Answer:
The model being used in this organisation is the OSI model, this model is used and together with the domain controller .
The network domain consists of all the accounts of the networked computers and also their user’s accounts which are then put in one group to ease the management of the network resources and manage the access and authentication of the clients.
Advantages.
Disadvantages.
Question:
Give the networks models used in Sebastian’s Sea Creatures? Give one advantage and disadvantage of this model.
Sample Answer:
The OSI models will be used for the organisational domains controls ,however both the OSI model and domains controllers were used concurrently.
This model is made of users and the computer accounts that enhances the ease in managing the resources in the networks through authenticating users.
The advantage of this model is that it has some features that enhances the network security.
However this model only disadvantage is the duplication of some network layers meant for error mitigation.
Answer:
The bandwidth will decrease. This is because the switch upload speed is very slow compared to the wireless access point, however the switch will offer a stable connection compared to the AP since the AP has chance of decreasing the bandwidth due to attenuation of the internet signals.
The estimated bandwidth for the access point will be 300mbps/25=12mbps while the switch bandwidth will be 100mbps/25=4mbps therefore there will be a decline in the bandwidth.
Question:
Will the change to switch from AP lead to increasing or decreasing of the network bandwidths to the workstations? Give the explanation and give the estimated effective bandwidths for both cases?
Sample Answer:
There will be a decrease in the bandwidth .This is because the access point devices has higher speed of transmission then the switch devices.The estimates for the bandwidths will be 12MBPS and 4MBPS for the Access point and switch respectively.
Answer:
The will be less collisions. This is because the GATE network with hub will be forwarding the message to each computer connected hence causing collisions unlike the one CAFÉ network where the switch forwards the signals to the specific computer in the network hence eliminates the chances of collision.
Question:
If you connected laptop to GATE, would it be subject to more, the same or less collisions than if it was connected to CAFE?
Sample Answer:
For this case the level of collision will be less.This is because as the switch forwards the signals to the destination device ,the hub send signal to all connected hosts and thus leading to collision therefore the CAFE will be having less collisions
Answer:
The unshielded twisted pair cables is not appropriate to be used in the connection of the two buildings which are within 200 m away due to the following.
Question:
. Give explanation with two reasons why UTP will not be appropriate to be used as network backbones medium.
Sample Answer:
To connect the two building the UTP cables will not be used this is because ,it is highly prone to interferences from electric fields and it experiences cross-talks and affects the signals transmission.
Answer:
The conversion of the organisation network from the IPV4 to IPV6 will be associated with various advantages which includes.
Question:
Describe 2 advantages or benefits of moving network to IPV6.
Sample Answer:
As a result of moving to the IPV6 there will be various benefits which includes :
Answer:
The change of the IPV4 to IPV6 is not a direct exercise however the process is gradual since the IPV4 has to move the resources to the IVP6 network and it is done by help of the following two technologies (Ross ,2016) .
Question:
Explain how it is that IPv4 and IPv6 could co-exist on the same networks at Sebastian’s Sea Creatures and describe two technologies that enable this.
Sample Answer:
The translation to IPV6 is a process and the IPV6 has to inherit the network resources from the IPV4 network where the two major technologies includes:
Answer:
The below is the resulting switch table from the events above.
MAC Address |
Port # |
00-25-2A-00-10-00 |
5 |
00-25-2A-AA-10-0C |
2 |
00-25-2A-00-10-00 |
3 |
00-25-2A-00-00-0F |
4 |
1 |
Question:
Draw the switching table that you’d expect to see at the end of these events. The order of entries is unimportant:
Sample Answer:
After the events analysis the below is the resultant switch table.
MAC Address |
Port # |
00-25-2A-00-10-00 |
3 |
00-25-2A-00-10-00 |
5 |
00-25-2A-AA-10-0C |
2 |
00-25-2A-00-00-0F |
4 |
Answer:
The problem is caused by the Trojan horse which is malware that is disguised as a normal genuine program, this malware can appear like a game or software program that when clicked or installed do malicious activities in the computer or even destroy the files as well (Peter , 2015)
The defensive way of handling this malware is by installing and updating the antivirus in the computer and avoids installing any un trusted application inside the computers.
Question:
What type of malware caused Sebastian the problem? What are defences against this type of malware?
Sample Answer:
The Trojan horse: This is a problem that results from a virus called a Trojan horse which is obtained by downloading applications from the internet although they tend to be genuine but they are malicious and affects the computer memory, applications and documents.
However this is controlled only by use of the antivirus applications to control the computer virus.
Answer:
The best cloud computing in this case is called Software as a Service .
This is the best service since the organisation will not be having professionals and this service will enable the organisation to use the applications and resources remotely and therefore there will be no installations of applications in the computers locally or even to set up a data centre (Charlie , 2014).
Therefore it will enable the organisation meet their goals easily by eliminating cost of buying computer hardware, programs and there will be no cost of maintenance ,installations and supports.
Question:
Which is the best cloud computing services that suites this situation? Give justification to Answers.
Sample Answers:
The Software as a Service. This is where the organization will have to host their programs in the computers in the remote servers and no other expense will be incurred to use the services.
The company will therefore be able to run their business at a low prices and no other devices will be bought for use or cost will be incurred to maintain or install the local computing infrastructures.
Answer:
To implement the high speed data access storages in the network there are two ways that can be used which includes.
The SAN is a storage device which is dedicated in the networks ,these devices can be tapes drive or even the array disks and they together build blocks for storing data ,however NAS is one device which can be a server and its storage space is shared through the network (Alfred , 2014) ..
Question:
Which are the solutions used to address centralised storage?
Sample Answer:
The below are the ways to do the implementation of the high speed data access in the data storage devices.
However SAN uses the dedicated network storage media while the NAS uses a single device like servers which is accessible by the entire network hosts.
Reference
Alfred ,A. (2014) Handbook of Applied Cryptography.2nd edn.New York:CRC Press.
Charlie ,K.(2014) Network Security: Private Communication in a Public World, 2nd edn. New York :Prentice Hall.
Peter ,N.(2015) Computer Related Risks.3rd edn. Boston:Addison-Wesley. 1995.
Ross ,A.(2016) Security Engineering.1st edn.New York :John Wiley & Sons.
Simson , G. (2015) Web Security, Privacy & Commerce.1st edn.California:O’Reilly.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download