Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room

Servers +ISP connections

·   All the departments must be separated with unique subnet and should not communicate with each other unless there is a special requirement.

·  IPs should assign using DHCP.

·   ERP and CRM Systems need to be implemented in this in local servers.

·   Number of servers required for the Server room need to be Uses static IPs.

·   High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.

·   Sales and Marketing need to access Network resources using WIFI connectivity.

·   Proper methods for networking monitoring and troubleshooting need to be established.

·   All possible network security mechanisms should be implemented.

·     Develop test cases and conduct verification to test the above Network and analyses the test results against the expected results.



Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room

Servers +ISP connections

·   All the departments must be separated with unique subnet and should not communicate with each other unless there is a special requirement.

·  IPs should assign using DHCP.

·   ERP and CRM Systems need to be implemented in this in local servers.

·   Number of servers required for the Server room need to be Uses static IPs.

·   High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.

·   Sales and Marketing need to access Network resources using WIFI connectivity.

·   Proper methods for networking monitoring and troubleshooting need to be established.

·   All possible network security mechanisms should be implemented.


Provide examples for networking software that can be used in above network design.


Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room

Servers +ISP connections

·   All the departments must be separated with unique subnet and should not communicate with each other unless there is a special requirement.

·  IPs should assign using DHCP.

·   ERP and CRM Systems need to be implemented in this in local servers.

·   Number of servers required for the Server room need to be Uses static IPs.

·   High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.

·   Sales and Marketing need to access Network resources using WIFI connectivity.

·   Proper methods for networking monitoring and troubleshooting need to be established.

·   All possible network security mechanisms should be implemented.


Recommend servers for the above scenario and justify your selection with valid points.


Given the following host requirements and using the IP address 195. 20. 5.0/18 divide the network using VLSM. 550, 30, 1050, 880, 58, 2, 2, 2 


·     Discuss the inter-dependence of workstation hardware with networking software and provide examples for networking software.


Describe three things (risks) that can cause damage to computer hardware; and explain measures an organization can use to minimize or prevent the risks.


<span lang="EN-GB">Main Objective of the exercise</span>

 

This is another client-server application. It builds on echoserver and has a more complex protocol based on the well-known series of (very bad) jokes. It is based on the standard Java introduction to distributed systems. The objective is to get it the simple client-server application working on the same machine and then on two different ones. Once you’ve done that the next step is to run a multi-client server version!

 


<span lang="EN-GB">What to do</span> – Single Client-Server Knock Knock Application

 

The following diagram shows the networked application.

 

As with the echoserver application, KKClient and KKServer are two processes (programs) that interact via the Socket API. You can run them on the same computer or on different computers (as you did in the last tutorial). You can see that the protocol is more extensive. The following shows the architecture.



Using two examples each, explain the difference between cyber technical vulnerabilities and people‐related vulnerabilities.


Using the stages of an attack below , give two examples of what an attacker would do if the attacker is to achieve the attack


Stages to focus on


a. Reconnaissance


b. Weaponisation


c. Delivery


d. Exploitation


e. Installation

An attack can impact individuals in the home and individuals working in organizations in different ways.


Considering the statement above , describe any two possible individual or personal cyber impacts using examples

LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS