Preview

Explain the Key Components Required for Client Workstations to Connect to a Network and Access Network Resources.

Powerful Essays
Open Document
Open Document
1846 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Explain the Key Components Required for Client Workstations to Connect to a Network and Access Network Resources.
Explain the key components required for client workstations to connect to a network and access network resources.
Scenario
I work for the IT support department of SMARTNETS Inc. an organisation that specialises in Network solutions for medium to large companies. The managers have now asked me to plan the network options for a charity called UCANHELP with an office in Northolt and will like to share resources between 6 computers, not in the same room but require internet connection, video conference, instant messaging etc.

Key Component * Network Devices * Interconnection devices * Connectors and cabling * Software

I. Network Devices

* Workstation: which is used by business or professional person who can be architect , gaming designer, multimedia and any organization .Such as : technical or scientific applications, video editing , photo editing. So they are much more powerful than normal computer and they can connect LAN (Lan area network) that in turn shares resource for one or several computer. * For example: computer, laptop, deskto , server machine.

* Sever: is specialist computer hardware system and were built very high hardware like workstation computer (High-speed processor, high-end graphics, large RAM, Hard-drivers and is most powerful. And server don’t use normal operating system, they use operating system server( Microsoft windows server , apple server , linux server) for control group computer which is in large business , school , technology company , because they have a lot of computer and they provide service to other computer (can called workstation). Some type of server: web server, mail server, gaming server, servers for the central management and storage of files and data and other kind of server.

* NIC (network interface card): accept workstation and personal computer connect to a network on LAN typically contain a network interface card specifically designed for the LAN transmission technology.

You May Also Find These Documents Helpful

  • Good Essays

    It 240 Week 3 Checkpoint

    • 620 Words
    • 3 Pages

    Complete Case Projects 3-1, 3-2, & 3-3 of Guide to Networking Essentials. After determining if a client-based or client/server model will be used, substantively justify your choice in 200 to 300 words.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Better Essays

    INDP Kudler Fine Food

    • 1189 Words
    • 4 Pages

    The major network components devices are a Network Interface Card (NIC), a Hub, Switches, Servers, Cables and connectors, firewalls, work stations, wireless access points, Wide area networks (WANs), Routers, VOIP phones and Modems.…

    • 1189 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    * server network interface card (NIC) – A specific tool that is put into a computer so that you may gain access to a network.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It282 Week 6 Checkpoint

    • 724 Words
    • 3 Pages

    Router: By the use of a router you will be inking all the computer systems to one device to provide sharing of the Internet connection. Using a router has a big advantage its firewall functionality. Mostly all routers provide this protection…

    • 724 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Networking is everywhere one of the main benefits is that we can share devices such as printers, scanners, CD-ROM drives and many more. Also, we can connect to networks as Meyers (2003, p3) said “one network can be connected to another network and become a more powerful tool because of the great resources”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Exercise 1

    • 617 Words
    • 2 Pages

    There are physical devices that connect the computer to the network of lines that you use to communicate over. It could be a modem, a network card, a radio transmitter, or a router.…

    • 617 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 9 Final Paper

    • 432 Words
    • 2 Pages

    A network is what gives the user the ability to transfer information between other computers (de Arazoza, 2015).…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Quick Check

    • 747 Words
    • 3 Pages

    10. A new company will have 30 workstations in one building sharing a single network. All users must be able to share files and printers with each other. Access to shared information must be secure and simple to administer. The best technology for this system is:…

    • 747 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In this scenario, I would again recommend a star topology due to its manageability and scalability. In this model, one would need computers, server, cables, and operating systems. The nodes would go through the switch or router and then…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The “Internal Use Only” data classification includes the User Domain, the Work Station Domain, and the LAN domain. These domains are the most simple IT Infrastructure domains, and they will cover all the users and workstations in the company. The “Internal Use Only” classification will cover information like the company telephone directory, new employee training materials, and internal policy manuals.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Policy Management

    • 1325 Words
    • 6 Pages

    The overriding goal of this policy is to reduce operating risk. The [ITT Tech High School] Server Configuration Security Policy will:…

    • 1325 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Outsourcing Risk

    • 1859 Words
    • 8 Pages

    Sharing responsibilities in an organization is emerging to maximize the technological advances in communication. Information systems and network integration is vastly becoming complicated for organizations to choose the cost factor of outsourcing unless management prepares to enable safe practices for any risk that may arise. The one major risk organizations are encountering is the challenge to outsource information for the facility. The concerns…

    • 1859 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Computer networking has existed for more than thirty years, but only more recently they have become popular in homes. In 1999, only a few hundred thousand households in the United States had a home network. When Windows 95 first came out, creating a home network was a huge task. Now there are ways to set up a home network that the toughest part is physically installing the hardware. There are a lot…

    • 1205 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Aix Audit Check List

    • 3519 Words
    • 15 Pages

    B. Determine who is responsible and what documentation is required for configuration changes to the physical network.…

    • 3519 Words
    • 15 Pages
    Powerful Essays

Related Topics