20171211194006networking_consultation x
MAKE IT 0% PLAGAIRISM
Running Head: NETWORK CONSULTATION 1
NETWORK CONSULTATION 7
Network Consultation
Name
Course
Tutor
Date
When consulting for services such as a network proposal, organizations such as DesignIT need a consultant who understands the procedures and processes that are involved within their type of field. The consultant should be able to provide proposals that are the most efficient, effective and cost saving (Wang et al. 2014). It is the work of the consultant to advice his or her client appropriately.
1. Recommend one (1) suitable network design.
There are limitless options when it comes to network evolution and creation. The main attributes to be considered in this particular scenario will be how much efficient the network will be and how cost effective it is. There are two types of network designs; these are; peer to peer architectures and client-server architectures. Peer to peer architecture involves a system whereby all the computers within the organization are interconnected, and data is accessed through all the computers which form a network structure. Client-server architecture involves the use of a server which acts as the storage and facilitator of all the data within the organization. Information is stored on the server and is only accessible to permitted computers or clients. The client-server architecture is the most suitable for the setting of DesignIT since it is more convenient and more inaccessible to intruders.
2. Suggest one (1) network architecture
A suitable network architecture and design are important for an organization that aims to increase the productivity of its resources. Putting up a computer network is the best way to get the most production out of the system that you have and its components, especially when operating an upcoming business like DesignIT. The advantage of networking is that it facilitates the management of all the vital operations of the business such as storage, data transfer, and communication. DesignIT will find the client-server setup more convenient in this type of setting since a large number of computers can be interconnected to one main central server. This will be of benefit to the organization since the mostly required applications and data that will be required by the employees at DesignIT will be installed to the server and can be accessed by anyone who is logged in to the network. This will be convenient to the organization mostly because the servers have already been purchased and it is only the connection that is required. To start using the network a suitable connection will be necessary; the computers will all be named and then connected to the server. The naming of the computers is mainly necessary for restriction purposes and for enabling certain users to have limited privileges within the network.
3. Suggest LAN and Wireless LAN (WLAN) wiring considerations
LAN stands for Local Area Network. It is a connection of many network devices and computers that are facilitated by routers and switches. In a LAN, all of the network elements and computers are connected through the routers and switches through a UTP cable. On the other hand, WLAN works in the same way, but the only difference is that the W stands for wireless. In a WLAN network, the data is transmitted through the air by the use of wireless receivers and transmitters. Both these transmissions have different advantages and disadvantages depending on the size of the organization. WLANs are very much preferable in a bigger organization where there is a bigger network to be covered due to a large number of computers. A LAN is not preferable in such a setting because the setup might be complex and demand a lot of cables. The LANs biggest advantage is its speed; a LAN has a bandwidth of about 100mbps while a WLAN could be limited to about 54mbps. With all that considered it would be more advisable for DesignIT to use the LAN network since it is a more convenient and faster system for the small organization (Huang et al. 2015).
4. Recommend hardware options and costs.
When it comes to selecting the appropriate hardware to be used in an organization, there are a lot of factors to be considered. First of all the organization can decide on whether to use second tire machinery which is obtained from well-known manufacturers or to buy true clone hardware that is developed by local companies which are less expensive. The difference between the two categories is the price, quality, reputation, and service. The price differs between the two categories because second tire hardware is normally a bit expensive than true clones, second tire goods normally have better quality goods than true clone goods. Second tier goods will always have a better reputation than true clones, and lastly, it is better to buy second-tier goods than true clones because they have more outlets than the latter. Hence there is better and convenient service at all times. Since second tire hardware has better quality, it is much better to purchase them instead of purchasing true clones. This is because despite the fact that true clones are cheaper repairing and servicing them might turn out to be even more expensive (Wang et al. 2014).
5. Suggest security considerations for:
1. Firewall
2. Antivirus software
Security considerations such as firewalls and antivirus software are very important for large organizations such as DesignIT. Firewalls are important mostly because they enable the server administrator to block sites that might be of harm to the software of the organization or to block unproductive sites. In most organizations, firewalls are put up by the administrators to bar the use of some websites. For example, the administrator can use firewalls to block social media sites if he or she identifies that most of the staff are wasting a lot of time on social media instead of being productive. On the other hand, antivirus software helps to protect the computers of the organization from viruses and the provision of other internet security. Both these products are very useful for the protection of the organization’s data. Good antivirus software should be a trusted developer and should efficiently serve its purpose with regular provisions of updates. The firewall should have the same considerations as the antivirus software and should be easily accessible and also easy to use
6. Recommend software options and costs.
Just like in the case of hardware in the organization, the software can also be obtained from two types of developers. There are the trusted developers who produce efficient and easy to use the software while there are also other developers who produce cheaper software which may be at times difficult to use. Trusted developers are the ones whose products are best for organizational use rather than those of other developers. An organization’s software is one of the most important assets that the organizations have; this is because all the activities, especially in the case of DesignIT, run through one type of software or another (Huang et al. 2015). Good software does not have to be necessarily expensive but should serve its purpose with much ease. The software should be well compatible with the hardware that the organization is using. The software should also be easy to install and update. Other developers will produce software that is difficult to use, and this should not be considered by the organization despite how cheap it might be.
7. Outline the labor costs, equipment costs, and service costs for your suggested design in table format.
Labor cost
Employees
Labor cost
Secretary
$4,000
Designer 1
$5,000
Designer 2
$5,000
Total
$14,000
Equipment Cost
Equipment
Cost
Web server
$500
File server
$550
Small business server
$300
High speed Internet access
$150
Firewall
$100
Antivirus
$100
Computers
$1,200
Laser printers
$900
Wireless access for portable devices
$400
Total
$4,200
Service cost
Service
Cost
All services
$600
8. Identify the single point of failure, and recommend potential mitigation strategies.
The web server is most likely to be the single point of failure. The function of the web server is to forward the web page files to the computers. The web servers are an essential asset to an organization since they facilitate communication and ensure that there is a continuous relay if information. The mitigation of a web server can occur in a couple of ways. One of the ways is by ensuring that the network is protected by the necessary malware, firewalls and antivirus software. The above products should be regularly serviced. For this to be achieved it should be ensured that only the genuine products are purchased, and the appropriate training is given to those who will be responsible for them (Zaitsev, 2013). Servicing also involves regular updating to ensure that all the software is up to date. The web server should also be password protected to limit the number of clients because some could have malicious intent. The passcodes should only be granted to the trusted employees to avoid cases of information leakages.
References
Huang, H., Chen, K., Ren, C., Liu, P., Zhu, S., & Wu, D. (2015, April). Towards discovering and understanding unexpected hazards in tailoring antivirus software for android. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (pp. 7-18). ACM. Retrieved from:
http://dl.acm.org/citation.cfm?id=2714589
Wang, X., Lei, X., Fan, P., Hu, R. Q., & Horng, S. J. (2014). Cost analysis of movement-based location management in PCS networks: an embedded Markov chain approach. IEEE Transactions on Vehicular Technology, 63(4), 1886-1902. Retrieved from:
http://ieeexplore.ieee.org/abstract/document/6626563/
Zaitsev, O. V., & Boronin, V. A. (2013). U.S. Patent No. 8,370,947. Washington, DC: U.S. Patent and Trademark Office.