Prepare network schema of a company, Computer Networking

Assignment Help:

Your Case Study must be based on the information provided. There will be no additional information. This must be submitted in a .doc, or .pdf format. If you send a few paragraphs in an email, it will result in a "0" score for the project. A1 Cars is a car dealership located in Forth Worth, Texas. The company has grown significantly over the last 5 years and due to physical space restrictions they have decided to expand their operations by opening another site in Denton, Texas. This location was chosen so that they could market their cars more easily in the Southern Oklahoma area. The new site will only have one building, and will bring an additional 25 employees on to the company payroll. Employees are as follows: There will be one general manager with an executive secretary, as well as three shift managers. The service/parts departments will employee a total of 12 employees. Five of these employees are mechanics. Book keeping department will employee three employees, and there will be 5 salesmen. All applications for financing/loans must be approved through the parent company located in Fort Worth. Even though the company has grown they have a limited budget to get their new company network, "including computers" up and running. You are in charge of advising the A1 Cars Company on what type of network schema they will need for their new location. The new building will be hardwired before you start you analysis. The Project Manager asks that you submit your proposal with detailed information that he/she can understand. Your Case Study must be based on the information provided. There will be no additional information. Some key points in the case study that I will be looking for are: 1. WAN/LAN/etc? 2. Client Server or Peer to Peer? 3. Hubs/Switches/Routers used? 4. Printing Needs? 5. Computers/Specs? 6. Protocols? 7. OS/Applications installed? 8. Wireless? 9. Security? 10. Media/Cabling? 11. Budget? on..  by alida HALL......... United States

Network Requirement

Introduction:

Most of all  companies are operating their business with handshake of computer technology. System requirement is based on the nature of business and company architecture and its ethics.

System requirements

40 Desktop computers  for all employees including shift managers.

Desktop computer configuration

Processor Intel Core i5 (any)
 Memory (RAM) 8.0 GB 8.0 GB

Hard Disk 500 GB2 500 GB2 

Display & Graphics 19-inch or 20-inch LCD3 
discrete video card
 Sound Built-in audio & speaker Built-in audio & speakers

 Miscellaneous DVD±R/CD-RW drive
80% efficient power supply
hardware-based systems management DVD±R/CD-RW drive
80% efficient power supply

Network  Connection 10/100/1000BaseT Ethernet 10/100/1000BaseT Ethernet

Recommended Operating System Windows 7 SP1

Network architecture 

LAN 

RJ45 CAT6  cables

No of Hub : 3

No of Switches: 4

Topology: Ring Topology 

WAN 

Router: cisco router 2600 series

Security:Unisys- Firewall 

Protocols 

Standard: TCP/IP

For secure transaction: HTTPS with SSL Certificate

 Peripherals

 

HP allinone m1005 series  - 3

Printers are connected with Server. It can be set in shared mode for accessing client machines..


Related Discussions:- Prepare network schema of a company

Who initiates the ‘trap'' message, Question 1 Who initiates the ‘Trap' mes...

Question 1 Who initiates the ‘Trap' message? When is this message generated? Question 2 Discuss the features of a typical Network Management System.List (Fault Management,

Nfs best performance, what parameters should i have for the best nfs v4 per...

what parameters should i have for the best nfs v4 performance?

Calculate the efficiency of stop and wait arq, (i)  Suppose that frames are...

(i)  Suppose that frames are 1250 bytes long including 25 bytes of overhead. Also assume that ACK frames are 25 bytes long. a)  Calculate the efficiency of stop-and-wait ARQ in

Control - transport layer, Control This field  defines 6 different  co...

Control This field  defines 6 different  control  bits or  flags. These bits  enable flow  control  connection  establishment  and termination connection abortion and the mode

Layers, Layers, Massages, Segments, Datagram's and Frames Figure 2.15 ...

Layers, Massages, Segments, Datagram's and Frames Figure 2.15 show the physical  path data takes down a  sending  end  systems  protocol  stack up and  down the  protocol stac

Networking concepts, Networking Concepts Q1  What are the main feature...

Networking Concepts Q1  What are the main features of TCP connections? Why is it said that TCP provides full-duplex service? Q2  What are the differences between TCP conne

What are the threats include in computer software, What are the threats inc...

What are the threats include in computer software The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to

Issues to process of message passing, The following issues are decided by t...

The following issues are decided by the system in the process of message passing: 1) Whether the communication link is established or not 2) Whether the receiver is ready to

Basic working of spanning tree, Q. Basic working of Spanning Tree? Spa...

Q. Basic working of Spanning Tree? Spanning Tree - Redundant bridges may be installed to provide reliability - To prevent infinite looping of packets between bridges,

Dotted decimal notation, Dotted decimal representation is a syntactic form ...

Dotted decimal representation is a syntactic form the IP software uses to express 32-bit binary numbers when communicating with humans. Dotted decimal presents every octet in decim

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd