Cluster architecture for the servers and databases

Assignment Help Computer Network Security
Reference no: EM13186427

The CTO informed you that the board of executives showed great interest in building a new network based on the work you did throughout the weeks. They need a proposal to proceed. Provide seven to ten page essay proposing the Systems Architecture for a new network of 500 users where the headquarters are located in Denver, CO with 4 branches located across the 4 US coasts. The type of business is not important and you may feel free to make up one.

1- What type of OS to use along with the file system and why is this architecture is better than others? Will you use the same OS for servers and Desktops? Will your file system of choice provide security?

2- What type of processor types will you choose for the desktops, the servers, and why?

3- Will the system be based cluster architecture for the servers and databases?

4- What type of data backup should the company use, will RAID be used, or is local backups enough?

5- Is there a need for a network to be built for connecting the servers and users, will data go across the WAN or will it stay local to the LAN? What protocols should be used if any?

Reference no: EM13186427

Questions Cloud

Find the sum of the perimeters and the sum of the areas : find the sum of the perimeters and the sum of the areas of all the squares, including the initial one.
State the top stream contains diesel and heating oil : The top stream contains diesel and heating oil. The middle stream contains heating oil and lubricating oil, and the bottom stream contains the solids
Find the average resistance of the wood : A bullet of mass 0.04 kg travelling at 300 m/s hits a fixed wooden block and penetrates a distance of 4cm. Find the average resistance of the wood.
State waste gas components into the water : Neglect the absorption of other waste gas components into the water, and the evaporation of water into the waste gas stream. What rate is NH3 is being removed from the feed gas?
Cluster architecture for the servers and databases : What type of OS to use along with the file system and why is this architecture is better than others? Will you use the same OS for servers and Desktops? Will your file system of choice provide security?
Explain the mathematical relationship : Explain why light intensity is dependent on the distance the detector is from the light source. Describe the mathematical relationship.
What is the before-tax rate of return : Beasley World Industries purchases a new computing center for $100 million. They estimate a life of 5 years and a salvage value of $20 million. Beasley World Industries is allowed by the IRS to use Sum of Year's Digits depreciation. They also e..
What is the cost of the bench : A garden table and a bench cost combined. The garden table costs more than the bench. What is the cost of the bench?
How much larger will that amount be : After all of these taxes are paid, Vanessa will have a larger amount. How much larger will that amount be? (Round your answer to the nearest cent.)

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security by obscurity

Defacement, Infiltration, Phishing, Pharming, Insider Threats, Click Fraud, Denial of Service, Data Theft/Loss, IP Whitelisting and IP Spoofing, recursive PHP functio, worm and a virus, hash on a string using MD5

  Secure communication if organization uses symmetric cipher

An organization has 300 members. It is desired that each member of the organization be able to communicate securely with any other member. The organization uses a symmetric cipher.

  Explaining asymmetric encryption algorithms

Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob. You should include any steps taken by Bob that allow him to read the message.

  Differentiate business continuity-disaster recovery planning

Business Continuity (BC) planning and Disaster Recovery (DR) planning are main elements in organizational security architectures. Write down the difference between them.

  Security goal if someone modifies critical information

If an attacker breaks into a corporate database, modifies some information and deletes critical files, against what security goal or goals is this attack aimed?

  Prepare a diagram using rationale

Analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

  Security measures currently in place give adequate security

Explain in scholarly detail on whether you believe security measures currently in place give adequate security as well as privacy, or do you believe these issues being emphasized are at the expense of the other?

  Explain protocol for sending encrypted message

Consider following protocol for sending an encrypted message from Alice to Bob in presence of Key Distribution Center (KDC).

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Design item hash table from using hash function

Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the following assumptions.

  Federal government regulates labels

The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd