Free Essay

Is3120

In:

Submitted By J3ss1ca
Words 461
Pages 2
* What impact will the continued evolution of the Ethernet standard have on data storage requirements, assuming capacity continues to follow the same pattern of progress?
Bandwidth will soon far exceed capacity * What network devices will be required for the configuration of a VLAN-enabled Ethernet network?
Gigabit switches * What statement can be made about the rate of progression in data transfer capacity in Ethernet standards?
Speeds mostly have to do with how much one is willing to pay for faster data connection. The deciding factor is how important is the data from which is needed to be collected. Slower standards are just as good as faster ones depending on of course, the capacity in which it is collected and infrastructure· * If an organization decides to implement a medical imagery repository for radiological reviews, requiring 100Mbps connectivity for eight workstations operating at the same time, what is the minimum Ethernet standard to implement? Briefly explain the reasons behind your selection.
Although fast ethernet 100Mbps would be sufficient, 1000Base-T would be better recommended for future growth. Ethernet has been the standard for networking for over 40 years. Future still looks promising with standard speeds of over 1Tbit on the horizon.

Evolution of ethernet: * 1973 While Robert Metcalfe worked for xerox, he was asked to come up with linking hundreds of computer to laser printers. Came up with Ethernet at 3Mbps over shared coaxial cable. * 1979 He left xerox and founded 3 com and with that evolves the standard to 10Mbps * 1986 10Base5 Ethernet is published as a standard by IEEE aka thick ethernet. * 1989 Kaplan created first ethernet switch * 1991 10Bast-T over Cat-3 twisted pair cabling is approved by IEEE * 1994 Fiber 10Base-F is approved by IEEE * 1995 Fast ethernet at 100Mbps becomes the standard * 1998 Gigabit at 1000Bast-T becomes the standard * 2002 10Gigabit ethernet becomes available * 2015 40/1000

With the ever-growing speed of which devices requiring connectivity, standards and hardware are always evolving to keep up with demand. Here is what is current and the plans for the near future of ethernet.

While Cat5e can run Gigabit speeds up to 100M in length and Cat6 can run 10GBase-T up to 100M, Multi-mode fiber can run 100G speeds over 125m making it the highest available medium today.
FCoE is now reducing the amount of cabling to hosts.
Open flow now allows routing and switching protocols to a network mainly for virtual machines.

"For 2015, we expect the bandwidth that needs to be supported to be 10 times what it was in 2010, and in 2020, 100 times what it was in 2010," said John D'Ambrosia, chair of new Higher-Speed Ethernet Consensus group that will lay the groundwork for the actual standard.

Similar Documents

Premium Essay

Is3120

...Examining Ethernet Changes through the Years ITT Technical institute, CA: IS3120 9/29/2014 The Ethernet and IEEE 802.3 CSMA/ CD LAN technologies are the most popular LAN technology in the world today. Inspired by the ALOHAnet paper written by Norman Abramson is entitled “The Aloha System – Another Alternative for Computer Communications.” It described the development of an innovative radio-based network of computers that came to be known as ALOHAnet. In 1973, Robert (Bob) Metcalfe was a recent Harvard Ph.D. graduate working at Xerox's Palo Alto Research Center (PARC). During a visit with a friend he had came across the article he was inspired to collaborate with David R. Boggs and they put they had put there thought together. So using an IBM Selectric Typewriter with an Orator ball, Metcalfe typed a memo and sketched a quick schematic that would forever change both networking and the world at large. Then the Ethernet was born on May 22, 1973. The Ethernet was actually introduced to the commercial marketplace in 1980 was distinguished by its high speed (10 Mbps). During the 1980s to the 1990s Ethernet LANs dominated due to the ease of implementation and migrations for the LANS base on the 10, 100, and 1000BaseT LAN Standards. The Ethernet LAN technology had solved business challenges and the connectivity of business challenges. By doing this the cost was lower the early introduction of the token ring. Some of the business challenges were: * The need to connect to...

Words: 495 - Pages: 2

Premium Essay

Is3120

...Introduction Course: IS3120 Week: 1 Lab: Understanding Cisco hardware The Understanding Cisco hardware lab provides you with the instructions and Cisco hardware to develop your hands on skills in understanding the output of various show commands to discover the hardware and software capabilities of a Cisco device. This lab includes the following exercises: 1) Understanding Cisco switch hardware 2) Understanding Cisco router hardware Notes As you perform the various steps of the lab, update your lab report. You will send the lab report to your online instructor for evaluation after you quit the lab. Submit the following screenshots to your online instructor for evaluation: 1) A screenshot of the output from the show version command on NYACCESS1 2) A screenshot of the show version output on NYWAN1 showing how many serial interfaces this router has These screenshots map to the evaluation criteria. Therefore, submit all screenshots to get the points assigned to all evaluation criteria. Lab Diagram During your session you will have access to the following lab configuration. Depending on the exercises you may or may not use all of the devices, but they are shown here in the layout to get an overall understanding of the topology of the lab. Internet ISP1 172.14.0.3/24 ISP2 172.14.0.4/24 172.14.0.0/24 Fas0/1 Fas0/1 Fas0/0 Fas0/0 Frame-Relay WAN NYEDGE1 Cisco 2811 Router LDNWAN1 Fas0/1 172.16.16.0/24 Fas1/0/2 Fas1/0/12 ...

Words: 3375 - Pages: 14

Free Essay

Is3120

...Instructions: Research all of the concepts below, answer the following questions, and then respond to the questions about the configurations on pages 2 and 3. Research the following concepts: • Area border router (ABR) • Autonomous system boundary router (ASBR) • Designated router (DR ) • Backup designated router (BDR) Answer the following questions: 1. When would you use an ABR as opposed to an ASBR? The time I would use ABR as opposed to ASBR is when I want to connect one or more OSPF areas to the backbone of the Network 2. What are the effects of using two OSPF processes? The effects of using two OSPF process would be you having absolute control over what prefixes are advertised between the two OSPF processes 3. What is the difference between a DR as opposed to BDR? DR and Bdr concept work in broadcast multi access network. It reduces Lsa flooding within broadcast domain by electing one DR and Bdr to which other routers in broadcast domain Form adjacency. So that only Dr and BDR have full adjacency That means full link state database. 4. How does the election process work? a network with 3 OSPF routers on a Fast Ethernet network. They are connected to the same switch (multi-access network) so there will be a DR/BDR election. OSPF has been configure so all routers have become OSPF neighbors, Instructions: a is ABSR B is ABR...

Words: 324 - Pages: 2

Premium Essay

Is3120 Final Project

...IS3120 Final Project: Network Design Proposal NCIF is an industry leading research and development firm consisting of eight (8) regional offices in seven (7) countries, including the United States, Germany, Africa, India, Australia, Brazil, and China, with eleven(11) district or branch offices, consisting of 225,000 employs worldwide. NCIF resides in Hopkinton, MA (USA). NCIF’s network has been designed in adherence with the latest IEEE 802 series of standards. In keeping with these standards NCIF has installed and configured a Local Area Network (LAN) using the IEEE 802.3 Series of standards and a Wireless LAN (WLAN) using the IEEE 802.11 Series of standards. NCIF’s network architecture consists of a client-server configured Local Area Network (LAN) based on a Gigabit Ethernet Star Topology or 1000 Base-X IEEE 802.3 Standard with Carrier Sense Multiple Access/Collision Detection (CSMA/CD) and a Storage Area Network (SAN), using Category 5e cabling –tested in accordance with ANSI/TIA/EIA-568-B specifications for 1000Mb/s data transfer rates. In order to anticipate future growth and keep network traffic to a minimum, NCIF has configured, one Class B network sub classed into several smaller networks based on department/job function at each regional and remote site – implementing the dynamic host configuration protocol (DHCP) in order to assign each terminal a unique IP Address – separating each department into Zones or Segments designed to mitigate risk management...

Words: 363 - Pages: 2

Premium Essay

Is3120 Unitt 1 Assignment

...Joshua Malone IS3120 Unit 1 Assignment 1 When it comes to the Johnson Company they are behind in the aspect of customer service relationship. They are only getting customer orders through telephone calls and by taking customer orders by hand. In these days and times not many companies and businesses can start and continue to operate regularly with just these practices. To help this company they should try to implement networking and other electronic means such as a website and monitoring what customers are interested in. By doing these practices they reach out to new customers in many ways. The first and most important way is that it broadcasts to new and potential customers products that they may potentially want to purchase. It also brings in new customers that usually do most of their purchasing of items through the internet. Lastly it gives new customers an awakening to the fact that the business is here. By implementing these means Johnson would stand out from other companies in many aspects of the business world. First and foremost it would get them more customers who mainly search the internet for their goods. Secondly it would help beat out other companies and businesses that only sell products through face to face interaction. Finally it increases their professionalism by showing they can do face to face and online transactions. Finally these methods would meet customers updated and informed and also meet the customer’s needs by what the methods can provide...

Words: 329 - Pages: 2

Free Essay

Is3120 Study Guide

...1. Real time Communications Page 11 which one does not belong 2. Customer service challenges Page 12 which one does not belong 3. Storing forward send it to stores then sends it to your email. Page 16 4. Common operations challenges for enterprise. Page 27. Small business challenges Pages 46-47. SOHO Page 48. 5. Network topology describes one Page 61. 6. Which field appears in an Ethernet frame that’s not in an IEEE frame is Type. Page 97 7. Session Initiation Protocol which supports real time. Page 77 Type of switching, know cut through switching 8. Collision is two network devices that send a packet at the same time. 9. Routing protocols layer 4 tcp/ip, payer 3 ip, and layer 2 is ppp 10. Know the ARP protocol 11. Know the private IP address 10 and anything. telnet ports 23 and ssh is 22.. CIDR notation pages 140 -145. 12. Know the difference between A, B, G & N. 13. know the speeds. What is the difference between G & B is the OSDM. Page 159 14. Chart on Page 170 15. WLAN design. Page 183 16. Layer 2 network backbone. Know the differences 17. Remove the router and connect both switches together 18. Read page chapter 8 starting on page 215 19. Page 307 20. Page 307 21. What is the criteria a router uses. Routing Metric page 317-318 22. 23. Routing protocols page 311, routed protocols are IP, IP apple talk, SAP, SAMP a. RIP protocol distance vector, exchanges its...

Words: 410 - Pages: 2

Free Essay

Is3120 Lab 4

...Seattle default gateway subnet mask slash notation G0/0 172.19.8.1 255.255.255.0 /24 G0/1 172.19.20.1 255.255.255.0/ 24 Serial 0/0/0 172.18.0.2 255.255.255.252/30 Serial 0/1/0 172.19.0.1 255.255.255.252/30 West Covina G0/0 -172.20.8.1 255.255.255.0/24 G 0/1- 172.20.20.1 255.255.255.0/24 Serial 0/0/0 172.19.0.2 255.255.255.252/30 Serial 0/1/0 -172.20.1.1 255.255.255.252/30 TAMPA G0/0 172.17.8.1 255.255.255.0/24 G0/1 172.17.20.1 255.255.255.0/24 SERIAL0/0/0 172.16.0.2 255.255.255.252/30 SERIAL 0/1/0 172.17.0.1 255.255.255.252/30 INDY G0/0 172.18.8.1 255.255.255.0/24 G0/1 172.18.20.1 255.255.255.0/24 SERIAL 0/0/0 172.17.0.2 255.255.255.252/30 SERIAL 0/1/0 172.18.0.1 255.255.255.252/30 NORFOLK G0/0172.16.8.1 255.255.255.0/24 G0/1 172.16.20.1 255.255.255.0/24 Serial0/0/0 172.20.0.2 255.255.255.252/30 Serial0/1/0 172.16.0.1 255.255.255.252/30 LAN switch 2 255.255.255.252/30 VLAN101 172.16.20.5 255.255.255.0/24 LAN switch 2 VLAN100 172.16.8.5 255.255.255.0/24 ASA_Instructor 172.31.0.100 172.31.0.1 255.255.255.0/24 ASA_Student 172.31.0.9 172.31.0.1...

Words: 308 - Pages: 2

Premium Essay

Lab 1 Is3120

...Lab 1 Assessment Questions 1. What Cisco “show” command displays various information and details about the router or switch such as Model #, flash memory, RAM, IOS version and physical interfaces? a. Show version 2. During the Instructor’s TELNET session to LAN Switch 1 and LAN Switch 2, - What was the captured terminal password for LAN Switch 1 and LAN Switch 2? b. Cisco 3. What is the size of the IOS file used for the Cisco 28xx Routers? c. 239Kb 4. What is the command used to enter the global configuration mode for interfaces on a Cisco Router or Switch? d. Router >enable 5. The default hexadecimal value of the configuration register setting for the Cisco 28xx Router is? e. 0x2102 6. What are the specific settings for the configuration hexadecimal value 0x2102? f. ignores break g. boots into ROM if initial boot fails h. 9600 console baud rate default value for most platforms 7. What is the key sequence used to interrupt the boot sequence for the router and initiate the password recovery sequence? i. Pause/break key on the keyboard 8. Using the password recovery process how can you break the router boot sequence to see the router saved passwords and what can you do in that mode? j. Ctrl – C to skip to the initial setup procedure to view, change and delete passwords 9. What is the command used to back up the running-config file to TFTP? k. “copy running – config...

Words: 279 - Pages: 2

Premium Essay

Is3120 Unit 2 Assignment2

...Data storage center centers will benefit greatly from the continued evolution of Ethernet. We saw in the past and present how Ethernet protocols enabled faster transmissions of data. How Xerox was able to network thousands of computers to a common printer. We even seen the benefit of collision management introduced in 1971. Data centers will improve the security of the cloud making it more cost effective to have virtual/roaming desktops. This will better enable companies to spend less on sky-scrapers by having most employees work from home. The hold back will be the telecom industry commonly referred to as ISP (internet service providers). Most of these companies have hesitated on the implementation of Gigabit connections due to the current high cost. VLAN-enabled Ethernet networks require switches and routers. The switches connect the users in a specific geographical area together and to a common connection to routers, one being for traffic and the other being a dedicated firewall. VLANs enable corporations to “hide in plane site” over the internet while still having the benefit of mobility like VPNs. Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers...

Words: 331 - Pages: 2

Premium Essay

Is3120 Unit 2 Assignment 2

...Data storage center centers will benefit greatly from the continued evolution of Ethernet. We saw in the past and present how Ethernet protocols enabled faster transmissions of data. How Xerox was able to network thousands of computers to a common printer. We even seen the benefit of collision management introduced in 1971. Data centers will improve the security of the cloud making it more cost effective to have virtual/roaming desktops. This will better enable companies to spend less on sky-scrapers by having most employees work from home. The hold back will be the telecom industry commonly referred to as ISP (internet service providers). Most of these companies have hesitated on the implementation of Gigabit connections due to the current high cost. VLAN-enabled Ethernet networks require switches and routers. The switches connect the users in a specific geographical area together and to a common connection to routers, one being for traffic and the other being a dedicated firewall. VLANs enable corporations to “hide in plane site” over the internet while still having the benefit of mobility like VPNs. Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers...

Words: 402 - Pages: 2

Free Essay

Is3120 Unit 2 Assignment 2 - Evolution of Ethernet

...Evolution of Ethernet Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet. Cat5e, Cat5 and CAT6 are the most recent Ethernet Evolution; they are the standard and most easily affordable for companies to use. The ease of installment is also a big factor when using CAT cables, twisting and lining up the end connectors is all that is required. The biggest issue with using CAT is that in starts to lose signal after 100 meters, it needs to be sent through a repeater, or a switch to regain signal strength. For the cost, performance and ease of installation the CAT5e is the best medium for a LAN. The next steps ethnet will be taking will be to increases speed and security. An organization using medical equipment or financial information has to consider what security protocols and policies it would use. Using Category 6 twisted pair cabling. These cables are hardier versions of Cat5E and are covered in a shielding that prevents them from being compromised by electrical...

Words: 302 - Pages: 2

Free Essay

This Will Worj

...Michael Bowden IS3120 Unit 2 assignment 2 Speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet. Cat5e, Cat5 and CAT6 are the most recent Ethernet Evolution; they are the standard and most easily affordable for companies to use. The ease of installment is also a big factor when using CAT cables, twisting and lining up the end connectors is all that is required. The biggest issue with using CAT is that in starts to lose signal after 100 meters, it needs to be sent through a repeater, or a switch to regain signal strength. For the cost, performance and ease of installation the CAT5e is the best medium for a LAN. An organization using medical equipment or financial information has to consider what security protocols and policies it would use. Using Category 6 twisted pair cabling. These cables are hardier versions of Cat5E and are covered in a shielding that prevents them from being compromised by electrical wiring or magnetic fields. Once the speeds of Ethernet have been completely...

Words: 289 - Pages: 2

Premium Essay

Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations

...Graded Assignments The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course. Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 11/04/2011 | All | New Curriculum | | December 2011 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- Graded Discussion/Assignment Requirements Discussion or Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the discussions and assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations Learning Objectives and Outcomes * Explore the effects of routing on current communication methods used by organizations. Assignment Requirements The Johnson Company provides networking components and services. It sounds simple, but management knows it takes a lot of planning...

Words: 3601 - Pages: 15

Premium Essay

Ga Econ

...Dec 17, 2013 IS3120 Unit1 Unit 1 Assignment 1 The Johnson Company is a small business that provides networking components and services. They are in need of new methods of communication for reaching out to new customers, standing out from other businesses, meeting existing customer needs, and keeping customers informed of news and updates. The Johnson Company still uses analog phone lines and still takes customer orders by hand. Their only current method of advertising is an ad in the yellow pages. They have reached out to our IT consulting firm to help them update their current business processes and communications Setting up an intranet site is one of the best ways for small businesses to keep all their workers in the loop and communicate new information. The Johnson Company can also use Microsoft SharePoint application and services to set up internal websites designed for specific projects. Providing customers with a website capable of taking online orders while advertising online as well would give the customers ease of access and efficiency. Project managers can also use these specialized websites to share documents and information, and this can help the projects run more smoothly and effectively. Email is one of the most widely used forms of technological business communication. Instant messaging services such as Skype and Go To Meeting are very up and coming and can provide better communications even more than email. Online advertising, forums, blogs, as well as...

Words: 310 - Pages: 2

Free Essay

Mnew

...John Poole 3/22/2014 IS3120 Unit 1: Assignment 1 An example of an application would be XBOX to make it an HTML feature. A few Safety and security pose for over site there’s three valid situations, one is using Use parental controls, monitoring kid’s play, and making sure the player disguises his or her identity. Another situation where and argument of Xbox Live chatter between a Canadian and a Texan turned serious when the latter gamer disclosed plans to shoot up his high school. The Texas gamer began by detailing his troubles in school to a Port Alberni, British Columbia Xbox Live opponent, which was normal enough, but eventually the Texas gamer spilled details on plans for attacking his school, including rattling off the names of fellow students he was going to target. The talk alarmed the B.C. gamer enough that he contacted local Royal Canadian Mounted Police personnel, who started a cyber-investigation. The RCMP contacted Microsoft and was eventually directed to a teenage suspect in San Antonio, Texas, who was arrested and is facing untold charges. Port Alberni RCMP Staff Sgt. Lee Omilusik commented on the case: This incident demonstrates the power of the electronic world and how different enforcement agencies can quickly work together to protect the citizens they serve, regardless of obstacles such as international barriers The arrested boy was 16-years old and a student at John Marshall High School. The school issued a short message (PDF) to parents indicating that...

Words: 312 - Pages: 2