Answer to Question #242242 in Java | JSP | JSF for Nicki

Question #242242

Q.1.1 Identify a suitable network scenario/ case that can be used to explain and discuss the relationship of concepts in the exhibit. Ensure that you provide details of the following aspects of the scenario:  • Description of the scenario;  • Why the scenario is considered a network system.  

Q.1.2 As part of the requirements analysis, list the requirements for each component or related area presented in the exhibit. Include the following components or network areas:  • Network systems and related network protocols;  • Network systems and related network traffic;  • Network systems and related embedded systems.  (15)        

Q.1.3 Using Q.1.1 and Q.1.2 above, discuss the relationship between the concepts as presented in the exhibit. In particular, explain the importance of understanding these relationships in network systems design. 


1
Expert's answer
2021-09-26T02:42:24-0400

Q.1.1 ANSWER

Let us consider the scenario of an academic institution.


In this case, The functional requirements of the network system mainly involves the allowing the user or

students to be able to access the network resources anytime possible, remotely accessing the academic resources 

and the computer system to run the experiments. This also include allowing the students to download or upload the

academic resources, checking their examinations transcripts, and also allowing users like Lecturers to upload the assignments.


This scenario is considered a network system because, it will consist a group of computers and devices.

Being connected to the network can communicate. information exchange And equipment Network sharing 

"network that has multiple dimensions.


Q.1.2 ANSWER

Requirements analysis consists of identifying, gathering, and understanding system requirements and their characteristics, and developing thresholds for performance to distinguish services (low-, high-performance, specified services etc.) Fundamental to network design.


i. A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. Examples of standard network protocols are TCP (Transmission Control Protocol), UDP (User Datagram Protocol), IP (Internet Protocol), ARP (Address Resolution Protocol), HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol) (Simple Mail Transfer Protocol)etc


ii. Network traffic is the amount of data moving across a computer network at any given time. Network traffic, also called data traffic, is broken down into data packets and sent over a network before being reassembled by the receiving device or computer. Operators often distinguish three broad types of network traffic: Sensitive, Best-Effort, and Undesired.


ii. An embedded system is a microprocessor-based computer hardware system with software that is designed to perform a dedicated function, either as an independent system or as a part of a large system. At the core is an integrated circuit designed to carry out computation for real-time operations.

Complexities range from a single microcontroller to a suite of processors with connected peripherals and networks; from no user interface to complex graphical user interfaces. The complexity of an embedded system varies significantly depending on the task for which it is designed. Embedded Systems can be classified into four types based on the performance and functional requirement.

  • Real Time Embedded Systems.
  • Stand-Alone Embedded Systems.
  • Networked Embedded Systems.
  • Mobile Embedded Systems.



Q.1.3

i. Embedded Systems Provides resource sharing (sharing of files, applications or hardware, an Internet connection, etc.) 

They also provides Communication support (email, live discussions, etc.) Processes Communication (communication between industrial computers)


ii. Protocols and standards make networks work together. Protocols make it possible for the various components of a network to communicate with each other, and standards make it possible for different manufacturers' network components to work together.


iii. Network traffic analysis is an essential way to monitor network availability and activity to identify anomalies, maximize performance, and keep an eye out for attacks.



Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment

LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS