Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Scenario:

AETMAD Bank is a modern and well reputed bank having 200 branches in various cities of a country. The branches are connected with each other through a grand computer network comprising of more than 1000 computers, 200 routers and a number of other related nodes such as switches, printers and scanners etc. The employees of the bank are often rotated among different branches causing change in the number of nodes per branch. In case of employee rotation, some hosts may be added in a branch and some may be removed resulting in change in the overall network topology. The bank is progressing day by day and having goal to expand its services by opening further branches in different cities of the country. The network executive of the bank has been asked to implement most suitable type of routing which would be easy to handle for the well trained networking staff to deal with scalability, any possible complexity and to maintain the overall efficacy of the network.

Question:

After carefully analyzing the above mentioned scenario and requirements of the bank, suggest the most suitable type of routing from the following with two proper reasons:

  1. Distance Vector
  2. Link State




1. Explain the term Computer Virus.

2. Give five (5) examples of antivirus applications.

3. Mention four (4) instances of how Computer Viruses are spread.

4. State three symptoms of Computer Viruses.


a)     Why the business organization choose computer network for its employee computers? List down the different topologies which are used for computer networks. Is MAC address responsible for communication among computers within same LAN.

b)    If a computer manufacturer called Apex created a home page for the Web, what would its URL likely be? Also, provide appropriate e-mail address for yourself, assuming that you are employed by that company.

c)     What factors made Pakistan Telecommunication Company Limited (PTCL) to convert its network from circuit switching to packet switching?

d)    The ubiquitous nature of mobile phones today brings tremendous convenience to our lives, but misuse of new improvements to this technology result in the loss of that convenience and other problems? Justify this statement.



1. Explain the term Computer Virus.

2. Give five (5) examples of antivirus applications.

3. Mention four (4) instances of how Computer Viruses are spread.

4. State three symptoms of Computer Viruses.


 

Case Study

VIDCO-19 is a privately owned, well-known Software company located in Colombo. The Management of VIDCO-19 has purchased a 3 story building in the heart of Kandy. They are planning to make it one of the state-of-the-art companies in Kandy with the latest facilities. 

It is expected to have nearly 150 employees in Kandy branch.

Department

Number of Users

Customer Care

10

Sales and Marketing

20

Finance

25

Legal

5

HR

10

Developers

55

Network Team

5

Server Room

Servers +ISP connections

 Total 130 computers

Following requirements are given by the Management;

•       All the departments must be separated with unique subnet and should not communicate with each other unless there is a special requirement.

•       192.168.10.0/24 is given and should be used for all the departments except the server room. IPs should assign using DHCP. 

•       ERP and CRM Systems need to be implemented in Kandy branch in local servers.

•       Number of servers required for the Server room need to be decided by the

Network designer and should be assigned with 10.254.1.0/24 subnet. (Uses static IPs)

•       High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks.

•       Sales and Marketing Team need to access Network resources using WIFI connectivity.

•       Proper methods for networking monitoring and troubleshooting need to be established (intelligent hub).

•       All possible network security mechanisms should be implemented.

Assume you have been appointed as the new network consultant of VIDCO-19 Solutions. Prepare a network architectural design and implement it with your suggestions and recommendations to meet the company requirements. 

 

(Note: Clearly state your assumptions. You are allowed to design the network according to your assumptions, but main requirements should not be violated)

 

Task 01

1.1           Discuss the different network models/system types that can be implemented in Kandy branch with their benefits and constraints.

1.2           Discuss main IEEE Ethernet standards that can be used in above LAN and WLAN design?

1.3           Critically analyze network protocol suites used in Network Industry and recommend suitable network protocol suites for above scenario and justify your selection. 

1.4           Explain the difference between Logical topology and Physical topology using examples and compare main network topologies used in network design. 

1.5           Recommend a suitable network topology for above scenario and justify your answer with valid points.

 

Task 02

2.1     Discuss the operating principles of network devices that can be used for above scenario. 

                Ex: Router, Switch, Etc.

2.2     Explore and describe the devices which we can use to enhance security of VIDCO-19 Kandy Branch.

2.3     Critically analyze the importance of networking software and provide examples for networking software can be used in above network design.

2.4               Discuss the importance of Servers in computer networks and research on

Servers that are available in today’s market with their specifications and Recommend server/servers and workstations for above scenario and justify your selection with valid points.

2.5     Discuss why it is important to have compatible devices and related software in network design.

 

Task 03

3.1      Provide VLAN and IP subnetting scheme for above scenario to satisfy user requirements. 

3.2 Provide a list of devices, network components and software need to design a network for above scenario and justify your selection.

3.3 Provide a detailed network design (Diagram) for your design using modeling tool. (Ex: Microsoft Visio).

3.4 Design a User feedback form and get feedback from network users and analyze their feedback and suggestions.

3.5 Install and configure Network services and Applications* of your choice to accomplish above user requirements. (Ex: DHCP, DNS, Active Directory, Proxy, Web, Etc.)

(Note: Screen shots of minimum 2 services are required)

3.6                  Design a detailed Maintenance schedule for above Network design.

 

*Note: - Screen shots of Configuration scripts should be presented.


differentiate between a client network computing and peer to peer processing.


Differentiate between client server computing and peer to peer processing


How the distributed objects overcome the problem which are raised by socket and RPC? Is it necessary to use both socket and RPC in the distributed environment? Justify with valid reason.


Describe the various technologies that enables users to send high volume data over any network


Describe the various technologies that enables users to send high volume data over any network


LATEST TUTORIALS
APPROVED BY CLIENTS