Client-Server System
The choice of client-server system over peer to peer networks and systems will provide several benefits to the office. The set of advantages are as listed below.
Client server system vs peer-to-peer networks
Following are key differences between the mentioned networks:
|
Client server system |
Peer-to-peer networks |
Participants |
In this type of system, all end systems are categorized into clients and servers. |
All end systems have equal competencies and responsibilities. |
Active role (requester) |
Clients initiate a communication session and they have active role in the system. |
Any one of them end systems can initiate the communication session. |
Networking software |
Different for clients and server |
Same for all |
Passive role |
Server |
Any participant |
Interaction |
Clients with servers |
Arbitrary |
Resource provider |
Servers |
Active participant |
Data flows |
Asymmetric |
Symmetric |
Security |
Good security |
Poor security |
Centralized control |
Centralized control is available |
No centralized control |
Performance |
No sluggish performances |
Performance can be impacted because of sharing resources. |
List of Components
The components required for the system will be:
Additional hardware will be required to develop and implement the network architecture and maintain the availability of the network. These hardware items will be required for processing, data storage and management, and accessing the network services.
Brief Description
Firewall
It is an application that filters the unwanted and suspicious programs from entering the system. Windows Firewall is the most commonly used firewall that will be used in this case as well. It will enhance the basic security and prevent unauthorized access (Blansit, 2009).
Defragmentation
It is a software utility to rearrange the fragments in such a manner that the adequate storage space is created. Windows defragmenter will be used in this case for optimum space utilization.
Backups
Windows backup will be used in this case to make sure that the data storage and handling is carried out properly and the data sets are not lost.
Software
Microsoft office and other business applications will be used to manage the official business operations.
Hardware
The hardware present on the client and server is scalable and will also be upgradable. This will assist in meeting the requirements in the future.
Implementation Plan & Gantt chart
The implementation of the network will be carried out in a series of phases.
Implementation Schedule
WBS |
Task Name |
Duration |
Start |
Finish |
Predecessors |
Resource Names |
1 |
Network Implementation |
20 days |
Mon 06-08-18 |
Fri 31-08-18 |
||
1.1 |
Initiation & Planning |
9 days |
Mon 06-08-18 |
Thu 16-08-18 |
||
1.1.1 |
Validation of Server Connectivity |
2 days |
Mon 06-08-18 |
Tue 07-08-18 |
Implementation Engineer |
|
1.1.2 |
Assessment of Implementation Needs |
2 days |
Wed 08-08-18 |
Thu 09-08-18 |
3 |
Implementation Analyst |
1.1.3 |
Implementation Assessments – Schedule, Budget, and Scope |
3 days |
Tue 14-08-18 |
Thu 16-08-18 |
4 |
Implementation Manager |
1.1.4 |
Milestone 1: Implementation Plan |
0 days |
Thu 16-08-18 |
Thu 16-08-18 |
5 |
|
1.2 |
Implementation Execution |
9 days |
Fri 10-08-18 |
Wed 22-08-18 |
||
1.2.1 |
Downtime Scheduling |
2 days |
Fri 10-08-18 |
Mon 13-08-18 |
4 |
Implementation Manager |
1.2.2 |
Migration of data sets |
2 days |
Tue 14-08-18 |
Wed 15-08-18 |
8 |
Data Analyst |
1.2.3 |
Migration of services |
2 days |
Tue 14-08-18 |
Wed 15-08-18 |
8 |
Implementation Engineer |
1.2.4 |
Implementation of Equipment and Services |
5 days |
Thu 16-08-18 |
Wed 22-08-18 |
10 |
Implementation Analyst |
1.2.5 |
Milestone 2: Implementation Report |
0 days |
Wed 22-08-18 |
Wed 22-08-18 |
11 |
|
1.3 |
Testing |
5 days |
Thu 23-08-18 |
Wed 29-08-18 |
||
1.3.1 |
Pre-Configuration of Networking Equipment |
2 days |
Thu 23-08-18 |
Fri 24-08-18 |
12 |
Implementation Engineer |
1.3.2 |
Testing Activities |
3 days |
Mon 27-08-18 |
Wed 29-08-18 |
14 |
Implementation Analyst |
1.3.3 |
Milestone 3: Test Results |
0 days |
Wed 29-08-18 |
Wed 29-08-18 |
15 |
|
1.4 |
Closure Tasks |
2 days |
Thu 30-08-18 |
Fri 31-08-18 |
||
1.4.1 |
Support Services |
2 days |
Thu 30-08-18 |
Fri 31-08-18 |
16 |
Implementation Engineer |
1.4.2 |
Maintenance Activities |
2 days |
Thu 30-08-18 |
Fri 31-08-18 |
16 |
Implementation Analyst |
1.4.3 |
Milestone 4: Implementation Closure Report |
0 days |
Fri 31-08-18 |
Fri 31-08-18 |
19 |
Gantt chart Task 2
The right application that shall be used for Electronic Banking is a modern & secure browser, such as Google Chrome. It is a web browser that is developed and managed by Google and comes with pre-defined security settings. It will be apt for electronic banking as the information security will be maintained to keep the sensitive financial data protected. The network connectivity shall be Virtual Private Network (VPN) in this case from the security point of view.
The security risks and attacks will be prevented and avoided with the use of VPNs (Heyman, 2007). Real-time anti-virus protection shall also be used as the electronic banking transactions may be impacted by the malware attacks. The occurrence of the malware attacks may impact the information properties, such as confidentiality, privacy, and availability. The use of anti-virus protection will ensure that such issues are prevented and avoided.
Following table presents a comparison table among three well-known web browsers i.e. Firefox, Google Chrome and Internet Explorer (IE):
Firefox |
Chrome |
IE |
|
Protection against malicious attacks (cross-site scripting) |
Yes |
Yes |
Yes |
Highest protection from phishing attacks |
Yes |
Yes |
|
Highlighting of domain name in address bar |
Yes |
Yes |
|
Privacy – prevent other users to know your visiting sites |
Yes |
Yes |
Yes |
Automatic recovery of crashed tabs |
Yes |
Yes |
Yes |
Session management |
Yes |
Yes |
No |
Custom extensions |
Yes |
Yes |
No |
Support for DEP / NX |
Yes |
Yes |
Yes |
HTML 5 support |
Yes |
Yes |
Yes |
Compatibility with older sites |
Yes |
No |
No |
Developer tools built in the browser |
Yes |
No |
Yes |
Task 3
The application types for Computer System Benchmark Software are as listed below:
Task 4
GNU is an operating system that is completely free of cost and it is software that is compatible with UNIX. Richard Stallman came up with the idea of GNU project in the year 1983. A detailed version of the project was published in 1985. It was then translated and specified in many other languages. The name was selected as it was in accordance with the requirements and fell in line with GNU – Not UNIX as an acronym.
It is a UNIX- like operating systems that comprises of a variety of components viz. kernel, compilers, text formatters, games, and many more. It comprises of a variety of free-software and shareware.
Task 5
Curse Client and Garena are the application type(s) that shall be used for online multiplayer games. Garena is an online gaming platform for the users to download and play games. It also provides a lot many other features, such as buddy lists, chat options, history & user management, and many more (Garena, 2018). Similarly, Curse is the gaming platform that provides enhanced gaming experience and provides the tools that are needed by the gamers to enrich their experience (Curse, 2018). There are events organized to allow the users to have an experience that they remember.
References
Blansit, B. (2009). Firewalls: Basic Principles and Some Implications. Journal Of Electronic Resources In Medical Libraries, 6(3), 260-269. doi: 10.1080/15424060903167377
Garena. (2018). Garena – Upgrade to the new version of our gaming platform now!.
Heyman, K. (2007). A New Virtual Private Network for Today’s Mobile World. Computer, 40(12), 17-19. doi: 10.1109/mc.2007.410
Kumar, P., & Singh, Y. (2010). A Software Reliability Growth Model for Three-Tier Client Server System. International Journal Of Computer Applications, 1(13), 9-16. doi: 10.5120/289-451
Li, Q. (2008). Design and implementation of network firewall system based on Godson CPU. Journal Of Computer Applications, 28(6), 1372-1375. doi: 10.3724/sp.j.1087.2008.01372
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download