Develop a plan based on companys business requirements

Assignment Help Computer Networking
Reference no: EM131188544

You are the Network admin for a small company XYZ this company is building its Network infrastructure from scratch and you have been tasked to assist in this project so you have been asked to develop a plan/design based on their business requirements/needs and below are the company's requirements:

• The company will be located in a building at Chicago and it will occupy two floors (7th floor and the 8th).

• The company size would be around 35 total employees (20 employees at the 7th floor and 15 at the 8th) and there would be a potential growth in the next 5 years.

• Users will need to be able to use the Internet for their research/study also they will need to use email and chatting system to communicate with each other and other companies.

• There will be a primary printer and scanner for each floor and each user need to be able to print/scan to the backup printer if the primary ones fail

• No voice or video streaming is required.

• Network Devices will be secured in a room in each floor also you will need to restrict access to these devices by setting passwords/encryption ...

• After 6 months the company is hiring a group of 10 employees in another state (Indiana) and both locations at both states will need to communicate with each other all 10 users will have Laptops to do their job.

As The Network Admin and using packet Tracer you are required to design this Network using the following:

• Provide a project outline/plan by analyzing the above requirements include a logical/physical drawings of your network

• Use the right Network devices/cables taking in considerations the potential company's growth

• Configure the Network devices and provide meaningful hostnames also restrict access to these devices by setting passwords/encryption

• Design the IP addressing Scheme correctly(use the correct interfaces IP addresses)

• Consider using either dynamic/static routing to allow proper traffic routing between the two locations

• Test your completion of this project, users in both locations will be able to communicate with each other successfully use all possible Network tools /show commands to test your results

• Troubleshoot any possible issues.

Reference no: EM131188544

Questions Cloud

Cause problem in a business : Discuss which of the top 10 mistakes that managers make is the most serious or the most likely to cause problem in a business. Give an example.
Reasons for the historical growth in the size of benefits : There are five reasons for the historical growth in the size of benefits packages. Which of these reasons still affects the growth of employee benefits today? Which actually might be current reasons for declines in the size of benefit packages
Find the financial break-even quantity : Consider a project with the following data: accounting break-even quantity = 14, 200 units; cash break-even quantity = 10, 300 units; life = five years; fixed costs = $170,000; variable costs = $27 per unit; required return =12 percent. Ignoring the ..
Identify different diversities that may be found groups : Identify different diversities that may be found within groups. Explain the impact of diversity on an organization. Identify the collaboration between a manager and human resources (HR) within organizational behavior.
Develop a plan based on companys business requirements : You are the Network admin for a small company XYZ this company is building its Network infrastructure from scratch and you have been tasked to assist in this project so you have been asked to develop a plan/design based on their business requireme..
What are the characteristics of an effective team : When discussions among team members breaks down, there is lack of clarity in communications, or some members are highly emotional, or in some way conflict develops among team members, what should the team leader do? What should all team members d..
Operating leverage at financial break-even level of output : A project has the following estimated data: price = $54 per unit; variable costs = $36 per unit; fixed costs = $19, 300; required return = 12 percent; initial investment = $26, 800; life = four years. Ignoring the effect of taxes, what is the account..
Types of stakeholders influence corporate finance decisions : Which two types of stakeholders would you argue to be the most important for the modern corporation and why? How do these types of stakeholders influence corporate finance decisions? Is this an appropriate level of influence for these stakeholder typ..
What types of energy are involved in this setup : Determine which of the following represent potential energy and which represent kinetic energy.

Reviews

Write a Review

Computer Networking Questions & Answers

  Construct a diagram to map the arguments about a moral claim

Construct a diagram to map the arguments about a moral claim that you have identified in the article and undertake further research about your chosen case. to assist you in analysing and discussing it in your essay.

  Process of routers and switches

Do you think that one day, routers and switches will not be needed? Why?

  Evaluate two network monitoring technologies

As a network manager in a medium-size corporation, it is your responsibility to use a proactive approach to providing security to your network. Evaluate 2 network monitoring technologies. These should be able to provide you with a graphical look at..

  A person providing information without direct knowledge

A person providing information without direct knowledge of or experience with the topic

  Plan and design a lan/wan for citycampus

Outline tand discuss 3 major network security considerations that have to be addressed so that the school can be reasonablysure of truble-free continued operation.

  Research paper should be on ethernet networking related to

it should be in api format.research paper should be on ethernet networking related to my specific subject which is

  What is the rationale for acquiring professional credentials

List and describe the criteria for selecting information security personnel

  User in a database

List any ten (10) Privileges that can be assigned to a user in a database.

  Explain what happens at each layer of the osi model

Explain the layers of the OSI Model and how data flows through the model. Explain what happens at each layer of the OSI Model.

  Application layer in the internet model

Give some advantages and disadvantages of combining the session, presentation, and application layer in the OSI model into one single application layer in the Internet (TCP/IP) model

  Develop a strategy to ensure this compatibility by using

imagine you have been hired as a network technology consultant for a small business. the owner of the business sally

  Describe internet application that you use in your life

Choose an Internet application that you use in your life, company, school or community. Describe its functionality and protocols in the Application layer, and the services, functionality, and protocols it uses in Transport layer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd