What type of network model and topology would you recommend

Assignment Help Computer Networking
Reference no: EM131316543

Assignment

You have been asked by a local charity retail organization to install a network in its downtown office. It currently has seven PCs running Windows XP Home Edition. They are configured as follows: Pentium 4 at 3.0 GHz 100-GB IDE hard drive 512 MB of memory, floppy drive CD-ROM 64 MB memory video card 1 parallel port, 1 serial port, and 1 USB 2.0 port The charity's owners are not very concerned about security because the network will share only product inventory information, not information about customers. The owners have asked for a simple, inexpensive network solution that will not require the purchase of new software or personal computers at this initial phase. The charity has volunteers run its stores, and the organization has a limited budget for this initial project. What type of network architecture/model and topology would you recommend, and why? The charity is expected to receive a substantial donation in the near future. This donation will enable it to double the size of its network to 14 PCs. What type of network architecture and topology would you recommend once the organization receives this donation, and why? Be sure to explain in some detail the advantages and disadvantages of the network models that you recommended. What additional software and hardware upgrades would be required? Explain whether they should consider using a network operating system (NOS) and when it would be appropriate. Which NOS would you recommend given the organization's plans? Include in your document a diagram of how the network would be laid out. You can use whatever topology you want in your diagram. Adhere to APA formatting and reference guidelines

Do you feel you can use this information when working in field? Why or why not?

Reference no: EM131316543

Questions Cloud

What part of trend lines value is due to assets : Trend Line inc. has been growing at a rate of 7% per year and is expected to continue to do so indefinitely. The next dividend is expected to be $7.00 per share. A. If the market expects a 12% rate of return on Rend Line, at what price must it be sel..
What will cash flows for this project be : KADS, Inc., has spent $370,000 on research to develop a new computer game. The firm is planning to spend $170,000 on a machine to produce the new game. Shipping and installation costs of the machine will be capitalized and depreciated; they total $47..
Use the geometric average growth rate : Suppose Stark Ltd. just issued a dividend of $1.96 per share on its common stock. The company paid dividends of $1.60, $1.70, $1.77, and $1.88 per share in the last four years. If the stock currently sells for $70, what is your best estimate of the c..
Match intended audience and purpose for situation and tone : Review the Strayer University Website to find an opportunity to write a FAQ that does not exist but would be useful to an intended audience. Match the intended audience and purpose for situation and tone
What type of network model and topology would you recommend : What type of network architecture/model and topology would you recommend, and why? The charity is expected to receive a substantial donation in the near future. This donation will enable it to double the size of its network to 14 PCs.
What is the standard deviation of portfolio : Stock A's expected return and standard deviation are E[RA] = A = 6% and A = 12%, while stock B's expected return and standard deviation are E[RB] = B = 10% and B = 20%. How would you construct a portfolio with expected return of 8% using stock A and ..
Exploration to the moon and mars outweigh the risks : Next, give your opinion on whether or not the benefits of space exploration to the Moon and Mars outweigh the risks and costs of exposing such travelers to gamma rays above Earth's atmosphere. Provide a rationale for your response
Make sure to clarify the intercept and the slope : The expected return on the market portfolio mu m = E[Rm] = 15%, the standard deviation is sigma m = 25% and the risk-free rate is Rf = 5%. Suppose the CAPM holds. Draw on a diagram with the Capital Market Line (CML) derived from the above data. Make ..
Contact list project where the user enters first name : Contact list project where The user enters first name, last name, street address, email address, phone number and notes. Alternate course: If the user leaves one or more of the fields blank, the person will still.

Reviews

Write a Review

Computer Networking Questions & Answers

  What makes tcp-ip networking so popular

What makes TCP/IP networking so popular? Provide at least 2 examples (other than the Internet) for which TCP/IP networking is well-suited, and discuss reasons to support your answer.

  How can these be used to compare

Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used? How can these be used to compare the features and components of each IDPS? Breifly compare the different classifications of systems you ..

  What is a domain name how is it used on the internet name

1 describe at least three examples that show the importance of data communications in your daily life. when doing so

  Write client and server java swing application using socket

Write client and server, Java Swing application using socket connections which permits the client to specify filename to server in Textfield and server send contents of text file back to client if it exists.

  Describe difference between serial and parallel transmission

Transmission Modes, Describe the difference between serial and parallel transmission. What is the chief characteristic of asynchronous transmission

  Importance of using routing protocol-general functionality

Discuss the importance of using a routing protocol and explain general functionality. Router Information Protocol (RIP) is a distance-vector routing protocol than can be used by a router to send data from one network to another. What are the demer..

  Outline a new network security design

Utilize the following information to outline a new network security design. Employee breakdown; 2 partners, 28 accountants, 5 administrative assistants, 2 technology specialists, 1 human resources manager.

  How will dns be handled for the second site

How many total servers are needed? Which roles will be combined? Which edition of Windows Server will be used for each server (e.g., Standard, Data)? Should servers be virtualized using Hyper-V? How will DNS be handled for the second site?

  What is the terminal console password for lan

What is the terminal console password for LAN Switch 1 and LAN Switch 2?

  Network administrator

Using the library, the Internet, and any other materials, prepare a PowerPoint presentation that outlines the following items

  How to install the subversion package

Implement con guration and runtime options that increase security|explaining why your choices increase security.

  Based on the kercher 2010 article explain how can windows

question 1 based on the greiner 2010 article how can microsoft windows azuretm manage file services?question 2 based on

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd