Computer Networks Answers

Questions: 989

Answers by our Experts: 989

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Question 3

a) I have no need for security management functions because I am using a dedicated and secure management network. Please comment on this statement

AP,5

 2

  

  b) Performance and accounting management are similar, in that both are interested in collecting usage data from the network. Describe an important way in which the use of this data and the requirements for its

AN,10

c)A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. What should an

 administrator implement to prevent future outbreaks?



Question 2

a) Explain two factors that can be important to the business success of a third-party

management application vendor that potentially has to compete with a network management offering of a network equipment vendor

AP,5

b) Explain the most important reason for using a dedicated management network instead of a shared one?

 Assume that you need to manage a network that contains three different types of

 devices. To avoid dependence on a particular vendor, you have two suppliers for each

 type of device. Explain some of the ways in which management standards are

 important in this situation.

c)

AN,10

AP,10

TOTAL[


Question 1


 a) A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. Explain the protocol needed to be configured on each network device to provide that information in a secure manner AP,5

b) A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which policy should the IT security team implement to help protect the network from attack as a result of this new policy

 c)

Explain why a management protocol needed between managers and agents, and why

 isn't mere connectivity between them sufficient?



Question 3

a) I have no need for security management functions because I am using a dedicated and secure management network. Please comment on this statement


  

  b) Performance and accounting management are similar, in that both are interested in collecting usage data from the network. Describe an important way in which the use of this data and the requirements for its collection differ.


c)A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. What should an

 administrator implement to prevent future outbreaks?


Question 4

a)

 As a network administrator, design a network diagram for an organization having six

 offices in in a different region making sure that users can access all the organization’s network


 b) A technician wants to securely manage several remote network devices. Explain what

should be implemented to securely manage the devices?


c) After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers. Explain what should the technician perform so that Ann can get back to work as quickly as possible?



 • What is deadlock? What is starvation? How do they differ from each other?  


) Compare the two policies and then create a policy you believe would be fair to you as a student of RGI. Include guidelines for Internet use during school hours, breaks, use of smartphones, and restrictions for using social media and unauthorized websites

(a) Locate two AUPs, one from the internet (published online) and the second one should be for your institution (Richfield Graduate Institute of Technology?


• Consider a bit streaming scenario for a video where the following values apply:

– The buffer size is 1 MiB

– The low watermark is set at 100KiB

– The high watermark is set at 900KiB

– The incoming data rate is 1Mbps

– The video display rate is 300 Kbps

Assume that the video is playing and that the buffer content has dropped to the low-water mark. The media player sets the controls for data input to begin again.

– Calculate the amount of data that will be input in two seconds to the buffer and the amount of data that will be removed from the buffer in the same period of time.

– Repeat the calculation for 4,6,8,10,12 seconds.

– From this data estimate when the buffer will have filled up to the high water mark.

– Assuming that the incoming transmission is halted at this time, calculate how long it will be before the buffer content has again fallen to the low-water mark level.


Consider a bit streaming scenario for a video where the following values apply: – The buffer size is 1 MiB – The low watermark is set at 100KiB – The high watermark is set at 900KiB – The incoming data rate is 1Mbps – The video display rate is 300 Kbps

 Assume that the video is playing and that the buffer content has dropped to the low-water mark. The media player sets the controls for data input to begin again



Consider a bit streaming scenario for a video where the following values apply: – The buffer size is 1 MiB – The low watermark is set at 100KiB – The high watermark is set at 900KiB – The incoming data rate is 1Mbps – The video display rate is 300 Kbps


LATEST TUTORIALS
APPROVED BY CLIENTS