Distinguish between network devices computers and servers, Computer Networking

Assignment Help:

The School of Computing is planning to deploy a new network structure to accommodate the following scenario. Please make suggestions on how this LAN can be designed based on the floor map.

Network devices such as hub, bridge, switch, router, router switch, and wireless devices can be used in combination.

The network design should offer high performance for the lab users and convenience for the staffs. Meanwhile, the cost of building and maintaining the designated network should be kept low.

A design proposal should be delivered at this stage, which contains the following contents:

• Illustrations of the LAN design as well as necessary annotations and comments.
• Justifications of the current design, i.e. reasons for choosing devices and structures.
o Discuss whether this is a practical approach for the required scenario from the following aspects:
Network devices, Network topology, Performance, Cost, Convenience, Sharing of network resources, Any alternative solutions?
• Supplies list including sources of purchase,
o Model numbers, web links, cost, etc.
o The total cost for the network deployment (except for the PCs) should also be finalized.
• Distinguish between Network Devices, Computers and Servers.

 


Related Discussions:- Distinguish between network devices computers and servers

Compute the entropy of the source, A statistical encoding algorithm is bein...

A statistical encoding algorithm is being considered for the transmission of a large number of long text files over a public network. Part of the file content is as follows: DOD

General middleware in client server environment, What is General Middleware...

What is General Middleware in client server environment? Ans) It having the communication stacks, distributed directories, authentication services, network time, RPC, Queuing se

What is dynamic host configuration protocol, How does dynamic host configur...

How does dynamic host configuration protocol aid in network administration? Instead of having to visit every client computer to configure a static IP address, the network admin

Password authentication protocols (pap), Password Authentication Protocols ...

Password Authentication Protocols (PAP) PAP  implements the  traditional username and password  authentication methods. At the  request from  an authenticator the client respon

Packets in eigrp, What are different kinds of packets in EIGRP?

What are different kinds of packets in EIGRP?

Describe how does arp response the request, ARP sent the request in broadca...

ARP sent the request in broadcast, response is unicast When a source sends ARP request the switch broadcast the ARP req. if it doesn't have the destination mac address in its ma

Barters, What is a OSI layer 2 device called a "barter"?

What is a OSI layer 2 device called a "barter"?

Describe the count-to-infinity problem in distance vector, Describe the cou...

Describe the count-to-infinity problem in distance vector

Explain the term- encryption, Explain the term- Encryption Because all ...

Explain the term- Encryption Because all of the user traffic, as well as control traffic, is digitized in second generation systems, it is a relatively simple matter to encrypt

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd