I’m trying to study for my Risk Management course and I need some help to understand this question. Introduction to the Concept of Gemba Kaizen (3:01) For this discussion, further….
You have been given the responsibility of recommending a suitable network to an organization give basis for recommending X.25, frame Relay or ATM.
a. Explain the term switching as used in data communication. (2 Marks)
b. Using the TCP/IP protocol stack, explain how a client sends mail to a remote using the SMTP
protocol. (4 Marks)
c. Differentiate between static and dynamic routing algorithms. (4 Marks)
d. Compare connectionless and connection-oriented packet switched networks using the following
ii. Greatest strength
iii. Error correction
e. Two 10 Base T local area networks (LANs) are located in separate building that are 8km apart.
One LAN has a total cable span of 1000m and the other has a 2500m cable span. Draw a basic
topology showing what repeaters, bridges and routers are needed to form a consolidated network.
What connection alternatives are possible and why would they be used. (4 Marks)
f. Suppose that you are working for a large corporation that has been assigned the IP network address
18.104.22.168. The company management wants to be able to accommodate a number of 16
departments and you are requested to design the network layout.
i. What is the maximum number of hosts per department? Explain the logic of your answer.
What subnet mask needs to be used? (3 Marks)
ii. What are the valid host addresses on the first subnet? (1 Mark)
iii. What are the valid broadcast addresses for the first subnet? (1 Mark)
g. Differentiate between a frame as used in IEEE 802.3 and a cell as used in ATM and explain why in
a frame error checking occurs at the end of the frame while in cell it appears at the end of the
header. (5 Marks)
Why Choose CustomEssayMasters.com?
♦ 24/7 customer support
♦ On-time delivery guarantee
♦ Plagiarism-free research papers
♦ Affordable and student-friendly prices
♦ Scholarly-rich custom-written papers
♦ 100% privacy and confidentiality