Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Write a fruitful function sum_to(n) that returns the sum of all integer numbers up to and

including n. So sum_to(10) would be 1+2+3. . . +10 which would return the value 55.


You are a network engineer. You have been asked to plan and implement a network for

two buildings. Each building has two floors. Each building has its own router, they are 

600 meters away from each other.

The first building contains the following Computer Labs:

1- Logic Lab (First Floor). The lab has 88 PCs, 4 switches.

a. Name one of the PCs net1.

2- C++ Lab (Second Floor). The lab has 135 PCs, 6 switches.

a. Name one of the PCs net2.

3- Media Lab (Second Floor). The lab has 590 PCs, 20 switches.

a. Name one of the PCs net3.

b. This LAB is data intensive, use the best possible cabling bandwidth.

4- Use the following Network address 174.15.0.0 255.255.128.0 for the three labs 

(Subnets).

5- The PCs in each network should obtain their IPs automatically from their DHCP 

server.

6- The DHCP Server should be assigned with a static IP address.

 Each LAN has its own DHCP Server. It should provide enough number of 

dynamic addresses for all PCs. It should also provide other information like 

DGW and DNS details.



An example of a troubleshooting document

Write a test program that creates some items of different types, adds them to the database, removes one of them and then prints out a list


Write a Database class that creates and maintain a list of multimedia items. Your class must use the subclasses defined above to provide the following minimum functionality: a) add an item to the list b) remove an item to the list c) print out a list of items (to the screen) d) depreciates each item


Research the ‘SolarWinds Hack’ and discuss your findings. Your discussion should put an emphasis on the follow (not limited to the list): • the assets of Solarwinds (including the type of data exposed and affected bodies) • which vulnerability was exposed (including the risk before the breach and measure that were in place to avoid it) • threat actor • the timeline of the attack • threat vector (provide details) • solarwinds defense and post attack productivity the discussion should be one page long, use more than one source and reference.


Difference between c++ and c

Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room

Servers +ISP connections

· High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.

· Sales and Marketing Team need to access Network resources using WIFI connectivity.

· Proper methods for networking monitoring and troubleshooting need to be established.

· All possible network security mechanisms should be implemented.

·      1.Prepare a written network design plan to meet the above mentioned user requirements including a blueprint drawn using a modeling tool. (Ex: Microsoft Visio, Edraw Max).

2.Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the list of devices, network components and software used to design the network for above scenario and while justifying your selections.



Multiple devices are connected via single line according to priority, how to access this mechanism to initiate Input-Output.


Explain any two methods of accessing 1/0 devices and transferring data from them


LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS