Show how to logon to the new domain

Assignment Help Computer Networking
Reference no: EM13809997

Part I-

discuss in detail the following items:

  • Show how you take a computer and would join it to a domain
    • name/workgroup change
  • Show how to logon to the new domain
  • show how to map network drives to the server
  • show software you might install to get a user going on the new network
    • antivirus
    • adobe reader
    • Malwarebytes or some spyware detection program
    • Other company software

Part II-

Document

  • Visio (or other) diagram showing locations for wired connections throughout the office (Andrew)
  • server install process (Andrew)
  • changes to the existing server (mainly promoting it to a domain controller (Andrew)
  • The IP addressing subnetting scheme and how it changed from phase 1 (Andrew)
  • minimum of 8 screen shots (Andrew)

PowerPoint

  • 6 - 10 PowerPoint slides
  • IP addressing scheme and security (duplicate info from document above)
    • think users
    • think folder authorizations
  • any changes to operating system
    • for example a Windows 7 Home has difficulty joining a domain, so we would upgrade it to Windows 7 Professional
  • Network services needed because of changes to the network
  • what needs to be done to the existing facilities or systems to integrate old system with the new
  • TCP/IP services to be considered
    • DHCP
    • DNS
  • additional equipment required.

Reference no: EM13809997

Questions Cloud

Write a research paper for the book the old man and the sea : Write a good thesis statement on a research paper for the book "The Old Man and the Sea".
What is effect on general partner of a limited partnership : What is the effect of having a corporation as the general partner of a limited partnership
Discuss a criterion to determine the price for the drug : Discuss a criterion to determine the price for the drug
Data and statistics to support answers : The resources use data and statistics to support answers to the same question, but they reach opposite conclusions! The textbook authors use the Gini Index to argue that income inequality is increasing. Perhaps it could be said that statistics are..
Show how to logon to the new domain : Show how you take a computer and would join it to a domain, Show how to logon to the new domain, show how to map network drives to the server
Question regarding the independent random samples : To compare commuting times in various locations, independent random samples were obtained from the six cities presented in the "Longest Commute to Work" graphic on page 255 in your textbook. The samples were from workers who commute to work during..
Cultural anthropology papper : CULTURAL anthropology papper
What charge should be placed on the particle : What charge should be placed on the particle at position B such that the force on the particle at A is exactly zero.
Enterprise risk management is most effective : Select the option which best completes this statement: Enterprise Risk Management is most effective when it is a(n) process

Reviews

Write a Review

Computer Networking Questions & Answers

  What type of wan solution would you recommend and why

An organization called Ranbaxy Inc. has currently 3 divisions in 3 different locations within Sydney city. One of the divisions serves as the company headquarters.

  Give hypothetical situation for signal type used in wan

Give a hypothetical situation for each signal type which illustrates how it could be, or is being, used in WAN. In what circumstance, for example, would a company choose to use a satellite signal?

  What is network infrastructure management

You have been tasked by your company to lead your team to plan, deploy and manage the computer / IT network for a large financial company "First Finance" who are shifting their head office to a new building. The whole project has to be completed i..

  Benefits of providing text links to graphical links

Question 1.What are some of the benefits of providing text links in addition to graphical links? Question 2.How can we improve on existing websites? Question 3.What are the steps to find the source code?

  Describe role of computer forensics-security in organization

Describe the role of computer forensics and security in the organizations. Explain the roles of computer forensics expert and computer security expert.

  Wireless technologies and networks in work environments

Summary of the discussion your team had about wireless technologies and networks in work environments

  How many subnets are created

What are the current advantages and disadvantages of packet-switching compared to circuit switching?

  Explaining language of all strings in alphabet sigma

For a language L over alphabet Sigma, let sup(L) denote language of all strings in Sigma* that contain a string of L as s substring.

  Implement the network topology using packet tracer

Draw a table such as the one show below and subdivide the network into subnets Use the smallest subnet where possible and routers use G0/0 to connect to the LAN. How many MAC does the 24 port Cisco switch used in the Packet Tracer has and what is the..

  Write a three-page summary a successful penetration test

Using MS Word, write a three-page summary describing a successful penetration test. What penetration tools and techniques do you feel would be needed in a successful penetration test?

  I outlinethis case study will require you to1 build a small

i. outlinethis case study will require you to1 build a small network using three switches and one router2 one switch

  Security issues

Provide an example explaining the best use of Virus, Encryption, VPN, Firewall securities, when and why?Which security areas you are using and applying to your securities? Also explain why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd