case study, Computer Networking

Assignment Help:

Scenario:
Your Case Study must be based on the information provided.
There will be no additional information.
This must be submitted in a .doc, or .pdf format.
If you send a few paragraphs in an email, it will result in a “0” score for the project.

A1 Cars is a car dealership located in Forth Worth, Texas.
The company has grown significantly over the last 5 years and due to physical space restrictions they have decided to expand their operations by opening another site in
Denton, Texas.
This location was chosen so that they could market their cars more easily in the Southern Oklahoma area.
The new site will only have one building, and will bring an additional 25 employees on to the company payroll.
Employees are as follows:
There will be one general manager with an executive secretary, as well as three shift managers.
The service/parts departments will employee a total of 12 employees. Five of these employees are mechanics.
Book keeping department will employee three employees, and there will be 5 salesmen.
All applications for financing/loans must be approved through the parent company located in Fort Worth.
Even though the company has grown they have a limited budget to get their new company network, “including computers” up and running.
You are in charge of advising the A1 Cars Company on what type of network schema they will need for their new location.
The new building will be hardwired before you start you analysis.
The Project Manager asks that you submit your proposal with detailed information that he/she can understand.

Your Case Study must be based on the information provided.
There will be no additional information.

Some key points in the case study that I will be looking for are:
1. WAN/LAN/etc?
2. Client Server or Peer to Peer?
3. Hubs/Switches/Routers used?
4. Printing Needs?
5. Computers/Specs?
6. Protocols?
7. OS/Applications installed?
8. Wireless?
9. Security?
10. Media/Cabling?
11. Budget?


Related Discussions:- case study

Command to disable cdp on an interface, Recognize the command to disable CD...

Recognize the command to disable CDP on an interface Ans) Router(config-if)# no cdp enable

What are the functions of the typical server program, What are the function...

What are the functions of the typical server program? It waits for client-initiated requests. Executes many requests at the same time. Takes care of VIP clients first. Initiate

Features of transmission control protocol, The major features of TCP are fo...

The major features of TCP are following: Reliability : TCP ensures that any data sent by a sender arrives at the destination as it was sent. There cannot be any data loss or mo

Describe essential security services, Problem: (a) Application Layer pr...

Problem: (a) Application Layer protocols can be classified as connection-oriented or connectionless-oriented. i. What do you understand by the term protocol? ii. Give an e

The cut-through switching technique work, How does the cut-through switchin...

How does the cut-through switching technique work? Ans) Cut-Through switching copies only the destination address which is the first 6 bytes after the =frame preamble into its b

Parallel balance point, Parallel Balance Point In order to implement a ...

Parallel Balance Point In order to implement a parallel algorithm on a parallel computer, K number of processors is needed. It may be noted that the given input is assigned to

Transport protocols - udp and tcp, Most real-life applications are built on...

Most real-life applications are built on top of the UDP and TCP transport protocols. UDP, which stands for User Datagram Protocol, provides the capability of delivering individual

Classes and dotted decimal notation, The relationship between dotted decima...

The relationship between dotted decimal notation and classes is shown as follows. In class A the three octets managed to a host suffix. In class B the last most two octets ar

State about data and data files - information, State about data and data fi...

State about data and data files - Information The third and major component of the system liable to be attacked is the data and data files used by the company. It is the most s

Define network, Communication, Resource sharing and Media (When many host s...

Communication, Resource sharing and Media (When many host share their resources with every other OR when many devices connect with each other for resource sharing )

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd