0% found this document useful (0 votes)
15 views2 pages

Week 6 Tuorial Activity

The document outlines a series of tasks related to Network and Cloud Computing for a business information systems course. It includes designing a network topology, analyzing cloud computing models, examining LAN setups, exploring wireless network security, discussing VPNs, and planning for application migration to the cloud. Each task requires research and practical application to support business needs and enhance network functionality.

Uploaded by

ishmalali13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

Week 6 Tuorial Activity

The document outlines a series of tasks related to Network and Cloud Computing for a business information systems course. It includes designing a network topology, analyzing cloud computing models, examining LAN setups, exploring wireless network security, discussing VPNs, and planning for application migration to the cloud. Each task requires research and practical application to support business needs and enhance network functionality.

Uploaded by

ishmalali13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

INF101 – BUSINESS INFORMATION

SYSTEMS

Topic 6: Network and Cloud Computing


Student ID:
Student Name:
Lecturer Name:
Due Date:

Page 1 of 2
Read Chapter 6 from your textbook and post your answers to the following questions on your
LMS.

1. Design a network topology for a small business with 50 employees. Choose the most
appropriate topology (star, bus, or mesh) and create a diagram to represent your
network. Explain why you selected this topology and how it supports the business's
needs.

2. Research the benefits and drawbacks of using public, private, and hybrid cloud
computing models. Provide examples of companies that use each model and discuss
why they chose their specific model. Based on your research, recommend a cloud
model for a medium-sized enterprise.

3. Analyse the LAN setup for a computer lab of CIHE. Identify and specify all the
components. Explain how each component contributes to the overall functionality and
performance of the network.

4. Explore the security concerns associated with wireless networks in public spaces such
as cafes or airports. Identify common threats and suggest best practices for securing
wireless networks in these environments. Provide examples of tools or technologies
that can be used to enhance security.

5. Research the role of Virtual Private Networks (VPNs) in securing remote work.
Identify at least two types of VPNs (site-to-site, client-to-site) and discuss their
applications. Provide examples of businesses or industries that benefit from using
VPNs.

6. Implement a plan to migrate an existing on-premises application to a cloud platform.


Outline the steps involved, potential challenges, and how you would address issues
related to data security and user adoption during the migration process.

Page 2 of 2

You might also like