Local and wide area networking, Computer Networking

Assignment Help:

A. Current setting

A new bank has its headquarters located in City A. Recently, the bank has opened its first branch in City B, and its data centre in City C. The three cities are separated apart over a long distance between them, as illustrated in Figure A. The headquarters and data centre have been internally networked already. The data centre maintains important and confidential data of the clients and bank.

B. Requirements

The bank management is seeking networking solutions for meeting the requirements below: Local branch

  • Ten bank officers are to be hired, each will have their own computer to work with.
  • The LAN supports a data rate of 100Mbps.
  • A database server needed for the staff to store and retrieve the financial data of clients.
  • A printer offers a high-speed and good-quality printing service for all staff.
  • Internet access for web and email services is necessary.
  • To save long distance phone cost to the head and data offices, all the analogue phone conversations are combined with computer data and transmitted together on a link. Wide area sites
  • A private network provides a high-speed delivery of voice and data among the three offices.
  • The network operation is not affected by a link breakdown.

 

C. Task

You are a System Engineer of a computer and networking company, and your task is to design a network infrastructure to satisfy the above requirements of the bank. With the aid of a diagram, elaborate your design which should specify the computer facilities, cabling, network devices, data rate, network architectures, etc. There are no absolutely correct solutions, but you need to justify every implementation with good reasoning.

1585_Local and Wide Area Networking.png

Figure A: Bank offices distributed in a large area


Related Discussions:- Local and wide area networking

virtual private network - virtual private network vpns, Virtual private ne...

Virtual private network The virtual  private  networks takes the  user data  encrypts them and sends them  to their  destination over  the internet. the sender  and the receiv

Mips instruction - set and explain the restrict pipelining, 1.  Consider th...

1.  Consider these two potential additions to the MIPS instruction set and explain how they would restrict pipelining. a)  cp d1(r1), d2(r2) copy contents of word at address

Ieee specification for spanning tree protocol, What is the IEEE specificati...

What is the IEEE specification for Spanning Tree Protocol Ans) IEEE 8021.d Spanning Tree Protocol (STP) was developed to stop routing loops in a network. If a router, switch, or

Distance vector multicast routing protocol, DVMRP • Distance vector mu...

DVMRP • Distance vector multicast routing protocol: Distance vector multicast routing protocol are abbreviated as DVMRP. These protocols are suitable for small networks which

Routing table - network layer and routing , Routing Table Each  router ...

Routing Table Each  router now  uses the  shortest path tree to construct its routing table . each  router  uses the same algorithm and the same link state  database its own sh

What is arcnet, What is ARCNet? The  Attached  Resource Computer Networ...

What is ARCNet? The  Attached  Resource Computer Network (ARCNet) standard was formed in 1977 at the Data Point Corporation by a scientist  -  John Murphy. ARCNet uses the toke

Metrics are used by routing protocols, What metrics are used by routing pro...

What metrics are used by routing protocols to verify the best path?

Error correcting code - hamming code, Error Correcting Code - Hamming Code:...

Error Correcting Code - Hamming Code: Hamming code is the one of the error-correcting code named after its inventor. Because of the simplicity of the hamming code, it can dete

Subnet layer of the tcp-ip model, Q. Subnet layer of the TCP-IP model? ...

Q. Subnet layer of the TCP-IP model? These two layers of the OSI correspond straight to the subnet layer of the TCP/IP model. Majority of the time the lower layers under the

Point out the drawbacks of token ring, Point out the drawbacks of Token Rin...

Point out the drawbacks of Token Ring. Few of the drawbacks of Token Ring are: a. Token Ring is very costly. All topology components cost much more than other more popular s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd