Data Communications Assignment

Assignment Help Computer Network Security
Reference no: EM132491565

Data Communications Assignment -

Question one -

(a) A magazine publisher based in Nairobi has a branch in Kisumu, and one in Mombasa. The company has kept in touch by telephone and courier service.

Each office is networked. The networks were implemented five years ago and each has a 10 Base 5 Ethernet network.

Lately, the company has been developing projects that involve teams consisting of members from more than one office. Each office has resources that others do not; the current projects require all of these resources.

The networks have frequent cable problems, and each time they have one, the entire network goes down until the problem is resolved.

The management team would like a networking solution which would offer easier troubleshooting, less downtime, and WAN communications between sites. They would like the WAN connections to support 256 Kbps of data and several telephone conversations. The combination of long distance calls and courier service should be eliminated by the WAN. Management would like the WAN to be able to continue operation even if one of the WAN links fails.

i) Identify at least two items at every site that needs upgrading.

ii) What type of WAN connection (link) might you use to connect the three sites to each other?

iii) How many WAN connections will it take to connect the three sites? Show the links in a diagram?

iv) What type of device could be used to connect the multiple signals from both voice and data and put them on the same WAN link?

v) What type of connectivity device should be used to connect the LAN to the multiple paths in the WAN created? What IP addresses should be used for the LANs/ WANs?

vi) Discuss the media that is suitable for individual the branch offices, stating the merits and demerits of each media.

Question two -

(a) Discuss four internetworking challenges.

(b) Describe how Virtual Private Networks are implemented and secured against attacks.

Reference no: EM132491565

Questions Cloud

Calculate the wacc : Now assume that the company issues another $2 million in face value debt. What happens to the WACC? Why?
Determine variable costing analysis with an example : Determine Variable costing analysis with an example. Describe what you learned about this topic and how variable costing differs from absorption costing.
Stocks from the most risky to the least risky : Rank these stocks from the most risky to the least risky.
Would voluntarily disclose the study information : If you were a manufacturer of one of the drugs, would you voluntarily disclose the study information? Why or why not? Stanford University medical researchers
Data Communications Assignment : Data Communications Assignment - What type of device could be used to connect the multiple signals from both voice and data
What is carroll saying about nature of rhetorical analysis : What is Carroll saying about the nature of rhetorical analysis? How do the fundamentals of rhetorical analysis figure into your life, both as a student
Why negotiations fail : Why Negotiations Fail? Explain the process taken in the negotiation effort and then explain how or at which point the negotiation failed.
What is the annualized forward discount : Assume the spot rate on the BRL:USD is $0.213/1 BRL and the 180 day forward rate on the BRL:USD is $0.202/1 BRL.
How much authority does an employee have to bind : How much authority does an employee have to bind a business into certain contracts which may or may not benefit the business? Find a case that you.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write a research paper about hids or antivirus systems

Write a Research Paper about HIDS or Antivirus Systems. The focus of the reseach paper is Host Intrusion Detection Systems (HIDS) or AntiVirus Systems.

  Create a network diagram illustrating the solutions

Write a cumulative 4- to 5-page paper (not including any diagrams or charts) incorporating your prior work. Solve the design problems of your organization. Create a network diagram Illustrating the solutions.

  How could you check suspicions without threatening system

How could you check your suspicions without threatening your system? What type of attack is this type of message associated with?

  What is the single most important new technology

What is the single most important new technology that has affected digital forensics in the last five years and why?

  Explain networks fundamental characteristics and components

Explain the network's fundamental characteristics and components. Develop a diagram in Microsoft Visio, Word, or PowerPoint based on the description provided.

  Difference between a dns resolver and a dns root server

COIT12206 TCP/IP Principles and Protocols - What is partially qualified domain name (PDQN), and what assumption is made by a DNS resolver when processing it and explain the difference between a DNS resolver and a DNS root server.

  What type of access controls are probably configured

If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured?

  Create a set of firewall policies and a set of firewall rule

Create a set of firewall policies and a set of firewall rules that should be implemented by the network administrator for firewall(s) placed in the network.

  Implementation of various systems moving forward

Explain how the impact of HIPPA and HITECH regulations will impact the implementation of various systems moving forward. Consider impacts to and from federal, local, software vendors/users, hardware vendors/users, infrastructure, and organizationa..

  Potential physical vulnerabilities and threats

Identify and analyze any potential physical vulnerabilities and threats that require consideration.

  Find out the modification made to the excel spreadsheet

A dissatisfied employee that is planning to leave an organization decides to delete a file from the server. He then copied an Excel Spreadsheet into another file, modifies the new file and deletes the old file.

  Describe best practices in cybersecurity

Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. Describe best practices in cybersecurity.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd