A computer training company needs an enterprise-wide network

Assignment Help Operating System
Reference no: EM13944776

From the project scenario below, what area of telecommunications or data communications to hardware and software would you suggest to design for this company's needs. Please provide a list of solutions based on the Network requirements that are listed at the end of the project scenario.

Example of solution:

· Modem dial-up for employees when at home

A VPN-based extranet in order to use its access controls and authentication services to deny or grant access to specific information to the offsite employees.

From there I will build a UML model.

Example of a project scenario:

A computer training company needs an enterprise-wide network.

The company currently has Building 1 in which there are:
· 3 Administrators
· 5 Finance people in accounting
· 1 Finance person in bookstore
· 5 Sales people
· 5 Support people
· 1 Computer person
· 10 Training rooms
The company is leasing space in Building 2 (120' across a parking lot on the same property) in which will be moved from Building 1:
· 3 Administrators
· 5 Finance people in accounting
· 5 Sales people
· 3 Support people

Leaving in Building 1:
· 1 Finance person in bookstore
· 2 Support people
· 1 Computer person
· 10 Training rooms
The company is also leasing Building 3 (2000' away on another property across city streets) which will have:
· 2 New support people
· 20 Training rooms
The company has a branch (250 miles away in the same state) which houses:
· 1 Administrator
· 2 Sales people
· 1 Support person
· 10 Training rooms
The company will be opening more branches of the same size as its current branch in other states and other countries.

Network Requirements

Currently, everyone has either a 486DX66 or a Pentium stand-alone PC with Microsoft Office and Windows 3.11 or Windows95. The only network is a 5-station Lantastic network in accounting.
The new network is to allow:
· All employees to share databases.
· All employees to share scheduling.
· All employees to have secure company e-mail.
· All employees to be able to e-mail to non-company people.
· Videoconferencing for sales staff and administrators.
· Administrators and sales people to have WWW access.
· Modem dial-up for employees when at home.
· 4 wall connections in each training room so that trainers and students can connect to the WWW via laptop computers.
· Firewall to Internet.
· Intranet in the future, if not to be part of this network.
· Systems easily replicated in new branches.

Reference no: EM13944776

Questions Cloud

What new about what machiavelli brought to political thought : What is new about what Machiavelli brought to political thought and the study of political rule? What are your thoughts? For instance, should we rule according to how things are, or according to how they should be?
Should asus eliminate model de1 from its product line : Asus computers is considering eliminating model DE1 from its computer line because of loses over the quarter. Should Asus eliminate model DE1 from its product line? Why or why not
Why these companies waited two years after the losses : Speculate why AT&T, Honeywell, and Verizon are changing the method for accounting for pension gains and losses. Then, speculate why these companies waited two years after the losses to make the change.
Research local and international pieces of legislation : Candidates are required to research local and international pieces of legislation (as listed below) that may have influence on business opportunities and operations in the international market. The legislation and law required to be researched are..
A computer training company needs an enterprise-wide network : The company is leasing space in Building 2 (120' across a parking lot on the same property) in which will be moved from
Imported lemons causes car fatality rates : Because the P-value is ? less greater than the significance level 0.05, there ?  is not is sufficient evidence to support the claim that there is a linear correlation between lemon imports and crash fatality rates for a significance level of a = 0..
Introducing and managing the improvements : As a senior manager you are responsible for these changes. How you will go about introducing and managing the improvements. How will you gain support of the retail staff.
How would feminist eve cole : As I learn more about the mind/brain connection, I find myself willing to give up the notion of "mind" as a separate idea. Is this just me, or does someone else feel that way?
The sample data is presented in the following table : Do the data present sufficient evidence to indicate that the mean for the machine 1 is smaller than the mean for the machine 2? Use a 0.05 level of significance.

Reviews

Write a Review

Operating System Questions & Answers

  Pros and cons of using embedded uid and pw

Think about an embedded user id and password which provides me access to a client/server environment. Discuss the pros and cons of using an embedded uid and pw?

  Performing the maintenance

A hard drive must be managed to be used most efficiently. This maintenance with deleting old files, defragmenting a drive so that it does not waste space, as well as, from time to time, discovering and attempting to correct disk failures.

  Compare threads and processe

Compare threads and processes based on the amounts of system resources each uses and based on a common file each uses. How does this answer affect the efficiency of context switching for each?

  Question 1a one major problem about process synchronization

question 1a one major problem about process synchronization is called race condition. explain what race condition is

  What lessons do the ancient greeks teach us

WHAT LESSONS DO THE ANCIENT GREEKS TEACH US ABOUT THE ROLE OF PERSONAL CHARACTER IN A GOOD NATIONAL LEADER?

  Identify properties of communication channel

Write the send and receive primitives for stated processes. Identify at least three properties of communication channel or link in this scheme

  A unix file system

A UNIX file system has 1-kilobyte blocks and 32-bit disk addresses. What is the maximum file size if each i-node contains 20 direct entries and one single, double, and triple indirect entry each? Draw a picture and give all calculations properly anno..

  What kind of file security does linux provide?

What kind of file security does Linux provide?

  Disk requests arrive at the disk driver

Disk requests arrive at the disk driver for cylinders, 45, 97,21,43,11,69,81,8,55,14,78,74, and 7. A seek takes 5 milliseconds per cylinder moved. Assume that the arm starts initially at cylinder 50 and was moving downward.

  Explain the elements and capabilities of a fault

Discuss briefly the network management software components and describe the elements and capabilities of a fault, configuration, accountingn and security server.

  How the offices within a wan are connected

The University of Hawaii campus is spanned over 2 miles. It has 7 colleges and each college building is separated from each other by at least 1000 feet. Each building has 4 floors. The University also has it's centers at London and Australia. You ..

  Ddos attack on router

Recently had a DDoS attack on border router. Discuss how would you estimate where the attack came from and what would you put in place to save it from happening again?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd