Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Jan and Kim Levering have decided to expand their IT consulting business. They have leased space in a nearby building. The following are the details:

1. They will have an entire floor that has the following:

a) a receptionist area
b) 2 offices (one for Jan and one for Kim)
c) a conference room
d) an office that will accommodate 15 cubes for their consultants
e) a computer room to house their server(s)

2. They currently have 8 Windows XP systems set up in a workgroup

They would like you to develop a 2-phased plan. The first phase involves moving from the current office to the new office. In a 3-4-page report, you need to do the following:

3. Diagram the network and identify the topology and components:

a) Their existing equipment is as follows:

  • 8 XP systems
  • 1 each in Jan and Kim's offices
  • 6 systems cubes (1 per cube)
  • 1 Windows Server 2008 (standard edition) system in the computer room
  • 1 printer in the computer room

b) Include the following:

  • addressing scheme (use static addressing)
  • subnetting/supernetting
  • subnet mask for phase 1

4. Provide an installation guide on how to set up the Windows Server 2008 system and the network, including the following:

a) illustrations of the server installation process

b) a minimum of 8 Windows Server 2008 screenshots, with detailed explanations

c) descriptions of the settings for the following:

  • server roles
  • naming conventions
  • disk format (NTFS or FAT)
  • joining
  • security
  • centralized versus decentralized administration

d) a discussion of TCP/IP configuration

e) a comparison of settings between workgroup and domain

f) an explanation of typical installation problems/difficulties related to the following:

  • hardware
  • software
  • the network

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M915482

Have any Question? 


Related Questions in Computer Network & Security

Cryptool lab-first download and install cryptool from the

Cryptool lab- First, download and install Cryptool from the website at http://cryptool.com - If using a windows PC, installed crytool1 - If using a MAC PC, install jcryptool Part1.1 a. Identify the digital signature sche ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Network simulation projectsimulation projectobjectivesbull

Network Simulation Project Simulation Project Objectives • Design and analyze the performance of a network under different traffic conditions. • Design and analyze the performance of a wide area network. • Investigates t ...

Information securityfor this weeks discussion consider the

Information Security For this week's discussion, consider the following prompts: A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows ...

Q1 a subnetted or hierarchical backbone can also be called

Q1. A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone Q2. A backbone network that connects many backbone networks span ...

Computer scienceprimary task response within the discussion

Computer Science Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discus ...

Taskspecific issues that you need to address in the forum

Task Specific issues that you need to address in the forum discussions are provided within the first 3 topics. These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts. As thi ...

Or the purpose of the first part of this project you are

Or the purpose of the first part of this Project, you are still the InfoSec Specialist for the Greenwood Company. Consider this project a continuation of the work you performed in Projects 1 and 2. After seeing you searc ...

Select one of the following topics in which you will base

Select one of the following topics in which you will base your responses in the form of a term paper: • Network Neutrality • Web2.0 • Wireless Technology • Broadband Convergence • U.S. Telecommunication Policy • Internet ...

Assignment give an answer to the following topicswhat are

Assignment: Give an answer to the following topics: What are the security issues with wireless LANs and WANs in a data processing environment? What are the recommended solutions to the issues identified? What are the sec ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen