Creating a network and updating computers

Assignment Help Operating System
Reference no: EM13942513

Bench Fitness Centers has eight separate locations in this area. Most of the centers have the same equipment and provide the same services, but some centers have different equipment and specialized trainers. Below is a summary of the services Bench Fitness Center is seeking from the a mid-sized IT consulting company.

The networking team will work on the network design for the eight centers. In the past, each Bench client has been enrolled in one particular location. However, Bench Fitness marketers think they will get more clients if clients can go to any of the eight Bench Fitness Centers. At the present time the eight centers are not connected to a central network. In order to open all centers to all clients, Bench needs a networked tracking system to maintain records of client usage. This will also allow clients with particular needs and/or interests to match up with specialized equipment and trainers at different centers.

At their eight locations, Bench fitness currently has one PC in the office and one PC in the entrance area. These computers are peer networked, but all are more than five years old.

Bench wants to install a computer in each of the 3 training areas of the centers, so trainers and other staff can look up client records without having to go to the office. Security is an issue and customers should not be able to access these computers. To help increase client use of the centers and to lengthen the time they spend at the centers, Bench also wants to add wireless connectivity in the customer lounge area, so clients can check email, visit the Internet, etc. in between sessions.

The networking project is to update the computer hardware and software at the eight centers and to develop designs for a networked environment to support the goals and to allow clients to visit all locations. All computers at the centers should be able to print to a networked printer and to local printers.

Reference no: EM13942513

Questions Cloud

Build a new store in its place : Mitzu Co. pays $2,650,000 for a tract of land with two buildings on it. It plans to demolish Building 1 and build a new store in its place. Building 2 will be a company office; it is appraised at $600,000, with a useful life of 20 years and a $75,000..
How the offices within a wan are connected : The University of Hawaii campus is spanned over 2 miles. It has 7 colleges and each college building is separated from each other by at least 1000 feet. Each building has 4 floors. The University also has it's centers at London and Australia. You ..
Which criminological theories best describe oprah life : What possible factors could have allowed Oprah to turn her life around and find success when many others in similar or better situations end up becoming criminals? Include the impact of the following factors in your discussion:- The impact of gend..
Companies relationship marketing practices : Make an assessment of your company's relationship marketing practices, based on the CERS' Relationship Strategy Wheel.
Creating a network and updating computers : At their eight locations, Bench fitness currently has one PC in the office and one PC in the entrance area. These computers are peer networked, but all are more than five years old.
Gain competitive advantage from marketing process : 1. Evidence that the organization has a gain a competitive advantage from their marketing processes.
Convergence of twain : Read Thomas Hardy The Convergence of the Twain and then compose a written explication of that poem. This is not a paper about the meaning, but rather what elements where used and why.
Do criminal justice system focus on specific types of crimes : Do present day criminological theories satisfactorily explain female and juvenile crime? Why? What possible challenges could criminology face in explaining these types of crimes?
Why is tcp/ip such a complex protocol : Compare and contrast the advantages and disadvantages of two protocols that perform similar functions at any layer of the OSI model.

Reviews

Write a Review

Operating System Questions & Answers

  Page table entries are needed for two-level paging

Assume that word 0 is part of a hole and that the highest word in memory contains valid tries are needed in the page table if traditional(one-level) paging is used? how many page table entries are needed for two-level paging, with 10 bits in ea..

  Applications for the programs

Applications are the programs that make our computers powerful. Not counting Microsoft Office, what are some of the new applications that you see making a big difference to computer users in next some years?

  Web security threats

Think about the given threats to Web security and explain how each is countered by a particular feature of SSL.

  Question about spam

Discuss your personal experience with Spam and how is spam affecting the Internet as a whole also find the best way to prevent it

  Internal application server for application systems

Classic Catalog Corporation runs a small but rapidly increasing catalog sales business. It outsourced its Web operations to a local ISP for many years but as Web have become a larger portion of its business,

  Assignment on functional modeling

Create a use-case diagram to include at least three (3) actors for the system described in this case through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution ..

  What is the difference between kernel and user mode

What is the difference between kernel and user mode? Explain how having two distinct modes aids in designing an operating system.

  Testing a motherboard

Assume you wish to test a motherboard used in an installation before you proceed too far into the installation. From the devices listed below, choose the minimum devices

  Individual operating systems

Discuss and explain the statement: "Global communication has developed to such a degree that the true operating system is the net itself, where the individual operating systems are just its nodes".

  A computer has a cache, main memory, and a disk

A computer has a cache, main memory, and a disk. If a referenced word is in the cache, 20 ns are required to access it. If it is in main memory but not in the cache (called cache miss)

  The state of the waiting thread to blocked

Which IPC mechanism does not change the state of the waiting thread to blocked?

  Sorting the ascii words

List all the words in memory that can be considred to be decimal ASCII coded numbers. An ASCII coded word can vary from 3030h to 3939h.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd