Preview

appendix b

Satisfactory Essays
Open Document
Open Document
569 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
appendix b
Associate Level Material
Appendix B
LAN Operating Systems Scenarios
Read the three scenarios below and answer the questions that follow each scenario.
You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component.
The type of relationship you would want to have is a SERVER/CLIENT relationship. The server would have to be able to handle logon/authentication (domain controller). Most likely a Windows Server that has an Active Directory. I also will need a file server which is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. Based on the departments I would need to create security groups in order to keep the network secure. I will also create a shared drive directory structure that represents each department. For example if more than 5 employees needed to be added it would be very easy to add them to the necessary security group which will automatically add them to the share
You are the network administrator for a company that has a peer-to-peer network. How would the pieces and components of this network relate to each other? Define all the components of this type of network.
The peer to peer network is unique because it has no central hub for any of the computers that is on the network. The computers are connected to each other and each computer hold a piece of the network capability, each computer handles part of the processing power, the memory requirements, and the communication processes. The components in this network are computers that are connected to each other and the cables that they are connected to. This type of network does not allow many additions to the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    A network operating system is a piece of software that is utilized to manage the network resources available to the clients on your network. As a central point of management you have the ability to create and manage user accounts, security templates(group policy), allow users and systems access to file servers and printers, and control any information that is requested from outside your network. Proper utilization and configuration of your network operating system is essential for the security of your network. From the server you can place rules on each of your clients to limit the resources they have access to, while determining how much freedom they will enjoy on their systems.…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ITN Final Chp 7 Through 12

    • 7250 Words
    • 75 Pages

    As discussed in this textbook, three layers of a network model are the components required for a typical network, including local area networks.…

    • 7250 Words
    • 75 Pages
    Satisfactory Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bus 210 Week 8 Appendix E

    • 381 Words
    • 2 Pages

    | With PC’s entering into the home and workplace, a network was created as a way of linking various PC’s together and to a server.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix H

    • 278 Words
    • 2 Pages

    Use this document to report your findings from the LeafLab Exploration Experiment. The lab report consists of three sections: Data, Exploration, and Lab Summary.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 It273

    • 299 Words
    • 2 Pages

    4. A great example of a small peer-to-peer network is a system link between game consoles. The connection allows the two machines to communicate with each other, so that a multiplayer LAN game may be played. While modern consoles are able to connect via the internet to play multiplayer sessions, faster speeds are able to be reached with a direct connection. A common example of a client/server network is a home network where devices connect to either to a modem or a router which itself connects to a router. It is through the router/modem that devices are able to communicate between each other. While you could use a peer-to-peer network instead of a client/server network for home use, but over time it would become a huge hassle to swap out devices and…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    A peer-to-peer network is a network where each workstation has equivalent capabilities and responsibilities. In this type of network there is no dedicated server, each workstation acts as a server and they share the responsibilities that a single dedicated server would. Each workstation is allowed to access all information allowed by the owners of each workstation. Each…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw410 Week 2 Lab Report

    • 502 Words
    • 3 Pages

    To complete the Week 2 Lab Report, answer the questions below concerning the Network Design Lab Scenario found in Doc Sharing.…

    • 502 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Allowed client station addresses can be spoofed by any old hacker. This method is unreliable at best…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Appendix B

    • 702 Words
    • 3 Pages

    |Cost of cotton decreases |Clothing |Supply(right) – cost less to make so |Quantity will increase price will |…

    • 702 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It is an arrangement of the various elements of a communication network. There are different types of topology as Lowe (2012, p8) said “each type of networking topology (bus, star, expanding star, ring, mesh) offers advantages and disadvantages”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    NT1210

    • 4443 Words
    • 28 Pages

    NT1210 Introduction to Networking Unit 2: Chapter 2, Introduction to Computer Networking 1 Objectives  Identify the major needs and stakeholders for computer networks and network applications.  Identify the classifications of networks and how they are applied to various types of enterprises. …

    • 4443 Words
    • 28 Pages
    Powerful Essays
  • Good Essays

    Itm 301

    • 909 Words
    • 4 Pages

    1. First management must implement a groupware system that is tailor specify to that organization. Select a…

    • 909 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Interpersoanl Skills

    • 1598 Words
    • 7 Pages

    The degree to which a system is distributed can be determined solely on the basis of how processors and other devices are connected.…

    • 1598 Words
    • 7 Pages
    Powerful Essays