Top-Rated Free Essay
Preview

FOUR NODE BUS NETWORK

Satisfactory Essays
249 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
FOUR NODE BUS NETWORK
INSTALLING A FOUR NODE BUS NETWORK

WESLEY CURRY

SEPTEMBER 30, 2013

Wesley Curry
Professor Pelosi
Introduction to Data Communication
September 30, 2013 Installing a network can be very complicated. There are many different types and ways you can wire a network. The network I’m going to describe is fairly simple and easy to install. This network is called a bus network, and will be used on a service counter, like you see at Verizon or somewhere similar. First, you need three 10Base-2 coax cables at least 10 feet long for connecting all four computers in a row. Next eight BNC connectors are needed, two for each cable. After this four BNC T-connectors are needed for connecting the coax cables in a line. “Two 50-ohm BNC terminators are also needed, one for the first and one for the last node” (Mansfield & Antaonakos, 2010, p. 26). To begin wiring the network, “you need to crimp a BNC connector on each end of the coax cables” (Mansfield & Antaonakos, 2010, p. 26). One end of each cable is plugged into the one side of the T-connectors lined up in a row. The other end of the cables go to the computers.
The T-connectors on the each end of the row have the 50-ohm BNC terminators plugged into the far end of them to prevent signal reflections (Mansfield & Antaonakos, 2010, p. 26). Once this is complete the bus network should be operational.

REFERENCES
Mansfield, K. C., & Antaonakos, J. L. (2010). Computer networking for LANs to WANs: Hardware, software and security. Albany, NY: Delmar Cengage Learning.

References: Mansfield, K. C., & Antaonakos, J. L. (2010). Computer networking for LANs to WANs: Hardware, software and security. Albany, NY: Delmar Cengage Learning.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1310 Unit 6 Exercise 1

    • 419 Words
    • 2 Pages

    On a TWISTED PAIR CABLE I chose to install an RJ-45. This is the standard Ethernet connector for most systems used today. I would first measure out the length of cable that I would need. I would then use a wire cutter to cut the length that I need, leaving enough room for corrections and to open the wire. I would then use wire strippers to remove a small piece of the outer most jacket. I would then choose what connection I wanted to make (568A or 568B). I would then untwist the wires and put them in the correct color order that I need. Then I would flatten out the wires and in one hand hold my RJ-45 connector and then with the other hand feed the wires into the connector. This is usually pretty simple with the way the connectors are made, and they are also usually clear. After I’m sure that the wires are in the connector all the way, and in the right order, I would use a wire crimper to clamp the wires securely into the connector.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 4.1 Case Study

    • 2532 Words
    • 11 Pages

    Using the description of Network C and Figure 4- 6, create a cabling solution for this network that meets the owner’s needs. Justify your choices.…

    • 2532 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Lab 1 Essay

    • 553 Words
    • 3 Pages

    Now that we understand the codes and standards needed to create this building, it’s time to put stuff in it. Our task at hand is to start wiring the building for a new computer science and electrical engineering labs. This building will have a lot of devices that need to be connected to the school campus network and we will need a lot of tools to do it.…

    • 553 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Trulove, J. (2005). “Designing LAN Wiring Systems.” LAN wiring (3rd ed.). McGraw-Hill Professional. P. 23. ISBN 0-07-145975-8.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    NT1210 Lad 5

    • 598 Words
    • 4 Pages

    The IEEE 802.1standard concerns with the standards and recommendations in the of architecture and internetworking of local area networks (LANs) and metropolitan area networks (MANs), security, network management, and protocol issues above the Data Link Layer.…

    • 598 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT220 Unit 5 assignment

    • 286 Words
    • 2 Pages

    Ethernet LANs: collection of devices which use IEEE Ethernet standards at the physical and data link layers, so that the devices can send Ethernet frames to each other…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 5050 Words
    • 21 Pages

    This method is a very effective way of creating and maintaining a functioning multi-user network. It’s cost effective, and in terms of labour and parts required very simple to set up (Apart from the cable management) Another advantage of this type of network is…

    • 5050 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Wide area networks (WAN) are complex networks that span large geographical areas. The most commonly known WAN is the Internet. WANs tend to be slower in speed, highly complex, and intolerant of system problems. Because of the multitude of connections on a WAN, even a simple down can create problems across the network.…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The equipment expected to effectively set up the LAN networks at every area are a switch/firewall mix, a modem, remote network interface cards for every workstation, and the cabling important to associate the switch to the modem and the modem to the Internet to secure the WAN association. Servers and their arrangement additionally have influence in keeping networks and information safe. Each bit of equipment and programming are essential in shielding the network and the information from electronic dangers.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    LAN domains are a collection of computers connected to one another. Threats for LAN domains include unauthorized access to the LAN, and unauthorized access to systems applications and data. The solutions for these threats are similar to that of the workstation domain. Another major threat are confidentiality of data transmissions via WLAN connections is compromised. Implementation of encryption between…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It282 Week 6 Checkpoint

    • 724 Words
    • 3 Pages

    Enabling networking to a workstation has been made to be fairly simple. Today, most of the software configuration is done automatically and the hardware installation is plug-and-play. There should be a primary network computer that will operate all the linked computer systems and different devices with the help of the operating system software. The following are steps of how to enable a network on a workstation:…

    • 724 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LAN – WAN is where the IT infrastructure links to a wide area network and internet.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays