Module 12 Assignment:
Networking and Security in the Business World Name: / 35
In this assignment you’ll complete a few activities from the text that will allow you to apply what you have learned about networking in this module. The first question is assessing your computer literacy related to networking and the remaining two questions are having you apply your knowledge to the workplace.
When answering the questions, be sure to: (5 points total for the assignment)
• Use complete sentences and thoughts, spellcheck, and proofread.
• Refer to the module content to support your ideas.
1. Becoming Computer Literate (10 points)
Ginormous State University is constructing a new building to house its Fine Arts and Digital Media programs. The digital media students and faculty work primarily on the first floor of the building at fixed workstations but need to transfer extremely large media files among various workspaces. The rest of the Fine Arts faculty can teach on any of the three floors in the building and need to access the network from wherever they may be teaching. Students will also need connectivity to the campus network and the Internet from any point in the building.
Instructions: Draft a memo (with supporting diagrams, if necessary) that details how to deploy network connectivity in the 25 classrooms, 12 faculty offices, and the common areas of the building. Justify the network topology you select, explain your choice of transmission media, and indicate the device(s) needed to connect the computers to the existing campus network.
Write your memo in the cell below.
2. Complete question #3 below and also choose to complete either item #1 or #2
Complete either question 1 or 2. 1. Network Topology in the Workplace (10 points)
You are interning at a small manufacturing company that is currently building a new manufacturing facility. All of the main manufacturing machines are computer controlled and need to be connected to the client/server network in the administrative offices. Equal access for nodes on the factory floor is not an issue as the machinery will communicate infrequently with the network. The machinery generates a lot of electrical interference and wireless signals do not travel well on the factory floor due to the presence of metal beams. Consider the following:
a. What type of topology would you recommend for the factory network? Why? (4pts)
b. What type of cabling would be appropriate to use in the factory portion of the network? Why? (3pts)
c. What type of navigation device(s) would be required to enable the factory network to communicate with the administrative office network? (3pts)
2. Transitioning Client/Server Networks (10 points)
The owner of the company for which you work announces that the company will be hiring another 50 workers over the next six months. Currently, your peer-to-peer network is adequately handling the needs of the 10 employees who now work at the company. However, you know that adding 50 more employees to the network would overload it.
a. Write a memo explaining why a switch to a client/server network would be appropriate. Be sure to explain which topology you think would be best to install. (5pts)
b. In the memo, estimate the costs of constructing a 60-person client/server network, including the costs of one server, cabling, workstations for the 50 new employees, and switches. Use resources such as dell.com and compaq.com for designing and pricing network components. (5pts)
Must complete this question. 3. Authentication on a Client/Server Network (10 points)
Authentication with logon ids and passwords is only secure if the logon ids are difficult to deduce and the passwords are secure. The company you work for establishes all logon ids as the first initial of the given name and the full surname of the employees (i.e. – John Smith would have the logon id jsmith). Passwords can be as few as four letters or numbers and never have to be changed. You know from your coursework at school that these are inadequate security procedures. Research password security on the Internet and draft a memo for upper management that addresses the following:
a. Suggest a new scheme for creating logon ids that would be difficult for a hacker to ascertain. (4pts)
b. What length of passwords would you recommend? What combination of letters, numbers, and other symbols should they include? (3pts)
c. How often would you recommend that employees be required to change their passwords? Would employees ever be allowed to repeat previous passwords? (3pts)
Naming Your File
When you save your file it is very important to name it in a manner that makes it easy for me to determine who it is from – remember that you are not my only student.
Please use the following naming format:
LastFirstModule#
For example Module 3 Assignment from Allen Jones would be saved with this file name:
JonesAllen3.doc
For a custom paper on the above topic, place your order now!
What We Offer:
• On-time delivery guarantee
• PhD-level writers
• Automatic plagiarism check
• 100% money-back guarantee
• 100% Privacy and Confidentiality
• High Quality custom-written paper
You May Also Like This:
- networking elements creating a connected world.
- NETWORKING ADMINISTRATION AND MANAGEMENT
- SQL Security and High Availability
- Implementing Network and Personnel Security Measures
- Networking
- EFFECTIVENESS IN THE BUSINESS WORLD.
- How can organizations develop confidence in the security of their networked systems when they have the capability to open their systems to almost any network?
- Analysis and the current status of security logins to DAMTSC
- Designing infrastructure and security protocols.
- Brand transformation plan for real-world business problems
- A linguistic perspective. Business Communication Quarterly,
- The Enterprise Information Security Policy
- Information security
- Business English
- Business memo
- business strategy
- Legal Challenges for Private Security
- Security and Privacy Implications of the HITECH Act
- Network Design and Implementation
- Ethics and Corporate Responsibility in the Workplace and the World
- Describe key areas of the selected company’s code of conduct that are of significant importance to the business, and explain why.
- contemporary global security agenda in relation to major events and key theoretical concepts;
- Global Business Strategy
- creating a social media participation policy
- Security and Risk Management
- computer security
- Business Assessment
- memorandum
- Evaluation of a Business Code of Ethics
- implement a network using VMware Workstation to develop a Postfix mail system secured by an OSSEC HIDS