Network Design Consultation
Introduction
The network consultation guides one through the process of designing a network for the small business. A typical network of this sort includes three computer users, two laptops, a server, one quality networked printer and access to the wireless network. The main aim is to build and design the best network for the organization, with top degree of functionality and security at the same time maintaining a low and reasonable cost. The business scale should be flexible so that as the business grows the network should also grow with it. Small business has reserved networking and computing requirements. The business may have a number of computers and laser printers. The network for the small office network should allow the members to share data, and printers as well as other peripherals. The computing requirements in small organizations may be met by use of a single LAN with one to two servers, and using off-the-shelf components. A small business LAN is usually managed by one person with moderate experience and technical knowledge (Gregory, 2002).
Network design for a small billing business
A network design that allows one server to control the networking, filter internet and serve printers is the easiest since the owner can manage his business at a single point. It should have easy connections that grow with the business. Web and mail servers could be used from a hosted service and thus having one internet connection. This is recommended since it is a cost effective and is efficient for a small business. The recurring cost of maintenance could be reduced by a big rate. In this business, the owner will consider using the following devices for his billing business.
The modem serves as a network adapter that configures the internet technology on the business operating system. For proper networking, the modem is first installed before the other software to confirm compatibility. The modem is connected to an AP router that is used when transmitting data between wired and wireless networking devices. The two laptops use wireless networking from the router to access network while the workstations and the other 3 users use LAN and are connected to the main server via the switch box. The two working stations are placed in a local area network which is secure to protect data and the working stations themselves.
The LAN’s IP addresses are private and available to the local network only. The workstations and the network printers are given an IP address automatically by the server, as well as to the wireless network that hook the three users and the laptops. The IP Addresses may be allocated permanently to the printers and workstations for easy locations accessibility. Therefore it is vital for the business owner to give an IP address to the LAN available depending on the type of business. A Switch is a mechanical device that is used for separation of machines to prevent data from going to machines that are not intended on the network. By using it, the network usage is reduced and the security of every machine is separated from the traffic created by other machines. It controls the network hard drive that transfers files to all the other computers.
The basic configuration recommended for a secure computing environment.
For a secure computing environment, the user should establish different security policies to protect data and threats. Implementing a basic firewall that manages threats and protects the system and the use of basic Antivirus software or even an anti-spyware program that protects from virus is the main methods used by business owners to protect information and the devices. Since there will be a wireless connection, a robust password is advised since wireless traffic is highly detected by the software. Review of the router and firewall logs helps to identify any abnormal network connections as well as any Internet traffic. Use passwords are encouraged for all accounts.
Diagram of the network configuration.
The 3 users
Network architecture and Internet access configuration
Network architecture is the structural and logical layout of the network that consists of transmission devices, hardware, and software as well as communication protocols and mode of transmission such as wireless or wired and connectivity between components. LAN is the best network type that can be used in a small business. The other computers are served by only one server (Gregory, 2002).
The networking consultation applies to the fundamental networking concepts solutions and terminology on computer networking. The networking allows one to implement a network using the physical media and data links created. Ethernet and Wi-Fi deploy the LANs as they guide on the network design to be used on any business.
Hardware recommendations and related costs
This are the tangible devices required by the user to access either through a dial up connection or direct connection to a host computer. Connecting cable lines enable connection to the Internet bringing about an increase in users and speed of connections on the web. A router is recommended as it is the main part of the architecture. It transmits information from one place to another in datagrams. A switchbox is required as it is the central control of all the actions taking place; it distributes traffic based on application or load content. Printer prints data from the connected computer. Pc is has components such as the keyboard, mouse monitor, data storage, hard drive, and the system unit. A Modem is used to configure and to set up internet technology on the operating system.
Cost Table listing all the items needing purchasing and the associated cost.
Item | Cost | Quantity | Total Cost |
2working station | $150 | 2 | $300 |
2laptops | $400 | 2 | $800 |
Printer | $300 | 1 | $300 |
Cables | $100 | 1 | $100 |
Router | $100 | 1 | $100 |
Switch box | $100 | 1 | $100 |
Network hard drive | $100 | 1 | $100 |
Software’s (Microsoft office) | $500 | 1 | $500 |
(Operating System) | $600 | 1 | $600 |
(Timer) | $50 | 1 | $50 |
Cost of installation | $300 | 1 | $300 |
Internet Expenses | $200 | 1 | $200 |
Electricity Expenses | $100 | 1 | $100 |
Modem | $100 | 1 | $100 |
Business License | $200 | 1 | $200 |
Miscellaneous Expenses(telephone etc) | $1,000 | 1 | $1,000 |
$4,850 | |||
balance | $150 |
Software recommendations and related costs
Software is the intangible utilities and Operating System that allows the computer to function, and the programs that do real work for users. For instance: windows 7&8, word processors and database, spreadsheets. Management systems and timers as well as any other software found in the ROM memory are software
Deployment in bandwidth, distance, and number of users
Network is a classification of devices that are linked to each other. Networks can be grouped into a variety of uniqueness, such as the topology, means used to transport the data, scale communications protocol used, advantage, and organizational scope. Different technologies are organized in different framework of networking for instance in topology which has bus, ring star, tree, and mesh classification. Topology is a crucial part of network design theory. One can build a small business computer network without perception of the difference between star design and a bus design, but when familiar with the typical topology provides one with a better understanding on the essentials of networking concepts such as routers, hubs, and broadcasts. Bandwidth is rate of data transfer within a band of wavelengths in a computer network. It is said to be the volume of data an internet connection can handle per second. The rate/speed of bandwidth is measured in bits per second (bps). An internet connection with a larger bandwidth can move a huge amount of data in a short span compared to an internet connection with a bandwidth that is relatively low. Network failure and a large decrease in the signal strength can hinder the bandwidth rate.
Characteristics of various communication protocols
A communications protocol is a structure of rules for data switch between computers. A protocol should define the semantics, syntax, and synchronization of communication. The character depends on how it is independently implemented. It can be implemented as software or hardware and even as both. A technical standard should be developed to bring the protocol into an agreement.
Deploy a basic Ethernet LAN and compare it to other network topologies
Network topologies are ways in which network elements are connected, thus the logical and physical arrangement of network nodes. Ethernet topology compared to other topologies has the simplest connection and has less network nodes. It is only preferred to a less load to avoid traffic.
Ethernet LAN network topology is cost effective mode of achieving high speed LAN transmissions since it can operate with as low as 10 to 100MB/s as compared to other topologies that are expensive. It supports various writing configurations and works best with a huge number of LAN as well as the micro-to-main frame applications. It is the easiest to install as compared to other network topologies. When compared to other network topologies, Ethernet is not a high-level performer when it comes to high-load environments. This protocol Carrier Sense Multiple Access/Collision Detection slows down significantly when many workstations compete for the one cabling trunk. It has a linear bus decentralized control which may complicate isolation of problems (Ekert, 2004).
Use technology and information resources to research issues in networking
The Networking and Information Technology Research issues are done to support technology leadership, science, and engineering and bolster economic competitiveness. The research focuses on identifying issues that will help the countries out-educate, out-innovate and out-build the world. Networking and information technology assists in Cyber security and information assurance from any attacks. High-confidence software and systems have priorities such as; Management of autonomous and complex systems; Development of science and technology for creation of cyber-physical systems (CPS); Development of technology assurance; Improvement of quality of high-confidence real-time system and software; as well as the improvement of CPS education to expand a new generation of experts (Edgar, 2005).
Reference
Gregory, R. (2002). Securing wireless networks. The Internet Protocol Journal, 5(3).
Edgar, D. (2005). Ieee 802.11. The Internet Protocol Journal, 5(1).
Ekert , V. L. (2004). An ontology for network security attacks. Lecture Notes in Computer
Science, 317-323. doi: Lecture Notes in Computer Science 3285.
Get Professional Assignment Help Cheaply
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Why Choose Our Academic Writing Service?
- Plagiarism free papers
- Timely delivery
- Any deadline
- Skilled, Experienced Native English Writers
- Subject-relevant academic writer
- Adherence to paper instructions
- Ability to tackle bulk assignments
- Reasonable prices
- 24/7 Customer Support
- Get superb grades consistently
Online Academic Help With Different Subjects
Literature
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Finance
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
Computer science
Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!
Psychology
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
Nursing
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Sociology
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
Business
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
Statistics
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Law
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
What discipline/subjects do you deal in?
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Are your writers competent enough to handle my paper?
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
What if I don’t like the paper?
There is a very low likelihood that you won’t like the paper.
Reasons being:
- When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
- We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.
In the event that you don’t like your paper:
- The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
- We will have a different writer write the paper from scratch.
- Last resort, if the above does not work, we will refund your money.
Will the professor find out I didn’t write the paper myself?
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
What if the paper is plagiarized?
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
When will I get my paper?
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
Will anyone find out that I used your services?
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
How our Assignment Help Service Works
1. Place an order
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
2. Pay for the order
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
3. Track the progress
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
4. Download the paper
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!
