jmontgomery2
Forum Replies Created
-
AuthorPosts
-
jmontgomery2Participant
God’s voice is not one that I can say I hear clearly and plainly. God has communicated things to me previously but I have yet to hear His voice fully. Maybe I do allow the voices of others to drown Him out. This is something I should change as I mature in life and in my faith. I would like to hear God’s voice in my life. To have His guidance show me the right paths to take would bring me great comfort. I know that God speaks to people in different ways, maybe I am just not listening for the right form of calling to answer to.
jmontgomery2ParticipantYou have detailed the differences of switching and routing in a great manner. Switchings is a very interesting method of communication, especially running the wires to various nodes on the network site. Combining the two methods can produce very efficient communications systems for large to medium networks.
jmontgomery2ParticipantRouting is a system used by routers to allow nodes nodes on a network to connect to other computer networks wirelessly. The router acts as a gateway for data and other connections coming in and out. This is also very similar to a wide area network in terms of connection range as using a router, the computer can connect to networks from around the world. This system of connection and communication is completed with IP addresses primarily.
Switching utilizes switches to connect multiple nodes on a network in order to communicate with one another. This is more in line with a local area network in the sense that each node is connected to an ethernet cord that runs to a port and is connected to a switch that handles traffic flow and what data goes where. This is completed using MAC addresses and allows for transmission between networks if necessary. Switches are not limited to LANs however and the switching method can be used to cover and entire campus for example.jmontgomery2ParticipantYour knowledge of core protocols is quite impressive and your eloquence in describing their functions was great. The flow of your paragraph is well thought out as each topic relates to the other how the protocols need to handle information transfer but also must be secure against hackers.
jmontgomery2ParticipantJesus Christ is Lord over all. There is no denying it and His name should be lifted above all others. I strive to a life fit for Him and I want to be a good and faithful servant to the only King worth following. However, this task is great and the trials are many. There is more I need to do and more I can do as a Christian. I want to live my life fully for Christ to experience the boundless nature of His love.
jmontgomery2ParticipantThese network device descriptions were spot on. Switches are highly useful in managing a network or separating devices that do not need to communicate with one another. Also, routers are one of the most important devices in use in networking as they allow computers to join the wider internet through other networks. Truly a cornerstone of information technology.
jmontgomery2ParticipantOne network device is the repeater which is a layer one network device. This device is used to receive a signal and send it out unaltered at a stronger power to reach a further distance. This is to avoid the risk attenuation which would weaken or eliminate the signal entirely.
A second network device is a bridge. This is a level two network device and is used to extend and connect physical networks together. Bridges help avoid collisions and creates separate domains for collisions, thus increasing bandwidth availability.
The third network device is the gateway, this level three network device is a node on a computer network. Gateways act as stopping points for information on their war to another network. They can allow information to pass through or deny it’s entry into the network.jmontgomery2ParticipantThis is a very sound methodology for troubleshooting. Determining the wires are all connected and the machine is receiving adequate power are two of the most common fixes for information technology related problems. In addition, the classic turn it off and back on again method is a surefire way to clear out minor one off bugs. This could fix almost anything from slow performance to a webpage not loading because of a driver or download that is not running smoothly.
jmontgomery2ParticipantThe troubleshooting process I would use would be to first recreate the problem if possible and run the order operations on a different device. After that I would try to move parts of the problem device over to identify if the issue lies in the software or hardware of the specific machine. Using the move a long method would make it easier to determine exactly where the problem lies and allows me to use the divide and conquer method to locate the issue. While this is a fancy way to describe having a gut feeling about t he problem, this method works quite well. This is especially true when you are familiar with the particular machine or software that is experiencing trouble. If you are not as familiar with the system or machine in question a linear method similar to the top to bottom of bottom to top method would be more applicable. If the problem is software based, the bottom up method would be more efficient in locating the root. The inverse is true if the problem is hardware based and you need to service a component of the machine on site.
-
AuthorPosts