.

Thursday, January 31, 2019

computers and life :: essays research papers

Life in a modern technologhy requires skills in dealing with computers...CH 8 net profit Management.8.1 Network Documentation.*Cut sheet diagrams.The first and approximately tiny component for a good engagement is documentation. Documentation is the just round talked about and least performed task in a network. diagrams that indicate the style of the physiological wiring layout the figure of pedigree the length of from distributively one cable the type of termination for the cable sensual location of each groyne dwelling or patch panel, and A labeling scheme for easy recognition of each wire. * MDF and IDF layoutsThis is a bodily and logical layout of the Main Distribution quick-wittedness and altogether of the Intermediate Distribution Facilities in the network, layout of rack mounts, auxiliary equipment, and servers in the dissemination facility, patch panel labels to identify cable terminations. Identification and condition detail of totally equipm ent located in the distribution facility.*Server and workstation compliance detailsThis is any physical detail of the computer, model and serial number, Physical location, exploiter, and network identification.     *Software listings          Standard and special wackyware used on each machine in the network.          This list includes operating system and cover software.     * attention recordsIt is as well valuable to keep a list of all repairs that rich person been done to all equipment included in the network. This will assistant an decision maker predict possible future problems with existing hardware and software.     * credential system measuresIncludes "soft" security, much(prenominal) as user rights, password definition, and firewall support, but also physical security. Physical or hard security includes things as wi de as identifying how the MDF and IDFs are locked, who has admittance to these rooms and why, how the hosts are protected (security cables - alarms), and who has physical access to the system.     *User policiesThey contain how the users can interact with the network. These policies include what is and what is not tolerable on the network. It should also include what the consequences of violating user policies will be. some other aspects of user policies include what minimum user ID and password length should be, and rules for the subject of passwords. 8.2 Network Security includes the following.     * Network accessIt involves making the network as in force(p) as possible against unauthorized access. This is done by establishing security policies, such as minimum password length, maximum password age, unequalled passwords (not allowing the said(prenominal) password repeated), and only allowing the user to logon to the network at finic ky generation of the day or days of the week.computers and life essays research papers Life in a modern technologhy requires skills in dealing with computers...CH 8 Network Management.8.1 Network Documentation.*Cut sheet diagrams.The first and most critical component for a good network is documentation. Documentation is the most talked about and least performed task in a network. diagrams that indicate the path of the physical wiring layout the type of cable the length of each cable the type of termination for the cable physical location of each wall plate or patch panel, and A labeling scheme for easy identification of each wire. * MDF and IDF layoutsThis is a Physical and logical layout of the Main Distribution Facility and all of the Intermediate Distribution Facilities in the network, layout of rack mounts, auxiliary equipment, and servers in the distribution facility, patch panel labels to identify cable terminations. Identification and configuration details of all e quipment located in the distribution facility.*Server and workstation configuration detailsThis is any physical detail of the computer, model and serial number, Physical location, user, and network identification.     *Software listings          Standard and special software used on each machine in the network.          This list includes operating system and application software.     *Maintenance recordsIt is also valuable to keep a list of all repairs that have been done to all equipment included in the network. This will help an administrator predict possible future problems with existing hardware and software.     *Security measuresIncludes "soft" security, such as user rights, password definition, and firewall support, but also physical security. Physical or hard security includes things as simple as identifying how the MDF and IDFs are locked, who has access to these rooms and why, how the hosts are protected (security cables - alarms), and who has physical access to the system.     *User policiesThey contain how the users can interact with the network. These policies include what is and what is not permissible on the network. It should also include what the consequences of violating user policies will be. Other aspects of user policies include what minimum user ID and password length should be, and rules for the content of passwords. 8.2 Network Security includes the following.     * Network accessIt involves making the network as secure as possible against unauthorized access. This is done by establishing security policies, such as minimum password length, maximum password age, unique passwords (not allowing the same password repeated), and only allowing the user to logon to the network at particular times of the day or days of the week.

No comments:

Post a Comment