case study, Computer Networking

Assignment Help:

Scenario:
Your Case Study must be based on the information provided.
There will be no additional information.
This must be submitted in a .doc, or .pdf format.
If you send a few paragraphs in an email, it will result in a “0” score for the project.

A1 Cars is a car dealership located in Forth Worth, Texas.
The company has grown significantly over the last 5 years and due to physical space restrictions they have decided to expand their operations by opening another site in
Denton, Texas.
This location was chosen so that they could market their cars more easily in the Southern Oklahoma area.
The new site will only have one building, and will bring an additional 25 employees on to the company payroll.
Employees are as follows:
There will be one general manager with an executive secretary, as well as three shift managers.
The service/parts departments will employee a total of 12 employees. Five of these employees are mechanics.
Book keeping department will employee three employees, and there will be 5 salesmen.
All applications for financing/loans must be approved through the parent company located in Fort Worth.
Even though the company has grown they have a limited budget to get their new company network, “including computers” up and running.
You are in charge of advising the A1 Cars Company on what type of network schema they will need for their new location.
The new building will be hardwired before you start you analysis.
The Project Manager asks that you submit your proposal with detailed information that he/she can understand.

Your Case Study must be based on the information provided.
There will be no additional information.

Some key points in the case study that I will be looking for are:
1. WAN/LAN/etc?
2. Client Server or Peer to Peer?
3. Hubs/Switches/Routers used?
4. Printing Needs?
5. Computers/Specs?
6. Protocols?
7. OS/Applications installed?
8. Wireless?
9. Security?
10. Media/Cabling?
11. Budget?


Related Discussions:- case study

What is groupware server, Groupware addresses the management of semi-struct...

Groupware addresses the management of semi-structured information like text, image, mail, bulletin boards and the flow of work. These Client/Server systems have people in direct co

Drawback of repeaters, Drawback of  Repeaters. Repeater  has no filte...

Drawback of  Repeaters. Repeater  has no filtering capability as it forwards  every frame. Repeater shell  be placed  at accurate distance  before  actual  signal becomes

Encoding the data type, ENCODING THE DATA TYPE: The figure explain a f...

ENCODING THE DATA TYPE: The figure explain a frame in which the data kind is specified by using the data area. To ensure interoperability format of encoding location m

Packet switches, PACKET SWITCHES:  To span large distances or several ...

PACKET SWITCHES:  To span large distances or several computers, networks must removed shared phase with packet switches. Each switch moves whole packet from one connection to

What is redirector, What is redirector? Redirector is software that int...

What is redirector? Redirector is software that intercepts file or prints I/O requests and changes them into network requests. This comes under presentation layer.

How are enterprise systems different, Question : (a) How do you relate ...

Question : (a) How do you relate the subsequent terms in the context of an information system: data, information and decision-making. (b) Why do you think organisations nowa

Distribution of dns - application layer , Distribution of DNS 1.By cen...

Distribution of DNS 1.By centralized data base The information contained in the domain  name space must be stored. A simple design  or DNS would have one DNS server that co

Persistent and no persistent connections, Persistent and No persistent Conn...

Persistent and No persistent Connections HTTP can use  both  persistent  and non persistent connection. By defaults  uses persistent  connections. Persistent Connections

Computes their distance vector for network, Consider the following network ...

Consider the following network example. Suppose that the distance vector (DV) routing algorithm is used to compute the distance between nodes. (a) Show the procedure of nod

Components of the vpn - point to point , Components of the VPN When  us...

Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd