Data communications and networks, Computer Networking

A magazine publisher based in Nairobi has branch in Kisumu, and one in Mombasa. The company has kept in touch by telephone and courier service. Each office is networked. The networks were implemented five years ago and each has a 10 Base 5 Ethernet network.
Lately, the company has been developing projects that involve teams consisting of members from more than one office. Each office has resources that others do not; the current projects require all of these resources. The network have frequent cable problems, each time they have one, the entire network goes down until the problem is resolved.
The management team would like a networking solution which would offer easier troubleshooting, less downtime, and WAN communications between sites. They would like the WAN connections to support 256 kbps of data and several telephone conversations. The combination of long distance calls and courier service should be eliminated by the WAN. Management would like the WAN to be able to continue operation even if one of the WAN links fails.i) Identify at least two items at every site that needs upgrading
Posted Date: 11/16/2012 2:18:38 AM | Location : Kenya







Related Discussions:- Data communications and networks, Assignment Help, Ask Question on Data communications and networks, Get Answer, Expert's Help, Data communications and networks Discussions

Write discussion on Data communications and networks
Your posts are moderated
Related Questions
Bens Network  Ben's network is a non-blocking network.  It is a different  type of Clos network where initial and final stage consists of  2×2 switches (for n input  and m ou

Algorithm:  Odd-Even Transposition //Input: N numbers that are in the unsorted form //Assume that element bi is assigned to pi for I=1 to N { If (I%2 != 0) //i.e Odd

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser


Question 1 Explain the basic communication model with its block diagram Question 2 List and explain the functions of network monitoring Question 3 Explain the get and se

State the term - Lot of care required while programming It is a common and well-known saying that many developers of "secure systems" leave a "back door" way for themselves so

show cdp is the command to verify if CDP is enabled.

Question: a) Briefly describe the purpose of Windows Powershell? b) Name three ways software can be installed on Linux? c) What is an interrupt request? d) As the

a) Consider a hypothetical arrangement of ‘self-learning' bridges shown in the figure below. Assuming all are initially empty, give the forwarding tables for each of the bridges B

Types of VTs There are  several  option for  payload are actually mapped into the VT.  Locked mode VTs  bypass the pointers with a fixed  byte oriented mapping of limited flexi