100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
BTEC Level 3 IT - Unit 9 - Assignment 2(P3,P4,P6,M2,M3,D1) - Design a Network for a Buisness, Make a network secure... £6.99   Add to cart

Essay

BTEC Level 3 IT - Unit 9 - Assignment 2(P3,P4,P6,M2,M3,D1) - Design a Network for a Buisness, Make a network secure...

5 reviews
 1989 views  10 purchases

BTEC Level 3 IT Unit 9 - Computer Networks Criteria: P3, P4, P6, M2, M3, D1 Assignment 2 - Goes into a lot of detail and all criteria were met first time

Preview 2 out of 12  pages

  • October 31, 2019
  • 12
  • 2017/2018
  • Essay
  • Unknown
  • Unknown
book image

Book Title:

Author(s):

  • Edition:
  • ISBN:
  • Edition:
All documents for this subject (22)

5  reviews

review-writer-avatar

By: mujibharris • 1 year ago

review-writer-avatar

By: mackenzieswales • 3 year ago

review-writer-avatar

By: richardochei • 3 year ago

review-writer-avatar

By: gazryankins • 4 year ago

review-writer-avatar

By: Wafi176 • 4 year ago

avatar-seller
Boyan67
Assignment 2 – Computer Networks
Contents
1. Annotated Screenshot.............................................................................................................................2
2. How the network has met all the requirements?....................................................................................3
3. All of the key components I have used....................................................................................................4
Separate Rooms.......................................................................................................................................4
Computers...............................................................................................................................................4
Phones.....................................................................................................................................................5
Switches...................................................................................................................................................5
Servers and Firewalls...............................................................................................................................5
Router......................................................................................................................................................5
Wireless Access Point..............................................................................................................................5
4. The functions of each of the three interconnection devices....................................................................6
Router......................................................................................................................................................6
Switch......................................................................................................................................................6
Wireless Access Point..............................................................................................................................6
5. How I have ensured the network is secure..............................................................................................7
Firewalls...................................................................................................................................................7
Locked Rooms..........................................................................................................................................7
Antivirus...................................................................................................................................................7
6. Business risks of insecure networks and how they can be minimized.....................................................8
Loss of service..........................................................................................................................................8
Data Confidentiality.................................................................................................................................8
Loss of Business or Income......................................................................................................................8
Legal and Financial Issues........................................................................................................................9
Malware Attacks......................................................................................................................................9
How to prevent these issues?..................................................................................................................9
Justification of design and choice of components.....................................................................................10




YONKOV, BOYAN 1

, 1. Annotated Screenshot
This is the administrator office in
This is the administrator Office 1-2. It has two computers This is Office 1-3. Where the
manager’s office in the Office 1- and two phones for the two service manager is and it has
1. It is on the first floor and has administrators. They all connect computer and a phone. That
a phone and a Pc connected to to the switch which is in the connect to the switch on the
the switch on the first floor same room. first floor.



This is the server
room where the
firewalls, antivirus
server and data
server are held.




This is the Main
Here is the
Reception Area. It
Conference Room
consists of two
and it has a printer,
computers and two
access point and a
phones that are
wireless device to
connected to the
demonstrate the
ground floor switch
connection




This is Office 0-1 the hotel manager
This is Office 0-2. This is where
office. It consists of a computer and a
the catering manager is and he
phone that connect to the ground
has a computer and a phone.
floor switch.
The switch and the router are
also placed in this room because
it is centralized. The room also
has a printer.




YONKOV, BOYAN 2

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Boyan67. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £6.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83637 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£6.99  10x  sold
  • (5)
  Add to cart