Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

“Network topology can simply be defined as the arrangement of the elements (links,



nodes, etc.) of a communication network”.



With reference to the foregoing statement, use a well labelled diagram, describing any three types of Network topologies and highlighting their advantages and disadvantages.

Assume you are a Network Administrator in your organisation who has been faced with various network-related issues, and have managed to resolve them effectively.

Discuss any ten (10) Network-related issues and the corresponding troubleshooting steps/ approach that you have adopted to resolve these issues. Use appropriate diagrams, images or screenshots where applicable in order to enhance your explanation.


BranchRouter >> HQRouter

network: 209.165.165.0

Mask: 255.255.255.252

Prefix:?

WAN Segment:

  • You have been given both the network address and subnet mask for this segment. Determine how many possible addresses exist in a network with the subnet mask provided.
  • (Hint: the subnet mask in this question produces a VERY SMALL network. Neither of the addresses you use for the interfaces will be anywhere close to 254 or 255). 
  • Assign the first available IP address in the first subnet to the interface on the Branch router connected to the WAN link
  • Assign the last available IP address in the first subnet to the interface on the HQ router connected to the WAN link
  • Determine the prefix based on the given subnet mask of 255.255.255.252

Fill in the appropriate address and prefix information below. The prefix does not need to be the entire network address, but rather just the two-digit number:

Branch WAN interface IP address:_____

HQ WAN interface IP address:___

Prefix (with or without the slash):______


QUESTION 2

1. In not less than 2,000 words, discuss five (5) roles of Information system in the

COVID-19 Pandemic management and Control?



QUESTION 1

Business process modeling is a graphical representation of a company’s business processes or

workflows. As a means of identifying potential improvement in a business process, you are

required to identify an ‘AS IS’ (existing) business process in your firm and model the process.

You are to note the following conditions for the task:


6. You are required to use Innovator for Business Analyst or any other process

modelling software to model both processes (“AS IS” and “TO BE”).


Business process modeling is a graphical representation of a company’s business processes or workflows. As a means of identifying potential improvement in a business process, you are

required to identify an ‘AS IS’ (existing) business process in your firm and model the process.

You are to note the following conditions for the task:

1. The identified process must be Cross-functional which should include not less than

four (4) decision points (Gateways).

2. Make sure you list all the steps in the identified process before modeling.

3. Describe how information systems could be used to improve the “AS IS” process

4. Remodel the ‘AS IS’ process to “TO BE” (modified) process after identifying

improvement with the Information systems.

5. If you are not affiliated to a firm, kindly work with any firm of your choice to identify

and model the processes (Both “AS IS” and “TO BE” processes).



Give a detailed account on the relationship between logical and physical design

Attack tree





Consider the following scenario of attack and construct a Attacker tree:





Smart Droid a well know company-in mobile devices base solution for employ managements has just in placed a new system in air university. The-new system have two method of employ verification 1) written password 2) facial recognition. In case of written password a device on the entry of each department is in place. When ever the employ enters the department he / she first enter his or her id and then the door gets open else he/ she is not allowed to enter the region. On the other hand the facial recognition system is in place at the gate way of Air university once the face is recognized it send the image to the server through an sub server which is connect through wifi node with the device on the gate. During rush hours system show delay in the processing of facial recognition. The attendance of each user on recognition show on the display screen placed in the main hall of each department.

Critically analyse the difference between horizontal application software and vertical application


software.

You are an IT consultant, and you are asked to create a new system for a small real estate brokerage firm.


Your only experience is with traditional data and process modelling techniques. This time, you decide to try


an object-oriented approach. How will you begin? How are the tasks different from traditional structured


analysis?

LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS