How to assemble modern computer components

Assignment Help Computer Engineering
Reference no: EM132859279

Unit: Computer and Network Technology Scenario

Open2reach is a functional division of telecommunications company CT plc, that owns and maintains the telephone wires, ducts, cabinets and exchanges that connect nearly all homes and businesses in the United Kingdom to the national broadband and telephone network. Open2reach manages CT's local access network which connects customers to their local telephone exchange, starting at the main distribution frame (MDF) in the exchange and ending at the network termination point (NTP) at the end user's premises. In July 2010 Open2reach signed a £800 million contract with ECI Telecom to help it service and create a fibre-optic network serving 18 million households in the UK. The deal was the largest in ECI's history. In 2017, Open2reach proposed offering super-fast fibre broadband to 10 million homes by 2025, using fibre to the premises (FTTP) technology. By June 2018 Open2reach was connecting 8000 properties per week to FTTP, with the aim of reaching 3 million premises by 2020.

You work as a Network analyst in Open2reach. As a part of the growth process the company has recruited 10 Analyst apprentices and the company plans to employee them upon completion of the programme. Your line manager Laura Barnsley has asked you to provide training to this group of apprentices. You have the following tasks for your new assignment with the company.

Task 1 - Handbook Instructions

You need to provide all apprentices with a handbook which will provide them with a review of the core academic knowledge before they start lab training.

You are now preparing a handbook for them and you are required to do the following:

a. First part of the handbook covers the fundamentals of the computer. In the introduction, provide a summary of the historical development of computer systems since 1980s.

b. First part is followed by an explanation of the components of a modern computer and an assessment of different operating systems (such as: Windows, MacOS, Linux, UNIX, Fedora, Ubuntu etc.) used in modern computers.
c. Conclude the first part of the handbook by providing a clear differentiation between the client and server environments of the Open2reach operation.

d. Second part of the handbook illustrates networking principles and their protocols. Provide a description of the network standards and protocols and evaluate the impact of different network standards on the Open2reach operation.

e. Using industry examples, assess different network topologies and differentiate between network hardware and software.

Task 2

All apprentices have completed the mandatory academic part of the training and now they are ready to start practical part of their work. You have planned to show them desktop engineering fundamentals and demonstrate them routing and switching techniques.

Instructions

a. Demonstrate how to assemble modern computer components to make a clone PC.

b. Troubleshoot at least 5 Windows/ Unix/ MacOS/ Linux OS errors in a laboratory environment. Ensure you log all the activities.

c. Install both client and server operating systems within a given timeframe.

d. Configure client systems to meet Open2reach's organisational policies.

e. Configure a network for Open2reach using routing and switching techniques.

Reference no: EM132859279

Questions Cloud

Limitations of existing communication processes : Determine the benefits and limitations of existing communication processes and Provide a commentary on how you would have implemented an improvement to access
Evaluation of the software development techniques : Software Development - Explanation of the importance of each stage in traditional software lifecycle approaches - Evaluation of the software development
Importance of strategic resources and competencies : What is the importance of strategic resources and competencies?
Formulate a precise research problem : You want to understand consumer behavior towards usage of mobile telephones through a survey.
How to assemble modern computer components : Demonstrate how to assemble modern computer components to make a clone PC - Troubleshoot at least 5 Windows/ Unix/ MacOS/ Linux OS errors in a laboratory
Discuss the various concerns regarding adopting e-commerce : Discuss the various concerns regarding adopting E-commerce. legal and seurity
Customer being unwilling to wear a mask in a store : -Share an incident you witnessed or heard about regarding a customer being unwilling to wear a mask in a store. Did employees confront the customer?
PAD 501 Grantsmanship in Public Administration Assignment : PAD 501 Grantsmanship in Public Administration Assignment Help and Solution - Strayer University, USA - Homework Help - QUIZ - GRANT FUNDING
System design methodologies : Systems Analysis and Design - provide a concise guidance on system design methodologies and modelling through an explanation of the system design concepts

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd