subject

You are a network technician for a small corporate network. The company recently expanded to the second floor of its building. You've already installed a small networking closet on the second floor and run the necessary cables to the ports on each of the floor's fiber patch panels. You now need to connect the two networks using fiber optic cables.

Your task in this lab is to connect the switch in the Networking Closet on Floor 1 with the switch in Networking Closet 2 on Floor 2 through the fiber patch panels in each networking closet. Use the following information to help identify necessary connections:

Determine the appropriate fiber cable to connect the switches to the fiber patch panels.
For the patch panel on Floor 1:
Port 3 is transmit (Tx).
Port 4 is receive (Rx).
For the patch panel on Floor 2:
Port 1 is transmit (Tx).
Port 2 is receive (Rx).
Use the color coding on the end of fiber optic cables to identify which end is Tx and which is Rx.
Connector A (white or red) is Tx.
Connector B (black) is Rx.
Plug the switch on Floor 2 into a Bank 1 Critical Load outlet on the UPS.
Verify the connection has been made by checking for an Internet connection on any Floor 2 computer.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 24.06.2019 16:00
How are roger williams, james oglethorpe, and william penn similar?
Answers: 3
question
Computers and Technology, 25.06.2019 01:30
Why is the most liked picture on instagram an eggy? owo
Answers: 1
question
Computers and Technology, 25.06.2019 08:00
Aresearcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. direct identifiers will not be collected; however, ip addresses may be present in the data set. risk of harm should be evaluated by: solely by the magnitude or severity of expected harm. both the magnitude (or severity) and the probability (or likelihood) of harm. solely by the probability of expected harm. neither the magnitude or probability of harm.
Answers: 3
question
Computers and Technology, 25.06.2019 08:50
A-12.3 an american spy is deep undercover in the hostile country of phonemia. in order not to waste scarce resources, any time he wants to send a message back home, he removes all the punctuation from his message and converts all the letters to uppercase. so, for example, to send the message, “abort the plan! meet at the dark cabin.” he would transmit given such a string, s, of n uppercase letters, describe an efficient way of breaking it into a sequence of valid english words. you may assume that you have a function, valid(s), which can take a character string, s, and return true if and only if s is a valid english word. what is the running time of your algorithm, assuming each call to the function, valid, runs in o(1) time?
Answers: 3
You know the right answer?
You are a network technician for a small corporate network. The company recently expanded to the sec...
Questions
question
English, 30.10.2020 14:30
question
Mathematics, 30.10.2020 14:30
question
Mathematics, 30.10.2020 14:30
question
Mathematics, 30.10.2020 14:30
question
Mathematics, 30.10.2020 14:40
question
Mathematics, 30.10.2020 14:40
question
Social Studies, 30.10.2020 14:40
Questions on the website: 13722363