Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

1. (Wireless LAN)

Identify and briefly explain any four key requirements that need to be examined when considering deploying a WLAN technology. [300words]

2.  (Backbone Networks)

You have been hired as a network consultant by an organization called Dwight Motors. Your job is to recommend an elegant solution to support their needs and to address their current problems. The IT manager of Dwight motors wants you to be aware of the following facts:

• The organization has 3 departments. All addresses are assigned using IP.

• Key servers are currently randomly placed in different departments. So a user in one department X reads and writes to file servers in another department Y. Similarly, users in departments X and Y would read mails from a server in department Z.
• The traffic and broadcast storms originating in one department is causing bandwidth saturation in other departments.
• The core of the network is slow and is unable to meet the response time requirements of various critical business applications.

Propose remedial solutions with adequate justification. In particular, in your recommendation you need to suggest the following:

a) Core technology design.

b) Specific LAN technologies to be used in each department.

c) Specific design solutions to address inter-departmental traffic issues. ((600 words)

3.  (Switched Backbone Networks)

You are the network administrator for a small manufacturing firm that runs Ethernet. You are currently using hubs and repeaters for connectivity but have decided to upgrade to a Layer 2 (L2) switched infrastructure.

a) The CFO has looked at your brief proposal and would like some information on the benefits of migrating to a switched network. What benefits would you list and why?

b) Your company is rapidly growing. The IT manager of the firm wants to know what additional key features one might look in L2 switches that your company might deploy in future as it grows? Identify and explain 3 key featuresand justify how these features will scale to support yourcompany's growth and any future network expansion.(500 words)

4.  (Wide Area Networks)

Explain the flaw in the following reasoning: Packet switching requires control and address bits to be added to each packet. This introduces considerable overhead in packet switching. In circuit switching, a transparent circuit is established. No extra bits are needed. Therefore, there is no overhead in circuit switching. (100words)

5. (Wide Area Networks)

An organization called Ranbaxy Inc. has currently 3 divisions in 3 different locations within Sydney city. One of the divisions serves as the company headquarters. They hire you as a network consultant to recommend a networking plan. The following are the requirements outlined by the company's CTO:

• Large volumes of data need to be exchanged between the divisions but only during certain times (random-not known a priori) during the day.
• The organization has a sizeable pool of employees who will need to regularly access their networks resources from home.
• Mobile sales personnel require access to their respective branch networks to upload/download sales data from remote locations.
• Since the data exchanged between the divisions is critical, privacy is of utmost concern.
• There is a budgetary constraint that will force the manager to go for the cheapest and most viable solution.

What type of WAN solution would you recommend and why? Provide adequate justification in support of your solution. (400 words)

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9909501
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

With smaller companies saving thousands and larger

With smaller companies saving thousands and larger companies saving billions through flexible manufacturing, if you are a discrete parts manufacturer seeking to be more lean, it is important to consider whether this migh ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Case study network design for ezy-booksezy-books is a

Case Study: Network Design for EZY-Books EZY-Books is a specialised publisher for customised book publication services based in Brisbane. The company has recently purchased a two-story building in a Brisbane suburb as it ...

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment1 consider a tcp connection between host a and

Assignment 1, Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 10526 and destination port number 80. What are the source and desti ...

Final project incident response exercise amp reportyour

Final Project: Incident Response Exercise & Report Your Task You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident desc ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As