0% found this document useful (0 votes)
102 views4 pages

Install Hardware To A Network - ICTNWK410

The summary outlines the workplace's IT contracting procedures that follow country and state standards and identify contract deliverable report frequencies. The IT contractor is responsible for supplying suitable software, hardware, and security procedures by analyzing the company's standards. Physical security procedures secure servers with access controls and optimal ventilation, while portable hardware is the employee's responsibility. Electronic security includes backups, anti-virus updates, patching, and software updates with employee authentication required to access data. The client requested a brief analysis of suitable network structures for their business, outlining local area networks for small/medium companies, wide area networks for large organizations, wireless networks' mobility but security/interference concerns, and mobile equipment's coverage but regional connectivity dependence.

Uploaded by

Syeda Maryam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views4 pages

Install Hardware To A Network - ICTNWK410

The summary outlines the workplace's IT contracting procedures that follow country and state standards and identify contract deliverable report frequencies. The IT contractor is responsible for supplying suitable software, hardware, and security procedures by analyzing the company's standards. Physical security procedures secure servers with access controls and optimal ventilation, while portable hardware is the employee's responsibility. Electronic security includes backups, anti-virus updates, patching, and software updates with employee authentication required to access data. The client requested a brief analysis of suitable network structures for their business, outlining local area networks for small/medium companies, wide area networks for large organizations, wireless networks' mobility but security/interference concerns, and mobile equipment's coverage but regional connectivity dependence.

Uploaded by

Syeda Maryam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Install Hardware to a Network - ICTNWK410

Hardwa Technical Configurat Hardware Licensing Security/ Required


re Functions specifications ions componen requirements Compatibil drivers/pro
required ts ity issues grams
Central Socket Type, Minimum Arithmetic N/A Different Mouse,
processing Processor type, required: 2- logic unit CPU Hard drive,
Unit (heart Brand. core (ALU), architecture Monitor,
of the Control s have operating
computer). Unit (CU), different system.
Cache. software
compatibilit
ies
Writing and Windows Computer N/A Volume Compatibili Need only
editing text XP/Vista/7/8. and Licensing ty issues to install
documents. “Script processor: customers have regarding MS Office
ActiveX 500MHz the right to MS Office
controls RAM: install and use versions
marked safe 256Mb any number of (years), or
for scripting” - Hard Disk: copies of the for
enabled 3Gb software on the operating
licensed device systems.
on physical Files can
and/or virtual have issues
machines. as well.
Provide Netscape 6.0.2 Select N/A Need a license Browser Install Inte
resources or and higher, “Internet to create Web security rnetExplore
information Internet options” – browsers for often uses rDriver
to the user. Explorer 6.0 open distribution, but JavaScript (IEDriverSe
and higher, settings, is free. (XSS cross- rver.exe) or
and Firefox 1.0 then choose site other
and higher. the scripting) to browser.
connections prevent
tab and privacy
click on breaches or
LAN malware.
settings for Those
the proxy issues
configurati depend on
on. the type of
browser.
Protect the 300 MB of Double For You need a Security It can use
computer available hard click hardware license to install issues can Kernel
from disk space, security – anti-virus and use any arises if mode
malware. Processor: For click scans you anti-virus, anti-virus drivers.
Windows – click Go. obviously depending on are not
10/8/7/Vista: 1 In the Edit need that the price updated
GHz scan, on the hardware.
scan For anti-
options tab, virus
configure software, it
the scan can require
option as routers,
required. cables,
specific
processors

Outline the workplace’s information technology contracting procedures that are in


place.
The workplace’s IT contracting procedures that are now in place all follow the country’s and
state’s standards. These procedures also identify how often should there be reports on the
contract deliverables (milestones).

What are the responsibilities of the IT contractor for the workplace?


The IT contractor’s responsibilities are to supply and provide, by analysing regarding the
company’s standards, the most suitable software and hardware systems and the security
procedures in the workplace.

Outline the information security procedures in place at the workplace (include both
physical and electronic security procedures)
The security procedures in place at the workplace are, regarding physical procedures: for
servers and hardware assets, the conditions must be secured with appropriate access through
keypads and locks and ventilation should be optimal at all times. Portable hardware, such as
laptops, are responsibility of the employee. Electronic security procedures include the
backups of all data from the workplace and the frequent update of anti-virus, patches needed
and software updating. Authentication of each and every employee is needed to access data
from the workplace.

The client also wishes you to include your advice regarding their current network setup
and business structure. Specifically, the client wishes you to include a brief analysis of
which network structures are most suitable for their business / work structure. Briefly
explain the designs and list the limitations of each of the following types of networks
relating to the client’s business structure:
 Local area network
A LAN is shared communications system that covers a limited local area. It is most suitable
for small/medium companies as it can cover a building or small group of buildings. Its
efficiency and transmission distance also depends on the type of cables used.
 Wide area network
Large communication system that connects a large geographical area (cities, for example).
For companies, it centralises the IT structure that spreads from a head office, simplifying
server management and enhancing scalability, increases bandwidth and privacy. However,
setting up a WAN has really high costs and there are some security concerns such as
information theft.
 Wireless network
Wireless networks connect computers and machines without any cables. That is way less
expensive as it does not require cable installation into buildings, etc. It is convenient and
maximises productivity and is cost efficient. However, it has disadvantages regarding
security, speed and reliability as it is subjects to many factors of interference.
 Mobile Equipment
In this type of network, the last link is wireless. Its advantages are that mobile equipment uses
less power and this network provides a larger coverage area and amazing speed. However,
connectivity depends on certain regions. The mobile equipment also has to be compatible to
the mobile network (for example, 4G).

You might also like