Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Section A

problem1) What do you mean by an IP Address?.

problem2) Describe briefly the attributes of the client/server computing model.

Section B

Case Study

You are interested in starting your own Music Store, Quality Sounds, in the suburban area of your town. You require to design and build the network and computing solution for your stores. You have done some initial planning and you would start with two stores (but you plan to add two more stores across town within one year). Your store would sell new and used music and allow customers to get “online” in your stores and download music. You also would offer classes on how to setup music downloads and configure MP3 devices. You took computer networking courses in college and you feel you could tackle this solution yourself. Upon initial planning, you have identified the following requirements for your network:

• Connects three office computers and one computer used for Point-of-Sale (POS) services at each of your stores. You also want six (6) computers in lobby/store where patrons could download music and you could run “training classes” for people to learn about using MP3 players and get other basic information. Two offices have to be connected into one cohesive network, sharing POS services and other critical company information. You also require to provide a “hand out” casual area for people to stop in and discuss music and connect wirelessly to the Internet (you may even offer free coffee to entice people to come in to your store).

• Provides adequate security for all of the company communications and documents (especially sensitive sales documents). All POS services should be protected. All general network access must be segmented from the company POS services.

• Fast and have extra capacity as the company grows

• Provides for centralized printing

• Supports eventual addition of other stores to the network

• Provides customers with the general information Website and a secure Website where clients could buy services, and products

• Provides for limited downtime (24 hour downtime maximum)

•  Provides for centralized management and control of the computers in two stores, so that you could maintain the network from off-site

• Provides for long-term cost effectiveness

• Provides a suite of software tools for employees to effectively communicate and a POS solution for the stores

The company does not have any equipment. Your plan must include a complete network and computer system which meets these requirements and future expansion plans.

The two store locations would (eventually) be within a five-mile radius of each other. The locations are within a suburban area which has present technological infrastructures and related technology offerings. The stores would require a sales system and print services for invoices.

problem1)  Complete your proposal including costs for computing equipment, network infrastructure, network servers, printers, and related hardware, software, and accessories. Include as much detail as possible as well as justification as to your selections. As you are a small business, cost is a main factor and must be minimized.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93168
  • Price:- $80

Guranteed 48 Hours Delivery, In Price:- $80

Have any Question? 


Related Questions in Computer Network & Security

Dqfacebook email electronic commerce and collaborative

DQ Facebook, email, electronic commerce, and collaborative sites for both work and leisure are a normal part of our everyday computing activities. Personal information entered on these websites become partially owned by ...

Network management paper in this paper you will research

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

What is the typical relationship between the untrusted

What is the typical relationship between the untrusted network, the firewall, and the trusted network? How is an application-layer firewall different from a packet filtering firewall? Why is an application-layer firewall ...

Or the purpose of the first part of this project you are

Or the purpose of the first part of this Project, you are still the InfoSec Specialist for the Greenwood Company. Consider this project a continuation of the work you performed in Projects 1 and 2. After seeing you searc ...

Data information decision please respond to the

"Data Information Decision" Please respond to the following: · With the obvious pace of current technology development, data continues to grow daily. Imagine that you are a Database Administrator for a large organization ...

Network and internet security assignmentproblem 1 - network

NETWORK AND INTERNET SECURITY ASSIGNMENT PROBLEM 1 - Network Access Control 1) Suppose you are a network administrator and are concerned about unauthorized networked devices being plugged into your system. You have read ...

Network security paper in this paper you will define the

Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disa ...

Computer scienceprimary task response within the discussion

Computer Science Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discus ...

You work the night shift at a software development company

You work the night shift at a software development company and mange six Web servers that host the company's e commerce solution for medical and dental supplies. You notice that traffic across the network dropped signifi ...

Go to csrcnistgov and locate federal information processing

Go to csrc.nist.gov and locate "Federal Information Processing Standard (FIPS) 197." What encryption standard does the address use? Examine the contents of this publication and describe the algorithm discussed. How stron ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen