Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Section A

problem1) What do you mean by an IP Address?.

problem2) Describe briefly the attributes of the client/server computing model.

Section B

Case Study

You are interested in starting your own Music Store, Quality Sounds, in the suburban area of your town. You require to design and build the network and computing solution for your stores. You have done some initial planning and you would start with two stores (but you plan to add two more stores across town within one year). Your store would sell new and used music and allow customers to get “online” in your stores and download music. You also would offer classes on how to setup music downloads and configure MP3 devices. You took computer networking courses in college and you feel you could tackle this solution yourself. Upon initial planning, you have identified the following requirements for your network:

• Connects three office computers and one computer used for Point-of-Sale (POS) services at each of your stores. You also want six (6) computers in lobby/store where patrons could download music and you could run “training classes” for people to learn about using MP3 players and get other basic information. Two offices have to be connected into one cohesive network, sharing POS services and other critical company information. You also require to provide a “hand out” casual area for people to stop in and discuss music and connect wirelessly to the Internet (you may even offer free coffee to entice people to come in to your store).

• Provides adequate security for all of the company communications and documents (especially sensitive sales documents). All POS services should be protected. All general network access must be segmented from the company POS services.

• Fast and have extra capacity as the company grows

• Provides for centralized printing

• Supports eventual addition of other stores to the network

• Provides customers with the general information Website and a secure Website where clients could buy services, and products

• Provides for limited downtime (24 hour downtime maximum)

•  Provides for centralized management and control of the computers in two stores, so that you could maintain the network from off-site

• Provides for long-term cost effectiveness

• Provides a suite of software tools for employees to effectively communicate and a POS solution for the stores

The company does not have any equipment. Your plan must include a complete network and computer system which meets these requirements and future expansion plans.

The two store locations would (eventually) be within a five-mile radius of each other. The locations are within a suburban area which has present technological infrastructures and related technology offerings. The stores would require a sales system and print services for invoices.

problem1)  Complete your proposal including costs for computing equipment, network infrastructure, network servers, printers, and related hardware, software, and accessories. Include as much detail as possible as well as justification as to your selections. As you are a small business, cost is a main factor and must be minimized.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93168
  • Price:- $80

Guranteed 48 Hours Delivery, In Price:- $80

Have any Question? 


Related Questions in Computer Network & Security

Cloud computing assignmentq1 you need to prepare a short

Cloud Computing Assignment Q1. You need to prepare a short report that describes the benefits of Cloud Computing for smartphone-like devices apps development and growing in the marketplace. Your discussion should be 400- ...

Computer scienceprimary task response within the discussion

Computer Science Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discus ...

Pros amp cons of very simple vs very planned networkwrite a

Pros & Cons of Very Simple Vs Very Planned Network Write a 3-5 page report that discusses the pros and cons of very simple plans versus detailed plans, although the standards mandate very specific requirements for the pl ...

Ppp data path completion using dummy network interface term

PPP Data Path Completion using Dummy Network Interface Term Project Goal of Term project 3 1. Completes the user level PPP program - Making a connection on both sides of the program YOU made 2. Try to make the full data ...

Assignmentpart 1the new network administrator at health

Assignment Part 1 The new network administrator at Health Care HQ wants to be clear about your duties as the system administrator. In 1 paragraph, you will provide the following: • Explain your job duties to the new netw ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

Network security paper in this paper you will define the

Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disa ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Network management paper in this paper you will research

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

Assignmentsummarize the principles of public-key

Assignment Summarize the principles of public-key encryption. In what way is an unprotected idle PC a danger to the internet? Suppose a PC owner leaves the PC connected to the Internet where it ultimately is used by anot ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen