data communication and networking, Computer Networking

Assignment Help:
i) Identify at least two items at every site that needs upgrading [2 Marks]

ii) What type of WAN connection (link) might you use to connect the three sites to each other? [2 Marks]

iii) How many WAN connections will it take to connect the three sites? Show the links in a diagram [2 Marks]

iv) What types of storage networks would you implement at the LANs/WANs? (2 marks)

v) What type of device could be used to connect the multiple signals from both voice and data and put them on the same WAN link? [2 Marks]

vi) What type of connectivity device should be used to connect the LAN to the multiple paths in the WAN created? Discuss what type of IP addresses you would assign for the LANs and WANs (5 marks)

vii) Discuss the media that is suitable for individual the branch offices, stating the merits and demerits of each media. [5 marks]


Related Discussions:- data communication and networking

Low frequency cut-off of the band-pass, Question Approximately what is ...

Question Approximately what is the low frequency cut-off of the band-pass filter shown in the figure?

Explain the concept of token passing, Token Passing S...

Token Passing Station is able to send only when it receives a special frame called a token Token circulates around the ring If station wishes to sen

Telecommunication switching system, if the signal input to an amplifier is ...

if the signal input to an amplifier is 0 dBm what is the power output in mW if the gain of the amplifier is 20 dB ?

What is a pseudo TTY, What is a pseudo tty? A pseudo tty or false termi...

What is a pseudo tty? A pseudo tty or false terminal enables external machines to connect by Telnet or rlogin. Without a pseudo tty, no connection can take place.

Roles of host system, Q.Role of Host System? Hosts on OSI implementatio...

Q.Role of Host System? Hosts on OSI implementations don't handle network operations (simple terminal) but TCP/IP hosts participate in most network protocols. TCP/IP hosts do su

State some security models, State some Security Models The first and f...

State some Security Models The first and foremost thing one needs to do is to chalk out a security plan and policy based on any security model. The term security policy shall

Command that configures serial0 for ppp encapsulation, Recognize the comman...

Recognize the command that configures serial0 for PPP encapsulation Ans) Router(config-if)# encapsulation ppp

What are the local network security issues, Q. What are the Local Network S...

Q. What are the Local Network Security Issues? Local Network Security Issues Password Protection - Encrypted username & password Group/Owner ID's - File Permissi

Distance vector and link-state protocol, What's the difference among distan...

What's the difference among distance vector and link-state protocol?

Describe the automatic repeat request protocol, Question 1: (a) In net...

Question 1: (a) In networking, there are different possible topologies. Explain the Linear bus, Ring and Star topology along with their advantages and disadvantages. (b) W

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd