Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Discuss the functions of each layer of the OSI model and protocols used

Describe the various positions in information security, and list the duties, tasks, and responsibilities associated with each position. 


·     Prepare a written network design plan to meet the above mentioned user requirements including a blueprint drawn using a modeling tool. (Ex: Microsoft Visio, EdrawMax).

Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the list of devices, network components and software used to design the network for above scenario and while justifying your selections.

 

·     Test and evaluate the proposed design to meet the requirements and analyse user feedback by using a User feedback form.

 

·     Install and configure Network services, devices and applications (Ex: VLAN,DHCP, DNS,Proxy, Web, Etc.) according to the proposed design to accomplish the user requirements and design a detailed Maintenance schedule for above Network.

            



Find Matrix Chain multiplication for following four matrices (M1, M2, M3 and M4) using dynamic programming Technique. 

echnique.

Matrix M1 M2 M3 M4

Order of Matrix 4 x 3 3 x 5 5 x 2 2 x 6

Distributed system is described as scalable when it remains effective when there is a



significant increase in the number of resources and the number of users. However, these



systems sometimes face performance bottlenecks.



How can these be avoided?

A University department has a file called exam marks which contains a list of


examination marks indexed by student names in alphabetical order. A student manages


to access the exam marks file. The student cannot read the file since it is encrypted.


However, they can work out the position of their own mark making use of the fact that


the students are listed in alphabetical order. The student swaps their mark with that of


the student who is always ‘top of the class’.



Write a paragraph discussing which of the security features has been breached?

Q1:DHCP has failed on the network. What do you have to configure manually to be able to use your Internet access as usual?

Q2:How many MAC are there?

Q3:On which layers does a switch work and what is its task?

Q4:Why are different types of routing protocols used within and between autonomous systems on the Internet?

Q5:What is the minimum, maximum and average latency between nodes in a ring-shaped network with equal latencies per section and data transmission in both directions in the ring?

Q6:What access control other than CSMA/CD is possible for wired networks? What are their advantages and disadvantages?


A basketball player throws the ball at the different angles. At which of the following angles will the ball achieve the maximum height? A. 35.0° B. 45.0° C. 65.0° D. 70.0°


3.2 Constituency Office Otuani



• The Otuani constituency office for the Opuwo Rural Constituency is nearing completion. There will be 5 employees with computers and IP phones, a computer lab with 25 places, a network printer for employees, a network printer for the lab, and 3 servers.



• The office only has an ISDN BRI link to the outside world. Provide Quality of Service such that the IP phones operate properly.



• The capital expenditure for this network (routers + switches + IP phones, but excluding PCs, laptops, printers) is capped at 100,000 N$.



Question 1: From the above scenario, design a network topology (using Packet Tracer).

b) DRAM is used in the main memory. To compensate for the slow speed of the DRAM, there are advanced DRAM organizations introduced. Discuss the advanced DRAM organization.


LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS