Identify application architecture in use by the organization

Assignment Help Computer Networking
Reference no: EM13860518

Assignment: Business Data Communication and Networks Concepts

There are three parts to this assignment relating to each lecture in Module 1.

Part 1: Layering and the Internet Model

Imagine that a technology organization has been in business for decades, and that the organization developed its own method of computer-to-computer communication. Because this method of communication only occurs within this organization, it is not layered, but rather is designed to operate as quickly and efficiently as possible on the custom hardware by using the least amount of overhead possible. The organization continues to create its own communication hardware and software that works with modern computers, but the CTO of the organization is considering replacing this custom communication solution with the adoption of the Internet Model in use today, along with its technologies. With this scenario in mind, address each of the topics below.

Topic 1: The Advantages of a Layered Model

Identify and describe the advantages that a layered solution would offer the technology organization when compared to its non-layered solution.

Topic 2: The Disadvantages of a Layered Model

Identify and describe the disadvantages of a layered solution when compared to the organization's non-layered solution.

Topic 3: The Layers of the Internet Model

Identify the layers of the Internet Model, and explain what functionality each layer would provide for the organization, if adopted.

Topic 4: Other Advantages

Are there advantages, for the organization, to adopting the Internet Model beyond those mentioned in Topic 1? If so, describe them.

Part 2: Application Architecture

Assume that an organization's employees have each been given a computer to perform their work. Each computer accesses the organization's applications via a powerful mainframe computer in the server room. When an employee types a key, the keystroke is sent to the mainframe, which in turn decides what action to take, and transmits that action back to their computer. Every keystroke is sent to the mainframe, and all decisions are made by the mainframe. Each employee's computer acts only as an input and display device. The CTO is considering switching from its current architecture, to another architecture. With this scenario in mind, address each of the topics below.

Topic 1: Architecture Identification

Identify the application architecture in use by the organization, and explain the basic mechanics of how that architecture works.

Topic 2: Switching to Client-Server

Identify and explain three issues the organization would need to address if it would like to switch from its current architecture to a two-tier, client-server architecture.

Topic 3: Advantages and Disadvantages of Client-Server

Identify the advantages and disadvantages, for the organization, of switching from the organization's current architecture to a client-server architecture.

Part 3: Digital Communication Rates

Imagine that we need to digitally download the text of a paperback book at the rate of 40 pages per minute. The number of lines per page is 25, and the number of characters per line is 65. With this scenario in mind, address each of the topics below.

1. Most of what is needed to calculate the number of bits sent per minute is present in the scenario above, but something is missing. What is it?

2. What are the common values for this missing item, and where do these values come from?

3. Which value would you choose from #2? There is no one provably "correct" answer to this, but do make sure to justify your choice.

4. With your assumption in #3, calculate the bit rate needed, expressed as bits per second, to download the text of the book as described in the scenario. Recall that the bit-rate formula is:

C = b/t

where C is the bit-rate, b is the number bits, and t is the unit of time.

5. Now that you have calculated the bit rate needed to download the book, let us consider how this relates to symbol transmission over a physical circuit. If a physical circuit encodes one bit per symbol, what would the minimum symbol rate need to be to download the book? Make sure to give the value and explain your reasoning.

6. If 256 Quadrature Amplitude Modulation (256-QAM) is used on the physical circuit, what would the minimum symbol rate on the circuit need to be to download the book at the given rate of 40 pages per minute? Make sure to give the value and explain your calculations.

7. Lastly, if the bandwidth used on the circuit is tripled, but all other factors including the symbol rate, signal strength, and noise strength are kept equal, what would happen to the supported data rate on the circuit? Make sure to explain your reasoning.

Reference no: EM13860518

Questions Cloud

Hat types of activities are conducted by your interest group : hat types of activities are conducted by your interest group?
What are the leadership implications in these circumstances : Does the manager's failure to acknowledge the contributions of his staff constitute an ethical violation? Why or why not and would the answer to this question differ in different cultures or contexts?
Eliminate the last comma in the string output : Eliminate the last comma in the String Output which includes array output values from "hourlyTemp[i]" (entire list). My guess is that this needs to incorporate "%d" somehow but my online book won't accept the use of "%d" for some reason. From the boo..
Differences between two theoretical perspectives : Compare and contrast the similarities and differences between these two theoretical perspectives.
Identify application architecture in use by the organization : Identify the application architecture in use by the organization, and explain the basic mechanics of how that architecture works.
Differences between a proactive and a reactive investigation : What are the differences between a proactive and a reactive investigation as it applies to the crime of terrorism?
Write a java program called numbers : Methods Lab   1. Write a Java program called Numbers that calls the following methods and displays the returned value: o Write a method called cubeIt that accepts one integer parameter and returns the value raised to the third power as an integer.
Examine the organizational frameworks and decision-making : Examine the organizational frameworks and decision-making environment in the judicial process
Identify and analyze any rhetorical appeals : How does the writer/speaker appeal to the audience's emotions and values - How does the writer/speaker appeal to the audience's legitimate fears and concerns?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd