Usf Infrastructure Research Paper

Improved Essays
Paper 1 – USF Infrastructure
The video describes the core of the University of South Florida infrastructure that is two redundant devices that provides 100Gbps and 10Gbps connectivity to the distribution layer devices. Cat 5e or Cat 6 wires are used for connections throughout the campus. The computers are on the edge of the network meaning they are the closest to the user. The wires are connected to the network by a patch cord going into a wall outlet that then leads into a wiring closest that is call intermediate distribution frame or IDF, which serves as an aggregation point of the network. The max cable length is 100m over copper cables for connecting computers to the IDF. All these wires lead to Ethernet switches and patch cords are used
…show more content…
An infrastructure is a means of moving data from one place to another and acting upon it. Infrastructure may be centered within a data center, with connections to users in different environments (Longbottom, "What Is Infrastructure). Transportation, communication, sewage, water and electric systems are all examples of infrastructure. In the technological age that we live in it is inherently important for a business or institutions to have an efficient infrastructure. Many services such as processing are provided through networks. A well-organized network can deliver important information and correct inventory of business orders in a fast reliable manner. The importance of the infrastructure is it allow for smooth traffic movement and avoid any blockage on the network that may cause delays or inconveniences. The most trusted institutions and corporations have efficient and reliable infrastructures that consumers an feel safe about. We all consume from businesses that function well, we shop online at the safest websites with the most reliable customer service and where we feel our data is safer. This are all aspects of proficient infrastructures, and those who fil to provide these services can lose consumer trust and …show more content…
Fiber optic cable – is a transparent glass or plastic fibers which allow light to be guided from one end to the other with minimal loss.
Intermediate distribution frame (IDF) – is a distribution frame in a central office which cross-connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame or CDF to individual cables connected to equipment in areas remote from these frames.
Small form-factor pluggable (SFP) – is a compact hot-pluggable transceiver used for both telecommunication and data communication applications.
Hence, I have learned that in order for an infrastructure to run well, all of its components must work equally effectively. Through my research I understood that infrastructure is the most important aspect of a network. In order for one to have a succeeding business or institution one must provide a reliable and trustworthy network that both the consumer and the employees providing feel is dependent and trust. This assignment ultimately helped me understand the constituents that make for a great infrastructure, such as switches, IDF, nodes, and BDF. These components must support the network in order to maintain reliability and optimal

Related Documents

  • Decent Essays

    Nt1310 Unit 2 Essay

    • 368 Words
    • 2 Pages

    1. Rack and wall mountable connector housings shall accept an interchangeable connector panel. An adapter panel is defined as a modular removable plate containing optical fiber connector adapters. 2.…

    • 368 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    ITM 301 Lab & Assignment 2 Deqa Yusuf Student #:500566949 Part A: Both CAT5 and CAT5e are UTP cables but the difference between these 2 cables is the quality. CAT5 has a 100 MHz signaling while CAT5e can have a signaling rate of up to 350 MHz. Not only that but the wiring is different as well, the CAT5 has simple wiring while the CAT5e has copper wiring. In short the CAT5e is a much more advanced cable compared to the CAT5.…

    • 403 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    The best thing is that if anything needs reconnecting for a different use, all source connections are available in a single space without needing to change any cables. The fiber optic cable would be appropriate because as the business relies on the internet for more and more of their ongoing operations, they are essentially sending and receiving more packets of data. There will be running, on average,…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Fire wire is another type of connection. Is tremendously fast that’s why it is mostly used to transfer video files. Ports: USB, Parallel, Serial USB Port – In a single port in can support up to 127 devices. It has a maximum cable run of 5m. Cables Optical Cable – The cable is used to send digital audio signals between devices, with a rapid connection.…

    • 751 Words
    • 4 Pages
    Decent Essays
  • Superior Essays

    The identity infrastructure is contained within Active Directory, which provides security, authentication, and authorization of identities (Training Solutions, 2014). The DHCP and DNS service are also provided to ensure reliable name resolution, and dynamic IP address assignment to the network devices that require dynamic IP address assignment. Finally, there are storage devices that contain a hybrid solution of storage area networks (SAN), and network attached storage (NAS).…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Nt1330 Unit 7 Exercise 1

    • 556 Words
    • 3 Pages

    3. IP Transit IP Transit, also known as Internet Transit, is what allows traffic from a network to cross or "transit" to a provider network. This type of service is generally used to connect one of the smaller internet service providers to the rest of the internet. 4. Dark Fibre Dark Fibre, also known as, unlit fibre, is an unused optical fibre that's commonly used in fibre-optic communication.…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Pm3110 Unit 4 Test Paper

    • 1148 Words
    • 5 Pages

    1. What are the four generic architectural components of a public communications network? Define each term? The Generic architectural Components are Subscribers, Subscriber Line, Exchanges and Trunks.…

    • 1148 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Data Communication and Net-Centric Computing (COSC 2061) Assignment 2 Student Name: Weibin Zhong Number: s3503887 Introduction This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 1

    • 360 Words
    • 2 Pages

    These days’ security is a critical factor of I.T whether it be protecting physical devices or information. What are some basic examples of ways to provide physical security for a server? What can be done about logical security? Security in the critical factor for everything related to internet.…

    • 360 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Technology Framework Design In this section, we combine the user domain needs described in Part 1 of this proposal, the physical framework requirements described in Part 2, and the technology selections described in Part 3 to create the final Digital Edge Manufacturing network infrastructure proposal. Choosing the Cabling Used in the Network We considered infrastructure costs, speed, and reliability for cabling and adaptors. Our network employed hybrid type of network sine we use Ethernet cable, Wi-Fi and fiber optic as our media.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Great Essays

    For instance, the employees discuss current market challenges and work on solution together. The whole departments can structure their own information and carry the principle of a transparent organization to life as the employees enable decentralized project collaboration in a networked world. S2. Effective Services for Retailer and Customer Otto Group provided several effective services in their business. For example, they understand that retailer and customer worried about the problem of payment process.…

    • 1544 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays