Network topology & communication

Assignment Help Computer Networking
Reference no: EM13765516

Network Topology & Communication

Details:

You have been asked by Redline Motors & Equipment, a local motor and performance parts company, to install a network in its new office. The corporate office use to be located within the warehouse, and a small office was leased in a remote location. Due to the lease being up on their remote location, and space being limited and cramped in the warehouse, the company built a 3 story corporate office. Some specifications for their new office and warehouse include: 50 computers and 7 printers in the corporate building for their sales and other representatives including management

There are a total of 10 offices located throughout the corporate building 10 laptops are used throughout the warehouse with 3 printers spread throughout the building (the warehouse is located on the opposite end of a parking lot from the corporate office) Communication is needed between the warehouse and the main 3 story office building. TIP: Think fiber optic between buildings and why? Security should be taken into consideration based on the fact that customer information and their payment methods will be in the computer systems. At this point in time Redline is not concerned about software or upgrades, they have a system in place they like and are going to expand that

  • Write a 3-4-page report detailing your network design that includes the following:
  • What type of network architecture/model or topology would you recommend? LAN, WAN or a combination of both.
  • What end devices would you recommend using and why?
  • What network media would you recommend using and why?
  • What other network designs are not the best solution and why? (E.g., bus, ring, etc.).
  • How is your network design scalable should Redline decide to expand in the future ?

Be sure to explain the advantages and disadvantages of the network model(s) that you recommended.
Adhere to APA formatting and reference guidelines when writing your response. Additionally, your response should be free of grammatical errors, use complete sentences, and give specific details to support statements

Reference no: EM13765516

Questions Cloud

Calculate the capacity of each machine center : Calculate the capacity of each machine center and the capacity of the system. Analyze where the focus of the company's efforts should be if Beck wants to expand capacity.
Characteristics of the u.s. health care delivery system : How do the interests, concerns, or foci of these multiple components intersect with and/or differ with one another?
Evaluate the various areas of the criminal justice system : Compare and evaluate the various areas of the criminal justice system and security by addressing the following: The objectives of and the challenges facing various federal, state, and local law enforcement agencies
Advantages of authorizing the usa patriot act : Write a 1,050- to 1,400-word paper that addresses advantages and disadvantages of authorizing the USA Patriot Act of 2001 as a permanent change to American statutory authority
Network topology & communication : You have been asked by Redline Motors & Equipment, a local motor and performance parts company, to install a network in its new office. The corporate office use to be located within the warehouse, and a small office was leased in a remote location..
Write paper on alliance supermarket and point-of-sale system : Write a paper on Alliance Supermarket and Point-of-Sale (POS) Systems case study. Alliance Supermarkets has been using a point-of-sale (POS) system for some time to track its inventory.
States tort claims act : Write a 1,550 to 1,850- word paper on the state's tort claims act where you reside or on the Federal Tort Claims Act of 1946. Explain how it applies to local justice and to security agencies
How important is forensic science to policing : How important is forensic science to policing and criminal investigations, court processes, and security efforts at various levels? Explain your rationale in a historical approach
What is the likelihood that the daughters suit will succeed : What is the likelihood that the daughter's suit will succeed? State your reasons. Is contract rescission a potential remedy? Why or why not? Is an award of monetary damages an adequate remedy? Why or why not

Reviews

Write a Review

Computer Networking Questions & Answers

  Identify the source port number

Identify the source port number and identify the destination port number and what is the length of the data?

  Prepare a design for a state of the art network

To prepare a design for a state of the art network at the Wall Street location of World-Wide Trading. Propose a Network design that solves the current security audit problems (see security sections), to meet business and technical goals. Provide a ..

  Consider this scenario.a new three level building

Consider this scenario. A new three level building will be built to accommodate three computer labs. It will be a separate building from the existing one. Each level will accommodate one lab. 50 personal computers (PCs) and a shared printer will b..

  Develop a project plan depicting the project tasks

Develop a project plan depicting the project tasks, task durations, predecessors, and resources needed to implement the wireless network and develop a network architecture diagram depicting the wireless networking equipment, security devices, and a..

  How recommendations at cfo site help efforts

How could the articles or recommendations at the CFO site help your efforts? Are these subjects where we should be looking to for future investments?

  Company a has about 100 employees

Company A has about 100 employees spread over three locations in the same city, all linked by fast network connections. The IT/IS administration is centralized and includes the helpdesk.

  Describe the recommended network architecture

Identify the protocols in your design and provide rationale for your decision. Describe the recommended network architecture.

  Threat, risk and vulnerability

Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.

  Explaining language of all strings in alphabet sigma

For a language L over alphabet Sigma, let sup(L) denote language of all strings in Sigma* that contain a string of L as s substring.

  Create the network for use in training environment

You are asked to create the network for use in training environment. It must be mobile, ... Mobile Training is small training firm which offers mobile classrooms.

  Homework 555 to guide you in your research you will be

to guide you in your research you will be answering various questions on can. you should answer each question fully.

  Networks 1consider an rtp session consisting of four users

1.consider an rtp session consisting of four users all of which are sending and receiving packets to the same multicast

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd