Free Essay

Infrastructure Assignment - 4

In:

Submitted By amh05klm98
Words 2038
Pages 9
1. Compare and contrast at least five technologies that are readily available for in-home internet access. You should consider practical as well as technical differences in your comparison. Do not include Frame Relay or ATM as these are primarily larger scale business solutions.
802.11N Higher-speed standards up to 300+ Mbps 802.11n uses (MIMO) technology and a wider radio frequency channel. It provides a mechanism called frame aggregation to decrease time between transmissions Channels operating at 40 MHz are another feature incorporated into 802.11n The transmitter and receiver use pre-coding & post-coding techniques to achieve the capacity of a MIMO link
Video Conferencing A video conference is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously ITU H.320 is known as the standard for video conferencing over integrated services digital networks H.264 SVC is compression standard that enables video conferencing systems to achieve highly error resilient The components within a Conferencing System layers: User Interface, Conference Control, Control or Signal Plane and Media Plane The RTP and UDP normally carry information such the payload type which is the type of codec, frame rate, video size and many others
Browser A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web. Web browser is a client program that uses HTTP to make requests of Web servers throughout the Internet on behalf of the browser user Web browsers use many other protocols like HTTPS, asp, java script, VB script to display and run script in web page Browsers include additional components to support e-mail, Usenet news, and Internet Relay Chat (IRC) There are many web browsers are available like Internet explorer, chrome, Firefox and safari
VoIP VoIP (Voice over Internet Protocol) is simply the transmission of voice traffic over IP-based networks VoIP has become popular largely because of the cost advantages to consumers over traditional telephone networks In the VoIP world, codec’s are used to encode voice for transmission across IP networks There are many codec’s are used in VoIP like ITU G.711 ITU G.722 ITU G.723 ITU G.726 ITU G.727 G.728

There are many Internet telephony applications available. Like CoolTalk and NetMeeting & Google voice
Bit Torrent BitTorrent is a content distribution protocol that enables efficient software distribution and peer-to-peer sharing of very large files To share a file or group of files, a peer first creates a small file called a "torrent" This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution BitTorrent makes many small data requests over different TCP connections to different machines, while classic downloading is typically made via a single TCP connection to a single machine. distributed nature of BitTorrent leads to a flood like spreading of a file throughout peers. As more peers join the swarm, the likelihood of a successful download increases The peer creates a hash for each piece, using the SHA-1 hash function, and records it in the torrent file

2. Explain the similarities and differences between Frame Relay and Asynchronous Transfer Mode.
 ATM and frame relay are two of the most common used methods for telecommunications between networks today. ATM, which stands for Asynchronous Transfer Mode, is a technology that arose from international standards relating to the transmission of data, voice, and video simultaneously over a network at speeds far faster than has been possible without the standards. ATM is also known for transporting communications at hundreds of megabits per second, which results in speedier service than Ethernet on local area networks. ATM has also ascended into being a standard for fixed-length cell switching. Cells that originate from various sources or from various destinations are asynchronously multiplexed between multiple packet switches. The Virtual Path Identifier (VPI) and Virtual Circuit Identifier (VCI) are the unique integer fields that identify each circuit on each link of the network.
Frame Relay implements no error or flow control. The simplified handling of frames leads to reduced latency, and measures taken to avoid frame build-up at intermediate switches help reduce jitter. Frame Relay offers data rates up to 4 Mb/s, with some providers offering even higher rates. Frame Relay VCs are uniquely identified by a DLCI, which ensures bidirectional communication from one DTE device to another. Most Frame Relay connections are PVCs rather than SVCs.
Frame Relay provides permanent, shared, medium-bandwidth connectivity that carries both voice and data traffic. Frame Relay is ideal for connecting enterprise LANs. The router on the LAN needs only a single interface, even when multiple VCs are used.

The difference, first, frame relay uses variable packet sizes. The packet size varies, depending on the amount of data that is being sent. ATM uses a fixed packet size, which is the 53 byte cell that was depicted earlier. Next, frame relay, while although is useful to connect different local area networks, it cannot actually work within one. ATM cannot only work within a local area network, but they can also work within a wide area network. Third, frame relay is easy and inexpensive to install, and is readily supported in software. For a lot of users, it simply means a software upgrade on existing equipment, which minimizes network investment. ATM more often requires a more complex installation, and is not readily supported in some software. Also, while frame relay does have a varied packet size, it is the variance that can often mean a low overhead within the packet, which makes it a more efficient method for transmitting data. ATM’s fixed packet size, while optimized for handling multimedia traffic at high speeds, can sometimes leave a lot of overhead within the packet, especially in short transactions, where cells are often not full. - [1] [2]
3. Technological advances are only one of many factors that play into how technology infrastructure develops. The social decision to break-up AT&T had a significant impact on the telephone infrastructure. Describe how the infrastructure changed due to this event.
 AT&T's voluntary breakup marks the end of the bigger-is-better era. For much of the 20th century, business strategy was relatively simple - scale up operations and expand market share. The greatest opportunities lay in providing standardized products, with incremental improvements, to a middle-class market. But the simple pursuit of scale and market share lost its effectiveness as the 20th century ended. Another prime example of this is what is happening to Microsoft. Even though they have different legal problems, their days of gobbling up any and all businesses that got in their way is over. Smaller firms - particularly those with innovative, customer-centric business designs became the most profitable. This is evident with the popularity of the dot.com's and how well they are doing in the market.
Shortly after announcing on October 25th that AT&T was going to split into four units, Michael Armstrong, the company's chairman, was asked in an interview if anything good would be lost as a result of the overhaul. He considered the question for at least 10 seconds, and then responded, "I can't think of anything." But in fact, AT&T may be losing something that if not necessarily good, has been a powerful force in its favour for more than 100 years: the fear that its size and power has inspired in competitors. This will hopefully weaken the level of competition that AT&T has faced in the past. The AT&T-brand companies that remain after the breakup plan is completed by 2002 will be smaller than the AT&T the communications the world has known. And the competitive landscape will change accordingly. The local phone companies, already formidable in wireless and eager to expand into long distance while continuing to roll out high-speed Internet services, will be countering AT&T region-by-region and business-by-business.
On January 30, 2005, AT&T agreed to be sold to an RBOC, Southwestern Bell (which had bought Pacific Bell earlier). This acquisition was finalized in October, 2005. Then SBC assumed the name "AT&T" and introduce a new logo. The new AT&T then absorbed Bellsouth.
It is interesting to note the political change since 1997, when Reed Hundt, then the FCC chairman, said South western Bell acquiring AT&T would be "unthinkable" since it would thwart competition. Since that time, SBC purchased AT&T, Verizon purchased MCI, Sprint purchased Nextel, and the new AT&T purchased Bellsouth. – [3] [4]
4. For the network that you have chosen to characterize, identify the connection to the internet WAN. Identify the media, devices, and service providers involved in establishing this connection. Describe what protocols/services are being implemented over this connection. In addition, describe at least one alternative ISP service available for this network.
 The home network that is chosen to characterize has DSL internet connection technology, In DSL internet connection it has many flavours and for home use my home network is ADSL internet connection. Asymmetric Digital Subscriber Line (ADSL) is one form of the Digital Subscriber Line technology, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voice band modem can provide. It does this by utilizing frequencies that are not used by a voice telephone call. A splitter, or DSL filter, allows a single telephone connection to be used for both ADSL service and voice calls at the same time. ADSL can generally only be distributed over short distances from the central office, typically less than 4 kilometres (2 mi) but has been known to exceed 8 kilometres (5 mi) if the originally laid wire gauge allows for farther distribution.
At the telephone exchange the line generally terminates at a Digital Subscriber Line Access Multiplexer (DSLAM) where another frequency splitter separates the voice band signal for the conventional phone network. Data carried by the ADSL are typically routed over the telephone company's data network and eventually reach a conventional Internet Protocol network.
Currently, most ADSL communication is full-duplex. Full-duplex ADSL communication is usually achieved on a wire pair by either frequency-division duplex (FDD), echo-cancelling duplex (ECD), or time-division duplex (TDD). FDD uses two separate frequency bands, referred to as the upstream and downstream bands. The upstream band is used for communication from the end user to the telephone central office. The downstream band is used for communicating from the central office to the end user. – [5] [6]
ITU-T Spec Description
G.998.1 ATM-based multi-pair bonding: A method for bonding of multiple DSL lines to transport an ATM payload beyond the rate/reach capability of a single DSL loop. This protocol allows the bonding of 2 to 32 pairs and supports dynamic removal and restoration of pairs without human intervention.
G.998.2 Ethernet-based multi-pair bonding: Provides a method for bonding of multiple DSL lines for Ethernet transport. This recommendation builds on the IEEE 802.3ah-2004 methods and extends Ethernet transport over other xDSL technologies, including ADSL.
G.998.3 Multi-pair bonding using time-division inverse multiplexing: Details a method for bonding DSL lines using time-division inverse multiplexing (TDIM). This recommendation uses IEEE 802.3ah handshake for pair discovery, parameter negotiation, and setup. It also allows the hitless addition and removal of pairs an the fast removal of a pair upon pair failure.
There many other ISP’s in telecommunication industry who provide DSL Internet connections mainly as,
[i] Verizon high speed internet - http://www22.verizon.com/Residential/HighSpeedInternet#plans
[ii] Qwest DSL - http://www.qwest.com/residential/internet/broadbandlanding/
References:
1. http://www.exampleessays.com/viewpaper/93331.html
2. http://itknowledgeexchange.techtarget.com/itanswers/what-is-the-difference-between-atm-and-frame-relay-networks/
3. http://www.directessays.com/viewpaper/43194.html
4. http://som.csudh.edu/cis/lpress/471/hout/telecomhistory/
5. http://webopedia.internet.com/TERM/A/ADSL.html
6. http://en.wikipedia.org/wiki/Asymmetric_Digital_Subscriber_Line
7. http://www22.verizon.com/Residential/HighSpeedInternet#plans
8. http://www.qwest.com/residential/internet/broadbandlanding/

Similar Documents

Premium Essay

Project Deliverable 5 Infrastructure and Security

...Project Deliverable 5: Infrastructure and Security This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment. The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally...

Words: 724 - Pages: 3

Premium Essay

Hw3 Case Study for Undergrad Computing

...Chocolate CompanyThis assignment is due for online students by midnight on Sunday of Week 3 and for on-ground students before Week 4’s class meeting. Submit your assignment to the course shell.Read the Harriet’s Fruit and Chocolate Company case study found in Chapter 2 of the textbook. Then, answer the questions below. Each response should be one (1) paragraph in length submitted in MS Word and the submission is not to exceed two (2) pages.Write a one to two (1-2) page paper that addresses: * What investigation will you do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building? * Make a list of business goals for Harriet’s Fruit and Chocolate Company. What are some constraints that will affect these goals? * Make a list of technical goals for Harriet’s Fruit and Chocolate Company. What tradeoffs might you need to make to meet these goals? * Will a wireless solution support the low delay that will be needed to meet the needs of the applications? Defend your answer. * What security concerns should you bring up as you design the network upgrade?The format of the paper is to be as follows: * Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format. * Type the question followed by your answer to the question. * In addition to the one to two (1-2) pages required, a title page is to be included. The title page is to contain the title of the assignment, your name, the...

Words: 1387 - Pages: 6

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18

Premium Essay

Networks 621

...DIPLOMA IN INFORMATION TECHNOLOGY (2 YEAR) NETWORKS 621 1ST SEMESTER ASSIGNMENT Name & Surname: ____________________________________________ ICAS No: _________________ Qualification: ______________________ Semester: _____ Module Name: __________________________ Date Submitted: ___________ ASSESSMENT CRITERIA QUESTION ONE QUESTION TWO GENERIC TO BOTH QUESTIONS LAYOUT AND SPELLING Font – Calibri 12 Line Spacing – 1.0 Margin should be justified. REFERENCE According to the Harvard Method TOTAL MARK ALLOCATION 35 30 15 5 EXAMINER MARKS MODERATOR MARKS 10 80 Examiner’s Comments: Moderator’s Comments: Signature of Examiner: Signature of Moderator: The purpose of an assignment is to ensure that the Learner is able to:      Use methods of enquiry and research in a disciplined field. Interpret and evaluate text. Have a sound understanding of key principles and theories, rules and awareness. Solve unfamiliar problems using correct procedures as well as investigate and critically analyse information and report thereof. Present and communicate information reliably and coherently. Page 1 of 4 Instructions and guidelines for writing assignments 1. Use the correct cover page provided by the institution. 2. All essay type assignments must include the following: 2.1 Table of contents 2.2 Introduction 2.3 Main body with subheadings 2.4 Conclusions and recommendations 2.5 Bibliography 3. The length of the entire assignment must have minimum of 5 pages. Preferably typed with font size 12...

Words: 777 - Pages: 4

Premium Essay

Ntc 360 Complete Class

...this visit here: http://www.activitymode.com/product/ntc-360-complete-class/ Contact us at: SUPPORT@ACTIVITYMODE.COM NTC 360 COMPETE CLASS 1. NTC-360 ADVANTAGE OF DIFFERENT SECURITY APPROACHES 2. NTC-360 ASSIGNMENT NETWORK ARCHITECTURE 3. NTC-360 ASSIGNMENT NETWORK PROTOCOLS 4. NTC-360 CURRENT TELEPHONE SYSTEMS OF HUFFMAN TRUCKING 5. NTC-360 HUFFMAN TRUCKING COMPANY SECURITY RECOMMENDATIONS 6. NTC-360 NETWORK OUTLINE 7. NTC-360 NETWORKING CHANGES 8. NTC-360 RIORDAN MANUFACTURING 9. NTC-360 SECURITY DISADVANTAGES 10. NTC-360 Team Assignment Riordan Manufacturing - Rough Draft 11. NTC-360 Team B Service Request SR-rm-017 paper 12. NTC-360 WEEK 1 DQ 1 13. NTC-360 WEEK 1 DQ 2 14. NTC-360 Week 2 Assignment Telecommunications 15. NTC-360 WEEK 2 DQ 1 16. NTC-360 WEEK 2 DQ 2 17. NTC-360 Week 2 Learning Team Assignment Network Topologies 18. NTC-360 Week 2 Team Paper - Network Protocols The Case of Huffman Trucking 19. NTC-360 WEEK 3 DQ 1 20. NTC-360 WEEK 3 DQ 2 21. NTC-360 week 3 individual part 1 22. NTC-360 week 3 individual part 2 23. NTC-360 Week 3 Team Assignment - Network Topologies 24. NTC-360 WEEK 4 DQ 1 25. NTC-360 WEEK 4 DQ 2 26. NTC-360 WEEK 5 DQ 1 27. NTC-360 WEEK 5 DQ 2 28. NTC-360 Week 5 Team Assignment Network Infrastructure Upgrading and the Case of Huffman Trucking 29. Activity Mode aims to provide quality study notes and tutorials to the students of NTC 360 COMPLETE CLASS in order to ace their studies. NTC 360 COMPLETE CLASS To purchase...

Words: 817 - Pages: 4

Premium Essay

Cis 462 Case Study 2: Scada Worm

... Email us At: Support@homeworklance.com or lancehomework@gmail.com Case Study 2: SCADA Worm Due Week 6 and worth 100 points Protecting the nation’s critical infrastructure is a major security challenge within the U.S. Likewise, the responsibility for protecting the nation’s critical infrastructure encompasses all sectors of government, including private sector cooperation. Search on the Internet for information on the SCADA Worm, such as the article located at http://www.theregister.co.uk/2010/09/22/stuxnet_worm_weapon/. Write a three to five (3-5) page paper in which you: 1. Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States. 2. Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains. 3. Assess the levels of responsibility between government agencies and the private sector for mitigating threats and vulnerabilities to our critical infrastructure. 4. Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate and attack similar to the SCADA / Stuxnet Worm. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references...

Words: 425 - Pages: 2

Free Essay

Cmgt 445 Syllabus

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |CMGT/445 Version 4 | | |Application Implementation | Copyright © 2012, 2009, 2008, 2006 by University of Phoenix. All rights reserved. Course Description This course will cover the process and issues associated with the implementation of a computer application information system. Topics will include the processes associated with sponsor and stakeholder approvals, end user training, technical staff training, conversion from existing application(s) and integration into the information system production environment. This course will also examine the use of development and testing environments and the testing procedures related to the implementation of a computer application information system. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view...

Words: 2145 - Pages: 9

Premium Essay

Nt2580 Week 1

...Class Plan Time Duration: This Class Period will be approximately 4 ¾ Hours in length. It will be divided 2 ¾ hours for Theory and 2 ½ hours for Lab. Content Covered: • Textbook o Chapter 1 - Information Systems Security Objectives: After completing this unit, the student should be able to: • Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts: ▪ Confidentiality, integrity, and availability (CIA) concepts ▪ Layered security solutions implemented for the seven domains of a typical IT infrastructure ▪ Common threats for each of the seven domains ▪ IT security policy framework ▪ Impact of data classification standard on the seven domains Materials: Week 1 PowerPoint Presentation Assignment Overview: Refer to Assignment 1: Match Risks/Threats to Solutions in the Graded Assignment Requirements section of this instructor guide. In this assignment, the students need to match common risks or threats within the seven domains of a typical IT infrastructure with the possible solutions or preventative actions. Use the hand out worksheet NT2580.U1.WS1.doc. Refer to Assignment 2: Impact of a Data Classification Standard, you must write a brief report on how the "Internal Use Only" data classification standard impacts the seven domains of the investment firm's IT infrastructure. Refer to Project Part 1. Multi-Layered Security Plan in the Project...

Words: 530 - Pages: 3

Premium Essay

Ntc 360 Compete Class

...SUPPORT@WISEAMERICAN.US NTC 360 COMPETE CLASS 1. NTC-360 ADVANTAGE OF DIFFERENT SECURITY APPROACHES 2. NTC-360 ASSIGNMENT NETWORK ARCHITECTURE 3. NTC-360 ASSIGNMENT NETWORK PROTOCOLS 4. NTC-360 CURRENT TELEPHONE SYSTEMS OF HUFFMAN TRUCKING 5. NTC-360 HUFFMAN TRUCKING COMPANY SECURITY RECOMMENDATIONS 6. NTC-360 NETWORK OUTLINE 7. NTC-360 NETWORKING CHANGES 8. NTC-360 RIORDAN MANUFACTURING 9. NTC-360 SECURITY DISADVANTAGES 10. NTC-360 Team Assignment Riordan Manufacturing – Rough Draft 11. NTC-360 Team B Service Request SR-rm-017 paper 12. NTC-360 WEEK 1 DQ 1 13. NTC-360 WEEK 1 DQ 2 14. NTC-360 Week 2 Assignment Telecommunications 15. NTC-360 WEEK 2 DQ 1 16. NTC-360 WEEK 2 DQ 2 17. NTC-360 Week 2 Learning Team Assignment Network Topologies 18. NTC-360 Week 2 Team Paper – Network Protocols The Case of Huffman Trucking 19. NTC-360 WEEK 3 DQ 1 20. NTC-360 WEEK 3 DQ 2 21. NTC-360 week 3 individual part 1 22. NTC-360 week 3 individual part 2 23. NTC-360 Week 3 Team Assignment – Network Topologies 24. NTC-360 WEEK 4 DQ 1 25. NTC-360 WEEK 4 DQ 2 26. NTC-360 WEEK 5 DQ 1 27. NTC-360 WEEK 5 DQ 2 28. NTC-360 Week 5 Team Assignment Network Infrastructure Upgrading and the Case of Huffman Trucking NTC 360 COMPETE CLASS 1. NTC-360 ADVANTAGE OF DIFFERENT SECURITY APPROACHES 2. NTC-360 ASSIGNMENT NETWORK ARCHITECTURE 3. NTC-360 ASSIGNMENT NETWORK PROTOCOLS 4. NTC-360 CURRENT TELEPHONE SYSTEMS OF HUFFMAN TRUCKING 5. NTC-360 HUFFMAN TRUCKING COMPANY SECURITY RECOMMENDATIONS ...

Words: 471 - Pages: 2

Premium Essay

Fsmo Role Ayer Nate Method

...controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master * Domain Master Domain Controller #2 Place the domain roles on this server. * RID Master * Infrastructure Master * PDC Emulator If more domains exist in the forest, place the domain roles on a server in theese domains like Domain Controller #2 Global Catalog configuration. In Windows 2008 Active Directory all Domain Controllers are by default Global Catalog servers, personally...

Words: 10360 - Pages: 42

Free Essay

Cis 502 Critical Infrastructure Protection

...CIS 502 Critical Infrastructure Protection Click Link Below To Buy: http://hwaid.com/shop/cis-502-critical-infrastructure-protection/ Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times...

Words: 1288 - Pages: 6

Premium Essay

Informative

...Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing and Maintaining an IT Security Policy Framework 83 Unit 10: Automated Policy Compliance Systems 90 Unit 11: Course Review and Final Examination 97 Course Support Tools 101 Evaluation of Student Learning 102 STUDENT COPY 103 Graded Assignment Requirements 104 Unit 1 Discussion 1: Importance of Security Policies 105 Unit 1 Assignment 1: Security Policies Overcoming Business...

Words: 18421 - Pages: 74

Premium Essay

Reflective Diary

...RMIT School of Business Information Technology ISYS1015 ASSIGNMENT SUBMISSION SHEET Family Name: Shen Student Number : 3354450 Personal Name(s) : Helin Contact Telephone Number 0420860306 Assignment Title Student Journal Course Coordinator Barry McIntyre Date Due Date Submitted 1 SEP 2014 This statement should be completed and signed by the student(s) participating in preparation of the assignment. A. Declaration and Statement of Authorship: 1. I/we hold a copy of this assignment, which can be produced if the original is lost/ damaged. 2. This assignment is my/our original work and no part of it has been copied from any other student’s work or from any other source except where due acknowledgement is made. 3. No part of this assignment has been written for me/us by any other person except where such collaboration has been authorised by the lecturer/teacher concerned and is clearly acknowledged in the assignment. 4. I/we have not previously submitted or currently submitting this work for any other course/unit. 5. This work may be reproduced, communicated, compared and archived for the purpose of detecting plagiarism. 6. I/we give permission for a copy of my/our marked work to be retained by the School for review and comparison, including review by external examiners. I/we understand that 7. Plagiarism is the presentation of the work, idea or creation of another person as though it is your own. It is a form of cheating and is a very serious academic offence that may lead...

Words: 2502 - Pages: 11

Premium Essay

Cis 341 Technical Paper

...and establishing physical and logical access control methods that will mitigate the risks identified. 1. Firewall (1)   2. Windows 2008 Active Directory Domain  Controllers (DC) (1)  3. File Server (1)  4. Desktop computers (4) 5. Dedicated T1 Connection (1)     Write a ten to fifteen (10-15) page paper in which you: 6. Identify and analyze any potential physical vulnerabilities and threats that require consideration. 7. Identify and analyze any potential logical vulnerabilities and threats that require consideration. 8. Illustrate in writing the potential impact of all identified physical vulnerabilities and threats to the network and the pharmacy. 9. Identify all potential vulnerabilities that may exist in the documented network. 10. Illustrate in writing the potential impact of all identified logical vulnerabilities to the network and the pharmacy.  11. For each physical vulnerability and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). 12. For each logical vulnerability and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk...

Words: 520 - Pages: 3