Ask Question, Ask an Expert


Ask Computer Network & Security Expert

Section A

problem1) What do you mean by an IP Address?.

problem2) Describe briefly the attributes of the client/server computing model.

Section B

Case Study

You are interested in starting your own Music Store, Quality Sounds, in the suburban area of your town. You require to design and build the network and computing solution for your stores. You have done some initial planning and you would start with two stores (but you plan to add two more stores across town within one year). Your store would sell new and used music and allow customers to get “online” in your stores and download music. You also would offer classes on how to setup music downloads and configure MP3 devices. You took computer networking courses in college and you feel you could tackle this solution yourself. Upon initial planning, you have identified the following requirements for your network:

• Connects three office computers and one computer used for Point-of-Sale (POS) services at each of your stores. You also want six (6) computers in lobby/store where patrons could download music and you could run “training classes” for people to learn about using MP3 players and get other basic information. Two offices have to be connected into one cohesive network, sharing POS services and other critical company information. You also require to provide a “hand out” casual area for people to stop in and discuss music and connect wirelessly to the Internet (you may even offer free coffee to entice people to come in to your store).

• Provides adequate security for all of the company communications and documents (especially sensitive sales documents). All POS services should be protected. All general network access must be segmented from the company POS services.

• Fast and have extra capacity as the company grows

• Provides for centralized printing

• Supports eventual addition of other stores to the network

• Provides customers with the general information Website and a secure Website where clients could buy services, and products

• Provides for limited downtime (24 hour downtime maximum)

•  Provides for centralized management and control of the computers in two stores, so that you could maintain the network from off-site

• Provides for long-term cost effectiveness

• Provides a suite of software tools for employees to effectively communicate and a POS solution for the stores

The company does not have any equipment. Your plan must include a complete network and computer system which meets these requirements and future expansion plans.

The two store locations would (eventually) be within a five-mile radius of each other. The locations are within a suburban area which has present technological infrastructures and related technology offerings. The stores would require a sales system and print services for invoices.

problem1)  Complete your proposal including costs for computing equipment, network infrastructure, network servers, printers, and related hardware, software, and accessories. Include as much detail as possible as well as justification as to your selections. As you are a small business, cost is a main factor and must be minimized.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93168
  • Price:- $80

Guranteed 48 Hours Delivery, In Price:- $80

Have any Question? 

Related Questions in Computer Network & Security

Corporate profile cybersecurity risk profilefor this paper

Corporate Profile: Cybersecurity Risk Profile For this paper, you will construct a cybersecurityrisk profile for the company that you wrote about in Part 1 of the Corporate Profile project. Your risk profile, which inclu ...

Assignment identifying potential malicious attacks threats

Assignment: Identifying Potential Malicious Attacks, Threats and Vulnerabilities You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is ide ...

Exercise sheet1 let l be a 9 bit lfsr with connection

Exercise Sheet 1. Let L be a 9 bit LFSR with connection polynomial c(x) = x 8 + x 4 + x + 1 and seed s = [1, 0, 1, 1, 1, 0, 0, 1, 0] (i.e. the last bit of s, 0, is the next keystream bit). Compute 10 bits of the keystrea ...

Any encryption algorithm like caesar cipher algorithmshould

Any Encryption algorithm (like caesar cipher algorithm)should be used and implemented for the information given in the document. Cryptography Assignment Given the following S-Boxes: S1= [ 15        10            2        ...

Cybersecurity in business and industry industry

Cybersecurity in Business and Industry Industry Profile Introduction - Provided an excellent overview of the cybersecurity industry as a whole. Answered the questions: (a) Why does this industry exist? and (b) How does t ...

Words 400-500 wordsharvard referencing4 references or

Words: 400-500 Words Harvard Referencing 4 References or more At least one website reference Must have in-text citation for all the references used Compare 2-tier and 3-tier client/server system configurations and analyz ...

Wb and data securitysubject web and data securitytopic

Web and Data Security Subject: Web and Data Security Topic: various types of Utility and its use to secure the data 8 pages start with executive summary, introduction, examples, its use in data security and conclusion.

Assignment data and pbx physical layer cabling designa

Assignment: Data and PBX Physical Layer Cabling Design A building you plan to use as an office has four floors; each floor is a rectangle 1000 ft. long and 300 ft. wide.  The vertical separation between the floors is 20 ...

Individual systems scenariothis assignment is a

Individual: Systems Scenario This assignment is a continuation from the Week Four assignment. In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and config ...

Security networkplease write short essay answers discussing

Security Network Please write short essay answers discussing the following "questions: 1. Give an (example of why data encryption is needed and when you would use encryption. 2. Name three data elements examples that wou ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate