Create a network configuration diagram

Assignment Help Computer Engineering
Reference no: EM133662964

Homework: Network Configuration Model Guidelines

Overview

Understanding basic network terminology and the rationale for specific network configurations is a key skill for succeeding in the information technology field. In this activity, you will demonstrate your understanding of both network terminology and systems mapping to create a home network diagram and define common networking terms.

Prompt

To demonstrate your understanding of these concepts, address the following:

I. Define the following IT concepts, and describe their role and importance within a network:

A. IP address and DNS
B. Server and client
C. VPN
D. Firewalls
E. LANs and WANs

II. Choose one of the following scenarios and create a network configuration diagram in Microsoft Visio using either the Basic Network Diagram or Detailed Network Diagram symbol sets:

A. Justin Altuve operates a small photography business out of his home. He connects to the internet through a cable modem connected to a wireless router. For information security, he uses a firewall. On his network, he has a desktop PC, a laptop, an IP phone, and a printer. He uses a digital camera that he regularly syncs with his laptop.

B. Georgia Springer runs a small accounting firm with two partners and a secretary. Each employee has a personal workstation. Client information is stored on a central server shared between all workstations in the office. There is a single networked device that functions as a copier, printer, fax machine, and scanner. The office's network has a firewall and connects to the internet through a cable modem.

C. Compose a brief 100 to 200 words summary of the network configuration you modeled in Visio, including a description of the network configurations you would recommend. In your summary, use the vocabulary discussed in the first part of this homework and describe how these components work together within the context of a network.

Reference no: EM133662964

Questions Cloud

Monitoring performance and taking corrective action : Is there scope to empower the team so that it can take on greater responsibility for setting standards, monitoring performance and taking corrective action?
What is artificial general intelligence : Artificial intelligence is everywhere, and people across industries are now aware of it, but what is artificial general intelligence.
Have staff provide hand-over-hand instruction : What is the best way for people with disabilities to learn work skills? Have staff provide hand-over-hand instruction.
Have staff provide hand-over-hand instruction : What is the best way for people with disabilities to learn work skills? Have staff provide hand-over-hand instruction.
Create a network configuration diagram : IT 200- Create a network configuration diagram in Microsoft Visio using either the Basic Network Diagram or Detailed Network Diagram symbol sets.
Derive a physical design from the logical design : ICT503 Database Systems, Victorian Institute of Technology - Derive a physical design from the logical design taking into account application, hardware
What makes a strong password : What makes a strong password? Develop a Python or C++ program that can check the strength of a password. There are a few requirements for the program.
Poster: post operative care after diverticular bowel surgery : Develop a poster from evidence-based information that either proves or disproves the accuracy of information provided by Artificial Intelligence
Employer policies that lead to gender-plus discrimination : Identify a true statement about an employer's policies that lead to "gender-plus" discrimination.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd