Description of the network components

Assignment Help Computer Networking
Reference no: EM13752467

Network technologies can be employed in various ways to meet business needs. Developing a solution begins with a set of requirements that must be understood and met. Following is a scenario that requires the use of a variety of network components and technologies. When working on developing a solution, all requirements may not be explicitly stated. When in doubt, post targeted questions. When making assumptions, be sure to include them in your design document.

The construction industry has struggled over the past years due to the economy. Nearly a dozen companies, including builders and subcontractors, banned together to develop a strategy to increase their business in the greater Washington, D.C. area. This consortium of builders and subcontractors called themselves BLDRS-DC.

BLDRS-DC engaged a well-known marketing company that recommended that they use a Web site to exhibit their services, capabilities, and availability. Other social media sites would be represented in the final solution as well. This site would tie together their sales and scheduling information. They also identified the need for the project managers to have access to project details from the construction sites. This remote access would ensure tasks were completed correctly and decrease construction time considerably.

In addition to engaging a marketing firm, BLDRS-DC hired a company that develops and manages Web sites. The Web site management company would be responsible for developing the software to connect sales materials and scheduling information to the Web site. Fortunately, all the companies involved use the same scheduling software and database software for sales material.
As the network specialist selected to plan and coordinate all of the activities, you need to develop a design document that outlines the technologies needed at each company to connect their unique information to the Web site. Specify the necessary network components that each company would need to enable customer access and scheduling.

In addition, you need to identify a solution for allowing construction managers to securely access drawings and other pertinent construction details remotely.

Prepare a Word document that is approximately 3-5 pages in APA format.

Be sure to include the following.

Title page

Introduction

Description of the network components needed to allow access to marketing materials and scheduling information.

Specified technologies needed to allow construction foremen remote access to construction details.

Explanation of any challenges or considerations uncovered from the research conducted.

Reference no: EM13752467

Questions Cloud

Additional bonds to the public at face value : General Matter's outstanding bond issue has a coupon rate of 11.4%, and it sells at a yield to maturity of 9.20%. The firm wishes to issue additional bonds to the public at face value. What coupon rate must the new bonds offer in order to sell at ..
What happened to germany after its defeat in the i world war : What happened to Germany after its defeat in the I World War? 200 Words.
How australias attitudes for war changed since world war i : How has Australia's attitudes and reasons for war changed since World War I?
External role players need info on growth of organisation : What external role players need info on the growth of an organisation
Description of the network components : Network technologies can be employed in various ways to meet business needs. Description of the network components needed to allow access to marketing materials and scheduling information
What was the role of russia in world war i : What was the role of Russia in World War I?
What are the consequences of intervention : Do you think this intervention was necessary and what are the consequences of this intervention? What might have happened if they had not intervened?
What the policy for hospital : Prepare a 2-3 page report describing, comparing and/or contrasting the specific standards that apply to the authentication, dating and timing of physician orders, and make a recommendation as to what the policy for your hospital should be
What cultural factors caused the differences in outcomes : What cultural factors caused the differences in outcomes? What legacies have the differences in types of encounters and degrees of cultural change left today?

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine the queuing delay for packet

Packet switch receives a packet and determines outbound link to which packet should be forwarded. Determine the queuing delay for packet? Show work.

  What is the length of the data

Is it a packet from the client to the server or vice versa?

  What is the size of data in the ipv4 datagram

An IPv4 header bytes in Hex notation is given below: 45 c0 00 38 9b 3e 00 00 ff 01 fd 3b 80 99 90 01 80 99 91 56.Answer the following questions about the header:What is the size of data in the IPv4 datagram?

  Give hypothetical situation for signal type used in wan

Give a hypothetical situation for each signal type which illustrates how it could be, or is being, used in WAN. In what circumstance, for example, would a company choose to use a satellite signal?

  Determine time take to send file between two hosts

Assume two hosts, A and B, are separated by 10,000 kilometers and are connected by direct link of R =1 Mbps. Assume propagation speed over link is 2.5?108 meters/sec .How long does it take to send file, suppose it is sent continuously?

  Justify whether or not network design will support vpn

Justify whether or not your network design will support dial-up or VPN remote access using descriptions of the following aspects: the advantages and disadvantages of your remote access solution.

  The general method for constructing the parameters of the

the general method for constructing the parameters of the rsa cryptosystem can be described asnbspfollows select two

  Computing smallest window size to optimize the throughput

Consider error-free 256 kbps satellite channel used to send 1024-byte data frames. What is smallest window size that is large enough to optimize the throughput?

  Determine the allocated source ip host address for the

question 1 what was the allocated source ip host address for the targetwindows01 server targetubuntu01 server and the

  Does vc or datagram architecture have more traffic overhead

Suppose that the links and routers in the network never fail and that routing paths used between all source/destination pairs remains constant. In this scenario, does a VC or datagram architecture have more traffic overhead. Why?

  Managing intrusion detection environment

As security manager at XYZ Corporation, you are responsible for managing intrusion detection environment. If you were given the ability to build the environment from scratch, would you use network based IDS, host based IDS, or a combination?

  Select a topic from the list and conduct research based on

select a topic from the list and conduct research based on literature at least three recent research papers and prepare

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd