Designing a network for a retail customer, Computer Networking

You are designing a network for a retail customer; they plan to have 5 locations initially with the main store acting as the warehousing depot.  Within the next year they are planning to expand to another 3 locations.  All locations will be located in Ontario.

Within each store there will be 3 main requirements, Internet access via the central warehouse, inventory control and point of sale.  Each retail store will have 8-10 employees at most.

  • What type of network design would you propose? Why? Provide a network diagram showing the proposed topology.
  • What bandwidth would you recommend at each location? Why? Explain
  • What routing protocol would you recommend for this network? Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.
Posted Date: 2/25/2013 1:06:35 AM | Location : United States







Related Discussions:- Designing a network for a retail customer, Assignment Help, Ask Question on Designing a network for a retail customer, Get Answer, Expert's Help, Designing a network for a retail customer Discussions

Write discussion on Designing a network for a retail customer
Your posts are moderated
Related Questions
What is an Ethernet? The Ethernet topology was developed at the University of Hawaii to connect computers on the many Islands. It was radio based design. Later, Robert Metacalf

While calculating shortest path, first we assume graph presentation of network at every node then we use Djikstra's algorithm to calculate shortest path from every node to other on

What are Triggers and Rules? Triggers are special user defined actions generally in the form of stored processes that are automatically invoked by the server based on data rel

What is routing region? When hierarchical routing is used, the routers are separated into what we call regions, with each router knowing all the details about how to route pack

The three ways to give login access to the router are by the Console port, auxiliary port, and virtual terminal (Telnet)

State about data and data files - Information The third and major component of the system liable to be attacked is the data and data files used by the company. It is the most s

Destination Port Number This is  port number used by the process  running on the destination host. It is also 16 bits long  if the destination  host if  server ( a client  sen

using binary adition, what is the result of 1010 + 10? Using binary addition, how would you repeatedly increment a number by 2?

What is piggybacked ACK The protocol will be incorrect. Suppose that 3-bit sequence numbers we are using. Consider following situation: A just send frame 7. B gets frame

Determine the definition of HDLC HDLC has only one address field. In a LAN, any station may transmit to any other station. The receiving station needs to see its own address in