Distinguish between network devices computers and servers, Computer Networking

Assignment Help:

The School of Computing is planning to deploy a new network structure to accommodate the following scenario. Please make suggestions on how this LAN can be designed based on the floor map.

Network devices such as hub, bridge, switch, router, router switch, and wireless devices can be used in combination.

The network design should offer high performance for the lab users and convenience for the staffs. Meanwhile, the cost of building and maintaining the designated network should be kept low.

A design proposal should be delivered at this stage, which contains the following contents:

• Illustrations of the LAN design as well as necessary annotations and comments.
• Justifications of the current design, i.e. reasons for choosing devices and structures.
o Discuss whether this is a practical approach for the required scenario from the following aspects:
Network devices, Network topology, Performance, Cost, Convenience, Sharing of network resources, Any alternative solutions?
• Supplies list including sources of purchase,
o Model numbers, web links, cost, etc.
o The total cost for the network deployment (except for the PCs) should also be finalized.
• Distinguish between Network Devices, Computers and Servers.

 


Related Discussions:- Distinguish between network devices computers and servers

What are all the base services provided by the os, What are all the Base se...

What are all the Base services provided by the OS? Interprocess communications (IPC) Task preemption Task priority Local/Remote Interprocess communication Semaphor

Topology, bus topology disadvantage?

bus topology disadvantage?

Wireless transmission, what are the main problems of signal propagation?why...

what are the main problems of signal propagation?why do radio waves not always follow a straight line?why is reflection both useful and harmful?

Enable wireless security - ccna, Enable Wireless Security Step : Confi...

Enable Wireless Security Step : Configure Windows to use WEP authentication.  Navigate to the Network Connections page again and right-click the Wireless Network Connection

Software overheads in parallel programming , Besides these hardware overhea...

Besides these hardware overheads, there are certain software overheads imposed by libraries, parallel compilers, tools and operating systems. The parallel programming languages

Define the network security, Q. Define the Network Security? The Intern...

Q. Define the Network Security? The Internet and Web technology presents enormous promise for e-commerce. Web now is used to handle important business assets that became the

Internet backbone - computer network, Internet Backbone Internet backb...

Internet Backbone Internet backbone  is the  physical  networks ( usually relying  on fiber optic  cable ) that  carries  internet  traffic between  different  networks  and i

Source port number - transport layer, Source Port Number This fields o...

Source Port Number This fields occupies  the first 16 bytes of the UDP header. This  fields typically hold the UDP port number  of the application sending  this datagram. The

Show the model for network access security, Q. Show the Model for Network A...

Q. Show the Model for Network Access Security? Model for Network Access Security (1) Gatekeeper functions comprise Password-based login authentications. (2)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd