We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Global Network Architecture - Research Paper Example

Comments (0)
A global company has its headquarters in Paris (France) with offices in London (UK), Berlin (Germany), Madrid (Spain), Cairo (Egypt), Berne (Switzerland), Beijing (China), Shanghai (China) and Singapore. These offices are interconnected by telecommunications links provided by several Telcos as shown below.
Download full paper
Global Network Architecture
Read TextPreview

Extract of sample
Global Network Architecture

Download file to see previous pages... Berlin to Beijing is the weakest link. In the event of failure it completely cuts off links between east and west. Furthermore, it has the lowest bandwidth which means even in the absence of such an event, data flow is still slow. The next two are Beijing to Shanghai and Singapore, the bandwidth is low and in the event of disruption each endpoint city could be completely isolated from the rest of the network.
We suggest how the network could be re-designed to overcome the weaknesses and vulnerabilities identified. If the company can only afford to make ONE of the changes you propose, recommend what that change should be, we recommend add a Cairo to Singapore link at 512Kbps. It would lighten the load on the weakest link as well as allow redundancy in the east-west backbone.
In order to provide global communications, fiber optic cables need to be laid under the oceans of the world. We have provided details of a modern day, and currently operational, cable laying ship; including its name, technical specification in terms of its cable laying capability, what techniques it uses to lay cables and examples of a recent mission:
This vessel has worked along with the Asia-America Gateway. ...
vided details of a modern day, and currently operational, cable laying ship; including its name, technical specification in terms of its cable laying capability, what techniques it uses to lay cables and examples of a recent mission:
Cable ship Niwa
Flag UAE
Port of registry Abu Dhabi
Call Sign A6E 2964
Shipbuilder Far East Levingston Shipbuilding Ltd.
Built in Singapore 1991
IMO Number 8819029
Type of vessel Cable Lay & Repair Vessel
Official Number 4963
Gross registered tonnage 13201 T
Net Tonnage 3960 T
Dead Weight 7900 T
Length Overall 145.66 m
Length between perpendiculars 130.88 m
Breadth Moulded 21.60 m
Design Draught 8.08 m
Keel to Boat Deck 37.87 m
Baseline to Masthead 37.87 m
Service Speed 15 knots
Range 10000 NM
Accommodation 138 Persons
Classification society American Bureau of Shipping
Class granted +A1 (E), +AMS, + ACCU
Main Cable Tanks 3
Total Cable Storage Volume 3 x 1086 m3 = 3258 m3
Cable Dead Weight 6098 tons
Auxiliary Cable Tanks 4 x 41 m3 = 164 m3
Repeaters Tank1-48, Tank2-48, Tank3-56 = 152
Cable Machinery 18 Wheel Pairs x 18 Tons Douty/Parkburn
Electric Driven LCE Linear Engine
No of wheel pairs 18
Maximum Pull 18 Tons
Drum Engine 45 t
Quantity (set) 2 + 2 DOHB
Maximum Pull 45 Tons
Main Engine Power 3 x Wartsila VASA 12V32D 5950 HP
Main Propulsion 2 x General Electric 4700 HP
Propulsion Configuration 1 x Fixed Pitch 3.8 m Diameter
Bow Thrusters 2 x 1970 HP Controllable Pitch
Stern Thruster 2 x 1750 HP Fixed Pitch Azimuth
Generators 2 x 900 KW Auxiliary 1 x 300 KW Emergency
Bunker type Marine Gas Oil
At cruising speed 45 Metric Tons
At economic speed 25 Metric Tons
Endurance 60 Days
This vessel has worked along with the Asia-America Gateway. We ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Network Security
As network vulnerabilities are constantly at a rise, network security vulnerabilities are evaluated in three categories i.e. logical security, internal security and external security. The logical security domain will cover technical controls such as deployment of IDS, Virtual LAN, monitoring violation logs, auditing on domain environment, ISA server and VPN security as well.
15 Pages(3750 words)Research Paper
Research Paper on iPhone Network or Security
That part of the research paper is followed by a second and a third part, the outline for which is as follows: The second part will deal with the features of the network technology employed by the iPhone. It will be further divided into sections on the types and methods of connections used for the phone, both in the U.S.
3 Pages(750 words)Research Paper
Iphone Network and Technology
a network Components of the global area network Introduction to 3G A detailed discussion of 3G Network architecture: General discussion of network architecture The network architecture of iPhone Advantages of the network architecture of iPhone Basic hardware components: Background Components, and their roles Role of switches Network security: Reasons of network security Challenges The network security protocols of iPhone Conclusion and recommendations: General discussion Summary of the layout of the paper Recommendations Harris Kamran Telecommunications Term Paper 24 July 2011 iPhone Network and Technology Introduction: In the world of cellular industry and telecommunications, the iPhone has
12 Pages(3000 words)Research Paper
Virtual Private Network Architecture
This paper also evaluates the migration and real-time transmission processes of the networks. At the present, business organizations prefer to run and maintain their server applications in data centers, which provide them with a wide variety of storage and computational resources.
3 Pages(750 words)Essay
Complete Computer Network Infrastructure for a Real or Ficticious Business
Our IT strategy executes by defining the topology of the network. The topology will define the structure of the entire network along with preferred cable to be used. Secondly, hardware specification of all departmental workstations and will be carried out along with the cost.
20 Pages(5000 words)Research Paper
Network Infrastructure Planning
Permission software are the most helpful infrastructure to help the fashion-ware company control the operations of the satellite branches at different times of the 24 hours in a day and still share the same resources at the central server at the head office.
3 Pages(750 words)Research Paper
Network security
For that matter, secure routing protocols for ad hoc and wireless sensor networks will be precisely looked at considering their policies and methods geared to help them meet their security necessities. Mobile nodes or computers in ad hoc networks collaborate and send packets to each other hence having them communicate past the direct wireless communication range set for them.
15 Pages(3750 words)Research Paper
Network Security Architecture
The former requires one or multiple servers or switches to be deployed while the latter approach is more coherent to the IEEE 802.11 standard. The IEEE 802.11 specifies a group of technologies governing
1 Pages(250 words)Research Paper
High Level business architecture
Business requirements can be defined as the high level needs or necessities which after fulfillment by an organization lead to the satisfaction of its
4 Pages(1000 words)Research Paper
WAN, Architecture Overview
around the globe are fighting tooth and nail to adopt a networking technology that will facilitate optimal achievement of business goals (DiMarzio, 2001). One the key features in promoting business competitiveness is the adoption of Wide Area Network (WAN) connectivity. On this
6 Pages(1500 words)Research Paper
Let us find you another Research Paper on topic Global Network Architecture for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us