Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Your Case Study should be based on the information given. There will be no extra information. This should be submitted in a .doc, or .pdf format.

A1 Cars is a car dealership situated in Forth Worth, Texas.

The company has grown significantly over the last 5 years and due to physical space restrictions they have decided to expand their operations by opening the other site in Denton, Texas.

This location was selected so that they could market their cars more simply in the Southern Oklahoma area.

The new site will only have one building, and will bring an extra 25 employees on to the company payroll.

Employees are as shown:

There will be one general manager with an executive secretary, and also three shift managers.

The service or parts departments will employee a total of 12 employees. Five of such employees are mechanics.

Book keeping department will employee three employees and there will be 5 salesmen.

All applications for financing or loans should be approved via the parent company situated in Fort Worth.

Even although the company has grown they have a limited budget to get their new company network, “including computers” up and running.

You are in charge of advising the A1 Cars Company on what kind of network schema they will require for their new location.

The new building will be hardwired before you start you analysis.

The Project Manager asks that you submit your proposal with detailed information that he or she can understand.  

Your Case Study should be based on the information provided.There will be no extra information.

Some major points in the case study that will be looking for are:

A) WAN/LAN/etc?

B) Client Server or Peer to Peer?

C) Hubs/Switches/Routers used?

D) Printing Needs?

E) Computers/Specs?

F) Protocols?

G) OS/Applications installed?

H) Wireless?

I) Security?

J) Media/Cabling?

K) Budget?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91161
  • Price:- $25

Guranteed 24 Hours Delivery, In Price:- $25

Have any Question? 


Related Questions in Computer Engineering

Austins commonplaces of lawbased on your reading of the

Austin's Commonplaces of Law Based on your reading of the Introduction, describe the three commonplaces of law and create examples to illustrate the meaning of each commonplace.

While there is no end to what you might write you must

While there is no end to what you might write you must convey your thoughts in essay of at least four to five pages excluding cover page and references section. Assignment: Write an essay that describes the preparation r ...

Assume we have a stream cipher whose period is quite short

Assume we have a stream cipher whose period is quite short. We happen to know that the period is 150-200 bit in length. We assume that we do not know anything else about the internals of the stream cipher. In particular, ...

Q1 describe the three models of cloud computing based on

Q1: Describe the three models of cloud computing based on the NIST cloud computing reference architecture. List the advantages and disadvantages of each model. Q2: What are the major network management functions? Q3: Des ...

1 assume there is a server with the domain name

1. Assume there is a server with the domain name www.common.com. a. Show an HTTP request that needs to retrieve the document /usr/users/doc. The client accepts MIME version 1, GIF or JPEG images, but the document should ...

Overviewyou are a mobile application developer working for

Overview: You are a mobile application developer working for Mick Jagger who owns Wild Horses Incorporated (WHI).  Mick's company is just getting started with Android mobile application development. Mick wants to make su ...

Imagine a peer-to-peer network where 1000 users want to

Imagine a peer-to-peer network where 1000 users want to communicate in an authenticated and confidential way without a central Trusted Third Party (TTP). ] 1. How many keys are collectively needed, if symmetric algorithm ...

1 how would you fi x the false sharing issue that can

1. How would you fi x the false sharing issue that can occur? 2. Consider the following portions of two different programs running at the same time on four processors in a symmetric multicore processor (SMP). Assume that ...

1 which security protocols are used to protect e-mail2

1. Which security protocols are used to protect e-mail? 2. IPSec can be used in two modes. What are they? 3. Which kind of attack on cryptosystems involves using a collection of pre-identified terms? Which kind of attack ...

Line segment informationthis program allows the user to

Line Segment Information This program allows the user to draw a line segment and then displays some graphical and textual information about the line segment. Input: 2 mouse clicks for the end points of the line segment. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen