Discuss the approach or strategy you would use to implement

Assignment Help Computer Networking
Reference no: EM131875160

Assignment: Advanced Networking Technology

Introduction:

Western County Bank is a small community bank that makes a modest profit by providing small business and personal loans to customers within the county and surrounding areas.

You will use the attached "Western County Bank Scenario" to create a proposal that meets the networking and data storage needs of Western County Bank.

Requirements:

A. Create a network diagram that meets the networking needs of Western County Bank based on the attached scenario that includes a representation for each of the seven layers of the Open Systems Interconnection (OSI) model for the following:

• components

• logical functions

• interconnectivity devices

Note: A representation from each of the seven layers of the OSI model can be provided on the network diagram or in a discussion.

B. Explain how your network addresses the needs of Western County Bank in the following areas:

1. local area network (LAN) configuration

2. wide area network (WAN) configuration

3. mobile network configuration

C. Create a data storage diagram that represents how you would meet the data storage needs of Western County Bank based on the attached scenario that includes all seven layers of the OSI model and address the following:

• components

• logical functions

• interconnectivity devices

Note: A representation from each of the seven layers of the data storage model can be provided on the diagram or in a discussion.

D. Discuss your modifications to the existing infrastructure for Western County Bank by doing the following:

1. Discuss the approach or strategy you would use to implement your network proposal at Western County Bank.

2. Explain the project requirements (e.g., tasks, services, activities) needed to complete your proposal for Western County Bank.

3. Identify the monitoring tools you would choose to evaluate whether network performance meets organizational availability, stability, and speed requirements.

a. Discuss how you would evaluate whether network performance meets organizational availability, stability, and speed requirements.

Attachment:- Task-1-Western-County-Bank-Scenario.rar

Reference no: EM131875160

Questions Cloud

Experience from facebook or twitter : Can you give me a specific example you experience from Facebook or Twitter, which made you to prefer one of this sites. (and explain)
Create alias named rm that always deletes files recursively : Create an alias named rm that always deletes files recursively and forcibly. How can you execute the original rm command without unaliasing it.
How will you add the parent directory to your existing path : How is the home directory set-by $HOME or /etc/passwd? How will you add the parent directory to your existing PATH? How can you make the setting permanent?
What is the name of the object that can be use in languages : What is the name of the object that I can use in languages like ASP.NET to manage state on the server?
Discuss the approach or strategy you would use to implement : Discuss the approach or strategy you would use to implement your network proposal at Western County Bank.
Discuss about the conditions of learning : In your opinion, describe how you think Gagne's "The Conditions of Learning" has influenced the development of the Dick and Carey model.
Identify a differential reinforcement procedure : Identify a differential reinforcement procedure that is most appropriate for each of these situations and type of behavior to address the problem.
Explain the difference between syntax and grammar : Refer to The Potential Impact of Syntax and Phonology Transfer from Spanish. Haitian Creole, and Portuguese Booklets.
Write a java statement that outputs the first name : Write a Java statement that outputs the first name followed by the last name separated by a single blank space of the first student.

Reviews

Write a Review

Computer Networking Questions & Answers

  Advantages and disadvantages of network processors

What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways?

  Compute the throughput for file transfer

Host A wishes to send the large file to Host B. Path from Host A to Host B has three links, of rates R1=10 Mbps, R2=500 kbps, and R3=750 Kbps. (1Kbit=210bit) Suppose no other traffic in network, determine the throughput for file transfer?

  Define the network topology in each office lan

Define the network topology in each office LAN, and define and describe the structure of the WAN to interconnect the offices

  Generally the receiver in the tcp flow control scheme sends

normally the receiver in the tcp flow control scheme sends back ack packets with the sequence number that it is

  Data validation refers to checking the content

Data validation refers to checking the content of data to ensure that it satisfies certain rules, known as constraints. For example, the employee name should never be omitted in the employee table, and the delivery date should be after (greater th..

  Create a network design for training environment

Create a network design which accommodates these requirements and keeps costs down. These training environments a maximum of one instructor and 12 students.

  Which device permits packet switching

Which device permits packet switching so that a message can be routed to the next link in a network? In order to translate from an IP alias to an IP address, which of the following is used?

  Describe how these theories understand the social nature

Cite real-world experiences to draw direct connections to the theories. Make a note of the social circumstances that relate to the concepts presented by the theories.

  Explain what each layer does in detail

What is OSI? Explain what each layer does in detail. Give examples. What it does, advantages and disadvantages. And reason of causing advantage or disadvantage.

  Administering active directory users and groups

ITSA1001 - Record all configuration updates you have made to the server during this practical task - ADMINISTERING ACTIVE DIRECTORY USERS and GROUPS

  Write a research paper about the cloud computing

Write a research paper about the cloud computing.

  Insert and remove dns messages into the network

Suppose that an intruder could both insert and remove DNS messages into the network. Give three scenarios showing the problems that such an intruder could cause.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd