Ask Question, Ask an Expert


Ask Computer Network & Security Expert

Jan and Kim Levering have decided to expand their IT consulting business. They have leased space in a nearby building. The following are the details:

1. They will have an entire floor that has the following:

a) a receptionist area
b) 2 offices (one for Jan and one for Kim)
c) a conference room
d) an office that will accommodate 15 cubes for their consultants
e) a computer room to house their server(s)

2. They currently have 8 Windows XP systems set up in a workgroup

They would like you to develop a 2-phased plan. The first phase involves moving from the current office to the new office. In a 3-4-page report, you need to do the following:

3. Diagram the network and identify the topology and components:

a) Their existing equipment is as follows:

  • 8 XP systems
  • 1 each in Jan and Kim's offices
  • 6 systems cubes (1 per cube)
  • 1 Windows Server 2008 (standard edition) system in the computer room
  • 1 printer in the computer room

b) Include the following:

  • addressing scheme (use static addressing)
  • subnetting/supernetting
  • subnet mask for phase 1

4. Provide an installation guide on how to set up the Windows Server 2008 system and the network, including the following:

a) illustrations of the server installation process

b) a minimum of 8 Windows Server 2008 screenshots, with detailed explanations

c) descriptions of the settings for the following:

  • server roles
  • naming conventions
  • disk format (NTFS or FAT)
  • joining
  • security
  • centralized versus decentralized administration

d) a discussion of TCP/IP configuration

e) a comparison of settings between workgroup and domain

f) an explanation of typical installation problems/difficulties related to the following:

  • hardware
  • software
  • the network

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M915482

Have any Question? 

Related Questions in Computer Network & Security

Security configuration managementkey assignmentsignificant

Security Configuration Management Key Assignment Significant work has been completed over the past few weeks on the Network Security Architecture Design document, including the following: • Security Requirements • Perime ...

What is a dmz is this really a good name for the function

What is a DMZ? Is this really a good name for the function that this type of subnet performs? What is RADIUS? What advantage does it have over TACACS? How does a network-based IDPS differ from a host-based IDPS? What is ...

Dqfacebook email electronic commerce and collaborative

DQ Facebook, email, electronic commerce, and collaborative sites for both work and leisure are a normal part of our everyday computing activities. Personal information entered on these websites become partially owned by ...

Data information decision please respond to the

"Data Information Decision" Please respond to the following: · With the obvious pace of current technology development, data continues to grow daily. Imagine that you are a Database Administrator for a large organization ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

Short paperwan technologies paper research point-to-point

Short Paper WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies a ...

Assignment give an answer to the following topicswhat are

Assignment: Give an answer to the following topics: What are the security issues with wireless LANs and WANs in a data processing environment? What are the recommended solutions to the issues identified? What are the sec ...

Web and data securitybullyour company security

Web and Data Security • Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as ...

Assignment standards researchthe following website may be

Assignment: Standards Research The following Website may be used for reference to complete this assignment. The Website represents an electronic document titled "Standards Organizations" written by William Stallings (200 ...

Perimeter securitythe project deliverables are as

Perimeter Security The project deliverables are as follows: • Update the Information Network Security Architecture Design document title page with a new date and project name. • Update your previously completed sections ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro