Preview

Nt1330 Unit 7 6.2 Conclusion

Good Essays
Open Document
Open Document
914 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 7 6.2 Conclusion
6. Deployment, Limitations and Conclusion

6.1. Deployment

We installed our project on the virtual box program, through this program we installed the server and the client to withdraw, as we set Windows Server 2008 R2 and Windows 7 for the client, and give each one IP address. The virtual machine designed for one network in Ghantoot Group Company.
The static IP address of the server set because this is a condition to be DNS server and domain controller. Then put Active Directory services even on the server side of the DNS. Then it was fixed in many roles and configured on the server. Those involved DHCP, file services and print services roles. Then the client the limits of their network configuration.
The client is configured to use DHCP
…show more content…
This was done as part of the ADSL Router and Cisco configuration Controller. The composition contained in the composition of ADSL factors. DHCP is created in the ADSL Router at the same time we will stop using DHCP server that is part of Windows Server 2008. The operating systems for the security of wireless networks are configured using WPA2 / WPA Mixed type. MAC made pass through a filter to allow only certain devices to connect to the Internet through various wireless networks white list their own MAC addresses. ADSL Router has also integrated firewall protection. This is configured with the default selections. It has an access point also some parental controls to prevent some of the sites. It is configured …show more content…
They can just do simple thing such as surf the Internet, send and receive e-mail messages and use some of the Microsoft Office products (Word, Excel and PowerPoint). More exercise may be necessary for users to benefit more from the network. Work especially in the field site where users log on from any device on the network and they provide the network relatively Connection Sharing from internal or external storage. Users also need to be skillful in how to cooperate and share Microsoft Office documents correctly.
Security is one of the most important things on the network, the staff needs to practice on the field of security in the network, as they need to learn and awareness on the dangers of network security, You must deal with their recommended, for example, they should not open e-mail facilities, except in the case of trust and find out the source of the sender. They must also training on how to recognize and identify the hackers, phishing attempts, there several ways Prowler are used, for example, asks the user name and password of the sites that show like areal sites .
To configure the access point

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Over the last week the market has saw December corn futures fall $.08 on the heels of the Monday USDA report. The September report confirmed what most analysts have predicted for the last several weeks; there will almost certainly be a massive corn crop this season. The general consensus this week is that corn will continue to decrease throughout the harvest season. Kevin McNew of Grain Hedge believes if there is a late winter rally coming it will be “a game of small moves,”. I decided that it would be beneficial to calculate how much per bushel I need to make my break-even point. As a result of using the Missouri Extension numbers for average yield and average cost per acre I found that the minimum break-even price per bushel comes in at about…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1330 Unit 2 homework

    • 364 Words
    • 2 Pages

    Check the workstations using ipconfig /all and find out if the ip range is within the address range you assigned, if it is a different address then the workstation failed to contact the DHCP server and has gone into apipa mode. The Network Interface Card might be assigned an incorrect driver. Another possible cause of the problem is that the patch cable is not plugged into the Network Interface Card, or is not connected to a switch on the other end. However, it could be that the server has run out of IP addresses that it can assign to clients. You can easily tell if this is the problem by comparing the size of the DHCP address scope to the number of devices on your network that request IP addresses from the DHCP server. But since only some of the workstations have got addresses the problem might be the DHCP server. Start off by doing some ping tests to verify that the DHCP server is able to communicate across the network. If the DHCP server is able to communicate with other computers on the network, then I recommend verifying that the DHCP server has an IP address that is compatible with the scope that the server is configured to assign addresses from. The server itself has to be assigned a static address in the same subnet range, such as 192.168.0.199. If this still doesn’t solve the problem make sure that the DHCP server is still authorized by the Active Directory to lease IP addresses. You should also check to verify that the scope is active, and that the necessary services are running on the DHCP server.…

    • 364 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Lab Report

    • 567 Words
    • 3 Pages

    Now that you have finished testing DNS and DHCP you will now configure the Windows Server 2008 machine as a replica Domain Controller. In this exercise you will install the Active Directory Domain Services Role on Server##A.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Now, select a virtual switch depending on how you have configured the host. Proceed to the configuration of port properties. Give the port a specific name. I have given the label as ‘VMK’. Enter VLAN ID if there is any or else chose ‘None’. Put a check next to the ‘Virtual SAN traffic’ box and then click ‘Next’. Now start with configuring IPv4 settings for this port. After completing that, click ‘Next’. Click on the finish button to end the configuration for port group creation. Make sure that the group is created. Again a new window will pop up showing the devices created and their respective IP addresses. After confirming that the host is created, repeat this procedure two more times, since we require at least three hosts for configuring VSAN.…

    • 229 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    graph 1.0 shows that out of ten respondent 5 are rated outstanding, 1 are rated very good and 4 are rated good with regards of the maintainability of the Point of Sale System…

    • 1214 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Grandfather – father – Son: According to this backup rotation schedule incremental backups are performed daily, while full backups are done weekly and monthly.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    a. The time in hours, minutes, and seconds is to be passed to a function named totsec().…

    • 720 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (i) No, in a datagram network the routing table cannot contain two same destination addresses, since all of the destination addresses are distinct (unique) in a datagram based network i.e. it’s impossible to have duplicates in a routing table because of the distinctiveness…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unix processes are instances of an executed program. UNIX, being a multi task operating system handles thousands of processes at a time. We are able to check on what processes are currently running by typing ps at the UNIX prompt. Depending on the options used with the ps command, we can see different outcomes such as $ps -ef | more. This will list all the processes in the system. Some items you might see using the ps command are PID which is the process ID number, TT or TTY shows the controlling terminal for the process. If there is no controlling terminal then a question mark is used.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In this article, a system was designed and built in order to receive, store, process, analyze, and display heart electrical signal wirelessly on cell phone. This device has small size, light weight, low power consumption, and appropriate price. The doctor or the nurse is able to receive and observe heart signal on their own cell phone only by installing the proper program and loading the related file. This device is also capable to calculate patient’s consumption calories and store the value; and also has a data base consisting of medical and drug information for increasing the awareness of patient about heart diseases. The obtained results from recording and displaying heart signal on cell phone by designed system has an…

    • 183 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It is an exception code which is suggestive of Windows registry corruption. 0x80070002 errors can start happening if the Windows registry has corrupted entries. Windows OS and Windows programs will fail to work unless you find a 0x80070002 fix.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network Final

    • 358 Words
    • 2 Pages

    Lan will be configured with VLans. This will depend on the amount of VLANS needed. For example, if a wireless hotspot is required in the conference room for visiting clients or suppliers, we will supply a wireless connection through a VLan that will enable them to access the internet without access to our operations network. This can also be implemented for scenarios like students vs operations. This will isolate traffic allowing for internal security.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Advanced System

    • 12812 Words
    • 52 Pages

    Server provides all applications, files and messages. If a client wants applications from the server, the server grant permission to the particular Client according to their authentication level, i.e., applications are shared between server and clients. The client access the printer which are attached to the server when a request is provided. The applications from the server are sent to the requested client by the provider. Resources include devices such as CD, Floppy and Printer. The client access these devices which are attached to the server when a request is provided.…

    • 12812 Words
    • 52 Pages
    Powerful Essays