Develop a network diagram using microsoft visio

Assignment Help Computer Networking
Reference no: EM132233674

Question: Review the Network Configuration Visio document of the Mayberry Satellite Campus. This diagram will be used throughout the course.

Scenario: As an IT networking trainee for your organization, your supervisor has given you an assignment to extend the Mayberry Network to an additional space (see existing diagram). The organization has obtained a space to create a 20-station learning center and two classrooms at the existing location. Each classroom will have one computer for the instructor and a wireless access point for the students. Typically, your supervisor has used computers with an Intel Core i5 processor, 16 GB of RAM, a 500 GB hard drive and a 10/100/1000 Ethernet NIC, but wonders if a better solution is available and would like you to recommend a solution.

Develop a 1-page network diagram using Microsoft Visio, or one of the free network diagramming programs you researched in Week One, to create a drawing of the learning center. The diagram should include:

• 22 computers that you specify

• Detailed specification for cabling, routing and switching, and wireless or VLAN options to connect to the existing network

Information related to above question is enclosed below:

Attachment:- Diagram.rar

Reference no: EM132233674

Questions Cloud

Difference between invention and innovation : ENGG6005 - Innovation and Commercialisation - University of newcastle - Explanation of the difference between invention and innovation
Discuss three challenges that cloud organizations could face : Companies that collect data on citizens in European Union (EU) countries will need to comply with strict new rules around protecting customer data by May 25.
What steps can companies take to protect trade secrets : What steps can companies take to protect trade secrets? With more persons working from home, how does one separate data intended for the employer.
How does the choice of encryption impact vpns : Encryption and a secure VPN are virtually inseparable. A secure VPN exists only because its traffic is encrypted. But some trusted VPNs may or may not use.
Develop a network diagram using microsoft visio : As an IT networking trainee for your organization, your supervisor has given you an assignment to extend the Mayberry Network to an additional space.
How system interacts or communicates with other resources : Access control is a procedure that is incorporated into an organization's information technology environment. The system identify and regulate the authorization
What would you do in the given situation : You are a professionally certified project manager working for a consulting company. Your manager has just let you know that you will be assigned to work.
Identify emerging technology that poses ethical challenges : Conduct research and find one article that identifies one emerging technology that poses ethical challenges. Describe the technology and ethical issues raised.
Write an essay describing that information : There may be personal information that you want considered as part of your admissions application. Write an essay describing that information.

Reviews

Write a Review

Computer Networking Questions & Answers

  Fault tolerance for communicating between the floors

fault tolerance for communicating between the floors

  Network bandwidth capacity

Suggestions for additional information to be documented with examples, Consideration of network bandwidth capacity considerations in the design documents and Any service level agreements that should be included in the network documentation

  What is a vlan trunk and what protocol alternatives exist

the osi reference model divides complex network tasks into 7 manageable subtasks called layers. layer 2 called the data

  Functional architecture for network monitoring configuration

The functional role of network monitoring by various areas in this week. You are also familiar with the pieces of information that are gathered and collected for the purpose of providing information on the network activity. Illustrate the function..

  Explain five steps to reduce network costs

Are there any additional steps that are not on this list? Which of these do you feel have the largest impact on a given network project?

  Why fat servers rather than fat clients should be used

Why fat servers, rather than fat clients, should be used in your scenario. Compare pros of Intranets to those of Internet from an organizational perspective.

  Implement the network using packet tracer

Implement the network using Packet Tracer - Calculate the EIGRP metric from R1 to network where PC2 is located. Explain and show how you derive at the values used in the calculation. Show detailed steps in arriving your answer.

  What can be defined as a premeditated

What can be defined as a premeditated, politically motivated attack against information, computer systems

  What are the advantages to mesh, bus, ring,star topology

What are the advantages and disadvantages to Ethernet, Token Ring, FDDI, and wireless?

  Discuss the ethical implications in case

Unit Title Network Project Management - you are required examine a project case and write a 800-100 words report on the project management and ethical issues

  What is the bcd number

A 16-bit register contains the following: 0100100101010111. Interpret the contents as a binary number.

  Examples of application layer protocols

Examples of application layer protocols and Cables and wireless transmissions are part of what OSI layer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd