What routing protocol is suitable for retail customer

Assignment Help Computer Networking
Reference no: EM1371848

You are designing a network for a retail customer; they plan to have 5 locations initially with the main store acting as the warehousing depot. Within the next year they are planning to expand to another 3 locations. All locations will be located in Ontario.

Within each store there will be 3 main requirements, Internet access via the central warehouse, inventory control and point of sale. Each retail store will have 8-10 employees at most.

• What type of network design would you propose? Why? Provide a network diagram showing the proposed topology.

• What bandwidth would you recommend at each location? Why? explain

• What routing protocol would you recommend for this network? Explain the reasons for your selection; refer to the specific features of the protocols that influenced your selection.

Reference no: EM1371848

Questions Cloud

Data flow diagram for student assistant of local law firm : Design a data flow diagram to include all functions and data flows as described in this situation, starting from time you submit your time sheet.
Electric generating plants of tennessee valley : Some of the electric generating plants of Tennessee Valley Authority are powered by coal. Coal is bought by a separate procurement division and is transferred to plants for use.
Activity-based costing-job costing : Employ the Internet or other resources to find out an article relevant to activity-based costing (ABC), job costing, or process costing. Make a 125-word executive summary of your article.
Absorption and variable costing methods on income statement : Write down the differences between absorption and variable costing techniques on income statement presentation.
What routing protocol is suitable for retail customer : What routing protocol would you suggest for this network? Describe the reasons for your selection; refer to specific features of protocols that influenced your selection.
Practice of tipping : In most restaurants, waiters receive a big portion of their compensation through tips from customers. Generally, the size of the tip is decided by the customer. However, many restaurants require a 15 percent tip for parties of eight or more.
Determining total cost problem-cost per unit : Company A plans to produce 300,000 units next year, the production budget is: Compute the total cost and cost per unit when the unit production is changed to 315,000 units.
Financial impact of outsourcing the grounds maintenance : College A is planning outsourcing their groundskeeping. They have been given a bid from Groundskeeper Willie for $250,000 a year, with the claim that he will keep school grounds in the same condition they are in now.
Explain different strategies-transfer file between computers : In second strategy, packets are not acknowledged individually, but whole file is acknowledged when it arrives. Explain the two approaches.

Reviews

Write a Review

Computer Networking Questions & Answers

  Calculate rsa signature on long message by computing mod

Calculate RSA signature on long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Determine internet address for domain name

Determine an Internet address for this domain name. Under what situations is each of the following statements true of the name resolution process?

  Explaining mutual exclusion protocol

In Lamport'so mutual exclusion protocol, if process i is implementing critical section, Is this still true when there are no messages in transit?

  How to access remoteapp applications from partner server

In the TS RemoteApp Manager console, there are currently two warning indicators showing in the Overview area. Will any of these warnings make it impossible to access your RemoteApp applications from your partner server?

  Specify protocol by listing the different messages

Specify your protocol by listing the different messages that will be used by your application layer protocol. You must clearly specify the contents of each message by providing the message structure.

  Research both legacy and voip telecommunications

Research both legacy and VoIP telecommunications. Determine which one is more secure and why.Define what it is and how it will be used in the telecommunications model. Provide 3 sources for your ideas.

  Maximum value of l-tcp sequence number are not exhausted

Consider transferring an enormous file of L bytes. What is the maximum value of L such that TCP sequence numbers are not exhausted? Give proper justification?

  Describe the features and benefits of csma-cd

For the purposes of this question you do not need to know about the token access method. You just want to explain the features and benefits of CSMA/CD.

  Research and recommend writing guide-forensics organization

Your manager has asked you to research and recommend a writing guide that examiners in your computer forensics organization will use for all official written reports.

  How mpls of long-haul ethernet to connect two offices

Louisiana, also must be connected to both Memphis and Laramie at a rate of 512 kbps? Which solution is cheaper now? How about considering an MPLS over IP solution or a form of long-haul Ethernet?"

  Self regulating norms of social networking business model

Do you think that the current Social Networking business model can sustain, given these generally self regulating norms?

  How many users can be supported if circuit switching is used

Suppose users share a 1Mbps link. Also suppose each user requires 100Kbps when transmitting, but each user transmits only 20% of the time. When circuit switching is used, how many users can be supported?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd