Components and topologies of client-server network

Assignment Help Basic Computer Science
Reference no: EM132357326

Part 1:

Prior to beginning work on this discussion, read the Five Ways to Improve Your Wireless Security and Network Design Manual: Designing and Building the Best Small Office Network From the Ground Up. online articles, and review any relevant information in this week's lecture.

The president of your company would like to deploy a wireless networking solution at the company's headquarters to help improve productivity. He understands the benefits of wireless networking, but he has reservations due to the potential security risks. He reaches out to you, the company's knowledgeable networking administrator, for advice. In your initial post, explain the different types of wireless security options, including the protocols and encryption levels necessary. Provide an evaluation of the security differences between the security options. Explain any risks or other technical considerations of which the president should be aware. Propose a wireless solution for the company, supporting your recommendations with evidence from the readings.

should be a minimum of 300 words.

Part 2:

Components and Topologies of a Client/Server Network

Prior to beginning work on this assignment read Chapters 4 and 5 in the text book as well as the Breeding online resource, and review any relevant information in this week's lecture.

For this assignment you will take on the role of an interviewee for an IT network admin position. As part of the interview process, you are provided with the following scenario and tasks to complete.

A group of four friends has been working out of a garage with a unique business model that has caught the eye of a venture capitalist. They are now ready to expand into a more appropriate two story building and hire more employees. You have been hired as a consultant by the group to explain their network needs based on their expanding business partners and customers. Apply standard principles of design to implement a plan to build them a network to keep them connected internally. The company will start off with 25 employees and will need plenty of room for growth. The network will require the following six elements.

Network to support data, voice, power, and video

LAN and WLAN with latest encryption and security protocols

Local file and printing services

Access to a cloud vendor for applications and data storage capabilities

Workstations will be a mix of Windows and Macs

Servers will be a mix of Windows and Linux

Research a minimum of two professional sources on this topic. (Access the MISM Credible Resource Guide for assistance with finding appropriate credible professional resources.) As part of your process, you will evaluate the given requirements. Apply your network technical knowledge to the project explain the network topology that best fits the scenario. You will create a high level network diagram to show the layout of the specified requirements. Beneath your diagram provide a written discussion of the network diagram explaining your logic and thought process for the design. Explain how your choices will help your client's business efficiency and growth. Support your statements with evidence from the required resources and at least two additional professional sources.

The assignment

Must be three double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center.

Must include a separate title page with the following:

Title of paper

Student's name

Course name and number

Instructor's name

Date submitted

Must use at least two professional sources in addition to the required resources.

Must document all sources in APA style as outlined in the Writing Center.

Must include a separate references page that is formatted according to APA style as outlined in the Writing Center.

Reference no: EM132357326

Questions Cloud

Methods used to continuously improve the bc process : Describe the methods used to continuously improve the BC process. list and describe key international standards in IR/DR/BC
Cybersecurity topic of your choice : The project must be a Word document that is 4-5 pages (double-spaced) on a cybersecurity topic of your choice.
Stakeholder wealth maximization and wealth maximization : Discuss the similarities and differences between shareholder wealth maximization and stakeholder wealth maximization.
Develop complete disaster recovery plan : Develop a Complete Disaster Recovery Plan to be submitted to executive board of your company. Only MS Word (.doc,.docx) and Adobe Acrobat formats are acceptable
Components and topologies of client-server network : Components and Topologies of a Client/Server Network. you will take on the role of an interviewee for an IT network admin position.
Define the legal constituents of consent for infants : Define the legal constituents of consent for infants, children and young people and use relevant criteria from the NMBA Registered Nurse Standards
Supply and demand for currency and a managed float : The U.S. dollar remains the world's reserve currency. Is this good for the United States, and if so, why?
What was our monetary policy response to the great recession : What was our monetary policy response to the Great Recession? What effect did this have on the economy?
Information for an european call and put option : If I have the following information for an European call and put option

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd