Evaluate the percentage availability of the network, Computer Network Security

Assignment Help:

QUESTION

a) "Two of the key attributes of an enterprise network is that it have to be multi-platform and multisite."

Decribe what you understand by this statement.

b) A logical network diagram is the deliverable at the end of the Needs Analysis stage in network planning. Illustrate the different phases in this stage.

c) Describe the following in relation to redundancy:
i) RAID Level 0+1
ii) Differential backup
iii) Level 3 UPS

d) In terms of performance, consider a network with an MTBF of 3000 Hours and MTTR of 2 Hours:

i) Evaluate the percentage availability of the network.
ii) Evaluate the percentage reliability of such a network over a one-year period.
iii) Determine the average throughput between two hosts given that the RTT for a 32 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes ICMP request-reply is 6 milliseconds.


Related Discussions:- Evaluate the percentage availability of the network

Implement database security, Question: (a) Describe fully with example ...

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

Wireless sensor networks, The project will be involving a design and a repo...

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

Distinguish between authorization and authentication, Question : (a) D...

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

Udp interaction, UDP INTERACTION  UDP follows four kinds of interactio...

UDP INTERACTION  UDP follows four kinds of interaction 1-to-1: One application can interact with one application. 1-to-many: One application can interact with many

Discuss the importance of ontologies in agent communication, Question 1...

Question 1 The speech act theory is used as the model for communication among computational agents. Locution, illocution, and perlocution are the 3 aspects of this theory Using

Explain the schemes for distribution of public keys, (a) What is a pseudora...

(a) What is a pseudorandom generator? Give an example describing how it works. (b) Explain the key components of a wireless network and their purpose. (c) Describe the authen

Deploying host-based idss, Deploying Host-Based IDSs -Proper implementat...

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

Steganography-cryptography, Steganography It is a process of hiding info...

Steganography It is a process of hiding information in use for a long time. Most popular modern version of this process hides information within files appearing to contain digit

Understanding a business model of a spammer, The first and foremost need of...

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd