What type of topology

Assignment Help Computer Networking
Reference no: EM132163499 , Length: 4 pages

Project

You and your company have been contracted to upgrade the existing network to include the following expansions. A network proposal has to be developed for a manufacturing company. The design is an L-shaped building approximately 1500 square feet. They will have 1 reception and 5 offices. Each office employee has a personal printer. They are not using a network to communicate.

Currently: President's Office (4), Accounting (3), and Business and HRM (2)

Future Plans: HR (6), Accounting (5), and Breakroom (2)

They are moving to a larger building 3500 square feet. They are expanding and will add 15 more offices. They will add network printers and wireless network for employees and guest. They will need to share files between departments.

Design a network for this company to incorporate a network server, printer and wireless network. Provide a security solution for them. What type of topology? What type of cabling will need to be used? You will need to determine cabling, hardware and software needs. Include a timeline and cost analysis for the executives.

Reference no: EM132163499

Questions Cloud

Describe in detail what position will be each block : Describe in detail what position will be each block, which also represents a position within your business. You only need to create the top three tiers.
What are some of the strategies that firms engage : Evaluating the benefit an opportunity can provide is complex. When measuring an economic benefit, you must look at the real return, the nominal return.
Decision using the steps in the decision making process : Think about a decision you've recently made. Write a description of this decision using the steps in the decision making process as your guide.
How was definition of ethics different from your classmates : What is legal and what is ethical are not always aligned. In fact, ethics are not considered primary when the law is already established.
What type of topology : Design a network for this company to incorporate a network server, printer and wireless network. Provide a security solution for them. What type of topology
Different school or joined different fraternity or sorority : Would you be a different person had you attended a different school or joined a different fraternity or sorority?
Government and manufactures to combat this type of crime : This is a major issue in your country or region. whats steps are being taken by government and manufactures to combat this type of crime?
Should full personal use of work equipment be allowed : Should full personal use of work equipment be allowed? Should management be allowed to monitor all internet use?
Assess two consumer-driven health plans : Employee Health Plans: Assess two consumer-driven health plans based on the effects they have on human resources and employee benefits.

Reviews

Write a Review

Computer Networking Questions & Answers

  Standardize network configurations

As the network engineer, you have been asked to standardize network configurations across the Devry University campus. This week, your manager has scheduled a meeting to discuss with you specific configuration requirements based on camera density

  Build the network according to the user requirements

ICT50415 IT Networking Assignment - Networking Project Area - Build the network according to the user requirements

  Analysis of the current network configuration

Analyse current network configurations and suggest two application scenarios -Design a detailed Network in Netsim-current network configurations

  Motherboard components identification

The motherboard is the main printed circuit board in a computer containing the computer's basic circuitry and components. The motherboard carries the central processing unit and system buses and is equipped with sockets that connect to the compute..

  What is the value of petabyte storage

ITECH 2201 Cloud Computing - According to IBM estimation, what is the percent of the data in the world today that has been created in the past two years and What is the value of petabytestorage?

  How rsa algorithm implemented if private key is unknown

What if private key is unknown? how would rsa algorithm be implemented then? Assume we have the algorithm which knows public key it is able to decrypt small amount of messages?

  Strategy planning for corporate

In another year, after all assignments are completed, you consider to convert back to a volunteer basis with AllTechComm, and to discover more profitable employment, preferably with a major company.

  Compare and contrast smtp, pop3, imap4, http email

Compare and contrast two of the following email clients: Outlook, Outlook Express, Hotmail, Eudora, Mozilla Thunderbird, Opera Mail, Pine, and Lotus Notes.

  Explain the steps take to stop cyber squatter

First protective strategy which is to register your trademark a trademark it can. Having it listed in the government registry is the right way to go, registry.

  Explain a tcp connection between host a and host b

Is it possible for an application to enjoy reliable data transfer even when the application runs over UDP? If so, please be specific in your answer of how this takes place.

  How long it take to send the file from source to destination

Suppose the network is a packet-switched datagram network, and a connectionless service is used. Now suppose each packet has 2h bits of header. How long does it take to send the packet?

  Disadvantages of several different web technologies

Describe the advantages and disadvantages of several different Web 2.0 technologies. How could these technologies be used for good? What types of problems might these technologies cause?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd