Mike Bates Development of a Network Plan for
Remnant Ministries |
|
Unit 9: June 4 |
|
Tasks |
1). Create network plan. Completed Major
accomplishments: Last
week we decided on a wireless network.
This will greatly reduce our costs.
Sprint DSL will be our ISP and our speed will be 5mbps. The
design of the network plan is completed.
We will have a Dell server running Microsoft Small Business Server
2003. This server will be used as a
file, print, and application server.
The 3 laptops will each be able to connect to this server to access
shared data and consolidate resources. 2) Create map and topology Completed Major
accomplishments: See
below 3) Develop IP Scheme and
configuration Completed Major
accomplishments: The IP
scheme will be 10.100.1.1 We will
use DHCP (Dynamic Host Configuration Protocol to allocate IP addresses. The set up gives the computer a random IP
address instead of manually. |
Decisions |
This
week we decided on DHCP for our network configuration. We also decided on client/server
configuration instead of workgroup. |
Learning |
1) What helpful feedback did you
get in the class (instructor, classmates) and outside the class (user,
stakeholder, beneficiary, mentor, expert advisor, others)? What did you learn
from this feedback? I received good feedback from my stakeholder letting me
know what type of shared access he needed.
The information he shared with me help in resolving our network plan,
configuration, and topology. 2) What resources did you use this week (e.g., people, money, equipment, systems, or software)? Did you add new resources? What was your learning? My mentor Tony Perez was again
influential in the decision making process this week. He helped me to formulate the
network plan and topology. 3) What research did you perform
this week that was assisting and/or literature based? What is your
findings/learning? Research
Question: Are
wireless networks secure? Source(s):
http://compnetworking.about.com/cs/wireless/f/arewlanssecure.htm Answer/Learning:
There
is no network that is completely secure, however wireless networks add an
additional layer of security because of going through the airwaves. As it
has evolved wireless networks now use security such as WEP or WPA that can
encrypt a network so that most hackers can’t get in. |
Indicators |
1)
What went well this week? What didn’t? This
week I was able to determine the IP scheme as well as network configuration. 2)
How well did you stick to your project schedule? I did
not deviate from the project schedule this week. ? 3)
How prepared are
you to conclude your project in Unit 10 as required in this course I
am prepared to conclude my project in Unit 10 as required in this course. |
Other |
|