Computer Network Principles - Assignment Example

Only on StudentShare

Extract of sample
Computer Network Principles

In order to design or upgrade a computer network for business, we need to consider the goals for the network design and the possible problems that will exist in the network after the design is finished or the problems that already exists in the system. Network designer needs to cooperate with the client completely and find out their business and technical goals. For instance, the network designer should be aware of the new applications that client wants to place in the business environment. The designer needs to discover the amount of network availability which is needed to help the key sections of the business to be able to function correctly.
Most of the times, the network design is accomplished by identifying the structure of the business. For instance, the logical design of a network is based on the different departments which exist in the network. So, it is a good start to discover the structure of the departments in the company as it is accomplished in the current assignment:
"The business occupies a two-storey building and a small single storey supplementary building.The larger building has a business broadband connection using ADSL over ATM (PPPoA). The broadband connection has an 8Mbps download and 1 Mbps upload. ...Show more


This paper will discuss two designs for two computer networks, the first design will discuss the issues regarding a LAN design and the second one will discuss the routing design and necessary configurations.
The first scenario, discusses a small training business…
Author : cmohr
Computer Network Principles essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the assignment on your topic
"Computer Network Principles"
with a personal 20% discount.
Grab the best paper

Related Essays

Network Security Assignment
Security on them other hand refers to the measures that are adopted to prevent the unauthorized use and reduce the various risks and threats that affect computers, network, and other external resources within any organization. All the measures that are taken ensure that information security is guaranteed because the information is a very valuable resource within the organization.
8 pages (2000 words) Assignment
After its recognition to be relatively solid encryption algorithm, it is gradually gaining acceptance. Some of the core features of blowfish algorithm include: Blowfish has a block cipher of block consisted of 64 bit The length of the key can be up to 448 bits On 32 bit microprocessor architecture, data encryption is supported at a rate of 18 clock cycles on every byte that is much quicker than DES and IDEA encryption.
10 pages (2500 words) Assignment
Based on your readings and understandings of literature on L2 learning and teaching principles, select 3 or 4 pedagogically sound principles and explore how those principles can be applied in the context of CALL (Computer Assisted Language Learning. (Can
Based on your readings and understandings of literature on L2 learning and teaching principles, select 3 or 4 pedagogically sound principles and explore how those principles
11 pages (2750 words) Assignment
Network Security Assignment
According to the report information security entails the adoption of specific measures that are supposed to prevent the unauthorized access, manipulation, use or the denial of access to any data, information, or capabilities that will ensure confidentiality. Organizations nowadays have greatly relied on the various network technologies.
9 pages (2250 words) Assignment
Computer and Network Hardware
The internal components constitute the secondary drives, the processing unit, and the mother board, large number of wires that are arranged in different order, Ram, connecting devices
1 pages (250 words) Assignment
Computer and Network Hardware
The switch also allows reception of telecommunication message and transmission of the message to the required device (Lewis, 2008). A router is a physical device joining a number of networks both wired and
1 pages (250 words) Assignment
Computer and Network Hardware
Protocols: SMTP, POP3 and IMAP achieve its operation. Its NIC must be TCP/IP configured and support intranet or internet and email gateway. Name to address resolution is done by Domain Name System (DNS). It makes
1 pages (250 words) Assignment
Computer and Network Hardware
The library realizes considerable liberty in providing Wi-Fi to its clients more so the students and other parties that obtain various services from these libraries. Shifting from hard line to wireless network services offers numerous
1 pages (250 words) Assignment
Computer and Network Hardware
HHF-CTO, for installation of Local Area Network (LAN) in your organization, dated 1st July 2012. It is to inform you that we have finalized a proposal for installation of LAN in your organization with low costs that would fulfill your requirements and the core
3 pages (750 words) Assignment
Computer and Network Hardware
Security Identifiers enable domain controllers to track information regarding user account when attempts to log on are made. A request will be sent to each domain controller which will then authenticate the user (Technology facts, 2012). Installation
3 pages (750 words) Assignment
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email