Networking Training Guide, homework help

User Generated

perngrxra

Other

Description

Throughout the course you have been working with improvements to the Bedford Campus and its satellite campus in Mayberry and an additional satellite. Because of your work, you have been promoted from IT networking trainee to IT networking technician. A new trainee will be starting next week and your boss has asked you to provide a training guide for the new trainee highlighting the knowledge and skills you have developed.

Using Individual and Learning Team assignments and discussions as reference, compile your guide as follows:

As a reference, compile the final network diagrams (1 page each) for all campuses with all of the improvements you and your team have made.

Create a 1- to 2-page Frequently Asked Questions (FAQ) in the form of a table in Microsoft® Word including the following questions:

  • What is the difference between a distributed and a centralized computer system? Describe the underlying principles and issues of distributed versus centralized computer systems and how cloud-based solutions have altered current networking solutions. Refer to the network diagrams you created as an illustration of a distributed network.
  • What are the major network topologies? Refer to the network diagrams you created as an illustration of the logical and physical topology you employed.
  • Why are standards bodies essential in networking and the Internet?
  • Why are the OSI and TCP/IP network models important in networking? Provide an example from one of the labs that illustrates the performance of one of the protocols you used.
  • What are the major TCP/IP protocols in use today? Provide an example from one of the labs that illustrates troubleshooting an issue with a protocol you used.
  • What is the difference between a LAN and a WAN?
  • What is meant by the terms latency, response time, and jitter, and what tools could you use to measure these?
  • What is VOIP, and what older technologies does it replace?

Create a 14- to 16-slide Microsoft® PowerPoint® presentation, including Introduction, Conclusion, and Reference slides, that contains the following:

  • An accurate description of the "building blocks" of today's data communication networks, such as switches, routers, and cabling. Provide examples from your network diagram of each building block.
  • A concise strategy to ensure the availability of network access in switched and routed networks. Provide illustrations from your improvements to the original campus networks.
  • An explanation of how firewalls mitigate some network attack scenarios. Give at least two examples from your solutions to the campus network that illustrates how you mitigated network attacks.
  • A list of at least five security concerns inherent to wired, wireless, and mobile networking.
  • A description of at least 3 responsibilities networking teams face in providing networking services, including security, privacy, reliability, and performance.

Note: Other applications like Adobe® Spark or Microsoft® Sway® or Mix can be used instead of PowerPoint®.

Be sure to include supportive graphics and appropriate backgrounds and styles. All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Find the attached doc,Best Regards

Student Name
Course Title
Professor Name
University Name
12 June, 2017

NETWORK DIAGRAM

INTRODUCTION
Mayberry Satellite College is a organization that
has a strong faith that client and worker
fulfillment at their premises is individual of the
chief factor that verifies their accomplishment.
 The college has resolved to spend in IT services
that would outcome to overall improved
creation.


SWITCHES


A network switch is a processor networking tool
that links devices together on a laptop network
with applying packet switching toward receive,
development, as well as forward information to
the end device (Techtarget, 2014).

ROUTERS
A router is mainly a networking tool that
forwards information packets among processor
networks.
 Routers execute the interchange directing main
functions mainly on the Internet.


CABLING
Cables are applied to connect as well as
transfer records and information among
laptops, routers, switches as well as storage
region networks.
 Cables are basically the carrier and also, media
from side to side which information flows


NETWORK DIAGRAM OF EACH BUILDING BLOCK

STRATEGY TO ENSURE THE AVAILABILITY OF
NETWORK ACCESS

Risk study also is a significant implement to an
association because it calculates the
association’s profits and also, losses.
 Virtualization assists association to decrease
power expenditure and consequently they
decrease the costs the association is spending
on the vast power bills.


STRATEGY TO ENSURE THE AVAILABILITY OF
NETWORK ACCESS

Virtualization is also helpful in give high
availability for important applications as well as
rationalizes application relocation( Sru, 2015)
 Virtualization can also make simpler IT process
and also permit IT association to transform to
faster industry demands


STRATEGY TO ENSURE THE AVAILABILITY OF
NETWORK ACCESS


Numerous of the strategies that confirm that
there is accessibility of system access in
switched as well as routed systems contain
redundancy, more accessibility, virtualization,
considered outages as well as tragedy recover.

STRATEGY TO ENSURE THE AVAILABILITY OF
NETWORK ACCESS


Each of these strategies is extremely essential
in ensuring that an association is having a
superior design of their backup explanations
that the association can count on as well as
those that are money-making to the association
(Techtarget, 2014)

IMPROVEMENTS TO THE ORIGINAL CAMPUS
NETWORKS

Upgraded firewalls
 Improved user profile supervision to preserve a
protected and dependable network
 Added redundancy


FIREWALLS MITIGATE SOME NETWORK ATTACK
SCENARIOS






Firewalls are planned to defend sensitive information
that moves among two networks. In sort to lessen
attacks, it separates the network into two areas
Trusted zone- these are the official clients in some
private network
Slightest trusted zone- are the clients in the internet who
are attempting to contact t...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags