CMGTCB554 Competency 2 Reflection
CMGTCB554 Competency 2 Reflection
1.
Networking Infrastructure
Networking Infrastructure
with limited resources and a single office. In this framework, all machines have equal status
for easy file and printer sharing. The computers would be connected using a network switch
for communication and a router for internet access. Using a Network Attached Storage (NAS)
device centralizes file storage for easier collaboration. To enhance security, install a firewall
and use a dedicated print server for efficient printer management and sharing. These
with multiple locations operating under a central datacenter. Core switches link multiple sites
for fast data transmission. Routers enable interconnection and internet access. Servers and
network equipment are stored in a server rack in the datacenter. The datacenter has redundant
power supply to ensure continuous operation and reduce downtime (Priol & Alléon, 2021). A
requirements. These guidelines consider the scalability and complexity needs of a multi-
location configuration.
I chose the peer-to-peer networking model for Company 1 because it is simple, cost-
effective, and suitable for the company's small-scale operations. The peer-to-peer model is
easy to set up and manage without a dedicated server. Additional recommendations for this
model include implementing a reliable network switch, a router for internet connectivity, a
Network Attached Storage (NAS) device for centralized file storage, a firewall for enhanced
security, and a dedicated print server for efficient printer management and sharing. On the
organization. The central server manages resources and services across multiple locations. I
suggested a core switch, router, server rack, redundant power supplies, and a VPN for secure
communication between locations in the datacenter. These recommendations meet the needs
of a larger organization with multiple facilities, improving data management, scalability, and
security.
technologies, hardware, and software proved difficult. When old and new technologies
coexist, interoperability issues arise. Problems hampered departmental data exchange and
collaboration. Upgrades and standardization of the network infrastructure were required for
integration and efficiency. Another issue was the constant threat to Network security.
Protecting important data's security, integrity, and availability is essential as cyber threats rise.
The company has to install rigorous security measures, perform frequent vulnerability
cybersecurity threats. Diverse and creative strategies were required to balance network
business hours, and well-defined contingency plans (Yang, 2019). Monitoring and managing
downtime reasons required a proactive approach. Organization scaling and adapting were
difficult. As the company grew, its network architecture required to enable data transmission,
disturbance proved difficult. Technology changed quickly, making it hard to incorporate new
innovations into infrastructure. For flexibility and technical competitiveness, the network was
Priol, T., & Alléon, G. (2021). A client/server approach for HPC applications within a
Yang, T. (2019). ICT technologies standards and protocols for active distribution network.