Tuesday, June 4, 2019
Chapter two homework
Chapter two homeworkChapter Two Homework1. What are some typical technical oddments for organizations forthwith?Scalability, approachability, Performance, Security, Usability, manageability, adaptability, affordability.2. What does availability mean?Its can be expressed as a percent uptime per year, month, week, day, or hour compared to the total time in that period. It does also be expressed as a mean time between failure (MTBF) and mean time to repair (MTTR).3. If a network is up for 835 hours in quintette weeks, what is the availability?In the week = 24 x 7 = 168 hour in one weekSo, 168 x 5 = 840 hourSo the availability is 835 / 840 = 0.994 x 100 = 99.4 %4. Using the five nines availability, what is the down time in moment per four weeks?One weeks in second = 60 x 60 x 24 x 7 = 604800 second4 Weeks = 604800 x 4 = 2419200 secondAvailability = 1 0.99999 = 0.000001 secondSo the downtime is 0.000001 * 2419200 = 24.192 second.5. What does the term hot-swapping means, and what the reasons for using it?6. A customer requires 99.999% availability, how would you carry out maintenance for such a network? Assume that hot-swapping is not possible7. What are the typical bit misconduct rate BER of a fiber link copper link?8. If a load is 115kbps where a tract switch needs to transmit it over an ISDN rophy (128kbps), what is the utilization? How many packets in the queue?Utilization = 115/128 = 0.898%Average number of packets in queue = (0.898) / 1-0.898) = 8,804 Packets9. How do bandwidth and throughput differ?Bandwidth is a data carrying force of a circuit, usually specified in bits per secondThroughput is the quantity of error free data transmitted per unit of time, usually specified in packets per second10. How can one improve network efficiency?More the packet is larger more the efficiency of the network will be.11. What are the security threats if a network device is compromised?Data flowing through the network can be intercepted, analyzed, altered, or de leted, compromising integrity and confidentiality.Additional, related network services, which rely on trust among network devices, can be compromised. For example, bad routing data or incorrect authentication information could be injected into the network.User passwords can be compromised and apply for further intrusions and perhaps to reach out and attack other networks.The configuration of the device can be altered to allow connections that shouldnt be allowed or to negative connections that should be allowed.12. What tradeoffs may be necessary in order to improve network efficiency?Implementing good throughput for one application might cause persist problems for another application. The cause of the efficiency of the (network) throughput is the packet size, so if one application have large packet size to concord it efficiency the other packet for another application may dont have capacity on the network.13. Redundancy is not one of the network goals, what is meant by redundan cy? Explain to what network goal is related and why?Redundancy means adding duplicate links or devices to a network to avoid downtime.Redundancy is linked to Availability, but redundancy is not a network goal, but redundant network topologies are becoming more and more significant for many networks design client who want to make certain business continuity after a major fault or disaster.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.