case study, Computer Networking

Assignment Help:
#questi
Scenario:
Your Case Study must be based on the information provided.
There will be no additional information.
This must be submitted in a .doc, or .pdf format.
If you send a few paragraphs in an email, it will result in a “0” score for the project.

A1 Cars is a car dealership located in Forth Worth, Texas.
The company has grown significantly over the last 5 years and due to physical space restrictions they have decided to expand their operations by opening another site in
Denton, Texas.
This location was chosen so that they could market their cars more easily in the Southern Oklahoma area.
The new site will only have one building, and will bring an additional 25 employees on to the company payroll.
Employees are as follows:
There will be one general manager with an executive secretary, as well as three shift managers.
The service/parts departments will employee a total of 12 employees. Five of these employees are mechanics.
Book keeping department will employee three employees, and there will be 5 salesmen.
All applications for financing/loans must be approved through the parent company located in Fort Worth.
Even though the company has grown they have a limited budget to get their new company network, “including computers” up and running.
You are in charge of advising the A1 Cars Company on what type of network schema they will need for their new location.
The new building will be hardwired before you start you analysis.
The Project Manager asks that you submit your proposal with detailed information that he/she can understand.

Your Case Study must be based on the information provided.
There will be no additional information.

Some key points in the case study that I will be looking for are:
1. WAN/LAN/etc?
2. Client Server or Peer to Peer?
3. Hubs/Switches/Routers used?
4. Printing Needs?
5. Computers/Specs?
6. Protocols?
7. OS/Applications installed?
8. Wireless?
9. Security?
10. Media/Cabling?
11. Budget?

on..

Related Discussions:- case study

Illustrate keep alive and time-waited timer, Q. Illustrate Keep alive and T...

Q. Illustrate Keep alive and Time-Waited Timer? Keep alive timer To prevent a long inactive connection between two TCPs - Either client or server crash

What are proxy server, What are proxy servers and how do they protect compu...

What are proxy servers and how do they protect computer networks? Proxy servers primarily stop external users who identifying the IP addresses of an internal network. Without i

What are the key design issues of a computer network, What are the key desi...

What are the key design issues of a computer Network? a. Connectivity b. Cost-effective Resource Sharing c. Support for common Services d. Performance

Two types of transmission technology , What are the two types of Transmissi...

What are the two types of Transmission Technology available in ccna? Ans) Point - to - Point and Broadcast are the Two types of Transmission Technology available in CCNA

Substantial capital investments in new networks, Question: (a) How can...

Question: (a) How can governments provide the mobile industry with the long-term clarity and certainty it needs to make substantial capital investments in new networks? (b)

Icmp process, Some of the ?elds of IP and ICMP datagrams will be ?xed, some...

Some of the ?elds of IP and ICMP datagrams will be ?xed, some will be settable by the application, and others will computed according to the situation. You must set all ?elds of th

Debug igrp, As a system administrator, you require to debug igrp but are wo...

As a system administrator, you require to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use?

Determine the names of network installation, Determine the names of Network...

Determine the names of Network installation ? Buying the components ? Cabling the network ? Installation of networking components such as hubs, switches, routers, gateway

Disadvantages of ip sec tunnelling mode, Disadvantages of IP sec  Tunnelli...

Disadvantages of IP sec  Tunnelling mode IP sec  tunnelling  mode has the  following  disadvantage a.Encryption of  small  packets  generates a lot  networks  over head  thu

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd