Question

Explain each of the good network design goals. Connectivity / Reliable performance / Management control and security / Scalability/ typed please

Explain each of the good network design goals.

Connectivity /

Reliable performance /

Management control and security /

Scalability/

typed please

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Each of the goals of network design are briefly described below :

CONNECTIVITY

The network design must be able to provide error free communucation accross locations that are geographically apart.

The transit time and response time of the network connection should be very low.

RELIABLE PERFORMANCE

The good network design will always give a good and reliable performance .

The design should be flexible enough to improve the performance of network by installing new networks or even upgrading the existing network. A reliable network will be robust enough to bear any catastrophic situation. The number of failures should be less and the network design should be able yo recover from the failure easily.

MANAGEMENT CONTROL AND SECURITY

The network management can be done using the specific tools created for that purpose. It is the goal of the network design process to select an apt tool for the network according to the needs of the organisation.

The network has to be secure enough so that any external user cannot enter the network without authentication. The design should be good enough to take care of any security breaches aur attacks on the network.

SCALABILITY

The network design should have a good scalability means that it should be able to adjust with the changes in an organization. With time, the organization may want to open up new branches, add new employees, merge with any new company, or even may want to shrink its size, etc . The good network design should be able to adapt easily in all the above mentioned scenarios.

Add a comment
Know the answer?
Add Answer to:
Explain each of the good network design goals. Connectivity / Reliable performance / Management control and security / Scalability/ typed please
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • do q1 if i have to post q2 again and typed please! typed pleaae! the goals for q2) connectivity reliable performance...

    do q1 if i have to post q2 again and typed please! typed pleaae! the goals for q2) connectivity reliable performance management control ans security scalability 1. Is it possible to use Ethernet network data link protocols on a Token Ring network? Explain why or why not. Describe each of the Network design goals as discussed in class 2. typed pleaae! the goals for q2) connectivity reliable performance management control ans security scalability 1. Is it possible to use Ethernet...

  • Complete the following short answer questions: 1. Design an Ethernet network to connect a single client...

    Complete the following short answer questions: 1. Design an Ethernet network to connect a single client PC to a single server which will contain a wired connection to both digital storage media as well as an optical device. Both the client and the server will connect to their respective workgroup switches via UTP. Their workgroup switches are connected directly by a trunk link. The two switches are 1,700 meters apart. They need to communicate at 500 Mbps. Your design should...

  • P8. Can you please explain your steps The Performance of Feedback Control Systems the array at...

    P8. Can you please explain your steps The Performance of Feedback Control Systems the array at its maximum available as the solar inci- dence changes during the day. One such closed-loop system is shown in Eigure P8. The transfer function for necessary gain Ks to maintain a steady-state error equal to 1 ㎝ when the input is a ramp r(t)-1 (me- ters). (b) With this gain K3, determine the necessary gain Ki K2 in order to restrict the percent overshoot...

  • ISOM319 Operations Management Instructions:  For each topic (with bullet point) please use one or two sentences to...

    ISOM319 Operations Management Instructions:  For each topic (with bullet point) please use one or two sentences to describe or define the topic , can be as simple as a definition. You may use the book to help you with concepts you may not remember.    Process Analysis ·       Process Flow Diagram ·       Little’s Law: Flow Unit, Flow Rate, Flow Time ·       Inventory Turns, Direct Labor Cost, Productivity, Yield Capacity Management and Analysis ·       Capacity Management ·       Capacity Analysis: Theoretical vs Actual Capacities, Utilization, Process Capacity, Process Flow...

  • please answer for each requirement QUESTION TWO ABT Security System Inc. (ABT) is a company known...

    please answer for each requirement QUESTION TWO ABT Security System Inc. (ABT) is a company known around the world for its state-of-the-art clectronic surveillance and monitoring equipment, its alarm control centres and a full line of residential security systems including fire alarms, sprinkler systems and burglar protection devices. ABT has a December 31 accounting year-end and the company's headquarter is located in City of Burnaby in the Province of British Columbia. Any prospective customer is entitled to a free home...

  • Need help with this project please! Please name the compiler and software used, would really appr...

    Need help with this project please! Please name the compiler and software used, would really appreciate that information. Don't bother doing the report section on this assignment either. Me and my group will handle it. This is a group project. Group size should be exactly 2 (unless approved earlier by the instructor). Only ne mi imi ma Design a security architecture for a smart electric metering infrastructure. Smart electric meters have embedded hardware for cellular connectivity, and are able to...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • with job satisfaction? CC-12. Using job characteristics theory, explain why the present system of job design...

    with job satisfaction? CC-12. Using job characteristics theory, explain why the present system of job design may be con- tributing to employee dissatisfaction. Describe some ways you could help employees feel more satisfied with their work by redesigning their jobs. 1 me idea about **** Repairing Jobs That Fail to Sati Learning Goals Companies often divid ciency, but speciali quences. Drain sed specialization petitors' costs often divide work as a way to impro Secialization can lead to negative DrainFlow is...

  • 1.) Describe the goals of a Gel Filtration Chromotography Experiment??? 2.) Explain each key theoretical principle...

    1.) Describe the goals of a Gel Filtration Chromotography Experiment??? 2.) Explain each key theoretical principle of a Gel Filtration Chromotography, and how they help acheive the goal???. 4.) Explain the key equations used in the Gel Filtration Chromotography experiment and the terms involved in the equation???? HI im trying to prepare for a lab/report and i have some questions i could use help with please :) over all having trouble seeing how everything ties together etc :) thank you...

  • Hello! Could you please write a 6 paragraph summary (5-6 sentences each paragraph) of the below?...

    Hello! Could you please write a 6 paragraph summary (5-6 sentences each paragraph) of the below? In the overview, if you could please describe the information in detail. Please have completed in 6 days if possible. Thank you! In 50 Words Or LesS .6TOC combines lean Six Sigma (LSS) and the theory of constraints (TOC) for bottom-line benefits . The method's metrics pyramids and communi- cations allow organiza- tions to retain gains and monitor benefits. · 6TOC goes beyond fac-...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT