Prepare network schema of a company, Computer Networking

Assignment Help:

Your Case Study must be based on the information provided. There will be no additional information. This must be submitted in a .doc, or .pdf format. If you send a few paragraphs in an email, it will result in a "0" score for the project. A1 Cars is a car dealership located in Forth Worth, Texas. The company has grown significantly over the last 5 years and due to physical space restrictions they have decided to expand their operations by opening another site in Denton, Texas. This location was chosen so that they could market their cars more easily in the Southern Oklahoma area. The new site will only have one building, and will bring an additional 25 employees on to the company payroll. Employees are as follows: There will be one general manager with an executive secretary, as well as three shift managers. The service/parts departments will employee a total of 12 employees. Five of these employees are mechanics. Book keeping department will employee three employees, and there will be 5 salesmen. All applications for financing/loans must be approved through the parent company located in Fort Worth. Even though the company has grown they have a limited budget to get their new company network, "including computers" up and running. You are in charge of advising the A1 Cars Company on what type of network schema they will need for their new location. The new building will be hardwired before you start you analysis. The Project Manager asks that you submit your proposal with detailed information that he/she can understand. Your Case Study must be based on the information provided. There will be no additional information. Some key points in the case study that I will be looking for are: 1. WAN/LAN/etc? 2. Client Server or Peer to Peer? 3. Hubs/Switches/Routers used? 4. Printing Needs? 5. Computers/Specs? 6. Protocols? 7. OS/Applications installed? 8. Wireless? 9. Security? 10. Media/Cabling? 11. Budget? on..  by alida HALL......... United States

Network Requirement

Introduction:

Most of all  companies are operating their business with handshake of computer technology. System requirement is based on the nature of business and company architecture and its ethics.

System requirements

40 Desktop computers  for all employees including shift managers.

Desktop computer configuration

Processor Intel Core i5 (any)
 Memory (RAM) 8.0 GB 8.0 GB

Hard Disk 500 GB2 500 GB2 

Display & Graphics 19-inch or 20-inch LCD3 
discrete video card
 Sound Built-in audio & speaker Built-in audio & speakers

 Miscellaneous DVD±R/CD-RW drive
80% efficient power supply
hardware-based systems management DVD±R/CD-RW drive
80% efficient power supply

Network  Connection 10/100/1000BaseT Ethernet 10/100/1000BaseT Ethernet

Recommended Operating System Windows 7 SP1

Network architecture 

LAN 

RJ45 CAT6  cables

No of Hub : 3

No of Switches: 4

Topology: Ring Topology 

WAN 

Router: cisco router 2600 series

Security:Unisys- Firewall 

Protocols 

Standard: TCP/IP

For secure transaction: HTTPS with SSL Certificate

 Peripherals

 

HP allinone m1005 series  - 3

Printers are connected with Server. It can be set in shared mode for accessing client machines..


Related Discussions:- Prepare network schema of a company

Measurement on latency and bandwidth , Measure the performance (both latenc...

Measure the performance (both latency and throughput) of  TCP and UDP protocol stack  running on a pair of PCs  or Workstations in the Lab, and compare the results of your software

How is computer networks used in sales and marketing, Q. How is computer ne...

Q. How is computer networks used in sales and marketing?  Marketing and sales:   Computer networks are used extensively in both marketing and sales organizations. Marketing pr

virtual private network - virtual private network vpns, Virtual private ne...

Virtual private network The virtual  private  networks takes the  user data  encrypts them and sends them  to their  destination over  the internet. the sender  and the receiv

Security, .test a number to be prime number in network security

.test a number to be prime number in network security

What is difference among flsm and vlsm, In FLSM subnet mask of all subnets ...

In FLSM subnet mask of all subnets will b same. But in FLSM it changes.

TCP, TCP creates a reliable data transfer service, in addition to IP''s unr...

TCP creates a reliable data transfer service, in addition to IP''s unreliable best-effort service. Study the related sections of the text, and in your own words, summarize how TCP

Write the purpose of split horizon, Split Horizon - If you attain a protoc...

Split Horizon - If you attain a protocol's route on an interface, do not send information about that route back out that interface.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd