Create a network that houses the storage file server

Assignment Help Computer Networking
Reference no: EM131100824

Choose one of the 2 Case Study cases below:

Case Study 1: You are hired as a consultant by Alpha Omega Technical Industries (ΑΩ TechInd). Your job is to provide a network solution to meeting the demands on the vertical growth the company has been experiencing during the last six months. ΑΩ TechInd has its headquarters in Los Angeles, California and divisions in

• Miami, Florida
• Rio de Janeiro, Brazil
• Frankfurt, Germany
• Dubai, UAE
• Shanghai, China

You are asked to create a network that houses the storage file server(s) keeping all files related to contract transactions between all divisions and their clients.

Your task is to design only this segment of the network. Do not worry about the rest of the network and do not worry about database and web servers. You will not be using them in your designed solution. The main file storage server must reside with the headquarters.

Please do consider the following in your solution discussion:

• File sharing between divisions
• Storage server backup and recovery in case of failure
• Security issues related to file transfers (optional)
• File concurrency - in case two files with the same name are trying to be saved at the same time on the same location
• File access logs
• File archival method
• Network diagram

Your report should be about 4 pages long (not including the title page and the reference page) in APA format with proper citations and references (if any), and it should include a diagram of the network solution (please embed the diagram to the Word document, and make sure it's viewable). Your report will be automatically checked against plagiarism upon submission. The final product must follow acceptable originality criteria (no more than 15% originality index and 2% per source match).

Case Study 2

America One Car (AOC) dealership is moving into a newly built facility in a suburb town of Washington, D.C.. You are retained as a consultant by AOC dealership to design a network solution for their new location. The new facility is assumed to be wired with UTP and fiber, with outlets in specific locations. The basic network is to be a LAN that serves desktop computers in the general manager's office, in the salesmen's area, and the showroom area; mobile devices (laptops, smartphones, tablets, etc.); and various accessories (printers, etc.). A major component of the network is a file server (for storing the sale contracts, and other files). Of primary importance is the Internet access solution (e.g., leased lines, Cable, DSL, broadband wireless, fiber to the home, satellite). Other components (such as web server, and database server) may be added for completeness (to earn extra credit).

Design a network solution, considering the following:

•Type and topology of LAN
•LAN cabling
•Storage file server: data back-up/archiving, file consistency, file access logs, and data recovery
•Internet access method (assume maximum availability of solutions)
•Security (all pertinent issues)
•Any other specific issues, such as web and database servers (for extra credit)

Your deliverable is a Word document of 4 pages (not including the title page and the reference page). It's required to include in the report a diagram of your network solution, and a table of the components (hardware and software) proposed. References must be listed and cited in APA format. Please embed the diagram into the Word document.

Reference no: EM131100824

Questions Cloud

Overview of the wmd in iraq report : Looking at the Overview of the WMD in Iraq Report, indicate three areas that you think indicate lacks in critical thinking. Your initial response should be at least 200 words and should use good grammar and APA citation and reference styles.
Under a firm commitment agreement : The Green Hills Co. has just gone public. Under a firm commitment agreement, Green Hills received $26.04 for each of the 7 million shares sold. The initial offering price was $28 per share, and the stock rose to $32.30 per share in the first few m..
Site overlays and geo-mapping : New techniques in Web Analytics include Site Overlays and Geo-Mapping. There are many free tools available online to experience how visual mapping is being using in determining customer locations
What will be levine''s stock value if the previous dividend : Investors require a 15 percent rate of return on Levine Company's stock (rs =15%). a. What will be Levine's stock value if the previous dividend was D0 = $2 and if investors expect dividends to grow at a constant compound annual rate of (1) = percent..
Create a network that houses the storage file server : You are asked to create a network that houses the storage file server(s) keeping all files related to contract transactions between all divisions and their clients.
Evaluation of the authors main ideas : This section is a short critique or evaluation of the author's main ideas; include positives/negatives and strengths/weaknesses.
How biodiversity contribute to overall health of ecosystem : Assume each pot represents a sample that you found in a group of wildflowers. Based upon the diversity of flowers present in each pot; would you say that the ecosystem is healthy? Why or why not?
Dominated by hedgers holding long positions in corn : 1. On July 10 a farmer observes that the spot price of corn is $2.735 per bushel and the September futures price is $2.76. The farmer would like a prediction of the spot price in September but believes the market is dominated by hedgers holding lo..

Reviews

Write a Review

Computer Networking Questions & Answers

  Present a proposal for an internet solution for a college

To implement the skills and knowledge gained through the course and to achieve greater awareness of the ways in which networks are used by organisations.

  Maximum ethernet payload

Host B can send TCP acknowledgements to host A, even though it has no data to send - experiment in which host A blasts a 26 Megabyte file to host B through a single TCP Tahoe connection over a 1 Gigabit/sec Ethernet. B transmits no data. Neither ho..

  Expected time to find passwords using dictionary attack

Determine the expected time to find all users' passwords using dictionary attack? suppose that eight more characters were added to password and that DES algorithm was changed so as to use all 16 password characters.

  Discuss the timestamp ordering protocol for concurrency

Discuss the timestamp ordering protocol for concurrency control. How does strict timestamp ordering differ from basic timestamp ordering

  From your study of asymmetric and symmetric key

from your study of asymmetric and symmetric key cryptography use your own words to compare between them in terms of1.

  Deduce expression for link utilization u of data link

Deduce the expression for link utilization U of a data link which uses sliding-window flow control and returns ACK for every OTHER frame received.

  How rsa algorithm implemented if private key is unknown

What if private key is unknown? how would rsa algorithm be implemented then? Assume we have the algorithm which knows public key it is able to decrypt small amount of messages?

  You can are required to research into one of the

you can are required to research into one of the following topics on data security or computer-network security and

  Research both legacy and voip telecommunications

Research both legacy and VoIP telecommunications. Determine which one is more secure and why.Define what it is and how it will be used in the telecommunications model. Provide 3 sources for your ideas.

  Write main advantage of using domain controlled network

Write down the main advantages to using Domain controlled network? Write down some concerns and disadvantages to switching to domain network?

  Sketch the existing wan

What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store? [Short answer]

  Research the web on linked-state routing protocol

Research the Web and look up information on linked-state routing protocol. Describe how linked-state protocol routing works. Discuss 2 examples of linked-state routing protocols. Explain how routing protocols differ from routed protocols.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd