100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

BTEC Level 3 IT - Unit 9 - Assignment 2(P3,P4,P6,M2,M3,D1) - Design a Network for a Buisness, Make a network secure...

Rating
3.4
(5)
Sold
10
Pages
12
Uploaded on
31-10-2019
Written in
2017/2018

BTEC Level 3 IT Unit 9 - Computer Networks Criteria: P3, P4, P6, M2, M3, D1 Assignment 2 - Goes into a lot of detail and all criteria were met first time

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
October 31, 2019
Number of pages
12
Written in
2017/2018
Type
Essay
Professor(s)
Unknown
Grade
Unknown

Subjects

Content preview

Assignment 2 – Computer Networks
Contents
1. Annotated Screenshot.............................................................................................................................2
2. How the network has met all the requirements?....................................................................................3
3. All of the key components I have used....................................................................................................4
Separate Rooms.......................................................................................................................................4
Computers...............................................................................................................................................4
Phones.....................................................................................................................................................5
Switches...................................................................................................................................................5
Servers and Firewalls...............................................................................................................................5
Router......................................................................................................................................................5
Wireless Access Point..............................................................................................................................5
4. The functions of each of the three interconnection devices....................................................................6
Router......................................................................................................................................................6
Switch......................................................................................................................................................6
Wireless Access Point..............................................................................................................................6
5. How I have ensured the network is secure..............................................................................................7
Firewalls...................................................................................................................................................7
Locked Rooms..........................................................................................................................................7
Antivirus...................................................................................................................................................7
6. Business risks of insecure networks and how they can be minimized.....................................................8
Loss of service..........................................................................................................................................8
Data Confidentiality.................................................................................................................................8
Loss of Business or Income......................................................................................................................8
Legal and Financial Issues........................................................................................................................9
Malware Attacks......................................................................................................................................9
How to prevent these issues?..................................................................................................................9
Justification of design and choice of components.....................................................................................10




YONKOV, BOYAN 1

, 1. Annotated Screenshot
This is the administrator office in
This is the administrator Office 1-2. It has two computers This is Office 1-3. Where the
manager’s office in the Office 1- and two phones for the two service manager is and it has
1. It is on the first floor and has administrators. They all connect computer and a phone. That
a phone and a Pc connected to to the switch which is in the connect to the switch on the
the switch on the first floor same room. first floor.



This is the server
room where the
firewalls, antivirus
server and data
server are held.




This is the Main
Here is the
Reception Area. It
Conference Room
consists of two
and it has a printer,
computers and two
access point and a
phones that are
wireless device to
connected to the
demonstrate the
ground floor switch
connection




This is Office 0-1 the hotel manager
This is Office 0-2. This is where
office. It consists of a computer and a
the catering manager is and he
phone that connect to the ground
has a computer and a phone.
floor switch.
The switch and the router are
also placed in this room because
it is centralized. The room also
has a printer.




YONKOV, BOYAN 2
$9.60
Get access to the full document:
Purchased by 10 students

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Reviews from verified buyers

Showing all 5 reviews
2 year ago

4 year ago

4 year ago

5 year ago

5 year ago

3.4

5 reviews

5
1
4
1
3
2
2
1
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Boyan67 PEARSON
Follow You need to be logged in order to follow users or courses
Sold
132
Member since
6 year
Number of followers
109
Documents
9
Last sold
2 year ago

3.3

36 reviews

5
11
4
5
3
10
2
5
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions