ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Networking Fundamentals and Design

Verified

Added on  2020/04/01

|5
|1261
|65
AI Summary
This networking assignment delves into the critical aspects of network design and management. It covers topics such as Quality of Service (QoS) requirements for different applications, fundamental network design principles, performance monitoring techniques, and reliability metrics like MTBF and MTTR. Students are tasked with analyzing scenarios, defining QoS levels, classifying network components, and calculating availability based on specified metrics.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORKING
Networking
Name of the Student:
Name of the University:
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
NETWORKING
Chapter 1
Answer to question 1
High-Quality (phone company-grade) voice calls: Guaranteed service – Guaranteed service
is required due to reduce the call drop rate in order to retain the identity and the legibility of
the calling party.
Voice over IP (VoIP): Predictable service – Given the client desires and the idea of open IP
arranges, the VoIP association should be unsurprising, yet does not require the end-end
certification of a normal telephone call.
FTP File Transfers: Best Effort – It is sufficient to give the association amongst client and
source with TCP guaranteeing conveyance off all information outlines.
Audio File Downloads: Best Effort – like as FTP this is a non-constant application that can
make utilization of TCP to guarantee conveyance over a variable time.
Video on demand: Guaranteed Service – this service is needed the guaranteed that the video
information stream keeps up a settled misfortune and jitter resilience over a heterogeneous
system to maintain a strategic distance from loss of video flag or inadmissible picture quality.
Server access: Best effort – like other non-time sensitive applications, this application can be
sophisticated concluded a best exertion benefit that best suits the variable transfer speed and
client requests for the information interface.
Answer to question number 2
Scenario 1
For motioning the system performances, the data about the performances of the system is to
be collected. The requirement of the user in this scenario is 100ms and if the delay is more
than 100ms an alert would be triggered for the system.
Document Page
2
NETWORKING
Scenario 2
A threshold violation is detected when the device that monitors the performance discovers
that the value that is measured is out of the range of the threshold value. The threshold value
in this scenario is 1.5 mb/s and the required value by the 512kb/s. Hence the value should lie
in between 512 kb/s and 1.5 mb/s. Alerts would be triggered if the value fluctuates form the
estimated data in either side.
Answer to question number 3
For monitoring the system, storage environment for the systems the performances metrics for
the storage system and the SANS switches. The alerts are also to be defined so that whenever
the performance threshold are triggered the alerts would be generated and the user would be
notified about the situation.
Answer to question number 4
The routers are used at the end points to provide services and also distribute them. SLA can
be used for measurement of the network metrics. The slack time and the response time can be
used for defining the system.
Answer to question number 5
The computer architecture and design and architecture and architecture and design of
a business are similar. The computer has an input and an output system. Similarly, the
businesses have import and export systems. The computer systems have processing units and
similarly the businesses have production units.
Chapter 2
Answer to question 1
Network must support Fast Ethernet and Gigabit Ethernet interfaces for all devices on the
network: Fundamental Requirements
Document Page
3
NETWORKING
Network backbone should be upgradable in capacity to 10 Gb/s within two years of
deployment: Informational requirements
Finance department requires firewall protection to the server: Feature Requirement
Existing network consists of 10BaseT Ethernet and FDDI segments: Informational
requirement
Network personnel would like to be able to bill users for network service: Feature
requirements
Network core must not generate or terminate any user traffic: fundamental requirement
Network must support digital video traffic from remote video cameras, and may additionally
support sound from these cameras: Fundamental requirement
Answer to question number 2
Database servers must run brand XYZ software: application
Teleconferencing requires at least 350 Kb/s capacity: device
Users must be able to submit print jobs of up to 25 MB in size: users
Each access network should be able to service 200 corporate users: network
Answer to question number 3
Processing telemetry data from a space shuttle launch, and providing that data to mission
control during launch. (Customer: NASA.): mission critical
The situation is mission critical as because the criteria is vital to the functions that are
operable within the organization named NASA.
Processing requests from automated teller machines throughout a city. (Customer: Bank.):
real time. The situation is real time as the teller machines would be responsive and the Bank
has to provide the service to the customers in real time.
Processing requests for Web pages from your servers. (Customer: Internet service provider.):
real time. The situation is real time as the web page would be responsive and the internet
service provider has to provide the service to the customers in real time.
Answer to question number 4
VoIP: the delay is caused when the packets of voice data take more time the expected time.
This is very important as thus causes disruption in the network.
Non-buffered video or audio playback: Delay is very important for the non-buffered video or
audio playback because once data from the system is downloaded it has to be viewed
immediately by the users and cannot be stored and hence, the file that the users is viewing
can be disrupted.
Teleconferencing: the teleconferencing is also a live process which involves interaction form
both sides in real time disruption in any one end can disrupt the whole session.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
NETWORKING
Chapter 3
Answer to question number 1
The following questionnaires are directed towards the users, hospital management and the
staff.
1. For how many hours would the network be active?
2. How are the notifications provided in the network?
3. What are the authentication system in the network?
4. Is there a requirement for the further sub division of the network?
5. Is there any requirement required for the accessibility of the network?
6. Is there any scope for the introduction of the wireless services in the network?
Answer to question number 2
For the analysis of the network Ethereal can be used. The software is to be installed in
the PC. The analyser performs the TCP stream analysis. This analyser is used for testing the
performance of the network.
Answer to question number 3
Reliability of a T1 link between an enterprise network and its ISP, with IP routers on each
end of the T1: MTBF and MTTR are used as the measure of reliability of the cloud services.
Round-trip delay between devices on network A and servers on server LAN B: the RTD and
RTT can be used as the measure of round trip delay
Average traffic rate in and out of a compute server, measured across all four of its LAN
interfaces over 15-minute intervals: The traffic low rate would be used as the metric.
Answer to question number 4
Given that,
MTBCF requirement of 8000 hours
MTTR requirement of 4 hours
Availability(A) = (MTBCF)/ (MTBCF + MTTR)
A = (8000)/ (8000 + 4) = 99.95% availability requirement
1 out of 5
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]