Data Communications Assignment

Assignment Help Computer Network Security
Reference no: EM132491565

Data Communications Assignment -

Question one -

(a) A magazine publisher based in Nairobi has a branch in Kisumu, and one in Mombasa. The company has kept in touch by telephone and courier service.

Each office is networked. The networks were implemented five years ago and each has a 10 Base 5 Ethernet network.

Lately, the company has been developing projects that involve teams consisting of members from more than one office. Each office has resources that others do not; the current projects require all of these resources.

The networks have frequent cable problems, and each time they have one, the entire network goes down until the problem is resolved.

The management team would like a networking solution which would offer easier troubleshooting, less downtime, and WAN communications between sites. They would like the WAN connections to support 256 Kbps of data and several telephone conversations. The combination of long distance calls and courier service should be eliminated by the WAN. Management would like the WAN to be able to continue operation even if one of the WAN links fails.

i) Identify at least two items at every site that needs upgrading.

ii) What type of WAN connection (link) might you use to connect the three sites to each other?

iii) How many WAN connections will it take to connect the three sites? Show the links in a diagram?

iv) What type of device could be used to connect the multiple signals from both voice and data and put them on the same WAN link?

v) What type of connectivity device should be used to connect the LAN to the multiple paths in the WAN created? What IP addresses should be used for the LANs/ WANs?

vi) Discuss the media that is suitable for individual the branch offices, stating the merits and demerits of each media.

Question two -

(a) Discuss four internetworking challenges.

(b) Describe how Virtual Private Networks are implemented and secured against attacks.

Reference no: EM132491565

Questions Cloud

Calculate the wacc : Now assume that the company issues another $2 million in face value debt. What happens to the WACC? Why?
Determine variable costing analysis with an example : Determine Variable costing analysis with an example. Describe what you learned about this topic and how variable costing differs from absorption costing.
Stocks from the most risky to the least risky : Rank these stocks from the most risky to the least risky.
Would voluntarily disclose the study information : If you were a manufacturer of one of the drugs, would you voluntarily disclose the study information? Why or why not? Stanford University medical researchers
Data Communications Assignment : Data Communications Assignment - What type of device could be used to connect the multiple signals from both voice and data
What is carroll saying about nature of rhetorical analysis : What is Carroll saying about the nature of rhetorical analysis? How do the fundamentals of rhetorical analysis figure into your life, both as a student
Why negotiations fail : Why Negotiations Fail? Explain the process taken in the negotiation effort and then explain how or at which point the negotiation failed.
What is the annualized forward discount : Assume the spot rate on the BRL:USD is $0.213/1 BRL and the 180 day forward rate on the BRL:USD is $0.202/1 BRL.
How much authority does an employee have to bind : How much authority does an employee have to bind a business into certain contracts which may or may not benefit the business? Find a case that you.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd