Wan architecture and wan service, Computer Network Security

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected order management system that coordinates  orders, raw materials, and  inventory across all 14 factories.  The management wants to go for a cost-efficient  data transmission solution for intermittent traffic (few megabits per Second) between  the sites. What type of a WAN architecture and WAN  service would you recommend? State and justify the rationale behind your choice.

Posted Date: 3/13/2013 3:10:22 AM | Location : United States







Related Discussions:- Wan architecture and wan service, Assignment Help, Ask Question on Wan architecture and wan service, Get Answer, Expert's Help, Wan architecture and wan service Discussions

Write discussion on Wan architecture and wan service
Your posts are moderated
Related Questions
attacks on crytography

USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

i want to detec and classify network anomaly detection based on KDD99 data set using swarm intelligence

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o

how to encryt the data in plaintext cipher

Secure Socket Layer (SSL) accepts a combination of asymmetric and symmetric (public-key) encryption to accomplish integrity, confidentiality, authentication and non-repudiation for