Explain the key differences among hubs, switches, and router

Assignment Help Computer Engineering
Reference no: EM133497193

Case Study: The company has asked you to implement a network to improve how they conduct business within the organization. The company occupies a two-story building in an office park. Their volume of business had been stable for the past three years, but has recently begun to increase. To handle the increased business volume, two new agents will be hired, along with a team of web designers and developers to create a web presence. Everyone in the company has a computer, but the business manager has the only printer. These computers are not connected by any form of network. When agents need to print a document, they must first copy the file to a USB stick and then carry it to the business manager's computer, where they are finally able to print it. Similarly, when staff members want to share data, the only means available is to copy the data to a USB stick and insert it into another computer.

Recently, problems have arisen with the current setup. The business manager is spending too much time printing other people's documents, and it is frequently unclear which copy of a given document is the latest version.

After carefully reviewing the scenario, research a minimum of two additional credible sources that address the topics. (Access the MISM Credible Resource Guide for assistance with finding appropriate credible professional resources.)

Question 1: Design a network for this company to support file, print, and web services. In a separate attachment, create a high-level network diagram that captures your solution. The diagram needs to show at minimum the cloud (Internet Service Provider), router, switch(es), printer(s), server(s), end-user computers, and how they all connect to one another.

Question 2: Explain the key differences among hubs, switches, and routers.
Explain how and why the hubs, switches and routers you've included in your diagram will be utilized on your network.

Question 3: Apply standard principles of design to recommend the network topology that would be most suitable for the business needs outlined, and defend your choice with a comparison explanation among the different topology types.

Question 4: Evaluate the networking needs of the company and suggest either a peer-to-peer or server-based network, and provide the rational for your choice.

Question 5: Finally, suggest at least two ways to segment this small office network, and evaluate the associated benefits and limitations. Apply telecommunication and network technical knowledge to support your choices.

Reference no: EM133497193

Questions Cloud

What resources are available in your community : What resources are available in your community would useful for senior citizens experiencing food insecurity and dietary restrictions based on medical diagnoses
Discuss the research on the effectiveness of transfer : Given the evidence and conclusions drawn, do you think this is an effective and necessary component of the juvenile justice system?
Analyze the interdependence of food service-lodging : Analyze the interdependence of food service, lodging, and meeting segments of the hospitality industry.
What factors should be considered when assessing the health : Describe what it means to have a resilient healthcare supply chain. What factors should be considered when assessing the health of a supply chain network?
Explain the key differences among hubs, switches, and router : Design a network for this company to support file, print, and web services. In a separate attachment, create a high-level network diagram that captures
Should forever pure buy the new production equipment : If total sales are expected to be 23,000 units, should Forever Pure buy the new production equipment? Assess lessons learned concerning cost-volume-profit
Identify two countries other than the united states : Identify at least two countries other than the United States, whose governments fully comply with the Trafficking Victims Protection Act's minimum standards.
Describe the reimbursement mechanisms for aprns : Describe the reimbursement mechanisms (Medicare, Medicaid private insurers and HMOs) for APRNs. Can APRNs own their own practices in your state? Why or why not?
What amounts would be reported as current : What amounts would be reported as current and non current liabilities section of ivanhoes balance sheet at dec 31,2024

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discussion on the SCADA system

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system. It occurs during the fall after a dry.

  Make a method to calculate the value of entire inventory

Modify the Inventory Program so the application can handle multiple items. Use an array to store the items. The output should display the information one product at a time, including the item number, the name of the product, the number of units in..

  Differences between security testing and threat modeling

For this assignment identify and explain the key differences between security testing and threat modeling. Please state your answer in a 1-2 page paper.

  Implement the entire queue adt using a singly linked list

Implement the entire queue ADT using a singly linked list. Implement the deque ADT with a doubly linked list. Implement the deque ADT with an array used.

  What steps are being taken to minimize or thwart the threats

What steps are being taken to minimize or thwart these threats? Will the efforts proposed to protect individuals, companies and the governments from these.

  Describe a cryptographic hash function

Describe a cryptographic hash function and how it is used as a security application. You must use at least one scholarly resource.

  Design an html form to enter a country

Use the database file to design an HTML form to enter a country and the php code loads information about the country and a list of its cities.

  Calculate the time required for each of three trip

Prompts the user for destination, number of miles driven, and speed driven (both as integer values).

  What kind of hardware is needed to support t-one connection

What kind of hardware is needed to support a T-1 connection to your business? What will be the resulting costs of including the following?

  Describe current key trends in data warehousing

"Data Warehouse Architecture" (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations.

  How do problems impact the information security field

Identify two to three key problems. Why do they exist? How do they impact the information security field? Who is responsible for them?

  What is the transfer function

By using the block diagram analysis approach determine the transfer function H(z) = Y(z)/X(z) of the digital filter structure of figure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd