Identify application architecture in use by the organization

Assignment Help Computer Networking
Reference no: EM13860518

Assignment: Business Data Communication and Networks Concepts

There are three parts to this assignment relating to each lecture in Module 1.

Part 1: Layering and the Internet Model

Imagine that a technology organization has been in business for decades, and that the organization developed its own method of computer-to-computer communication. Because this method of communication only occurs within this organization, it is not layered, but rather is designed to operate as quickly and efficiently as possible on the custom hardware by using the least amount of overhead possible. The organization continues to create its own communication hardware and software that works with modern computers, but the CTO of the organization is considering replacing this custom communication solution with the adoption of the Internet Model in use today, along with its technologies. With this scenario in mind, address each of the topics below.

Topic 1: The Advantages of a Layered Model

Identify and describe the advantages that a layered solution would offer the technology organization when compared to its non-layered solution.

Topic 2: The Disadvantages of a Layered Model

Identify and describe the disadvantages of a layered solution when compared to the organization's non-layered solution.

Topic 3: The Layers of the Internet Model

Identify the layers of the Internet Model, and explain what functionality each layer would provide for the organization, if adopted.

Topic 4: Other Advantages

Are there advantages, for the organization, to adopting the Internet Model beyond those mentioned in Topic 1? If so, describe them.

Part 2: Application Architecture

Assume that an organization's employees have each been given a computer to perform their work. Each computer accesses the organization's applications via a powerful mainframe computer in the server room. When an employee types a key, the keystroke is sent to the mainframe, which in turn decides what action to take, and transmits that action back to their computer. Every keystroke is sent to the mainframe, and all decisions are made by the mainframe. Each employee's computer acts only as an input and display device. The CTO is considering switching from its current architecture, to another architecture. With this scenario in mind, address each of the topics below.

Topic 1: Architecture Identification

Identify the application architecture in use by the organization, and explain the basic mechanics of how that architecture works.

Topic 2: Switching to Client-Server

Identify and explain three issues the organization would need to address if it would like to switch from its current architecture to a two-tier, client-server architecture.

Topic 3: Advantages and Disadvantages of Client-Server

Identify the advantages and disadvantages, for the organization, of switching from the organization's current architecture to a client-server architecture.

Part 3: Digital Communication Rates

Imagine that we need to digitally download the text of a paperback book at the rate of 40 pages per minute. The number of lines per page is 25, and the number of characters per line is 65. With this scenario in mind, address each of the topics below.

1. Most of what is needed to calculate the number of bits sent per minute is present in the scenario above, but something is missing. What is it?

2. What are the common values for this missing item, and where do these values come from?

3. Which value would you choose from #2? There is no one provably "correct" answer to this, but do make sure to justify your choice.

4. With your assumption in #3, calculate the bit rate needed, expressed as bits per second, to download the text of the book as described in the scenario. Recall that the bit-rate formula is:

C = b/t

where C is the bit-rate, b is the number bits, and t is the unit of time.

5. Now that you have calculated the bit rate needed to download the book, let us consider how this relates to symbol transmission over a physical circuit. If a physical circuit encodes one bit per symbol, what would the minimum symbol rate need to be to download the book? Make sure to give the value and explain your reasoning.

6. If 256 Quadrature Amplitude Modulation (256-QAM) is used on the physical circuit, what would the minimum symbol rate on the circuit need to be to download the book at the given rate of 40 pages per minute? Make sure to give the value and explain your calculations.

7. Lastly, if the bandwidth used on the circuit is tripled, but all other factors including the symbol rate, signal strength, and noise strength are kept equal, what would happen to the supported data rate on the circuit? Make sure to explain your reasoning.

Reference no: EM13860518

Questions Cloud

Hat types of activities are conducted by your interest group : hat types of activities are conducted by your interest group?
What are the leadership implications in these circumstances : Does the manager's failure to acknowledge the contributions of his staff constitute an ethical violation? Why or why not and would the answer to this question differ in different cultures or contexts?
Eliminate the last comma in the string output : Eliminate the last comma in the String Output which includes array output values from "hourlyTemp[i]" (entire list). My guess is that this needs to incorporate "%d" somehow but my online book won't accept the use of "%d" for some reason. From the boo..
Differences between two theoretical perspectives : Compare and contrast the similarities and differences between these two theoretical perspectives.
Identify application architecture in use by the organization : Identify the application architecture in use by the organization, and explain the basic mechanics of how that architecture works.
Differences between a proactive and a reactive investigation : What are the differences between a proactive and a reactive investigation as it applies to the crime of terrorism?
Write a java program called numbers : Methods Lab   1. Write a Java program called Numbers that calls the following methods and displays the returned value: o Write a method called cubeIt that accepts one integer parameter and returns the value raised to the third power as an integer.
Examine the organizational frameworks and decision-making : Examine the organizational frameworks and decision-making environment in the judicial process
Identify and analyze any rhetorical appeals : How does the writer/speaker appeal to the audience's emotions and values - How does the writer/speaker appeal to the audience's legitimate fears and concerns?

Reviews

Write a Review

Computer Networking Questions & Answers

  Data integrity for input strings and security issue

What are some problems with not adding data integrity for your input strings? Example: If you are asking for an amount and when you can put in a letter. What is one security issue that can take place with an interface? Explain why.

  Explain elementary process for case-tracking system

You are now modeling logic of each elementary process for case-tracking system and have decided to write it is Structured English to communicate effectively with both users and programmers.

  Common network for all onboard systems

This module item is similar to the previous case study. You need to analyze and study the subject presented below and compose a report answering the questions posed.

  How is sodexho using social networking to its advantage

How do the new practices at Sodexho align with the essentials of performance management? How is Sodexho using social networking to its advantage

  What expansion of network services and benefits might the

350 words....you have been hired by your local library to help it set up a lan to connect its three library sites. the

  Explain how would you perform the batch configuration

you install a proxy server system in a midsize organization with about 100 separate hosts distributed among several

  Wireless technologies to access various network resources

The following are the four main wireless technologies used to access various network resources: Radio wave, Infrared. Explain three advantages and three disadvantages of each of these wireless technologies.

  Described a layered model of networking

Described a layered model of networking along with details of physical implementations that together support a wide range of possible networking scenarios.

  Determine prefixes for four subnets

Assume it wishes to create four subnets from this block, with each block having same number of IP addresses. Determine the prefixes (of form a.b.c.d/x) for four subnets?

  What is needed to accelerate its deployment

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Sources must be cited in apa format nbspyour response

sources must be cited in apa format. nbspyour response should be a minimum of one 1 single-spaced page to a maximum of

  Explain what is the router''s outside interface ip address

What is the router's outside interface IP address. What is the router's inside interface IP address. What is the Web site's public IP address. What is the private IP address of the backup web server

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd