Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Jan and Kim Levering have decided to expand their IT consulting business. They have leased space in a nearby building. The following are the details:

1. They will have an entire floor that has the following:

a) a receptionist area
b) 2 offices (one for Jan and one for Kim)
c) a conference room
d) an office that will accommodate 15 cubes for their consultants
e) a computer room to house their server(s)

2. They currently have 8 Windows XP systems set up in a workgroup

They would like you to develop a 2-phased plan. The first phase involves moving from the current office to the new office. In a 3-4-page report, you need to do the following:

3. Diagram the network and identify the topology and components:

a) Their existing equipment is as follows:

  • 8 XP systems
  • 1 each in Jan and Kim's offices
  • 6 systems cubes (1 per cube)
  • 1 Windows Server 2008 (standard edition) system in the computer room
  • 1 printer in the computer room

b) Include the following:

  • addressing scheme (use static addressing)
  • subnetting/supernetting
  • subnet mask for phase 1

4. Provide an installation guide on how to set up the Windows Server 2008 system and the network, including the following:

a) illustrations of the server installation process

b) a minimum of 8 Windows Server 2008 screenshots, with detailed explanations

c) descriptions of the settings for the following:

  • server roles
  • naming conventions
  • disk format (NTFS or FAT)
  • joining
  • security
  • centralized versus decentralized administration

d) a discussion of TCP/IP configuration

e) a comparison of settings between workgroup and domain

f) an explanation of typical installation problems/difficulties related to the following:

  • hardware
  • software
  • the network

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M915482

Have any Question? 


Related Questions in Computer Network & Security

Provide at least three methods or tools used to attack web

Provide at least three methods or tools used to attack web servers as well as provide how each of these three methods can be protected against. Directions: Your completed assignment should be at least 2 FULL double-space ...

The handbook must be original student content and workin

The handbook must be original student content and work. In addition to describing the company to which the employee handbook applies, also address the issues of privacy, employee or applicant testing, and performance eva ...

Any encryption algorithm like caesar cipher algorithmshould

Any Encryption algorithm (like caesar cipher algorithm)should be used and implemented for the information given in the document. Cryptography Assignment Given the following S-Boxes: S1= [ 15        10            2        ...

Network analysis reportassignment- a coversheet with your

Network Analysis report Assignment - A coversheet with your name and student id must be included. - All references should be appropriately cited using the Harvard style - Submit your report as one PDF file - Save your fi ...

Concepts and strategies for managing securityassignment

Concepts and Strategies for managing security Assignment Brief As part of the formal assessment for the MSc Information Systems you are required to submit a Information Systems Security assignment. Please refer to your S ...

Individual systems scenariothis assignment is a

Individual: Systems Scenario This assignment is a continuation from the Week Four assignment. In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and config ...

Assignment overviewpurpose of the assessmentthe purpose of

Assignment Overview Purpose of the assessment: The purpose of this assignment is to develop skills to identify appropriate network security tools for various operating systems. Students will also have opportunity to expl ...

Ten immutable laws of security please respond to the

"Ten Immutable Laws of Security" Please respond to the following: • From the e-Activity, read the full article posted at https://technet.microsoft.com/en-us/library/hh278941.aspx titled "Ten Immutable Laws of Security (V ...

Network security - web security threatsassume that you are

Network Security - Web Security Threats Assume that you are the lead network security expert in your organization. Because of the recent rise in web security issues and the development of the global marketplace, your org ...

Taskprovide short answers to the following six questions

Task Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document (MS Word or PDF, NOT both) along with title page and submit it online using EAS ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate