Traditional network design approach, Computer Network Security

Assignment Help:

Question:

a) Give two reasons why the building-block approach is favoured to the traditional network design approach.

b) With reference to network monitoring parameters, distinguish between:

i) Logical network statistics
ii) Physical network statistics

c) Two important system performance parameters are: Availability and Reliability.

i) Describe the difference between those two parameters.

ii) Determine the MTTR to the nearest hour of a system with an availability of 99% with an average of 2 failures per year.

iii) Evaluate the MTBF to the nearest hour if the reliability of a system needs to be 99.99% over 30 days.

d) Give three steps that will be taken to reduce network management costs.

e) Using all of 6 physical disks, sketch the possible arrays that you will implement in RAID 0+1 and showing how stripes A, B, C, D, E and F are written to the arrays. Provide the total effective size of each array if each disk has a size of 20 GB.


Related Discussions:- Traditional network design approach

Address resolution , Mapping between a hardware address and a protocol addr...

Mapping between a hardware address and a protocol address is known Address Resolution. A router or host uses address resolution when it requires to transmit a packet to another dev

ITC 571 Emerging Technologies and Innovation Assignment, Ask quProject brie...

Ask quProject brief template The project brief is a document upon which the full Project Proposal and Plan will be based. About me: Who are you? What do you do? What is your Exper

Pgp encryption, Produce a short report of your experiences in installing an...

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de

Explain the term virtual private network, Question: (a) Besides privac...

Question: (a) Besides privacy, what other security functions does Pretty Good Privacy (PGP) provides? (b) What is the Post Office Protocol (POP) used for? Why is it impo

Softbank theft of consumer data -information security, Example : Softbank –...

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

Calculate the dynamic range of the 16-bit scanner, You are hired as a consu...

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

Illustrate about tinysec protocol, Illustrate about TinySec Protocol T...

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Security policies, implementing password policy in organisation

implementing password policy in organisation

What do you meant by network address translation, Problem: (a) What do ...

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd