29, 2013

Benefits of Twisted Pair Cable The first change I would suggest would be to setup a client/server network in which all 20 computers are connected to the main the computer. In this case, we would add another computer to use as the main workstation and central server so we would actually have 21 computers. We could just connect them all with cat 5 cables since there are only 20 clients but if the company could afford it, I would advise them to go with fiber optic cables to reduce noise and interference from the outside. It is important to move away from the peer to peer network that Ocper, Inc. currently has to a centrally controlled network. This will provide more security and better efficiency. Peer to Peer networks are just not secure enough. It would only take one dishonest employee or one employee having a bad day to try to sabotage a coworker’s computer. Although peer to peer networks are a good starting point for small businesses, the security risk makes them a hazard. Each user is responsible for controlling their own data, resources, and login information. Any user can upload a virus disguised as an .mp3, .avi, or any other type of file. With me being the network administrator, I can keep a list of the files that are being distributed across the network and make sure there is nothing fishy going on. This will also benefit the company if and when it grows or even doubles in size as the President predicts. Switching over to Ethernet cabling would also be less expensive and more flexible than the existing coaxial cables and they offer more noise resistance. I can run the cables in the ceiling or between the computers so that they do not get stepped on or rolled over by the chairs. I will also need to put in a router or a hub to connect the client computers to the main network computer. I may use 2 routers or hubs and connect 10



References: (2009). ePanorama.net. Twisted pair cables. Retrieved from http://www.epanorama.net/documents/wiring/twistedpair.html Alexander, D. (2013). Reference.com. Advantages Disadvantages of Twisted Pair Cable. Retrieved from http://www.reference.com/motif/science/advantages-disadvantages-of-twisted-pair-cable Higbie, C. (2013). SearchNetworking. Comparisons of coaxial cable, fiber optic cable and twisted pair cable. Retrieved from http://searchnetworking.techtarget.com/tip/Comparisons-of-coaxial-cable-fiber-optic-cable-and-twisted-pair-cable

You May Also Find These Documents Helpful

  • Satisfactory Essays

    iLab Week4

    • 563 Words
    • 2 Pages

    network on the second floor with 15 computers to start, but would like to explore further…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Links to downloadable files and media could be replaced with malicious code and hackers could gain access and monitor activity within the company.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It240 Week 3

    • 370 Words
    • 2 Pages

    To solve the shared bandwidth problem with the company network new equipment is necessary. First off the 10mbps Ethernet hub should be replaced with a 100mbps, due to its better performance. An extended star topology with a logical switch topology will be the best setup for the situation. As for the five new computers a wireless approach will be best. For this method each new addition will need to be equipped with a wireless NIC (network interface card). To connect these to the network a wireless router and a wireless access point will also be needed.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Assignment

    • 381 Words
    • 2 Pages

    In this paper we will discuss two different cabling solutions (copper & fiber), and in what situations you would choose one over the other. One might be better for one type of application while the other might be a better fit, depending on the situation. They each have their own advantages which we will discuss in the following paragraphs.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Lab 7

    • 346 Words
    • 2 Pages

    Coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable.…

    • 346 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 220 Lab 9.1

    • 426 Words
    • 2 Pages

    38. What type of networking cables would you use in a new building? Discuss the issues related to your selection.…

    • 426 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Week 3 Ilab

    • 827 Words
    • 3 Pages

    2. Will the current horizontal cabling suffice for the new network? If it will not, what type of cable should be used for the horizontal cabling? Provide detailed specifications for this cable. (10 points) I believe that it works with the current cabling, but if we wanted the network smoothly, I would use a Category 6 network cable. The DHCP, or a Dynamic Host Configuration Protocol cable, is a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers configured for a given network. It assigns an IP address whenever a system is started.…

    • 827 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    First and foremost all files need to be encrypted and password protected. The Playstation Network was taken down easily because routers were left unprotected and the data belonging to users was not encrypted. Everything needs to be locked down digitally. Riordan conducts business in many places and hackers are everywhere. Finance and accounting use outdated systems and manually enter information. Integration of the systems through a secure pipeline will decrease the security risks but the files still need to be encrypted to secure ensure that all security holes are no longer open.…

    • 893 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In the scenario presented for this assignment, four logical divisions exist for the company’s network: operations, engineering, marketing, and the call center. The company is expanding and needs to shuffle people off their home floors and onto other floors and even into other locations. By segregating the company network into four broadcast domains, the network administrator can prevent the network from becoming flooded with traffic so that bandwidth is not…

    • 750 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT 240 Week 1

    • 317 Words
    • 1 Page

    1) The type of network I would use in this particular situation. I would first start off with recommending a high speed broadband provider such as in my area Either EPB or Comcast for connectivity. I would also start with a wireless router to allow wireless connectivity at the office itself. Depending on the type of business and what they would do production wise I would also recommend a VPN to allow offsite business with access to the files based off of needs of the individual employee. For this business a simple LAN would suffice their needs with simple usage. I would build the Client/Server network for this company. I would also recommend Windows 7 for the office computers. This would allow each user to have their own set of permissions with higher level employees having for instance editing access to certain documents pertinent to their job.…

    • 317 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    I would suggest installing a Local Area Network, which will supply networking capabilities to computers in the company. The set up for installation requires a modem and wireless routers to be able to connect all computers to the internet, using Ethernet cables or wireless card connections will allow all computers access to the internet via a broadband connection. Each computer or client will be able to access all necessary information on the network this can be achieved by utilizing file sharing will allowing that company to dictate who has access to what information on the network. I would also suggest printer sharing, which will allow the company to dictate who has access to the printer. I would also utilize TCP/IP Protocols; which are the rules that allow computers to connect to one another and that enable computers and peripheral devices to exchange information.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    By performing the actions required to facilitate this network, many users now have trusted access to certain files and documents within their team or company, so they may work together and the managers and executives can keep track of the work as…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mini-Case 1

    • 869 Words
    • 4 Pages

    Let’s start at the user end. This is commonly called the access layer in network design. Since we are concerned with low error rate and high reliability, we need to use an infrastructure that will negate as many common sources of errors as possible. I recommend using 1 Gbps multimode fiber over Cat 6 STP or UTP. The fiber will negate several common sources of cabling errors. Impulse noise which is the most common source, cross-talk, and white noise will all be significantly reduced. Attenuation is also less of a concern due to the fact that fiber allows for longer runs with amplification. Fiber in my opinion also removes some common user and hardware errors that can arise when using twisted pair cabling. Poor connections can cause circuit echo and circuit outages. With twisted pair these are sometimes hard to find…

    • 869 Words
    • 4 Pages
    Good Essays
  • Better Essays

    1. Viruses. "A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet)." (Symantec, 2013). Due to the shear frequency of virus attacks, we shall list them number one. According to a Department of Trade and Industry (DTI) survey, 72% of all companies received infected e-mails or files last year and for larger companies this rose to 83% (Vernon, 2004). The potential impact of the network becoming infected with a virus could be devastating. File destruction, file corruption, disabling user programs, loss of critical data and overloading the network are just a few of the potential impacts of a virus. Viruses can be introduced in to the network in many ways. Employees downloading /using unauthorized programs, opening and executing infected email attachments, bringing infected files from home on a thumb drive or CD, accessing the network with their smart phone,…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Everyone would interfere with the local IT network in one way or another, therefore the IT group has to remain vigilant and ensure changes, whether how minor is it, is tracked.…

    • 557 Words
    • 3 Pages
    Good Essays

Related Topics