StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Assignment 1: Network Consultation for DesignIT - Coursework Example

Comments (0) Cite this document
Summary
The document presents design and architecture of computer network to be deployed as per the requirements provided by the DesignIT. The document suggests the hardware and software applications to be deployed and implemented in the DesignIT, along with the associated costs of the hardware and software. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.2% of users find it useful
Assignment 1: Network Consultation for DesignIT
Read TextPreview

Extract of sample "Assignment 1: Network Consultation for DesignIT"

Download file to see previous pages The network design given below shows that the topology of the network is Star. Therefore, the cables from all the devices (computers, servers, wireless access points, etc.) would be terminated into the switch. The size of the space undertaken by the DesignIT is 56’ x 36’, therefore, after analysis it is determined that a roll of cable would be enough for connecting the computers, printers, servers, routers and wireless access points to the Switch. Moreover, it is recommended that the Design utilizes the cable of Category Five (Cat 5) for connecting the devices to the switch utilizing RJ45 connector.
The following diagram shows the network design and architecture to be deployed in the DesignIT.
In order to prevent the network and digital information either from an unauthorized access from the intruders or viruses and malware, there are various hardware and software required to be implemented. For instance, in terms of hardware, the Firewall and Intrusion Detection System (IDS) are used disallow the unauthorized persons to access information available over the network and sniff the network to detect the abnormal content trying to enter the network. However, on the other hand, it is recommended for the DesignIT to install the antivirus software applications to prevent the viruses to enter into the network. From the many available antivirus software applications, it is suggested that the DesignIT should install Symentic Endpoint Protection. Moreover, it is suggested that the company would implement a strong password policy. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assignment 1: Network Consultation for DesignIT Coursework”, n.d.)
Assignment 1: Network Consultation for DesignIT Coursework. Retrieved from https://studentshare.org/information-technology/1649239-assignment-1-network-consultation-for-designit
(Assignment 1: Network Consultation for DesignIT Coursework)
Assignment 1: Network Consultation for DesignIT Coursework. https://studentshare.org/information-technology/1649239-assignment-1-network-consultation-for-designit.
“Assignment 1: Network Consultation for DesignIT Coursework”, n.d. https://studentshare.org/information-technology/1649239-assignment-1-network-consultation-for-designit.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Assignment 1: Network Consultation for DesignIT

Network Topology

...? Network topology of “Network Topology” Network topology refers the of arrangement of systems on a computer network. It defines hoe computers or nodes are arranged and connected to each other within the network (Shoniregun, 2007). This paper intends to outline the functionality of a network topology. The topology signifies the network of the research lab. The diverse Cisco switches symbolize the unlike vlans that can be configured for the dissimilar project teams in the lab. EIGRP router functions as the interior routers of the research lab system. OSPF and EIGRP and RIP routers functions as the interface between the laboratory fund raising and biology laboratory (Shoniregun, 2007). File servers will be storing the files of volunteer’s...
3 Pages(750 words)Assignment

Assignment 1: IT Consultation for Mr. Green

...?Windows 7 Ultimate Installation Capabilities of Windows 7 Ultimate currently Windows 7 Ultimate is an operating system that is purposefully designed for people and organizations who wish to have all necessary functionalities of the operating systems enabled. This package of includes advantages in the Home Premium and Professional operation systems plus added advanced security measures that are quite recommended for networked systems. Additionally, it allows for the sharing of documents, files, pictures, videos, and music over a networked system; together with ease to run several other existing productivity and business programs meant for Windows XP. 2) General capabilities Besides the simple qualities of Windows 7 noted above...
3 Pages(750 words)Assignment

Social Network

... Social Network Differences between physical and social sciences Physical science deals with certain aspects of nature that include chemistry and physics in studying the nature. From a viewpoint of either a functionalist or materialist, physical science tends to overlap ecological studies especially when studying evidences behind evolution or historical facts. Studies show that there are differences between the ways in which social and physical scientists study social networks (Phillipson, Graham, and Morgan 33). According to their findings, a physical scientist believes that people create a network of collectivism under the statuses of corporate interaction. The interdependence forged by the concepts of physics and social studies resolves...
4 Pages(1000 words)Assignment

Windows 7 Workgroup Consultation for Sally Chu

...? Windows 7 Workgroup Consultation for Sally Chu (School) This paper will serve to define the specifics relating to setting up local users on a Windows 7 workgroup network, with a high level of security, as a part of a simulated network technology consultancy for a small business, owned by a Sally Chu. Keywords: UAC, user access controls, administrative users, users, Windows 7, workgroup, network Windows 7 Workgroup Consultation for Sally Chu In order for Sally to grant all six of her administrative staff members the same computer-access privileges, to allow them to run applications and use network printers, but not be able to make any accidental changes that can adversely affect their computers, the most effective and efficient way...
4 Pages(1000 words)Assignment

IT Consultation for Fast Paced Financial

...? Introduction Fast Paced Financial Company depicts a development image by taking decisions to deploy a Windows Server 2008 network. In any organization, infrastructure in aspects of communication is an essential factor. Networking involves communication, the exchange of information by various parties. Efficiency in any network system is an essential factor. In this case, Windows Server 2008 network is a reliable, cost worth, effective and efficient system to deploy by Mark Cohen the owner of the company. Active Directory Domain Services (ADDS) A directory service is a system, which provides a platform for information in a directory to be stored in a systematic manner and makes it easy to retrieve. Information technology defines directory...
6 Pages(1500 words)Assignment

Network Routing

A working and configuration of a routing protocol shall also be elaborated. PROTOCOL: The protocol that is given for the completion of the task is Open Shortest Path First (OSPF). It falls in the category of link-state routing protocol. So we shall start with some information on what is link-state. LINK-STATE Link-state is a mechanism that follows the condition and connection type of every connected link and develops a metric calculation that is based on some factors that also included the factors that were set by the network engineers. The functionality of the link-state protocols is that it knows the status of the link, whether it is up or down and what is its bandwidth and calculates a cost to use that path. As we know that ev...
10 Pages(2500 words)Assignment

Network Management

... insular. The company should also consider the impact of its decisions relating to the architecture of its network, on such matters as supply chain management and intranets/internets for internal, B2C and B2B networking. (Verisign) This will become increasingly important as ProPrint Plc expands its range of operations and services. Ultimately its network architecture should be focused on facilitating information exchange for both internal and external users - staff, customers and suppliers. Current and Proposed Future Network Architecture Hardware The organisation currently has 22 servers and 46 workstations as follows: Current Proposed Location S W S W Sales & Marketing 0 6 2 6 Graphic Design Agency 6 5 6 5 Purchasing 0 111...
10 Pages(2500 words)Assignment

Network Routing

In this algorithm, whenever a status of the link changes, a routing update is exchanged between the routers; this routing update is called a Link-State Advertisement (LSA).  When routers receive this LSA routing update they recalculate the shortest path using link-state protocols to affected destinations.  Link-state routing constantly tries to keep complete networks topology by updating its routing table whenever a status of any link is changed in the network. Every router builds a map of the full network topology. OSPF (Open Shortest Path First) is an example of Link State protocol.
           In distance vector protocols, routers are updated about remote networks with the help of neighbouring routers using Bellman Ford algo...
10 Pages(2500 words)Assignment

Network Security

...Network security The case involves election of the President of the United s. East Dakota is the most competitive and whoever wins its votes wins the presidency. The state allowed its citizens to vote over the internet and 30 percent of the state’s citizens used the avenue. An online election fraud occurred in the state and an organization tricked citizens to use its site then it used the details to vote for Candidate X. State officials from East Dakota compiled the results and candidate X emerged the winner. X has been inaugurated and evidence has emerged over the fraud, though it cannot be established if X knew about the scheme. The following is a discussion of responses of two stakeholders to the case. The other presidential candidates...
2 Pages(500 words)Assignment

Recruitment and selection consultation

The company seeks to recruit a staffing officer who will be responsible for sorting out resumes of potential candidates as required by different employers as well as to conduct interviews. This person should have experience in the field of human resources management.
Suitably qualified candidates will be selected on the basis of their education as well as experience. Candidates will be invited to submit their resumes online and aspects such as employee referrals will be seriously taken into consideration. Only shortlisted candidates will be invited for interviews.
The company shall not discriminate potential candidates on the basis of race or gender. Any person who has knowledge about Australian labour practices will be co...
3 Pages(750 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Assignment 1: Network Consultation for DesignIT for FREE!

Contact Us