Distinguish between network devices computers and servers, Computer Networking

Assignment Help:

The School of Computing is planning to deploy a new network structure to accommodate the following scenario. Please make suggestions on how this LAN can be designed based on the floor map.

Network devices such as hub, bridge, switch, router, router switch, and wireless devices can be used in combination.

The network design should offer high performance for the lab users and convenience for the staffs. Meanwhile, the cost of building and maintaining the designated network should be kept low.

A design proposal should be delivered at this stage, which contains the following contents:

• Illustrations of the LAN design as well as necessary annotations and comments.
• Justifications of the current design, i.e. reasons for choosing devices and structures.
o Discuss whether this is a practical approach for the required scenario from the following aspects:
Network devices, Network topology, Performance, Cost, Convenience, Sharing of network resources, Any alternative solutions?
• Supplies list including sources of purchase,
o Model numbers, web links, cost, etc.
o The total cost for the network deployment (except for the PCs) should also be finalized.
• Distinguish between Network Devices, Computers and Servers.

 


Related Discussions:- Distinguish between network devices computers and servers

Effectiveness of data communications, Efficiency of a data communications s...

Efficiency of a data communications system depends on three fundamental characteristics - Delivery: The system should deliver data to the correct destination. Data should be r

Session layer standards, Session layer protocols consists of NFS, SQL, RPC,...

Session layer protocols consists of NFS, SQL, RPC, Appletalk Session Protocol (ASP), XWindows, and NetBEUI.

Disadvantages of ip sec tunnelling mode, Disadvantages of IP sec  Tunnelli...

Disadvantages of IP sec  Tunnelling mode IP sec  tunnelling  mode has the  following  disadvantage a.Encryption of  small  packets  generates a lot  networks  over head  thu

Explain token passing -token ring, Token Passing - Token Ring (IEEE 802.5) ...

Token Passing - Token Ring (IEEE 802.5) Needs that station take turns sending data Token passing coordinates process Token is a especially formatted three-byte fr

Explain FDDI media access control, FDDI Media Access Control Unlike CSM...

FDDI Media Access Control Unlike CSMA/CD networks such like Ethernet token-passing networks are deterministic--you are able to calculate the maximum time that will pass before

Connection establishment - tcp connection management, Connection Establishm...

Connection Establishment TCP transmits  data in full duplex mode. When two TCP is two machines are  connected they are able  to send segments to each other simultaneously. This

What do you mean by platform independence, What do you mean by platform ind...

What do you mean by platform independence? Platform independence means that we can write and compile the java code in one platform (eg Windows) and can implement the class in a

Authentication in ppp - point to point , Authentication in PPP PPP can ...

Authentication in PPP PPP can support  authentication operations at the  beginning of a connection. In some  cases reauthentication is also  possible  during  a session.  Endpo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd