answersLogoWhite

0

You can create a hierarchial network using pretty much any type of networking equipment. No special equipment is required or needed, although if you are building a massive network, do consider at least Gbit interfaces and thus CAT6 cables.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What is the maximum distance for a run of horizontal cabling that extends from a repeater to any workstation?

90 meters


What type of cat five cabling allow to connect two workstation on a peer to peer network?

VGA cable


Describes wiring that connects workstations to the closest telecommunications closet?

The wiring that connects workstations to the closest telecommunications closet is typically done using structured cabling, such as Ethernet cabling (Cat5e, Cat6, etc.). These cables are run from each workstation to the patch panel in the telecommunications closet, where they are connected to the network switch. This setup allows for a centralized and organized network connection for each workstation within the building.


What are the main features of ADhoc network?

The main feature of an ad-hoc network is that there are temporary and do not require any cabling. The only connections required are the wireless connections in the devices. As a result there is very little setup to worry about.


Which transmission media is LEAST susceptible to eavesdropping?

Fiber optic cablingAnswer Explanation: Unlike coaxial cabling, unshielded twisted pair (UTP) cabling, and shielded twisted pair (STP) cabling, fiber optic cabling is not susceptible to eavesdropping. An eavesdropper would have to actually cut the line and tap into the fiber optic cable with a highly complex form of optical T-connector. This would interrupt the connection, which should immediately trigger an alarm.The "Unshielded twisted pair cabling" and "Shielded twisted pair cabling" options are incorrect. Twisted pair cabling is susceptible to eavesdropping because information is transmitted through the cable via electrical pulses, which emit small amounts of electromagnetic radiation. An eavesdropper could intercept communications with the proper equipment.The "Coaxial cabling" option is incorrect. Coaxial cabling is susceptible to eavesdropping because anyone can tap into it and add an unauthorized device. Since connections to the network cannot be controlled by a switch or hub, there is no way to prevent unauthorized connections. An intruder can tap into the network with either a basic T-connector or vampire tap.


Only one workstation on a particular network cannot reach the Internet What is the first troubleshooting step if the divide-and-conquer method is being used?

Disconnect it completely from the network. If the rest of the network functions correctly, the problem is in the cabling to that single computer. Change the cables - if the terminal works correctly, the old cabling was at fault. If it still doesn't work, the next culprit would be the network card.


How do you connect a computer to the network via cabling?

Connections to a network depend on the topology and cable type you are using. If we take the most common connection it is via UTP (unshielded twisted pair) cabling, utilizing an RJ-45 connector. This connector takes 8 wires in a modular connection on the cable.Plug one end of the cable into a network interface card on your PC, and the other end to a network connection, which may be a switch, router, hub, etc. The EIA/TIA structured cabling guidelines 568A/B will tell you much more about these types of connections.


How do you wire a network?

Ethernet is the standard now, so Cat5e or better cabling is the way to go. All workstation/phone endpoints should be wired back to a central closet that will contain the Ethernet switch. Maximum cable distance is 300 feet.


What are the 3 types of cables used in business and residential systems?

Fiber optic cabling, Category cabling, and coaxial cabling.


What is the r f cabling?

RFC cabling stands for "Request for Comments" cabling. RFC is a series of documents published by the Internet Engineering Task Force (IETF) that define standards and protocols for the internet. In the context of cabling, RFC cabling refers to following the guidelines set out in these documents for the design and installation of network cabling systems.


Which subsystem does permanent networking cabling within a building belong to?

Backbone Cabling


Can a NIC be used for more than one type of cabling?

Yes, there are Many kinds of NICs capable of using multiple cabling a 10/100 NIC is a NIC that can use both 10BaseT Cabling and 100Base Cabling