Evaluate threats to network provision and compare solutions

Assignment Help Basic Computer Science
Reference no: EM13936066

Answers to the tasks will demonstrate the ability to:
1. Critically evaluate threats to network provision and compare solutions
2. Compare and contrast existing and emergent networking technologies
3. Apply appropriate network technologies in complex settings, providing alternative solutions, clear selections and justifications.
4. Critically evaluate relevant and credible sources for up to date information on network and data communications technologies.

Scenario

Rubha Reidh (means Red Point in the local Gaelic language, sometimes seen spelt Rua Reidh and pronounced "roo-a ree") is a remote lighthouse on the west coast of Scotland. The lighthouse itself is now automated (as are all lighthouses in the UK) and the original keeper's cottage is now run as a bed & breakfast holiday guest house.

This is a VERY remote location. The nearest place on the map is Melvaig, which is just a camp site and an Inn. The nearest place with a shop is Gairlock, 12 miles (20km) away. Gairlock is so small that it does not have a Wikipedia entry! Oddly, Rubha Reidh itself does have a Wikipedia entry, so you can look it up. There is also a web site for the guest house, so you can search for that as well. The UK post code for Rubha Reidh is IV21 2EA. You may need this post code during your research.

You can use it on mapping web sites such as maps.google.com and www.streetmap.co.uk to find the location. The places named here also come up in normal searches, with links to various local information. Like any modern holiday accommodation, Rubha Reidh need to provide Internet access for their guests. However, given the remoteness of the location, this isobviously going to be a challenge. Your assignment is to determine how to provide an Internet connection to this location.

You are to provide a report for the owners of Rubha Reidh that explains the options available to provide high speed and reliable Internet connections to their location. You should produce a formal report that outlines a suitable range of connection technologies that could be used for this location. You MUST focus on this location. Consider the problems that this location presents and how the technologies resolve those problems. You need to make recommendations for this location and clearly justify these recommendations. You need to cover the entire backhaul connection route from the premises to a major Internet backbone.

You do not need to discuss local distribution of the Internet connection at the premises. i.e. do not discuss LAN technologies. You should research the connection technologies that are currently available to Rubha Reidh using the various web sites that provide such information. You should also consider novel connection technologies that are not commonly used but may be appropriate for this location. A Visit Scotland grant is available to help the local tourist industry with getting Internet connections, so the cost is not a major issue, but you do need to provide guidelines on cost and consider it alongside other aspects of the technologies discussed.

Reference no: EM13936066

Questions Cloud

The typical procedures for internet intruders : As a system administrator, how can you protect your system from these attacks? Can you give a complete hacker story (from technical aspect) including the tools employed by them?
Write a windows form program for a nina''s cookie source. : Include at least one other functional control such as a button (Exit button) or a MenuStrip having an Exit and an About selection.
Do you think the one-year forward rate would underestimate : Do you think the one-year forward rate would underestimate, overestimate, or be an unbiased estimate of the future spot rate in one year? Explain.
Research methodology and data collection strategy : 1) Your research methodology and data collection strategy must be clearly outlined in an appendix. 2) Copies of any research instruments, eg questionnaires or interview questions, used must be included in an appendix in your report.
Evaluate threats to network provision and compare solutions : Rubha Reidh (means Red Point in the local Gaelic language, sometimes seen spelt Rua Reidh and pronounced "roo-a ree") is a remote lighthouse on the west coast of Scotland. The lighthouse itself is now automated (as are all lighthouses in the UK) a..
Create a windows form application in c# : The total price will be the number of computed rental days times the cost for the model of car selected ($19.95/day for Compact, $24.95/day for Standard and $39/day for Luxury).
Do you think raven ltd should hedge its remittance : Based on this information, do you think Raven Ltd should hedge its remittance of expected Japanese yen profits to the UK parent by selling yen forward contracts? Why would this strategy be advantageous?
Define and discuss key terms associated with the event : You are to select ONE healthcare reimbursement event and discuss the following: History and purpose and Define and discuss key terms associated with the event
What will be probability distribution of the yens change : If Stillwater Ltd uses this information to forecast the Japanese yen's exchange rate, what will be the probability distribution of the yen's percentage change over the upcoming period?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Control aspects of speed and delivery of content

Currently, there are questions over whether it is permissible for ISP's (major U.S. providers include Comcast, Verizon and AT & T) to control aspects of speed and delivery of content on their netowrks to their subscribers. Many subscribers and sites ..

  Write sequence of statements-find first comma in string line

Write down sequence of statements which finds first comma in the string line, and assigns to variable clause portion of line up to, but not including comma.

  Code a method called calcremainder

Code a method called calcRemainder() that receives two integers through its parameter list and returns

  Use of authentication types techniques impact security

Explain how the use of authentication types techniques impact security

  Windows tools and bsod errors

Windows Tools and BSOD Errors

  Systems analysis and design

What are the benefits of a thorough system requirements document? Drawbacks? How can a system requirements document be used to manage stakeholder expectations?

  Know the industry in which a company operates

Getting to know the industry in which a company operates is a critical factor for leveraging information systems and gaining a competitive advantage.

  What do u get when u type in that subarray and why?

so there is an array called arr2=[ 1 2 3; -2 -3 -4; 3 4 5]; what does it mean to access the subarray arr2(:, 1:2:3)? like what do u get when u type in that subarray and why?

  Use bcd to encode the decimal number

Find the decimal integer that corresponds to each interpretation and Perform the subsequent operations:

  Develop a program to play lottery

Suppose you want to develop a program to play lottery. The program randomly generates a Lottery of a two-digit number, prompts the user to enter a two-digit number, and determines whether the user wins according to the following rule.

  Problem regarding the binary calculations

Do the following binary calculations.

  Drivers for digital dashboards found in automobiles

Believe or not digital dashboards can be found in automobiles. In fact, Mossberg (2010) wrote article titled, "Ford Drives Digital Dashboards to Next Level. Are drivers ready for this kind of technology?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd