case study, Computer Networking

Assignment Help:

Scenario:
Your Case Study must be based on the information provided.
There will be no additional information.
This must be submitted in a .doc, or .pdf format.
If you send a few paragraphs in an email, it will result in a “0” score for the project.

A1 Cars is a car dealership located in Forth Worth, Texas.
The company has grown significantly over the last 5 years and due to physical space restrictions they have decided to expand their operations by opening another site in
Denton, Texas.
This location was chosen so that they could market their cars more easily in the Southern Oklahoma area.
The new site will only have one building, and will bring an additional 25 employees on to the company payroll.
Employees are as follows:
There will be one general manager with an executive secretary, as well as three shift managers.
The service/parts departments will employee a total of 12 employees. Five of these employees are mechanics.
Book keeping department will employee three employees, and there will be 5 salesmen.
All applications for financing/loans must be approved through the parent company located in Fort Worth.
Even though the company has grown they have a limited budget to get their new company network, “including computers” up and running.
You are in charge of advising the A1 Cars Company on what type of network schema they will need for their new location.
The new building will be hardwired before you start you analysis.
The Project Manager asks that you submit your proposal with detailed information that he/she can understand.

Your Case Study must be based on the information provided.
There will be no additional information.

Some key points in the case study that I will be looking for are:
1. WAN/LAN/etc?
2. Client Server or Peer to Peer?
3. Hubs/Switches/Routers used?
4. Printing Needs?
5. Computers/Specs?
6. Protocols?
7. OS/Applications installed?
8. Wireless?
9. Security?
10. Media/Cabling?
11. Budget?


Related Discussions:- case study

What is the last step in data encapsulation, The Five steps to data encapsu...

The Five steps to data encapsulation (IN ORDER): 1) User information is changed into data. 2) Data is changed into segments. 3) Segments are changed into datagram and pack

Statements about ppp and slip for wan communications, State the statements ...

State the statements about PPP and SLIP for WAN communications?  Ans)    a) PPP uses its Network Control Programs (NCPs) component to encapsulate many protocols.  b) SLIP

What is dynamic host configuration protocol, How does dynamic host configur...

How does dynamic host configuration protocol aid in network administration? Instead of having to visit every client computer to configure a static IP address, the network admin

Ku-band earth station, Ku-BAND EARTH STATION This is most recent on-goi...

Ku-BAND EARTH STATION This is most recent on-going project under which 40 remote sites will be installed for CDMA back haul and 60 sites will be installed for GSM back haul. 4

What is d-amps, What is D-AMPS D-AMPS uses 832 channels (in every dire...

What is D-AMPS D-AMPS uses 832 channels (in every direction) with three users sharing a sole channel. This allows D-AMPS to support up to the 2496 users simultaneously per cel

Define the term - frame and packets, Define the term - frame and packets ...

Define the term - frame and packets Frames sum up packets. When a packet arrives at data link layer, the complete packet, header, data and remaining all, is used as data field

Determine 10base5 - thicknet, 10Base5 - Thicknet A rigid coaxial c...

10Base5 - Thicknet A rigid coaxial cable (RG-8) approx 0.4 in' thick used in the original Ethernet networks Bus topology LAN utilize base signalling with a maximum se

Illustrate about sliding window protocols, Q. Illustrate about Sliding Wind...

Q. Illustrate about Sliding Window Protocols? - Sliding window - Keeps the unacknowledged outstanding frames in sender - Keeps the expected frames in receiver - Sequen

How to protect computer hardware by threats, How to protect computer Hardwa...

How to protect computer Hardware by threats The first component in the computer system vulnerable to attacks or threats, and most important to be protected, is the hardware.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd