Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Jan and Kim Levering have decided to expand their IT consulting business. They have leased space in a nearby building. The following are the details:

1. They will have an entire floor that has the following:

a) a receptionist area
b) 2 offices (one for Jan and one for Kim)
c) a conference room
d) an office that will accommodate 15 cubes for their consultants
e) a computer room to house their server(s)

2. They currently have 8 Windows XP systems set up in a workgroup

They would like you to develop a 2-phased plan. The first phase involves moving from the current office to the new office. In a 3-4-page report, you need to do the following:

3. Diagram the network and identify the topology and components:

a) Their existing equipment is as follows:

  • 8 XP systems
  • 1 each in Jan and Kim's offices
  • 6 systems cubes (1 per cube)
  • 1 Windows Server 2008 (standard edition) system in the computer room
  • 1 printer in the computer room

b) Include the following:

  • addressing scheme (use static addressing)
  • subnetting/supernetting
  • subnet mask for phase 1

4. Provide an installation guide on how to set up the Windows Server 2008 system and the network, including the following:

a) illustrations of the server installation process

b) a minimum of 8 Windows Server 2008 screenshots, with detailed explanations

c) descriptions of the settings for the following:

  • server roles
  • naming conventions
  • disk format (NTFS or FAT)
  • joining
  • security
  • centralized versus decentralized administration

d) a discussion of TCP/IP configuration

e) a comparison of settings between workgroup and domain

f) an explanation of typical installation problems/difficulties related to the following:

  • hardware
  • software
  • the network

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M915482

Have any Question? 


Related Questions in Computer Network & Security

Assignment descriptionassignment overviewfor this

Assignment Description Assignment Overview For this assignment you will evaluate a Network Security Software. Marks will be awarded based on the sophistication and the difficulties the demonstration explored. Your task i ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

Assignmentthe vice president of sales for your company has

Assignment The Vice President of Sales for your company has asked you for more information on cloud-based office productivity suites. He tells you that the Sales team is often remote and needs to be able to stay connecte ...

Discussion questions -optimizing your network design please

Discussion Questions - "Optimizing Your Network Design" Please respond to the following: Select and describe one (1) of the queuing methods described in the readings. Present a real-world example of the method you select ...

Global asset inc gaiglobal asset inc gai is a financial

GLOBAL ASSET, INC. (GAI) Global Asset, Inc. (GAI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GAI specializes in financial ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized format ...

Case studyyour company security professionals inc has been

Case study Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as "Case # 2 - W ...

Assignment description1overview of the assessmentthe

Assignment Description 1 Overview of the assessment: The purpose of this assignment is to develop skills to independently think of a situation and Apply skills to analyze complex problems in network security under superv ...

Computer scienceunauthorized access to networks and the

Computer Science Unauthorized access to networks and the information they contain can present significant problems to an organization. Part of a good network improvement includes a review of system security and identific ...

Network simulation projectsimulation projectobjectivesbull

Network Simulation Project Simulation Project Objectives • Design and analyze the performance of a network under different traffic conditions. • Design and analyze the performance of a wide area network. • Investigates t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen