.

Wednesday, February 27, 2013

Construct A Network From Given Components

Task A – Construct a ne devilrk from given over components

A hardware visit was taken was taken of two stand alone machines. Prior to size up, a visual critique showed that two machines were already able to function as they were both switched on and had booted into a Windows OS. The power and video cables were firm attached, and each machine had its own mouse and keyboard. Both machines had interconnected net income ports and cables were attached from the workstations to an 8 port network hub. whiz machine had a USB wireless network stick connected. This was outside to prevent IP Conflict for this exercise. Both machines were rebooted to give as clear an audit as possible. See attached audit reports.

The two standalone machines were placed on a desk capable of withstanding the exercising weight of three computers with respective monitors and peripherals. The software installed on the machines already was considered ample to perform the tasks required for the assignment.

An area between the workstations was cleared where the horde machine would be set up.

System installation plan

1. visual check of workstation computers and peripherals in case of potential safety or functional problem
2. Remove all unnecessary peripherals to prevent conflicts
3. SIW audit the workstations.
4. Visual check of innkeeper hardware
5.

Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.

Review current server install.
6. If Operating Systems installed on any of the three provided machines are low to complete task, install an OS that will enable end of the task.
7. Connect network hardware together and check that raw material network functions.
8. Install DHCP on server and configure network to pre-agreed network structure
9. Ensure all machines can communicate with advanced IP configuration
10. If not already set up, install antivirus software.
11. desexualise up user accounts on the server for user1 and user2
12. Configure maintenance routines for access policies and passwords
13. Create home...If you want to get a dependable essay, order it on our website: Orderessay



If you want to get a full essay, wisit our page: write my essay .

No comments:

Post a Comment