Local and wide area networking, Computer Networking

Assignment Help:

A. Current setting

A new bank has its headquarters located in City A. Recently, the bank has opened its first branch in City B, and its data centre in City C. The three cities are separated apart over a long distance between them, as illustrated in Figure A. The headquarters and data centre have been internally networked already. The data centre maintains important and confidential data of the clients and bank.

B. Requirements

The bank management is seeking networking solutions for meeting the requirements below: Local branch

  • Ten bank officers are to be hired, each will have their own computer to work with.
  • The LAN supports a data rate of 100Mbps.
  • A database server needed for the staff to store and retrieve the financial data of clients.
  • A printer offers a high-speed and good-quality printing service for all staff.
  • Internet access for web and email services is necessary.
  • To save long distance phone cost to the head and data offices, all the analogue phone conversations are combined with computer data and transmitted together on a link. Wide area sites
  • A private network provides a high-speed delivery of voice and data among the three offices.
  • The network operation is not affected by a link breakdown.

 

C. Task

You are a System Engineer of a computer and networking company, and your task is to design a network infrastructure to satisfy the above requirements of the bank. With the aid of a diagram, elaborate your design which should specify the computer facilities, cabling, network devices, data rate, network architectures, etc. There are no absolutely correct solutions, but you need to justify every implementation with good reasoning.

1585_Local and Wide Area Networking.png

Figure A: Bank offices distributed in a large area


Related Discussions:- Local and wide area networking

Des key, Assume the following 64-bit DES key (expressed in hexadecimal): FE...

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys

Client-server , We need to design and implement a secure conference system....

We need to design and implement a secure conference system. The system will allow users to connect to a conference server and to participate in a shared conversation. The conversat

osi layer performs code conversion, Name the OSI layer which performs code...

Name the OSI layer which performs code conversion, code formatting and encryption Ans) Presentation layer performs code conversion, code formatting and encryption

What are called transactions, The grouped SQL statements are known as Trans...

The grouped SQL statements are known as Transactions (or) A transaction is a collection of actions embused with ACID properties.

Determine downloading time when non persistent http is used, Assume that a ...

Assume that a user wants to download from a server a web page that references 3 objects. The base page and each of the objects are of the same size that requires 20 ms transmission

#title.assignment., hii i want to make a assignment from you. please help m...

hii i want to make a assignment from you. please help me.

Sketch the output waveform square wave that symmetrical, Question: The ...

Question: The input to the circuit in the figure is a square wave that is symmetrical about 0V. Sketch the output waveform.

Explain the functions and features of the ipmonitor program, Functions and ...

Functions and features of the IPMonitor program are as follows:   a)  This program should be able to list out detail information of IP traffic which includes source IP address an

Application to exploring network packet capture, This lab introduces basic ...

This lab introduces basic network capture concepts using Wireshark. Setup You will need a PC running Windows for this lab and you will need to install the Wireshark softwar

Internet mail access protocol - application layer, Internet  Mail Access P...

Internet  Mail Access Protocol Another  mail access  protocols  is internet  mail access  protocols  version 4 (  IMAP4). IMAP4 is  similar to POP3 but it  has more  feature

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd