Local and wide area networking, Computer Networking

Assignment Help:

A. Current setting

A new bank has its headquarters located in City A. Recently, the bank has opened its first branch in City B, and its data centre in City C. The three cities are separated apart over a long distance between them, as illustrated in Figure A. The headquarters and data centre have been internally networked already. The data centre maintains important and confidential data of the clients and bank.

B. Requirements

The bank management is seeking networking solutions for meeting the requirements below: Local branch

  • Ten bank officers are to be hired, each will have their own computer to work with.
  • The LAN supports a data rate of 100Mbps.
  • A database server needed for the staff to store and retrieve the financial data of clients.
  • A printer offers a high-speed and good-quality printing service for all staff.
  • Internet access for web and email services is necessary.
  • To save long distance phone cost to the head and data offices, all the analogue phone conversations are combined with computer data and transmitted together on a link. Wide area sites
  • A private network provides a high-speed delivery of voice and data among the three offices.
  • The network operation is not affected by a link breakdown.

 

C. Task

You are a System Engineer of a computer and networking company, and your task is to design a network infrastructure to satisfy the above requirements of the bank. With the aid of a diagram, elaborate your design which should specify the computer facilities, cabling, network devices, data rate, network architectures, etc. There are no absolutely correct solutions, but you need to justify every implementation with good reasoning.

1585_Local and Wide Area Networking.png

Figure A: Bank offices distributed in a large area


Related Discussions:- Local and wide area networking

Relevance and protection regarding dns attacks, Relevance and Protection re...

Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o

Define the term - public knowledge information, Define the term - public kn...

Define the term - public knowledge information It is essential to distinguish between public knowledge information and the more detailed pieces of information relating to spec

Define some solutions of security, What is Security solutions Though t...

What is Security solutions Though there are a number of security solutions available due to sophistication in technology, there are a number of risks and difficulties attached

Show the process of mail delivery, Q. Show the process of Mail Delivery? ...

Q. Show the process of Mail Delivery? Mail Delivery -Consists of three stages -First stage - email goes from user agent to local server, where it is stored until it ma

When would we use isdn, We use IDSN supports high speed voice, data and vid...

We use IDSN supports high speed voice, data and video and is a good choice for many small businesses.

How can you identify the ip class of a given ip address, How can you identi...

How can you identify the IP class of a given IP address? By looking at the first octet of any given IP address, you can recognize whether it's Class A, B or C. If the first oct

Describe network topology and vpn, Describe Network Topology and VPN Ne...

Describe Network Topology and VPN Network Topology refers to the layout of a computer network. It presents how devices and cables are physically laid out, as well as how they j

Use of coaxial cable, Has a central core conductor covered in an insulating...

Has a central core conductor covered in an insulating sheath encased in an outer conductor of metal foil  RG numbers indicate physical specs such as thickness and type of insula

What are major types of networks and explain, What are major types of netwo...

What are major types of networks and explain? Server-based network: Give centralized control of network resources and depend on server computers to give security and network

What is dos, What is DoS? A do, or Denial-of-Service attack, is an atte...

What is DoS? A do, or Denial-of-Service attack, is an attempt to stop users from being able to access the internet or any other network services. Such attacks might be come in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd