Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Section A

problem1) What do you mean by an IP Address?.

problem2) Describe briefly the attributes of the client/server computing model.

Section B

Case Study

You are interested in starting your own Music Store, Quality Sounds, in the suburban area of your town. You require to design and build the network and computing solution for your stores. You have done some initial planning and you would start with two stores (but you plan to add two more stores across town within one year). Your store would sell new and used music and allow customers to get “online” in your stores and download music. You also would offer classes on how to setup music downloads and configure MP3 devices. You took computer networking courses in college and you feel you could tackle this solution yourself. Upon initial planning, you have identified the following requirements for your network:

• Connects three office computers and one computer used for Point-of-Sale (POS) services at each of your stores. You also want six (6) computers in lobby/store where patrons could download music and you could run “training classes” for people to learn about using MP3 players and get other basic information. Two offices have to be connected into one cohesive network, sharing POS services and other critical company information. You also require to provide a “hand out” casual area for people to stop in and discuss music and connect wirelessly to the Internet (you may even offer free coffee to entice people to come in to your store).

• Provides adequate security for all of the company communications and documents (especially sensitive sales documents). All POS services should be protected. All general network access must be segmented from the company POS services.

• Fast and have extra capacity as the company grows

• Provides for centralized printing

• Supports eventual addition of other stores to the network

• Provides customers with the general information Website and a secure Website where clients could buy services, and products

• Provides for limited downtime (24 hour downtime maximum)

•  Provides for centralized management and control of the computers in two stores, so that you could maintain the network from off-site

• Provides for long-term cost effectiveness

• Provides a suite of software tools for employees to effectively communicate and a POS solution for the stores

The company does not have any equipment. Your plan must include a complete network and computer system which meets these requirements and future expansion plans.

The two store locations would (eventually) be within a five-mile radius of each other. The locations are within a suburban area which has present technological infrastructures and related technology offerings. The stores would require a sales system and print services for invoices.

problem1)  Complete your proposal including costs for computing equipment, network infrastructure, network servers, printers, and related hardware, software, and accessories. Include as much detail as possible as well as justification as to your selections. As you are a small business, cost is a main factor and must be minimized.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93168
  • Price:- $80

Guranteed 48 Hours Delivery, In Price:- $80

Have any Question? 


Related Questions in Computer Network & Security

1 when an organization undertakes an infosec-driven review

1. When an organization undertakes an InfoSec-driven review of job descriptions, which job descriptions must be reviewed? Which IT jobs not directly associated with information security should be reviewed? 2. List and de ...

Benefits of cloud-based office productivity softwarebased

Benefits of Cloud-based Office Productivity Software Based on what you have learned about using cloud-based office productivity software, create a 5-slide presentation to the department head or CEO to convince him or her ...

Part-1given the following design for a money transfer

Part-1 Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission. Issuing a Check: 1. Payee (A) will contact the bank r ...

1 what attributes do organizations seek in a candidate when

1. What attributes do organizations seek in a candidate when hiring InfoSec professionals? Prioritize this list of attributes and justify your ranking 2. What are the critical actions that management must consider taking ...

Computer scienceunauthorized access to networks and the

Computer Science Unauthorized access to networks and the information they contain can present significant problems to an organization. Part of a good network improvement includes a review of system security and identific ...

Maintaining the network please respond to the following-

"Maintaining the Network" Please respond to the following: - Examine three cable maintenance tools that you would consider essential for a network team. Of the three tools that you have examined, determine the one that y ...

Assignmentnetwork architecture paper using either the osi

Assignment Network Architecture Paper: Using either the OSI Reference Model or the TCP/IP Protocol Suite, describe how each layer of the Model/Suite represents the communication flow between organizational levels and acr ...

Go to csrcnistgov and locate federal information processing

Go to csrc.nist.gov and locate "Federal Information Processing Standard (FIPS) 197." What encryption standard does the address use? Examine the contents of this publication and describe the algorithm discussed. How stron ...

Cryptool lab-first download and install cryptool from the

Cryptool lab- First, download and install Cryptool from the website at http://cryptool.com - If using a windows PC, installed crytool1 - If using a MAC PC, install jcryptool Part1.1 a. Identify the digital signature sche ...

Network security paper in this paper you will define the

Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro