...------------------------------------------------- NT1230 ------------------------------------------------- Client-Server Networking I ------------------------------------------------- Homework Assignments Name: Ernani Narag Week 6 Homework: Due Week 7 Assignment 1: Ticket Escalation Assignment Requirements Respond to the following email, making recommended solutions and explaining the rationale for your recommendations: ---- FROM: Manager TO: Systems Administrator RE: Support Prioritization I am receiving complaints from department supervisors that their support issues are not being addressed in a timely manner. We need a ticket escalation policy to ensure business priorities are met, while managing end-user expectations. Please draft a policy describing how support requests will be prioritized. In addition to normal troubleshooting prioritization, please address the following departments: customer service, sales, accounting and marketing, prioritized in that order. How can we better manage these business requirements? ---- Submission Requirements Address all of the concerns of the manager and provide a recommendation. Microsoft Word. 1-2 pages. Self-Assessment Checklist I made recommendations to address all of the concerns in the email. | * | I explained my reasoning. | * | I composed a professional response. | * | I used critical thinking. | * | I have followed the submission requirements:File Format: Microsoft...
Words: 359 - Pages: 2
...First the warehouse workstations. For those I would really try to install Windows 7 Enterprise. With Enterprise, the workstations can access their server without VPN. It also allows the workstations to access files from their server much quicker. Plus the added security, like the encryption of internal and external drive data, would not hurt. Only problem is that the company needs a volume license in order to be able to have Enterprise installed on their computers. However, if this business has Microsoft’s Software Assurance, then they can have Enterprise installed at no extra cost. For the workstations at the main office building, I would try to have Enterprise installed on those computers, but Professional would be good too. Enterprise for the same reasons as above. Faster server access, better security, etc. Professional would be fine on these workstations though. Since these workstations are in the same building as the physical server, they would not need the faster server access. The only thing that Enterprise would be installed for is the better security. No matter which Windows 7 edition I choose to install, I would choose to do a clean install over just an upgrade. Both would put the new Windows edition on the workstations, but one is more secure than the other. An upgrade just changes the version of Windows without moving/deleting anything on the computer. Any files, caches, background running applications, etc. will still remain once 10 is installed. With a clean install...
Words: 299 - Pages: 2
...is a multi-master database. As such, is can be updated by any Domain controller that is writeable. There are some sensitive operations that need to be more strictly controlled than others (schema management and adding or removing one or more domains from an active directory forest) that are specified roles. This means that only one domain controller in the replica ring can provide a specific operation. To find the roles being held by the domain controllers, the best tool to use would be the ntdstil. Using this tool, do the following: 1 Go to the Start button 2 Type “roles”, hit enter 3 Type “connections”, hit enter 4 Type “connect to server (name of server) and (name of domain), press enter 5 Type “quit”, press enter 6 Type “select operation target”, press enter 7 Type “list roles for connected server”, press enter, and quit A system can have only one schema master and domain naming master in the entire forest and only one PDC, RID and IM in your domain. If any of the domain controllers fail, then you can transfer the roles or seize them. The Primary Domain Controller Emulator is the role which carries the highest importance in the domain (since it is responsible for the password changes and/or account lockout, as well as the Group Policy Object setting changes in the domain). However, if the domain controller holding PDC fails there will be no immediate impact. Once you find that the domain controller holding the PDC has gone down, then you can...
Words: 316 - Pages: 2
...briefly mentioned. Windows 7 Basic and Home Premium edition will require 2GB of memory per machine and preferably a Dual Core processor to operate reasonably well. You wouldn't need to use Professional or Ultimate as it would not be beneficial. As you are experiencing sluggish performance, I believe you may need to improve the system resources of each workstation, by looking at the individual configurations and upgrade their memory and perhaps the processors as well as perhaps how the local area network is set up as well. Running Windows 7 will only hamper its performance, as I believe Windows XP is perfect enough. There is another option you might want to consider and perhaps use a single machine and test it against your Windows 2003 server. It wouldn't really cost you anything except time and that is to run Ubuntu or CentOS 6.0 on a singular box and try it from there. The Linux operating system does not require a lot to run as it is designed to run on older computer systems. With Windows applications, you can install Virtual machine or use a Cross-over program such as Wine to run your program as usual. Further more the operating system is totally free and you should not experience any sluggish...
Words: 266 - Pages: 2
...with a Subnet Mask of 255.255.255.0. This gives you 254 hosts per subnet which accommodates for your 50% growth over the next 2 years. For the time being you could use this one subnet and add another down the road if needed. If we add a second subnet down the road, and we are using DHCP, we would also setup a DHCP Relay Agent to relay the DHCP Broadcast messages across both subnets. Should IP addresses be dynamically or statically assigned? While you are setting this up, you can statically assign IP addresses for your servers, routers, firewalls, and printers. The rest of the computers and laptops should be setup to use dynamic IP addresses from DHCP. It should be standard security to have a firewall installed for your network to protect company information. You would have a router setup at access the internet for business purposes. If DHCP is used, should a router, firewall, or Windows Server be utilized and why? I would definitely setup a DHCP server to centrally manage your IP address pool. DHCP gives you a centralized administration point for dynamic IP...
Words: 260 - Pages: 2
...and devices is visible to other network computers File printer and sharing – files and printers that I have shared from this computer can be accessed by people on the network Public folder sharing – When it’s on, people on the network including homegroup members, can access files in the public folder Media streaming – When on, people and devices can access pictures, music, and videos on this computer File sharing connections – Windows 7 uses 128-bit encryption to help protect file sharing connections. Some devices don’t support 128-bit encryption and must use 40- or 56-bit encryption. Lab03_worksheet Table 3-2 TCP/IP setting – Enabled IPv4 address – 10.26.108.143 Subnet mask – 255.255.252.0 Default gateway – 10.26.110.1 DNS servers – 10.26.110.11, 192.168.110.13, 192.168.110.10 Exercise 3.5 IP Address | Subnet mask | Network address | Host address | CIDR | 192.168.1.1 | 255.255.255.0 | 192.168.1.0 | .1 | /24 | 10.1.1.1 | 255.0.0.0 | 10.1.1.1 | .1.1.1 | /8 | 172.16.1.1 | 255.255.0.0 | 172.16.1.1 | .1.1 | /16 | 192.168.1.35 | 255.255.255.224 | 192.168.1.35 | .3 | /24 | 10.10.1.5 | 255.255.0.0 | 10.10.1.5 | .1.5 | /8 | 172.18.5.6 | 255.255.255.0 | 172.18.5.6 | .6 | /16 | 11.25.5.1 | 255.255.192.0 | 11.25.5.1 | .1.1 | /8 | 74.12.3.1 | 255.0.0.0 | 74.0.0.0 | .12.3.1 | /8 | 195.167.5.4 | 255.255.224.0 | 195.167.0.0 | .5.4 | /24 | 172.19.5.4 | 255.0.0.0 | 172.0.0.0 | 19.5.4 | /16 | 192.168.7.2 | 255.255.0.0 | 192.168.0.0 | .7.2 | /24 | 195.167...
Words: 385 - Pages: 2
...For the 5 workstations at the main office I would like to run Windows 7 Enterprise. Enterprise would not be as cost effective as some of the other options but being that this is the main office and the server is onsite it would be a more secure. Commercial servers, workstations, and other high-end PCs may have more than one physical processor. Windows 7 Enterprise allows for two physical processors, providing the best performance on these computers. Windows 7 Starter, Home Basic, and Home Premium will recognize only one physical processor. This should also speed up the sluggish issue between the computers at the warehouse when trying to access the server files. Also windows 7 ultimate works well with Microsoft office products and other business related programs. For the 3 workstations at the warehouse I would use Windows 7 Professional. . Windows 7 Professional has some good features that work well with business. Windows 7 Professional allows for backup and restore on networks in addition to having file system encryption through EFS. Not to mention the easy connect feature that Windows 7 Professional has, your help-desk, with your permission, can remotely connect to your windows 7 pc to fix Home Group problems. Windows 7 Professional is also has location aware printing that can automatically switch your laptop from your home printer to the office for those employees that travel between the Main office and the Warehouse. Not to mention that Windows 7 Professional...
Words: 379 - Pages: 2
...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...
Words: 1834 - Pages: 8
...currently has 20 Windows peer to peer client computers I would like for you to consider moving towards the client server network modelOnce a peer-to-peer network grows beyond 10 computers, it will likely begin to suffer from performance and from administrative problems (Posey, 2000) In the client server network model network hosts have specific roles which are assigned to them. There are certain host that are assigned as servers, which will provide network resources to the workstations. Unlike the current peer to peer model that is supported in your organization today in which everyone workstation has the same or similar operating systems. There are several benefits for your organization to consider to transitioning to client server network model. One of the major benefits of the client server network model is scalability. Since we know the potential for this organization to double in size over the next two years scalability is a key factor. It’s very easy to expand the size of your network with client server model because it will be easy to just add on workstation. Everything is centralized to the server. This server will be the centralized platform for all the workstations. Another major benefit of this client server model is increased security. This server will provide security that Ocper, Inc. current peer to peer model lacks. This server is responsible for the security surrounding the shared resource. In the client server environment you can set the appropriate...
Words: 719 - Pages: 3
...application architecture describes the layout of the application deployment, generally includes partitioned application logic and deployment to application server engines (Gartner, 2013). The application architecture can be tailored to any business. Riordan Manufacturing must define objectives prior to choosing and designing their system. Once the objectives have been identify then the design process can start. With the equipment needs, implementation requirements, and workflow clearly understood these are describe in more detail in order to design the appropriate system. The designing itself is accomplished after many interviews in order to capture the real needs, by using flowcharts, scale models, and even some process simulation software (Dennis, Wixom, & Ruth, 2012). A client server architecture services would be beneficial for Riordan being that this nonfunctional requirement could have more benefits than a server based or client server. There are four major benefits in a client server; scalability, adaptable support, reliable networking and separation of logic: a) Scalability adjusts storage and processing within the server b) Adaptable support is the ability to support different client and servers. The server can also separate logic’s without changing any other data. c) Reliable networking allows the server to maintain the network in case of any errors or application crashes d) Separation of logic facilitates reasoning (Dennis, Wixom, & Ruth, 2012) ...
Words: 797 - Pages: 4
...The World Wide Web provides a new paradigm in computer networking for human communication, which had an impact on the delivery of information and continues to stand in rapid developments. The word Web Technology represents a discontinuity in the way applications are connected. Using the Web Technology as the basis for an application brings substantial advantages to the adopter. This report focuses on 2-tier architecture and mainly on the 3-tier architecture, which is the present web technology. This report will also review the client-side scripting and the server-side scripting. TABLE OF CONTENTS EXECUTIVE SUMMARY 2 1. Introduction 3 2. Need for technology 4 3. Terminology 5 4. 2-Tier Architecture 5 5. 3-Tier Architecture 7 6. Client Server Architecture 10 7. Conclusion 12 REFERENCES 13 1. INTRODUCTION Web sites have quickly evolved from simple, static pages to complex Web applications performing critical operations for many businesses. These applications involve dynamic data from multiple sources; ever changing and various features for e-commerce, personalization and many more. At the same time, customers and internal users have understandably come to expect and demand more and more sophistication in the Web-based applications they use every day. The result? Web application solution providers — and their client companies — face several new challenges. They must meet or exceed...
Words: 2397 - Pages: 10
...What's the difference between client/server and peer-to-peer networks? There’s quite a bit, although most of the differences are in two areas – security and cost. Beyond that, your consideration for what you need is largely dependent on budget and the size of your organization. So, what’s the difference? A peer-to-peer network has no central server. Every workstation on the network shares files equally with everyone else on the network. This also means there is no authentication of users and no central storage. This model is considered a decentralized form of networking. Conversely, the client/server network provides a central pool of data and resources, with user profiles established with localized restriction on which data can be accessed. This model is commonly referred to as a centralized form of networking. Both are good! There’s an old saying, ‘wisdom is what works’. Well, the same is true for your network. Peer-to-peer networks are great for use in homes or in small businesses where employees interact regularly and share all information and files. They don’t cost much to setup, nor are they difficult to manage. The downside is there’s almost no security (pretty much controlled at an individual ‘share’ level). Once you get more than 8-10 workstations connected, there would likely be an impact to performance and management since each station functions as both client and server at the same time. As each employee manages the sharing of their workstation...
Words: 452 - Pages: 2
...Peer-to-Peer and Client/Server Networks Darsheen Smith Strayer University Peer-to-Peer and Client/Server Networks A network is a group of computers and other devices, such as a printer, that are connected by some type of transmission media (i.e. fiber optic cables or radio waves) (Dean, 2010, p.2). Originally “sneakernet” was the only means of electronic source sharing. It involved the transfer of electronic information by physically couriering removable media, such as floppy disks, from one computer to the next (Wikipedia, 2011, para 1). With the advancement of computer technology so is the modernization of computer networking. Analysis There are two types of networks, peer-to-peer and client/server networks. Both have the capability to communicate with other computers on the network. They also have the capability to protect files from unauthorized users. There are also distinct differences between the two types of networks. In a peer-to-peer network every computer can communicate directly with every other computer. No computer has more authority than another. A Typical peer-to-peer network consists of two or more personal computers (Dean, 2010, p.3). In contrast, a client/server network consists of a central computer, called a server, which is designed to permit communication and information sharing between computers, known as clients, on the network. The clients do not share their resources directly with each other...
Words: 642 - Pages: 3
...Architectures: Peer-to-Peer, Client/Server, and Web-based 3 Part 2: Propose One Architecture in Detail 4 Part 3: Examine and Explain the Role of Protocols for Your Proposed Architecture 5 Part 4: Explain and Detail the Supporting Infrastructure for the Proposed Architecture 6 References 7 Part 1: Examine the Three Architectures: Peer-to-Peer, Client/Server, and Web-based A peer-to-peer network (P2P) is a network where all computers, workstations, and/or terminals are treated equally, i.e. the permissions and access is leveled across the board, and any one of the computers in the network can become the host (Englander, 2014). A way I worked this into my life was, while deployed, I set up a network where all computers connected to that network could share information and files as needed, so long as they were given access to the network in the first place. It was a small group, about 8 points of connection, using TCP/IP to communicate between the terminals, and was effective, however, I think we would have experienced some ‘bogging down’ of the network if we increased the number of people that had access to it. Because of the innate security risk that P2P networks exhibit, no sensitive information was permitted to be stored or shared on this network for any reason. Client-server architecture is application based being installed a user’s computer or workstation (i.e. the ‘client’) and through that can make requests from the server, and save back to the server as needed. In this...
Words: 1094 - Pages: 5
...1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component. You'd want a client-server environment using Active Directory possibly with a file server. A. Server to handle logon/authentication. Most likely Windows Server, with Active Directory. B. File server; a computer attached to a network that has the primary purpose of providing a location for shared disk access C. The administrator will create security groups based on departments. D. The administrator will create a Shared Drive directory structure where EACH folder represents a department: This way as you add your 5 more employees, you simply add them to the necessary security group which automatically grants them access to the corresponding shared drive. 2. You are the network administrator for a company that has a peer-to-peer network. How would the pieces and components of this network relate to each other? Define all the components of this type of network. In general, office and home P2P networks operate over Ethernet and employ a hub-and-spoke topology. Category 6e copper wire runs among the PCs and an Ethernet hub or switch, enabling users of those networked PCs access to one another's...
Words: 530 - Pages: 3