Description of the network components

Assignment Help Computer Networking
Reference no: EM13752467

Network technologies can be employed in various ways to meet business needs. Developing a solution begins with a set of requirements that must be understood and met. Following is a scenario that requires the use of a variety of network components and technologies. When working on developing a solution, all requirements may not be explicitly stated. When in doubt, post targeted questions. When making assumptions, be sure to include them in your design document.

The construction industry has struggled over the past years due to the economy. Nearly a dozen companies, including builders and subcontractors, banned together to develop a strategy to increase their business in the greater Washington, D.C. area. This consortium of builders and subcontractors called themselves BLDRS-DC.

BLDRS-DC engaged a well-known marketing company that recommended that they use a Web site to exhibit their services, capabilities, and availability. Other social media sites would be represented in the final solution as well. This site would tie together their sales and scheduling information. They also identified the need for the project managers to have access to project details from the construction sites. This remote access would ensure tasks were completed correctly and decrease construction time considerably.

In addition to engaging a marketing firm, BLDRS-DC hired a company that develops and manages Web sites. The Web site management company would be responsible for developing the software to connect sales materials and scheduling information to the Web site. Fortunately, all the companies involved use the same scheduling software and database software for sales material.
As the network specialist selected to plan and coordinate all of the activities, you need to develop a design document that outlines the technologies needed at each company to connect their unique information to the Web site. Specify the necessary network components that each company would need to enable customer access and scheduling.

In addition, you need to identify a solution for allowing construction managers to securely access drawings and other pertinent construction details remotely.

Prepare a Word document that is approximately 3-5 pages in APA format.

Be sure to include the following.

Title page

Introduction

Description of the network components needed to allow access to marketing materials and scheduling information.

Specified technologies needed to allow construction foremen remote access to construction details.

Explanation of any challenges or considerations uncovered from the research conducted.

Reference no: EM13752467

Questions Cloud

Additional bonds to the public at face value : General Matter's outstanding bond issue has a coupon rate of 11.4%, and it sells at a yield to maturity of 9.20%. The firm wishes to issue additional bonds to the public at face value. What coupon rate must the new bonds offer in order to sell at ..
What happened to germany after its defeat in the i world war : What happened to Germany after its defeat in the I World War? 200 Words.
How australias attitudes for war changed since world war i : How has Australia's attitudes and reasons for war changed since World War I?
External role players need info on growth of organisation : What external role players need info on the growth of an organisation
Description of the network components : Network technologies can be employed in various ways to meet business needs. Description of the network components needed to allow access to marketing materials and scheduling information
What was the role of russia in world war i : What was the role of Russia in World War I?
What are the consequences of intervention : Do you think this intervention was necessary and what are the consequences of this intervention? What might have happened if they had not intervened?
What the policy for hospital : Prepare a 2-3 page report describing, comparing and/or contrasting the specific standards that apply to the authentication, dating and timing of physician orders, and make a recommendation as to what the policy for your hospital should be
What cultural factors caused the differences in outcomes : What cultural factors caused the differences in outcomes? What legacies have the differences in types of encounters and degrees of cultural change left today?

Reviews

Write a Review

Computer Networking Questions & Answers

  Kind of security drill typical in organization

Which kind of security drill do you believe is the most typical in an organization? Which type of security drill do you believe is the most effective? Why?

  Explain why you would propose connecting all current and

you are a recently hired consultant for a ncf the networking consulting firm and your first consulting assignment is at

  What is meant by a nondeterministic protocol

What is meant by a nondeterministic protocol and what are the various combinations of circuit switched and packet switched networks and connection-oriented and connectionless network applications?

  How can p2p file-sharing networks make money

What social issues are raised by P2P file-sharing protocols and programs such as BitTorrent? Is the record industry justified in attempting to shut them down? Why or why not?

  Make arrangement of subnet masks to form subnets

Organization owns network 200.1.1.0/24 and wants to form subnets for 4 departments. Write a possible arrangement of subnet masks to make this possible.

  The cto informed you that the board of executives showed

the cto informed you that the board of executives showed great interest in building a new network based on the work you

  Describe three components found in a web system

Describe one type of variable or method that can be used to exchange data between web pages.

  What is prototyping

What is prototyping? Under what circumstances should prototyping be used? Under what circumstances should it not be used?

  Use the internet and other sources to research

Finally, how often will this technique reject authorized users while accepting unauthorized users compared to other standard biometric techniques? Based on your research, would you recommend this technique? Why or why not?

  Find an ftp server product

List two examples of e-mail server software other than those mentioned in class. List three to six features of each software package and include the web site of the software manufacturer.

  A simple implementation of the rsa algorithm

For subsequent new connections (new sessions) the server's public and private keys should be different. For this assignment you should use TCP, and you do not have to implement non-blocking communications.

  Explain a short scenario in which a company might find this

just as your car requires regular oil changes for optimum performance a wireless lan requires routine maintenance to

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd