Preview

Case Project 3-1: Client-Server Assignment

Good Essays
Open Document
Open Document
874 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Project 3-1: Client-Server Assignment
Client-Based / Client-Server Assignment
John Birster
Axia College

IT240
Daniel Dronsick
July 23, 2013

Client-Based / Client-Server Assignment
Introduction
Complete Case Projects 3-1, 3-2 and 3-3 of Guide to Networking Essentials. Substantively justify your choice in determining if client-based or client/server model will be used (Syllabus, IT240 Version 4, Intro to LAN Technologies, 2012).
Definitions
Client-Based Model – “an application that runs on a work station or personal computer in a network and is not available to others in the network” (Farlex, 2013).
Client-Server Model – utilizes client and server devices each designed for a specific purpose (Mitchell, 2013). Project 3-1 (Tomsho, 2011)
Recommendation: Replace the
…show more content…
Justification: Replacing the 10 Mbps Ethernet with a secured Ethernet hub with 1000BASE-T capability will increase the bandwidth throughput with the capability of filtering packets to minimize network traffic. The functionality will greatly increase the speed of the network to support multiple users transferring large …show more content…
Each Floor LAN would be connected to a central (primary) Star Ethernet LAN within the server room where each of the five server would be connected. This would create a LAN (Extended Star ) topology.
All databases and central files will be stored on the server. Software will be installed on each workstation to support the creating and editing of the central files (creating a client-server model).

Justification: Since there is an influx of internet business, a secured router on each floor would provide the network administrator with a central location to complete the security administration while retain the ability to connect to the central servers on the primary hub. Additionally, a secured hub would provide functionality to encrypt data between the primary hub and each hub on each floor. This would provide additional security to business sensitive data.
Responses to questions:
● What type of topology should be used in this network? Enhanced Star
● Will the network be peer to peer or server based? No
● How many computers will be attached to the network? Minimum of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    iLab Week4

    • 563 Words
    • 2 Pages

    safe to say that while the expansion will increase the traffic (as expected) that the ethernet traffic…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Secure service: The main objective of this network is to provide secure administrative computing service to DesignIT. It is designed to be functionally and physically isolated from access by people not employed by DesignIT so as to minimize the risk of unauthorized use.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In this essay, it will describe what the hub can accomplish and the restrictions that it has. Afterward a switch will be explained on how it is going to outdo a hub. It will first talk about the Hub and the restrictions and the positive goals the hub can achieve. After, it’s going to talk about what the switch can accomplish to help fix the problems the hub caused to the network.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    7.2.3 Hub and spoke networks are well understood by all network administrators, and their benefits are thoroughly documented. They offer a high degree of security because each device on the network is isolated from the others through the single connection to the wireless router. Other benefits include high performance, centralization, and simplicity. They're relatively inexpensive and easy to wire and easy to fix if a component goes down.…

    • 725 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Server this goes back to the OS, but with a server, you have a different level of access can be assigned to users. A report that conducted by Kaspersky Labs ("Global IT Security Risks Surve2014," 2014) stated that even virtualized have security risk that needs to watch.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    You are the administrator of a client-server environment. What kind of network would you install and how would the pieces and components of this…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    Client Component- The client component runs on the client machine, and enables the client to participate on…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    Client/ server computing – is a program that distinguishes relationship between the client and the server. The client will request a service or resource from another program and this is the server. Once the server has fulfilled the client’s request the connection is terminated. Overall a client/server computing is linking to a computer system where a central server supports a number of networked workstations.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | Two or more computers connected to each other, that allows you to share files, information and communication between different computers in different locations…

    • 429 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cnt 4513 Study Guild

    • 578 Words
    • 3 Pages

    a) client-server: dedicated servers, fixed IP, not scalable, single-point-of-failure. (E.g., Web, FTP, Telnet, and e-mail)…

    • 578 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The network IP addressing scheme for the Frederick MD building should be designed to ease network management. A well thought out network subnet design enables administrators to quickly locate computers by IP address by building floor and room, and whether the computer is a server, a student computer, staff computer or instructor’s computer. A proper subnet design will also minimize broadcast traffic that decreases network performance, by reducing the total number of computers allowed in each broadcast domain. A proper subnet design will also provide for efficient use of IP addresses by including only the number of IP addresses in each subnet necessary to support current computers plus a few additional IP addresses for immediate expansion when required. To differentiate subnets by IP address, student subnets start with a “1” in the third octet, staff subnets start with a “2” in the third octet where “10” in the second and third digits designates the location to be floor 1, “12” designates the location to be floors 1 and 2, “10” designates the location to be floor 1, “20” designates the location to be floor 2, and a second digit of “4” designates office staff and a second digit of “5” designates Admissions staff. The broadcast and network numbers have been removed from the IP address ranges below.…

    • 1166 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    |World Wide Web and Internet |Software that connects databases to different institutions making it possible to hold |…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210

    • 4443 Words
    • 28 Pages

    NT1210 Introduction to Networking Unit 2: Chapter 2, Introduction to Computer Networking 1 Objectives  Identify the major needs and stakeholders for computer networks and network applications.  Identify the classifications of networks and how they are applied to various types of enterprises. …

    • 4443 Words
    • 28 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7

    • 1276 Words
    • 9 Pages

    Notice the list of deliverables toward the end of the information. Part 1 includes deliverables 1-4.…

    • 1276 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    j. A computer that accepts requests from computers connected to it and shares resources with those computers.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays

Related Topics