Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Jan and Kim Levering have decided to expand their IT consulting business. They have leased space in a nearby building. The following are the details:

1. They will have an entire floor that has the following:

a) a receptionist area
b) 2 offices (one for Jan and one for Kim)
c) a conference room
d) an office that will accommodate 15 cubes for their consultants
e) a computer room to house their server(s)

2. They currently have 8 Windows XP systems set up in a workgroup

They would like you to develop a 2-phased plan. The first phase involves moving from the current office to the new office. In a 3-4-page report, you need to do the following:

3. Diagram the network and identify the topology and components:

a) Their existing equipment is as follows:

  • 8 XP systems
  • 1 each in Jan and Kim's offices
  • 6 systems cubes (1 per cube)
  • 1 Windows Server 2008 (standard edition) system in the computer room
  • 1 printer in the computer room

b) Include the following:

  • addressing scheme (use static addressing)
  • subnetting/supernetting
  • subnet mask for phase 1

4. Provide an installation guide on how to set up the Windows Server 2008 system and the network, including the following:

a) illustrations of the server installation process

b) a minimum of 8 Windows Server 2008 screenshots, with detailed explanations

c) descriptions of the settings for the following:

  • server roles
  • naming conventions
  • disk format (NTFS or FAT)
  • joining
  • security
  • centralized versus decentralized administration

d) a discussion of TCP/IP configuration

e) a comparison of settings between workgroup and domain

f) an explanation of typical installation problems/difficulties related to the following:

  • hardware
  • software
  • the network

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M915482

Have any Question? 


Related Questions in Computer Network & Security

Develop a network security plan for a medical record

Develop a Network Security Plan for a Medical Record Company. As a network administrator you are required to develop a brand new security plan. The medical record company consists of the following individuals: Doctors, N ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Assignmentin this project we will design a network solution

Assignment In this project we will design a network solution that is suitable for a small business. Our business is located in an office park in one floor of a new office building. Our office has all of the modern featur ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Objectivesthis assignment is designed to assess students

OBJECTIVES This assignment is designed to assess students' ability to: - Produce a concise detailed report about the importance of information security audit policy and its components - To have excellent understanding re ...

Assignmentyou have been asked by a local charity retail

Assignment You have been asked by a local charity retail organization to install a network in its downtown office. It currently has seven PCs running Windows XP Home Edition. They are configured as follows: Pentium 4 at ...

Assignmentmr smith is the director of it at a law firm

Assignment Mr. Smith is the Director of IT at a law firm located in downtown Chicago. He needs to plan for a network upgrade. He has decided that he would like to have a network analysis done before the upgrade so that h ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

Networking trendsnetworking trends paper in this paper you

Networking trends. Networking Trends Paper: In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, h ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro