Got a tricky question? Receive an answer from students like you! Try us!

Computer Network Principles - Assignment Example

Only on StudentShare
Masters
Author : cmohr
Assignment
Technology
Pages 18 (4518 words)

Summary

This paper will discuss two designs for two computer networks, the first design will discuss the issues regarding a LAN design and the second one will discuss the routing design and necessary configurations.
The first scenario, discusses a small training business…

Extract of sample
Computer Network Principles


In order to design or upgrade a computer network for business, we need to consider the goals for the network design and the possible problems that will exist in the network after the design is finished or the problems that already exists in the system. Network designer needs to cooperate with the client completely and find out their business and technical goals. For instance, the network designer should be aware of the new applications that client wants to place in the business environment. The designer needs to discover the amount of network availability which is needed to help the key sections of the business to be able to function correctly.
Most of the times, the network design is accomplished by identifying the structure of the business. For instance, the logical design of a network is based on the different departments which exist in the network. So, it is a good start to discover the structure of the departments in the company as it is accomplished in the current assignment:
"The business occupies a two-storey building and a small single storey supplementary building.The larger building has a business broadband connection using ADSL over ATM (PPPoA). The broadband connection has an 8Mbps download and 1 Mbps upload. ...
Download paper

Related Essays

General Electric and Cybernetics Principles
He perceptively foresaw innovative social and ethical consequences.…
12 pages (3012 words)
Computer system Network Security
The issue of computer security first arose in the 1970s as individuals began to break into telephone systems. As technology advanced in computing, computer systems became targets as well. The need for computer network security system raised when a couple of incidents occurred in the USA. The Federal Bureau of Investigation (FBI) made one of its first arrests related to computer hacking in the early 1980s3. A group of hackers known as the 414s, named after their area code in Milwaukee, Wisconsin, were indicted for attacking 60 different computer systems including the Los Alamos National…
5 pages (1255 words)
Computer Network Security Methods
The boom in information technology has revolutionized communications world wide. The exponential growth of the most popular public network, Internet, has made inter-communication fast and effective. The amount of data flow through e-mails, e-commerce etc has gained new peaks and is still growing. Business transactions on corporate networks, corporate data access facilities for mobile employees, e-banking and many other data access and electronic facilities have become the order of the day. Almost any function of sale, purchase, transfer or sharing of data, conduct of on line university…
24 pages (6024 words)
Technology and Network
His statement "our societies are increasingly structured around the bipolar opposition of the Net and the Self" (1996, p. 3) still finds relevance, if not more relevance, a decade after he made it, particularly considering his definition of the self as "the multiple practices through which people try to reaffirm identity and meaning in a landscape of rapid change."…
8 pages (2008 words)
Neural Network
In general a biological neural network is composed of a group or groups of chemically connected or functionally associated neurons. A single neuron may be connected to many other neurons and the total number of neurons and connections in a network may be extensive. These connections are called synapses, are usually formed from axons to dendrites, though dendrodendritic microcircuits and other connections are possible. Apart from the electrical signaling, there are other forms of signaling that arise from neurotransmitter diffusion, which have an effect on electrical signaling. As such, neural…
6 pages (1506 words)
Network Security Assignment
This essay stresses that IT security policies are important because they restrict access to both the information and the systems that the company owns. The policies ensure that only the authorized employees and employers have rightful access to what they have been assigned to handle. Such security policies reduce various risks and threats that face information and systems .They ensure information security in terms of integrity, authentication, availability, and nontrepidation. Security policies provide roadmap to the IT staff that is planning network security implementations and identifies…
9 pages (2259 words)