Data communications and networks, Computer Networking

Assignment Help:
A magazine publisher based in Nairobi has branch in Kisumu, and one in Mombasa. The company has kept in touch by telephone and courier service. Each office is networked. The networks were implemented five years ago and each has a 10 Base 5 Ethernet network.
Lately, the company has been developing projects that involve teams consisting of members from more than one office. Each office has resources that others do not; the current projects require all of these resources. The network have frequent cable problems, each time they have one, the entire network goes down until the problem is resolved.
The management team would like a networking solution which would offer easier troubleshooting, less downtime, and WAN communications between sites. They would like the WAN connections to support 256 kbps of data and several telephone conversations. The combination of long distance calls and courier service should be eliminated by the WAN. Management would like the WAN to be able to continue operation even if one of the WAN links fails.i) Identify at least two items at every site that needs upgrading

Related Discussions:- Data communications and networks

Define the terms unicasting and multiccasting, Define the terms Unicasting,...

Define the terms Unicasting, Multiccasting and Broadcasting? If the message is sent from a source to a one destination node, it is called Unicasting. If the message is sent

What are the working of software team, What are the working of software tea...

What are the working of software team The software team has to learn every bit of things related to computers. Since different users work on different platforms and application

Illustrate TCP – bytes and segments, Q. Illustrate TCP – bytes and segments...

Q. Illustrate TCP – bytes and segments? TCP - bytes & segments TCP at the sending site collects bytes into a packet called a segment TCP adds a header to each se

Briefly describe about cryptography, Question 1 Describe any five differen...

Question 1 Describe any five different types of computers Question 2 Explain Bus Type LAN. Its advantages and disadvantages and examples Question 3 Explain the s

Why routine security audits are essential, Why Routine security audits are ...

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

What is a database server, With a database server, the client gives SQL req...

With a database server, the client gives SQL requests as messages to the database server. The results of every SQL command are returned over the network. The server uses its own pr

Describe essential security services, Problem: (a) Application Layer pr...

Problem: (a) Application Layer protocols can be classified as connection-oriented or connectionless-oriented. i. What do you understand by the term protocol? ii. Give an e

Determine the task which should intranet require, Determine the task which ...

Determine the task which should intranet require Intranet to work smoothly, the following tasks should be properly synchronised: All computers connected together in a n

Explain what are the external threats, Explain what are the External Threat...

Explain what are the External Threats External security threats are the most problematic ones. Till date the greatest threat was the virus menace. Now, with the sophisticated

Computer nework critira, what is compurter network and types, topology, com...

what is compurter network and types, topology, communication media

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd