Mr. Walter King
Gulfstream Air
Savannah, GA, USA 34566
DotNet Solutions
| Network Fundamentals
Equipment
Services
Proposed Network Layout
This is a tender proposal for the project involving the design and the configuration of the local area network (LAN) aboard Gulfstream IV business jet. The LAN is be used for the provision of in-flight entertainment and communication. This proposal gives the details of the hardware requirement for the completion of the project together with the approximate cost of the project components.
Equipment
Router
The router that should be used must have more than 20 ports. The best in this case is CISCO 837-K9-64 ADSL Broadband Router.
Component
Recommendation
Memory: 32MB
The memory can be expanded to 48MB
Ports: 24 10/100 ports
Will be wired to use 100T Base speed
Switch-Cisco Catalyst® 2950C-24
Component
Recommendation
Memory: 32MB
The memory can be expanded to 48MB
Ports: 24 10/100 ports
Will be wired to use 100T Base speed
3. Network Points
Component
Recommendation
Memory: 32MB
The memory can be expanded to 48MB
Ports: 24 10/100 ports
Will be wired to use 100T Base speed
4. Wireless Access Points
For displaying the videos and also running basic application such as Microsoft Office suite .can also be used for sending e-mail
6. Server
For controlling the other network resources. Also used to stream the AVOD (Audio Video On Demand)-Should be HP Compaq ProLiant DL760 G2
Component
Recommendation
Processor:Quad (4x) Intel Xeon 2.8GHz
Operating system: Windows 7
RAM: 4GB RAM
7. Color Printer:
Samsung CLP300-Is the lightest color printer hence its suitability on the plane
Component
Recommendation
Samsung CLP300
Is light in weight and decent
Ports: 24 10/100 ports
Will be wired to use 100T Base speed
Must be able to support printing over the network
Budget
Equipment
Cost
1
CISCO837-K9-64 ADSL…
Network Fundamentals HR Gulfstream Network Proposal Network Fundamentals Cover Letter Appended information Mr. Jet Buyer 1952 Kanako Lane Gulfstream IV Network Proposal Bob Smith Customer Relations In less than one hundred years, air travel and networking and computing communications have evolved from the Wright brothers and the UNIVAC housed in several huge rooms to fully functional in-flight Gulfstream network communications. Passengers today expect their palm pilots, laptops and PC's to work as seamlessly as the flight itself. The modern day concerns
The paper creates Extended Access Control Lists for ABC Corporation using Port Numbers. Extended Access Control Lists for ABC Corporation using Port Numbers access-list 101 permit tcp 172.16.3.0. 0.0.0.255 any eq 20 access-list 101 permit tcp 172.16.5.0. 0.0.0.255 any eq 21 access-list 101 permit tcp 172.16.3.1/16. 0.0.0.255 any eq 22 access-list 101 permit tcp 172.16.3.254/16. 0.0.0.255 any eq 25 access-list 101 permit tcp 172.16.5.254/16. 0.0.0.255 any eq 35 access-list 101 permit tcp 172.16.0.254/16. 0.0.0.255 any eq18 access-list 101
Network dating sites. How type dating evolved . Include pros cons. Network dating sites have gained a particular place of social eminence within contemporary times. Online dating sites that members pay to use, such Match.com, made over a billion dollars in 2010 (No author). Many people consider these websites as primary options for dating for the simple fact that they allow expedient access to other singles who are also looking to
Network Security for a Medium Sized Company: Network security is an important component for all companies including small and medium sized firms because very few businesses can operate without a network of computers. The network of computers facilitates improved communication in order for the company to improve its profitability or productivity. However, the improved communication between computers is also associated with some inherent risks such as malware and unauthorized access. The
Network Design Consultation Design recommended for the client The requirement of the client of the small billing business shall deserve a tailored system for his network design. This compels for network similar for a small office management process. Shall has a variety of the components suited in their places. The network shall facilitate the process of file sharing, internet access, connection to a networked printer, maintain a basic, secure environment and facilitate
All network authorized personnel must be instructed to use "strong" passwords consisting of at least 8 characters; they must include at least one upper and one lower case letter, at least one Arabic number, and at least one "special character" in addition to avoiding any form or abbreviation of the user's first or last name (Boyce, 2002; Kizza, 2005). Network administrators must also implement applications capable of ensuring compliance by
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now