Global Network Architecture - Research Paper Example

Only on StudentShare

Extract of sample
Global Network Architecture

Berlin to Beijing is the weakest link. In the event of failure it completely cuts off links between east and west. Furthermore, it has the lowest bandwidth which means even in the absence of such an event, data flow is still slow. The next two are Beijing to Shanghai and Singapore, the bandwidth is low and in the event of disruption each endpoint city could be completely isolated from the rest of the network.
We suggest how the network could be re-designed to overcome the weaknesses and vulnerabilities identified. If the company can only afford to make ONE of the changes you propose, recommend what that change should be, we recommend add a Cairo to Singapore link at 512Kbps. It would lighten the load on the weakest link as well as allow redundancy in the east-west backbone.
In order to provide global communications, fiber optic cables need to be laid under the oceans of the world. We have provided details of a modern day, and currently operational, cable laying ship; including its name, technical specification in terms of its cable laying capability, what techniques it uses to lay cables and examples of a recent mission:
This vessel has worked along with the Asia-America Gateway. ...Show more

Summary

A global company has its headquarters in Paris (France) with offices in London (UK), Berlin (Germany), Madrid (Spain), Cairo (Egypt), Berne (Switzerland), Beijing (China), Shanghai (China) and Singapore. These offices are interconnected by telecommunications links provided by several Telcos as shown below.
Author : denesiklenny
Global Network Architecture essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the research paper on your topic
"Global Network Architecture"
with a personal 20% discount.
Grab the best paper

Related Essays

Network Security
As network vulnerabilities are constantly at a rise, network security vulnerabilities are evaluated in three categories i.e. logical security, internal security and external security. The logical security domain will cover technical controls such as deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server and VPN security as well.
15 pages (3750 words) Research Paper
Research Paper on iPhone Network or Security
That part of the research paper is followed by a second and a third part, the outline for which is as follows: The second part will deal with the features of the network technology employed by the iPhone. It will be further divided into sections on the types and methods of connections used for the phone, both in the U.S.
3 pages (750 words) Research Paper
Iphone Network and Technology
a network Components of the global area network Introduction to 3G A detailed discussion of 3G Network architecture: General discussion of network architecture The network architecture of iPhone Advantages of the network architecture of iPhone Basic hardware components: Background Components, and their roles Role of switches Network security: Reasons of network security Challenges The network security protocols of iPhone Conclusion and recommendations: General discussion Summary of the layout of the paper Recommendations Harris Kamran Telecommunications Term Paper 24 July 2011 iPhone Network and Technology Introduction: In the world of cellular industry and telecommunications, the iPhone has
12 pages (3000 words) Research Paper
Electronic Commerce and Architecture
On the other hand e-commerce could be described as electronic data exchange (EDI) involving the querying of inventories and transmission of purchase of orders involving two or more companies (Appan and Browne, 2010). The term could also be defined as the making of business transactions through electronic channels in relation to internet based relationships actively involving vendors and consumers.
7 pages (1750 words) Research Paper
Complete Computer Network Infrastructure for a Real or Ficticious Business
Our IT strategy executes by defining the topology of the network. The topology will define the structure of the entire network along with preferred cable to be used. Secondly, hardware specification of all departmental workstations and will be carried out along with the cost.
20 pages (5000 words) Research Paper
Network Infrastructure Planning
Permission software are the most helpful infrastructure to help the fashion-ware company control the operations of the satellite branches at different times of the 24 hours in a day and still share the same resources at the central server at the head office.
3 pages (750 words) Research Paper
Network security
For that matter, secure routing protocols for ad hoc and wireless sensor networks will be precisely looked at considering their policies and methods geared to help them meet their security necessities. Mobile nodes or computers in ad hoc networks collaborate and send packets to each other hence having them communicate past the direct wireless communication range set for them.
15 pages (3750 words) Research Paper
Network Security Architecture
The former requires one or multiple servers or switches to be deployed while the latter approach is more coherent to the IEEE 802.11 standard. The IEEE 802.11 specifies a group of technologies governing
1 pages (250 words) Research Paper
High Level business architecture
Business requirements can be defined as the high level needs or necessities which after fulfillment by an organization lead to the satisfaction of its
4 pages (1000 words) Research Paper
WAN, Architecture Overview
around the globe are fighting tooth and nail to adopt a networking technology that will facilitate optimal achievement of business goals (DiMarzio, 2001). One the key features in promoting business competitiveness is the adoption of Wide Area Network (WAN) connectivity. On this
6 pages (1500 words) Research Paper
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT