Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Section A

problem1) What do you mean by an IP Address?.

problem2) Describe briefly the attributes of the client/server computing model.

Section B

Case Study

You are interested in starting your own Music Store, Quality Sounds, in the suburban area of your town. You require to design and build the network and computing solution for your stores. You have done some initial planning and you would start with two stores (but you plan to add two more stores across town within one year). Your store would sell new and used music and allow customers to get “online” in your stores and download music. You also would offer classes on how to setup music downloads and configure MP3 devices. You took computer networking courses in college and you feel you could tackle this solution yourself. Upon initial planning, you have identified the following requirements for your network:

• Connects three office computers and one computer used for Point-of-Sale (POS) services at each of your stores. You also want six (6) computers in lobby/store where patrons could download music and you could run “training classes” for people to learn about using MP3 players and get other basic information. Two offices have to be connected into one cohesive network, sharing POS services and other critical company information. You also require to provide a “hand out” casual area for people to stop in and discuss music and connect wirelessly to the Internet (you may even offer free coffee to entice people to come in to your store).

• Provides adequate security for all of the company communications and documents (especially sensitive sales documents). All POS services should be protected. All general network access must be segmented from the company POS services.

• Fast and have extra capacity as the company grows

• Provides for centralized printing

• Supports eventual addition of other stores to the network

• Provides customers with the general information Website and a secure Website where clients could buy services, and products

• Provides for limited downtime (24 hour downtime maximum)

•  Provides for centralized management and control of the computers in two stores, so that you could maintain the network from off-site

• Provides for long-term cost effectiveness

• Provides a suite of software tools for employees to effectively communicate and a POS solution for the stores

The company does not have any equipment. Your plan must include a complete network and computer system which meets these requirements and future expansion plans.

The two store locations would (eventually) be within a five-mile radius of each other. The locations are within a suburban area which has present technological infrastructures and related technology offerings. The stores would require a sales system and print services for invoices.

problem1)  Complete your proposal including costs for computing equipment, network infrastructure, network servers, printers, and related hardware, software, and accessories. Include as much detail as possible as well as justification as to your selections. As you are a small business, cost is a main factor and must be minimized.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93168
  • Price:- $80

Guranteed 48 Hours Delivery, In Price:- $80

Have any Question? 


Related Questions in Computer Network & Security

Networking trends paperin this paper you will research and

Networking Trends Paper In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, hardware, network man ...

Assignment network programmingassignmentbuild a chat

Assignment: Network Programming Assignment: Build a chat programme using socket level programming. This can be done at various levels of sophistication and the marks available at each level are indicated below. Tutorials ...

Assignmentintroductionin this assignment you will use

Assignment Introduction In this assignment you will use several network tools to look at the protocols and data exchanged between network components. We will be only scratching the surface of the usefulness of these tool ...

Case studyyour company security professionals inc has been

Case study Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as "Case # 2 - W ...

You work the night shift at a software development company

You work the night shift at a software development company and mange six Web servers that host the company's e commerce solution for medical and dental supplies. You notice that traffic across the network dropped signifi ...

Case projectnbsp law firm companynbsp law firm lincoln

CASE PROJECT:  LAW FIRM Company:  Law Firm: Lincoln Partners, Esq. A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth.  The Law firm curre ...

Wireless and remote access securitykey assignment

Wireless and Remote Access Security Key Assignment Draft Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasin ...

Discussion window media servicebulldiscuss sharepoint

Discussion Window Media Service • Discuss SharePoint services and various SharePoint options as well as Windows Media Rights Management to handle the requirements of different enterprise scenarios, such as one that requi ...

Write one paragraph only for each questions1- can a

Write one paragraph only for each questions. 1- Can a business survive in today's world without a website or a poorly maintained website? Why or Why not? 2- What's your biggest fear about using the Internet? Why? Can you ...

Assignmentsummarize the principles of public-key

Assignment Summarize the principles of public-key encryption. In what way is an unprotected idle PC a danger to the internet? Suppose a PC owner leaves the PC connected to the Internet where it ultimately is used by anot ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen