Preview

appendix b

Satisfactory Essays
Open Document
Open Document
569 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
appendix b
Associate Level Material
Appendix B
LAN Operating Systems Scenarios
Read the three scenarios below and answer the questions that follow each scenario.
You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component.
The type of relationship you would want to have is a SERVER/CLIENT relationship. The server would have to be able to handle logon/authentication (domain controller). Most likely a Windows Server that has an Active Directory. I also will need a file server which is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. Based on the departments I would need to create security groups in order to keep the network secure. I will also create a shared drive directory structure that represents each department. For example if more than 5 employees needed to be added it would be very easy to add them to the necessary security group which will automatically add them to the share
You are the network administrator for a company that has a peer-to-peer network. How would the pieces and components of this network relate to each other? Define all the components of this type of network.
The peer to peer network is unique because it has no central hub for any of the computers that is on the network. The computers are connected to each other and each computer hold a piece of the network capability, each computer handles part of the processing power, the memory requirements, and the communication processes. The components in this network are computers that are connected to each other and the cables that they are connected to. This type of network does not allow many additions to the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    There will be 25 employees at the main office and 15 employees at the two new locations. Each employee will have their own workstation at their employed location. Each employee will have their own unique user id and password to log into their workstations. Each employees profile will be set up so they can log into any workstation at all three locations. All the profiles will be connected to a public shared drive that gives all employees access to all documentation under this drive. Each employee will also have a private drive that will give them access to private documentation at any location they may be working at. There are 10 employees that will be traveling to different locations when needed. Although the employees have the capability of logging onto any workstation and/or customer relations workstation at either location; we will also provide laptops and/or tablets connected to the network they will be able to access their profiles…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    The architectural components of a LAN are utilized to describe to network. They include the network's physical topology, how the nodes access it. The transmission technique and whether it is wired or wireless. Other factors are the protocols utilized to talk over the network and whether it shares information with other networks. As far as physical components go you have to look at switches, routers, servers, and clients. Other items are added to these depending on the size of the network in question.…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ITN Final Chp 7 Through 12

    • 7250 Words
    • 75 Pages

    As discussed in this textbook, three layers of a network model are the components required for a typical network, including local area networks.…

    • 7250 Words
    • 75 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 273 Unit 1

    • 316 Words
    • 2 Pages

    4. Describe two hypothetical situations, one in which a peer-to-peer network would be most appropriate and one in which a client-server network would be most appropriate, and explain why the particular network type would be most appropriate for that case.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Appendix H

    • 278 Words
    • 2 Pages

    Use this document to report your findings from the LeafLab Exploration Experiment. The lab report consists of three sections: Data, Exploration, and Lab Summary.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    A peer-to-peer network is a network where each workstation has equivalent capabilities and responsibilities. In this type of network there is no dedicated server, each workstation acts as a server and they share the responsibilities that a single dedicated server would. Each workstation is allowed to access all information allowed by the owners of each workstation. Each…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw410 Week 2 Lab Report

    • 502 Words
    • 3 Pages

    To complete the Week 2 Lab Report, answer the questions below concerning the Network Design Lab Scenario found in Doc Sharing.…

    • 502 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Allowed client station addresses can be spoofed by any old hacker. This method is unreliable at best…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Appendix B

    • 702 Words
    • 3 Pages

    |Cost of cotton decreases |Clothing |Supply(right) – cost less to make so |Quantity will increase price will |…

    • 702 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It is an arrangement of the various elements of a communication network. There are different types of topology as Lowe (2012, p8) said “each type of networking topology (bus, star, expanding star, ring, mesh) offers advantages and disadvantages”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Itm 301

    • 909 Words
    • 4 Pages

    1. First management must implement a groupware system that is tailor specify to that organization. Select a…

    • 909 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Interpersoanl Skills

    • 1598 Words
    • 7 Pages

    The degree to which a system is distributed can be determined solely on the basis of how processors and other devices are connected.…

    • 1598 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    This is a multi-layered security system that consists of the user’s domain. The user is the first and the weakest link in any system. The security is only as strong as the user’s ability to understand what can go wrong. We can implement a training program session for security awareness. Another security measure is to implement a policy to stop employees from bringing in CD’S, DVD’S, and USB’S or other personal devices into the work place that can connect to the network and possibly harming the system. The work station domain is where users first access the system, applications, and the data. The system should be password coded for authentication purposes. Applications and data ought to be monitored and permissions set accordingly. Downloading should also be limited to only those people with the proper permissions. The LAN domain is a collection of computers all connected to a central switch configured to run all of the company’s data. The LAN would have all the standards, procedures, and guidelines of all the users. I would insure all information closets, demark locations and server rooms are locked and secured at all times. Only those with proper ID or authorization would be allowed to access these locations. The LAN to WAN domain contains both physical and logical designs of the security appliances. For this layer you want to apply security protocols on file transfers, scans, and unknown files. The WAN connects the system to remote locations, such as other PC’s on your system i.e. the other 7 locations on our network. URL filters implemented on the system may ensure limited access to the web sites that are undesirable for business use. “The Remote Access Domain connects users to the organization’s IT infrastructure. Remote access is critical for staff members who work in the field or from home.” It is…

    • 775 Words
    • 4 Pages
    Better Essays