Description of the network technologies

Assignment Help Basic Computer Science
Reference no: EM132365174

Network technologies can be employed in various ways to meet business needs. Developing a solution begins with a set of requirements that must be understood and addressed. Following is a scenario that requires you to use a variety of network components and technologies to develop a networking solution. When working on developing a solution, all requirements may not be explicitly stated. When making assumptions, be sure to include them in your design document. The construction industry has struggled over the past years due to the economy. Nearly a dozen companies, including builders and subcontractors, banned together to develop a strategy to increase their business in the greater Washington, D.C. area. This consortium of builders and subcontractors called themselves BLDRS-DC. BLDRS-DC engaged a well-known marketing company that recommended that they do the following: a.Use a Web site to exhibit their services, capabilities, and availability ?Other social media sites would be represented in the final solution as well. This site would tie together their sales and scheduling information. b.Have access to project details from the construction sites ?This remote access would ensure tasks were completed correctly and decrease construction time considerably. In addition to engaging a marketing firm, BLDRS-DC hired a company that develops and manages Web sites. The Web site management company would be responsible for developing the software to connect sales materials and scheduling information to the Web site. Fortunately, all of the companies involved use the same scheduling software and database software for sales material. As the network specialist selected to plan and coordinate all of the activities, you need to develop a design document that outlines the technologies needed at each company to connect their unique information to the Web site. Specify the necessary network components that each company would need to enable customer access and scheduling. In addition, you need to identify a solution for allowing construction managers to securely access drawings and other pertinent construction details remotely. Prepare a Word document that is approximately 3-5 pages in APA format. It should be professional in appearance and suitable for review by network novices. Present the information in layman's terms.

Be sure to include the following:

• Title page

• Introduction summarizing the problem being addressed and solution highlights

•  Description of the network technologies and components required to implement a Web site providing marketing materials and scheduling information (see a above)

• List of the specific technologies and components needed to allow construction foremen remote access to project details (see b above)

• Explanation of any challenges or considerations uncovered from the research conducted

• References in APA format as appropriate.

Reference no: EM132365174

Questions Cloud

Prepare the trading account in the general ledger : FAC1501 - Introductory Financial Accounting - University of South Africa - Prepare the trading account in the general ledger of Namib Traders for the year ended
Post a brief explanation of the role of technology : Post a brief explanation of the role of technology and information systems in epidemiology today. Then provide two specific examples of how the role.
Discusses methods to assess the quality of simulations : Discusses methods to assess the quality of simulations. You learned about three different views of simulation quality which are Standard view,
How the attack occurs on a network : For each of the six types of attacks, give an example of how the attack occurs on a network. Summarize and compare the three techniques for transmitting.
Description of the network technologies : Description of the network technologies and components required to implement a Web site providing marketing materials and scheduling information
Describe how security administration works to plan : Describe how security administration works to plan, design, implement and monitor an organization's security plan. Describe five effective change management.
Analyze the role of the chief executive office in effort : Analyze the role of the Chief Executive's office in this effort. Evaluate the work of the Chief Executive's office and suggest further solutions that might be.
What steps can companies take to protect trade secrets : What steps can companies take to protect trade secrets? With more persons working from home, how does one separate data intended
How the technology can be used specifically in the case : Describe how the technology can be used specifically in the case you have proposed. Summary of the case integrating proposed solutions(s).

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Deregulation of electricity generation

a. Describe the economic rationale for the deregulation of electricity generation

  Find an article about one of of the technologies

Using your book and the Internet, find an article about one of of the following technologies: GSM, ISDN, CDMA, TDMA, Bluetooth, and 802.11x, summarize the article in your own words, and discuss why an investigator should care about the technology ..

  Areas and any objective of the tax policy

Research the government's tax/subsidy policy in these areas and any objective of the tax policy.

  Test a singly-linked list in style of a standard container

Sometimes, the space overhead of a listcan be a problem. Write and test a singly-linked list in the style of a standard container.

  Discuss some key characteristics of load lines

Explain the key quantities from the data sheet of your selected transistor. Based on your selected data sheet, what are the most important quantities to be considered for a circuit designer, and why. Discuss some key characteristics of "load lines,..

  In what way does it account for both precision and recall

How is F-score defined as a metric of information retrieval?

  Responsibility in the workplace and the world

PharmaCARE (We CARE about YOUR health®) is one of the world's most successful pharmaceutical companies, enjoying a reputation as a caring, ethical and well-run company that produces high-quality products that save millions of lives and enhance the..

  Implementation of the vending machine in several styles

Draw a timing diagram that shows a difference in the detailed timing behavior of the original (unretimed) Moore, asynchronous Mealy, and synchronous Mealy implementations.

  Create at least one clustered index on every relation

Which factors would you consider in deciding whether to make an index on a relation a clustered index? Would you always create at least one clustered index on every relation?

  Explain the value added by an enterprise resource system

Explain the value added by an enterprise resource system in term of Porter's Value Chain. What are the risks and problems of brining.

  Find the probability that x is less than 5

The probability that X is less than 3 is 0.23. Find the probability that X is less than 5.

  Most companies have policies that regulate employees

Most companies have policies that regulate employees' personal use of work computers during work hours. Some even monitor employee

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd