Data communications and networks, Computer Networking

Assignment Help:
A magazine publisher based in Nairobi has branch in Kisumu, and one in Mombasa. The company has kept in touch by telephone and courier service. Each office is networked. The networks were implemented five years ago and each has a 10 Base 5 Ethernet network.
Lately, the company has been developing projects that involve teams consisting of members from more than one office. Each office has resources that others do not; the current projects require all of these resources. The network have frequent cable problems, each time they have one, the entire network goes down until the problem is resolved.
The management team would like a networking solution which would offer easier troubleshooting, less downtime, and WAN communications between sites. They would like the WAN connections to support 256 kbps of data and several telephone conversations. The combination of long distance calls and courier service should be eliminated by the WAN. Management would like the WAN to be able to continue operation even if one of the WAN links fails.i) Identify at least two items at every site that needs upgrading

Related Discussions:- Data communications and networks

Illustrate the advantages of VLANs, Q. Illustrate the Advantages of VLANs? ...

Q. Illustrate the Advantages of VLANs? - Cost and time reduction in moving stations from one group to another - Creation of virtual workgroups - Security Position of

Explain about data link layer sub layers, Data Link Layer Sub layers ·  L...

Data Link Layer Sub layers ·  Logical Link Control (LLC) - upper layer · Handles control information, logical addressing and data · MAC (Medium Access Control) - lower layer ·

Explain functions and protocols and services of each layer, Describe in pro...

Describe in proper details about OSI Model ? Explain the functions and protocols and services of each layer ?

What is clipper, Clipper is a compiler that was well recognized at the time...

Clipper is a compiler that was well recognized at the time of80's and early times of 90's. We can build DOS based applications (even large applications too) using clipper. There is

Encrypted with a symmetric key, Alice sends a message to Bob, encrypted wit...

Alice sends a message to Bob, encrypted with a symmetric key. Bob decrypts the message and finds it is a purchase order for an expensive workstation. When the time comes to deliver

Different kinds of host in multicasting, What are the different kinds of ho...

What are the different kinds of host in multicasting?

Explain data communications, The distance over which data moves within a co...

The distance over which data moves within a computer may differ from a few thousandths of an inch, as is the case within a one IC chip, to as much as lot of feet along the backplan

Configure the physical topology- ccna, Configure the Physical Topology ...

Configure the Physical Topology Step 1: Cable the network. Refer to the figure and table below for the essential cables. Step 2: Physically connect lab devices. C

Dns cache poisoning, DNS cache poisoning The DNA cache poisoning gener...

DNS cache poisoning The DNA cache poisoning generally refers to the process of maintaining or developing the false information, in the cache of DNS server. This process refers

Dns - server attacks, DNS - Server Attacks It’s not so easy to list al...

DNS - Server Attacks It’s not so easy to list all the associated attacks as they are evolving way so fast. As any error of flaw is identified, a patch is released in response

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd