Now electronics has four stores in the sydney region

Assignment Help Computer Networking
Reference no: EM13380253

Now! Electronics has four stores in the Sydney region (Hornsby, Penrith, Campbelltown, City) connected in a star topology by leased T-1 lines to its head office in North Ryde.

(a) Sketch the existing WAN, showing the stores, head office and the leased lines.

(b) What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store?

(c) A new stock management server is to be installed to track stock in all four stores - all sales will be reported to this server as they happen. Some members of the development team want to install this new server in head office, while others want to install it in the city store because that store has 40% of the total sales. Which option do you prefer and why?

(d) Now! is planning an aggressive expansion strategy with offices and stores in each Australian state. Compare the merits of expanding the existing T-1 based WAN with moving to a new MPLS-based WAN.

Reference no: EM13380253

Questions Cloud

Wite a java application that allows the user to read : write a java application that allows the user to read validate store display sort and search the account
Barwon taichi is a small and dynamic business located in : barwon taichi is a small and dynamic business located in geelong and melbourne. it provides self-defence fitness and
What do you think is the key to managing change in projects : what do you think is the key to managing change in projects? why do you think this is the key?assess your current
A company with headquarters at 1 talavera rd north ryde : a company with headquarters at 1 talavera rd north ryde wishes to obtain internet access. they require unlimited data
Now electronics has four stores in the sydney region : now electronics has four stores in the sydney region hornsby penrith campbelltown city connected in a star topology by
Backbone networksa backbone network can be constructed as a : backbone networksa backbone network can be constructed as a switched backbone a routed backbone or a vlan backbone.
Wireless networksconsider a warehouse that is 60m by 30m : wireless networksconsider a warehouse that is 60m by 30m. wireless networking is required so that up to 20 staff
1 ascii code is a fixed-length coding scheme using the : 1. ascii code is a fixed-length coding scheme. using the 7-bit ascii code table 3 or any other references find the
The data encryption standard des is a symmetric-key : the data encryption standard des is a symmetric-key algorithm for the encryption of electronic data which you

Reviews

Write a Review

Computer Networking Questions & Answers

  What is the full address of the abbreviated ipv6

Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable leave your answers in fully expanded hexadecimal colon notation.

  Design a simple layout of omni directional antennas

Would you recommend security for this network, and if so, what type of security? Discuss the options and justify your choice and design a simple layout of omni directional antennas to cover the entire warehouse.

  Create a project plan for moving the data center

Describe the knowledge and processes areas of project management in accordance to the Project Management Institute Project Management Body of Knowledge (PMBOK®) Guide.

  Explaining mutual exclusion protocol

In Lamport'so mutual exclusion protocol, if process i is implementing critical section, Is this still true when there are no messages in transit?

  Produce a test plan for the new inventory system

Produce a report detailing how you will manage the transition to the new platform so as to assure the quality of the process and hence the outcome.

  Write characteristics of smtp-pop3-tcpprotocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols? What are they used for?

  Create variant of kerberos in which workstation generate tgt

Create variant of Kerberos in which the workstation generates TGT. TGT will be encrypted with user's master key rather than KDC's master key.

  Which modern wireless technologies use ofdm

Investigate the history of the CSIRO Wifi patent which was recently up-held in courts in the United States.

  Determine rtcp bandwidth that each sender be assignied

Let the RTP session comprising of four users, all of which are sending and receiving packets to same multicast address. Determine RTCP bandwidth that each sender be assignied?

  Describe the methods to tackle and mitigate rf multipath

Describe the methods to tackle and mitigate RF multipath that impact to WLAN throughput. Explain the purposes of POE in WLAN design.

  Describe available bandwidth as a function of n

Assume that N Ethernet stations, all trying to send at same time, need N/2 slot times to sort out who transmits next. Describe available bandwidth as function of N.

  Explain data communications and network infrastructure

Explain the data communications and network infrastructure which Dell must put to manage its internal communications and external communications with Intel.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd