In: Computer Science
PLEASE ANSWER ALL OF THE FOLLOWING QUESTIONS
2. Describe the networks that might be used to support a small family-owned neighborhood convenience store with a point of sale (POS) computer, and an office computer for inventory control, accounting, product acquisition, etc.
3. Describe the distributed applications that might be used to support a neighborhood book store with a coffee shop/browsing area that offers free Internet access to its customers, accepts credit cards for purchases, has an email-based marketing plan, and sells some products online.
4. Describe the networks that might be used to support a small manufacturing facility that supplies widgets to a large international manufacturing firm. The organization uses automation in their production, employs a small management staff (accounting, materials procurement, human resources, etc.), and receives their orders for widgets via electronic communications with the larger firm.
5. Explain the differences between backend LANs, SANs, and backbone LANs
6. List and describe the key components of satellite communications systems
7. In a computer and network security context, list and briefly describe three classes of intruders
8. In a computer and network security context, list and briefly describe three intruder behavior patterns
9. Describe the computing needs of a medium-sized enterprise and the need for client/server, intranet, and/or cloud computing.
10. Conveniently Yours is a small family-owned neighborhood convenience store that sells products and Lottery tickets to a very limited customer base. Their computing equipment is minimal with a point of sale (POS) computer, an office computer for inventory control, accounting, product acquisition, etc. Describe Conveniently Yours computing needs and their possible need for client/server, intranet, and/or cloud computing that would support his business operations.
2- PAN( Personal Area Network ) can be used which may be made up of a wireless modem, few computers, phones, printers, etc., and revolves around one person in one building or just the neighbourhood. These types of networks are typically found in small offices or residences, like the one in the question.
LAN OR WLAN (Wireless local area network ) can also be used, it is a simple network to connect low voltage devices across short distances.
3- There are large variety of Distributed application available today , the application that can be used for 2, should be like resource sharing so that both the things should be managed with minimum expense, it should be precise to maintain a good check on the money transaction, security is the key to keep data safe, availability is an important feature so that this app should always be a boon to the business never an obstacle some examples of distributed applications are Brave, EOSdynasty , MakerDAO etc which are used for different purposes.
4- CAN- Campus area network can be used with proper security as per the requirement. CAN is spread across several buildings that are fairly close to each other so users can share resources. so even if there is any scale up of the infra, CAN can accumulate the devices.
5- In simple terms, Backend (LAN)networks are generally used to interconnect large systems such as mainframes, supercomputers, and large storage devices where main need here is for bulk data transfer with reliability among a limited number of devices in a not a large area preferrably a smaller one. The SAN separates storage tasks from specific servers and creates a shared storage facility across a high-speed network. Whereas a backbone LAN is a high-capacity LAN which is used to interconnect LANs with lowercapacity .
6- Repeater- It is a circuit that changes the frequency band of the transmitted signal from the received one and acts like a transponder. It consist of input multiplexer, multiplier and output multiplexer.
7 - Masquerader - It is an unauthorized user who penetrates a system and exploits a authorized user’s account (outside).
-Misfeasor - An authorized user who makes unauthorized accesses i.e. misuses his privileges .
-Clandestein user- It grabs supervisory control to elude other controls like auditing and access controls or may suppress audit collection as well.
8- Hacker- Select target, identify vulnerable services, wait for user to log in, captures password and use it to access the network.
Criminal Enterprise- Exploit through vulnerable ports, use trojen horses, act quick, hard to detect and make no mistakes generally.
Internal Threat- use accounts they don't use for themselves for daily jobs, email former and prospective employers, conduct chats, do large downloads and file copying, access network during non working hours.
9-Medium-sized enterprise need flexible , secure, scalable, portable and efficient in terms of collaboration type of services in their computing.
Need of intranet- It provides one central place to store all the company documents, always up-to-date and can be accessed by anyone on the team, it shows properties like distribution and availability and provide tools like search to ensure that employees can find the information what they need in order to perform their jobs.
Need of Client server- client computers provide an interface to allow a computer user to request services of the server and to display the results the server returns. Hence they are required to fulfill the various requirement in simple ordered way.
Need of cloud-Cloud computing helps in the access of applications and data from any location and device( internet connection) around the world . It offers businesses with scalable computing resources helping themin saving the cost in acquiring and maintaining them.
10- The computer needs will be- A secure, environment friendly and user friendly system, easy to manage and portable computing with distributed system like cloud for ensuring availability, scalability and to not bother about maintainability.