StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Hybrid Network System for WLA Company - Essay Example

Cite this document
Summary
From the paper "Hybrid Network System for WLA Company " it is clear that to protect the workstations from viruses, Trojans, and unauthorized access, windows live OneCare will be installed. This package includes an antivirus, firewall, performance tune-ups, and antispyware and data backup options…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Hybrid Network System for WLA Company
Read Text Preview

Extract of sample "Hybrid Network System for WLA Company"

Table of Contents Introduction 3 Client’s Requirements 4 Client software requirements 4 Operating system 4 Communication Software 5 Client Hardware Requirements 5 Server Hardware 6 Server Software 6 Network Hardware, layout and address plan 7 Floor Plan 8 Network Plan 9 Network Topology 10 Workstations 11 Software 11 Hardware 11 Costing & Budget 13 Future Developments 13 Evaluation 13 Network Layout 14 Summary 14 Bibliography 14 Introduction Networking and services are one of the most essential elements for the success of any business institution. It’s clear that WLA Company has a vision of growing into a multinational company. Thus the networking systems are very vital in such an institution. The existing Information and Technology infrastructure of WLA Company hinders the development of the company. This is due to the fact that the infrastructure is insufficient, the data stored is not secure i.e. can easily be compromised by unauthorized person and above all, the data backup plan is not efficient as the mode of backup is prone to disasters such as earth quakes and floods in the location of the company. Moreover, there is no documentation for the current IT infrastructure. There is no documentation explaining the network setup in the company. Also, the software and the hardware are outdated. Considering that the computers are still running windows XP, it implies that the OS may not support the current versions of application software and hardware needed to run the business as per the requirements. Considering the above stated issues, it’s clear that the WLA Company IT infrastructure needs to be restructured, redesigned and updated to meet the current IT requirements. This involves updating both the software and the hardware parts of the current system, designing new network infrastructure to cater for the needs of the company and training the existing employees on how to use the lately installed networking system. To solve the above-connoted issues a network system has to be set up. This network system will consist of client computers, servers and other peripheral devices such as printers, fax machines, telephone etc. (i.e. a client/server network is set up). The best network design for this company is peer-to-peer design. But the rapid growth of the company calls for the preparation of the company for further expansion by allowing flexibility. In this regard, the best network design will be a hybrid network. With this setup, account and permission will be required to access file on the server, while at the same time, access to other computers on the network will be shared equally. This will minimize the cost of setting up the network while at the same time bringing in efficiency. The hardware and software explain below are recommended to ensure maximum functioning of the company activities. Client’s Requirements All software and hardware that will be required for WLA business is listed below and why the justification of why it is required. Garrett (2003) indicates that implementing the correct training would allow all staff feel comfortable with the new system. It would reduce the amount of paperwork. Misplaced documents would be resolved with computerisation. Ensure product knowledge is maintained (Kickstart, 2003). Client software requirements Operating system The operating system installed on the entire client computers should support networking. In this scenario, the best and current operating system to run on all the client computers is Microsoft windows 7 Ultimate, Microsoft Windows 7 Professional or Microsoft Windows 7 Enterprise. This is the best choice operating system since it supports all the latest application software and advanced hardware for networking. Communication Software Software tools facilitate communication between the client and the server. This includes web browser and email clients. This type of software simplifies communication between client and the server. It provides a user interface and also encapsulates into packets for transmission on the network. In this case, the communication software to be used is as follows. For web browsing, Mozilla Firefox (which is the most secure open source web browser) is used and for email clients Microsoft outlook which is contained in the MS office package will be used. Client Hardware Requirements The client must have a minimum of the following specifications. For better performance The client should have 2rd generation Core i3processors WITH 3M cache and a speed of 2.60Ghz The minimum random access memory (RAM) should be at least 4 gingerbytes. This facilitates proper running of the applications. The computers should have read only memory (ROM) The computers should have input/output devices which includes pointing devices such mice, keyboard and network connection software. The computers also should have Universal serial bus and also serial and parallel ports. Security cameras will be installed for safety measures Chubb (2007) has stated that it is a good security measure that can monitor internal and external activities in the business. Server Hardware The hardware requirement to run windows server is as in the table below. Component Requirement Processor 2 GHZ Memory 2 GB Available Disk Space 160 GB Drive DVD-ROM drive Display and Peripherals Monitor, Keyboard and pointing device The specified server specifications above will facilitate proper and efficient running of the server. The speed of 2 GHz and RAM of 4GB ensures the applications run faster and as a result there is no congestion on the server in case it is being accessed by many clients at the same time Server Software The recommended server operating system is windows server 2008. Other software to be installed on the server and will be shared by all the other client server include. Sage line 50 accounts, sage payroll, Microsoft Visio, and SQL database management system which will be used alongside Microsoft access. To protect the serve from viruses and malware, windows one care is recommended. These are the recommended application since they are up-to-date and as a result, it’s easy to update them, they support a wide variety of other application software and also because they are more secure. Network Hardware, layout and address plan The following network hardware is required to be able to construct the network. Since the building was pre-wired with CAT 5 UTP cable, then there is no need of acquiring new cabling since this can transfer data up to 100 Mbps that is efficient. Other pieces of hardware include: Patch panel RJ – 45 connectors Terminators Patch cables Hub Floor Plan The diagram below shows a map of all the elements involved in the networking process. Network Plan Below is the network plan for WLA Network Topology The layout below shows the network topology to be used in the network design. This is a physical bus topology. Workstations Software The recommended operating system for the workstations is windows 7 ultimate. This should be a 64 – bit operating system. This due to the fact that the 64-bit operating system utilizes the workstation resources to an optimum level ensuring maximum production. Microsoft office suite should also be installed on the workstation. The recommended office suite is MS office 2010 since it’s the latest and most efficient in the market. To protect the workstations from viruses, Trojans and unauthorized access, windows live OneCare will be installed. This package includes an antivirus, firewall, performance tune-ups, and antispyware and data backup options. Hardware The processor should 3rd generation Intel i3 processors with a minimum speed of 2 GHz. The recommended for this task should 3rd generation i3 processors with a speed of 2.16 GHz. The processor should Intel Manufactured. The recommended minimum Random Access Memory is 1 GB or higher. According to DSG (2011) new hardware and software to be installed should increase productivity in every department and achieve the business goals at a much quicker pace that will maximize sales. Costing & Budget Item Units Price per Unit Total Cost Website Client Computers 15 £349.00 £6,282.00 www.dell.com Printer 2 £500.00 £1,000.00 www.hp.com Servers 2 £2,149.00 £4,298.00 www.dell.com Windows 7 Ultimate 18 £309.00 £5,562.00 www.microsoft.com MS Office 2010 18 £147.00 £2,646.00 www.microsoft/office.com Windows live OneCare 18 £62.00 £124.00 www.microsoft.com Patch panel 1 £270.00 £270.00 www.ebay.com RJ – 45 connectors 100 £5.00 £500.00 www.ebay.com Terminators 100 £5.00 £500.00 www.ebay.com Patch cables 1 £150.00 £150.00 www.ebay.com Labor 1 £5,000.00 £5,000.00 www.corefid.co.uk Maintenance 1 £2,000.00 £2,000.00 www.corefied.co.uk Sage Payroll 1 £150 £150 www.sage.co.uk Hub 2 £37.00 £74.00 www.corefid.co.uk Laptop Computers 3 £800 £2,400 www.dell.com Wireless router 1 £200 £200 www.ebay.com Wireless booster 1 £44.99 £44.99 http://www.maplin.co.uk Total   £10,983.00 £33,406 Future Developments For Future developments, the hybrid network will be easily expanded in case the amount of client computers increase. The servers can also, be increased in number to assign each department with its own server Evaluation With the proposed design, the client is able to share resources both the hardware and the software. This will greatly improve the company’s production. Network Layout The basic network setup in this scenario is peer-to-peer. To enhance productivity and to prepare the company for expansion if need be, the network system has been designed in such a way that it accommodates both the peer-to-peer characteristics as well as server based characteristics, i.e. a hybrid network. In this setup, there is one server which is the central storage and for the client computers to access the network, they must possess an account and permission. Access to other client computers is equal for all the client computers. All the client computers are equal in terms of accessing the server. Summary The proposed hybrid network system is efficient for this company. This is due to the fact that the development of the network system is cost effective, the network can be upgraded with ease and ultimately, it serves the purpose it was intended for by the company. Bibliography Chester, M.A.A. (2002) Basic Information Systems Analysis and Design. New York: McGraw Hill Education. Chubb (2007) Make your world a safer place. http://www.chubb.co.uk/utcfs/Templates/Pages/Template-46/1,8060,pageld=1377&siteld=403,00.html [accessed 01 February 2013]. Dell (2012) For small and medium business. http://www.dell.co.uk [accessed 02 February 2013]. DSG (2011) PC World price lists. http://www.pcworld.co.uk/gbuk/desktop-pc-monitors-73-u.html [accessed 04 February 2013]. Kickstart (2003) Together Sales and Marketing. http://www.kickstartall.com/documents/KS_Articles/Together.htm [accessed 01 February 2013]. Garrett, J. (2003) The Elements of User Experience. New York: Pearson Education. HMRC (2012) HM Revenue and Customs. http://www.hmrc.gov.uk/incometax/index.htm [accessed 01 February 2013]. IRIS (2012) Accountancy Software and Professional Services. http://www.iris.co.uk/default.aspx [accessed 06 February 2013]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Network Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1614057-computer-network
(Computer Network Essay Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1614057-computer-network.
“Computer Network Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1614057-computer-network.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hybrid Network System for WLA Company

System Software and Network Security

Whenever the company decides on the type of cloud (public, private, hybrid) (Furht, 2010) as well as the cloud service(IaaS, PaaS, SaaS) which best suits its specific infrastructure and the business needs, the next major task should be to choose the one specific vendor who is able to provide the above services putting into consideration both cost and performance.... Nevertheless there are a few guidelines that a company should put in place before deciding on the best cloud service provider....
10 Pages (2500 words) Essay

Internets Impact on Location of Global Firms

This paper ''Internets Impact on Location of Global Firms'' tells us that Micklethwait and Wooldridge called globalization 'the most important economic, political, and cultural phenomenon of our time' characterized by the 'integration of the world economy, reshaping business and reordering the lives of individuals etc....
13 Pages (3250 words) Assignment

Quality of Service in WiMAX Based Broadband Wireless Networks

specification of the selected topic and the motivation behind this selectionWiMAX and WiMAX-based broadband wireless network offer an alternative to existing wireless and mobile communication technologies.... 1 set of standards developed by this committee provide a basis for wireless local area network (WLAN) communications....
9 Pages (2250 words) Essay

Fiber Optic Security Systems

An intrusion detection and prevention system is a software or hardware designed to detect and mitigate any attack to the computer or network system.... Wireless IDPS: They are used to detect intrusions on the wireless system and rogue access points (unauthorized wireless access point used by hackers).... Other IDPS systems PIDPS: (Packet Intrusion Detection system) used for packet sniffing to detect attacks.... The main parts of an IDPS system are: Sensor: generates the security event Console: monitors the event Engine: it records the events logged by the sensors in a specified database....
8 Pages (2000 words) Thesis Proposal

Virtual Private Network

A well-designed VPN can greatly benefit a company by: ... ?? Thus, more effective ways of combating the threats especially in terms of access to the network are extremely important in order to determine that those who access an information systems infrastructure are authorized and recognized by the system.... (Wikipedia, 2007)” The encryption methodology in VPN is an end-to-end system whereby “the process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode....
5 Pages (1250 words) Essay

Creating value or Customer loyalty

his paper looks into the various ways through which a company or individual creates value for its customers and stakeholders.... The paper, will first of all discuss the various expectations of the various stakeholders in a company such as Wal-Mart, and subsequently the paper looks into the various ways through which customers and stakeholder's expectations could be satisfy by an organisation....
12 Pages (3000 words) Essay

Global Logistics System of Wall-Mart

The paper "Global Logistics system of Wall-Mart" examines the global logistics systems, in particular, focusing on the storage systems of Wal-Mart's retail location by examining the IT store network, logistics administration, supplier connections, and stock administration.... Programming frameworks are utilized for logistics automation, which helps the production network industry in automating the work process and administration of the organization....
11 Pages (2750 words) Case Study

Open Stack System and Cloud Computing

The author of this coursework "Open Stack system and Cloud Computing" describes key features of cloud computing.... The obstacles in communication associated with the system diagram are demonstrated by the 'Cloud' symbol.... This paper outlines Self –Servicing, network Access, Resource Pooling services, and Types of Cloud Computing and OpenStack Components.... loud computing is referred to as a technology designed to smooth the process of suitable network contact....
20 Pages (5000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us