preview

Nt1330 Unit 3 Assignment 1 Windows Server 2008

Decent Essays

Software
• Windows server 2008:
These are the functions that consider when using the win server 2008;
1. Presence of read-only domain controller.
2. Presence of bit locker a full drive encryption.
3. Easy maintainable server manager which provides useful UI for the user.
4. Network access protection which allows implementing security policies.

• Client O/S:
Windows 7, 8, 8.1 64bits. These types of an operating system have good performance and new features. These are the latest operating systems and same familiar OS should be used. These OS will be used in every client PC’s in the department.

• Virus Guard:
Kaspersky Anti-Virus 2016 for each PC’s and the servers. This virus program is a looking good performing and fighting with the …show more content…

• Break broadcasting domain.
• Access controlling.

Cables:
This created physical connection between PC’s and the network line. Connected data’s are transporting data’s through the network. Cable is a medium through which information usually moves to one network to another network.
We can use one of the following cables in our network;
• Unshielded Twisted Pair (UTP) Cable.
• Shielded Twisted Pair (STP) Cable.
• Coaxial Cable.
• Fiber Optic Cable.
• Cable Installation Guides.
• Wireless LANs.
UPS:
UPS is a main device that allows any computers to keep till the last time when the power source is down. This will keep as a power backup to the end of the power gets down. Its looks as a …show more content…

The NIC is an adapter that controls the exchange of information between the network and the user. In this company branches NIC’s are increasingly preinstalled and have the ability to automatically configure to match the speed of the network to which they are connected.

Firewall
A firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. It may be a hardware device or a software program running on a secure host computer. It must have at least two network interfaces, one of the network it is intended to protect, and one for the network it exposed

Get Access