case study, Computer Networking

Assignment Help:

Scenario:
Your Case Study must be based on the information provided.
There will be no additional information.
This must be submitted in a .doc, or .pdf format.
If you send a few paragraphs in an email, it will result in a “0” score for the project.

A1 Cars is a car dealership located in Forth Worth, Texas.
The company has grown significantly over the last 5 years and due to physical space restrictions they have decided to expand their operations by opening another site in
Denton, Texas.
This location was chosen so that they could market their cars more easily in the Southern Oklahoma area.
The new site will only have one building, and will bring an additional 25 employees on to the company payroll.
Employees are as follows:
There will be one general manager with an executive secretary, as well as three shift managers.
The service/parts departments will employee a total of 12 employees. Five of these employees are mechanics.
Book keeping department will employee three employees, and there will be 5 salesmen.
All applications for financing/loans must be approved through the parent company located in Fort Worth.
Even though the company has grown they have a limited budget to get their new company network, “including computers” up and running.
You are in charge of advising the A1 Cars Company on what type of network schema they will need for their new location.
The new building will be hardwired before you start you analysis.
The Project Manager asks that you submit your proposal with detailed information that he/she can understand.

Your Case Study must be based on the information provided.
There will be no additional information.

Some key points in the case study that I will be looking for are:
1. WAN/LAN/etc?
2. Client Server or Peer to Peer?
3. Hubs/Switches/Routers used?
4. Printing Needs?
5. Computers/Specs?
6. Protocols?
7. OS/Applications installed?
8. Wireless?
9. Security?
10. Media/Cabling?
11. Budget?


Related Discussions:- case study

Subnet/address mask, To use a subnet or classless address, table under rout...

To use a subnet or classless address, table under routers and hosts that have address must keep two pieces of information with every address: the 32-bit address itself and another

Determine the computing infrastructure, Determine the computing infrastruct...

Determine the computing infrastructure One solution for the protection of the computing infrastructure is to use digital certificate-based solutions. Users can be given access

Factor causing parallel overheads, Factor Causing Parallel Overheads F...

Factor Causing Parallel Overheads Figure clearly explains that the performance metrics are not able to achieve a linear curve in comparison to the enhance in number of process

Explain the term dimensionality of interconnection network, Dimensionality ...

Dimensionality of Interconnection Network Dimensionality refers the arrangement of processing elements or nodes in an interconnection network. In linear network or single dimen

Describe the term disaster management as security threats, Describe the ter...

Describe the term Disaster Management as security threats Making and testing backups regularly could be the simplest and easiest of all the security measures. But a new questio

Diiferentiate between html and http, Diiferentiate between HTML and HTTP ...

Diiferentiate between HTML and HTTP Hypertext Markup Language (HTML) The language used in writing pages for the World Wide Web. Knowledge of not HTML is not necessary f

What is structured query langauge (sql), SQL is a powerful set-oriented lan...

SQL is a powerful set-oriented language which was developed by IBM research for the databases that adhere to the relational model. It having of a short list of powerful, yet highly

Configure VTP Pruning on the Switches- CCNA, Configure VTP Pruning on the S...

Configure VTP Pruning on the Switche s VTP pruning allows a VTP server to suppress IP broadcast traffic for particular VLANs to switches that do not have any ports in that VLAN.

Determine the specification of fddi, FDDI has four specifications: 1. M...

FDDI has four specifications: 1. Media Access Control it defines how the medium is accessed 2. Physical Layer Protocol it defines data encoding/decoding procedures 3. Phy

Work-sharing constructs in openmp, Work-Sharing Constructs A work-shari...

Work-Sharing Constructs A work-sharing construct distributes the implementation of the associated region between the members of the team that encounters it. A work-sharing cons

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd