...Unit 2 Assignment Michael Grube Kaplan University Online IT332 Principles of Information Systems Architecture Professor Denver Martin May 27, 2016 Table of Contents Part 1: Examine the Three Architectures: Peer-to-Peer, Client/Server, and Web-based 3 Part 2: Propose One Architecture in Detail 4 Part 3: Examine and Explain the Role of Protocols for Your Proposed Architecture 5 Part 4: Explain and Detail the Supporting Infrastructure for the Proposed Architecture 6 References 7 Part 1: Examine the Three Architectures: Peer-to-Peer, Client/Server, and Web-based A peer-to-peer network (P2P) is a network where all computers, workstations, and/or terminals are treated equally, i.e. the permissions and access is leveled across the board, and any one of the computers in the network can become the host (Englander, 2014). A way I worked this into my life was, while deployed, I set up a network where all computers connected to that network could share information and files as needed, so long as they were given access to the network in the first place. It was a small group, about 8 points of connection, using TCP/IP to communicate between the terminals, and was effective, however, I think we would have experienced some ‘bogging down’ of the network if we increased the number of people that had access to it. Because of the innate security risk that P2P networks exhibit, no sensitive information was permitted to be stored or shared on this network for any...
Words: 1094 - Pages: 5
...Running head: Computer Systems Architectures Computer Systems Architectures Kaplan University Abstract Computer architecture is a set of rules that say how software and hardware interact to create a network or platform. In other words computer architecture is the design of the network base on the needs of the user, the system if it is there or needs to be built, and the technology that needs to go into the project. System design is all how all the hardware is set up while the instruction set architecture is the program language. Table of Contents Introduction What OS file system should we use? What types of processors? Cluster Architecture? Data Backup LAN or WAN Web-based diagram Introduction to Coast to Coast computing We can get in a plane and be across the country in a few hours but what if we need to work together faster than a few hours? Is it possible? How hard is it to have users in California work with users in Washington, New York, and Florida? What has to be done to make this happen? How secure will it be to have such a network? This and many other questions come up when a company starts thinking of expansion beyond the building or city they headquartered at. When looking at a network a business wants to be sure it is using the most cost effective form for the network. The base of a network is the architecture. For small businesses a peer to peer architecture would be best. There are three types of peer-to-peer architecture: collaborative computing...
Words: 1513 - Pages: 7
...Unit 8A Charles Burchess Kaplan University IT332 Principles of Information Systems January 10, 2014 Unit 8A Backing up user data is vital to the company. To do this a backup server would be the way to go. There are several ways to do this one would be to install a NAS or use a Server to make sure the data is backed up. A NAS unit is a computer connected to a network that provides only file-based data storage services to other devices on the network. Although it may technically be possible to run other software on a NAS unit, it is not designed to be a general purpose server. For example, NAS units usually do not have a keyboard or display, and are controlled and configured over the network, often using a browser. A full-featured operating system is not needed on a NAS device, so often a stripped-down operating system is used. For example, FreeNAS, an open source NAS solution designed for commodity PC hardware, is implemented as a stripped-down version of FreeBSD. NAS systems contain one or more hard drives, often arranged into logical, redundant storage containers or RAID. NAS uses file-based protocols such as NFS, SMB/CIFS, AFP, or NCP. NAS units rarely limit clients to a single protocol. NAS is useful for more than just general centralized storage provided to client computers in environments with large amounts of data. NAS can enable simpler and lower cost systems such as load-balancing and fault-tolerant email and web server systems by providing...
Words: 1319 - Pages: 6