StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Network Architecture - Essay Example

Summary
The paper "The Network Architecture" takes up the various network topologies to make communication feasible and possible with regard to all the physical and network barriers. The network design would provide enough architecture which would give a clear picture…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
The Network Architecture
Read Text Preview

Extract of sample "The Network Architecture"

Running head: Bead Bar Network Bead Bar Network Executive Summary The central aim is to observe the business processes and the businessorganization in place and prove ones analytical skills to understand how the business can be enveloped using a computer network infrastructure for making communication swift and successful sharing of information. The proposed network would entail better communication and save the organization on costs for facilitating one process to get the job done. The departments concerned would be able to capture and share effectively valuable business information so as to remain synchronized with the latest events and take decisions accordingly saving time and costs. Table of Contents Executive Summary 2 Table of Contents 3 1.Introduction 4 2.Background information of Bead Bar: 5 3.Recommendation overview: 5 4.Network topology 6 5.Explanation of the Network Design: 8 6.Network Topology: 9 7.Advantages of the architecture: 9 8.Drawbacks of the architecture: 11 References/ Bibliography 13 1. Introduction Bead bar concentrate in producing beads jewellery for the customers. They are organized into three divisions’ namely studios, franchises and bead bar on board which demands to be brought to the same page for synchronization of activities. The proposed network design and the appropriate topology which would be an advantage to the firm for ensuring communication and sharing information to keep in synchronization with the current prospects of the business. The following sections would take up the various network topologies to make the communication feasible and possible with regard to all the physical and network barriers. The network design would provide enough architecture which would give a clear picture of the interconnection of devices and the departments to facilitate the sharing of business information. The final segment discusses the pros and cons of the proposed topology in subject. 2. Background information of Bead Bar: Bead Bar is departmentalized into three divisions namely studios, franchises and bead bar on board. The current circumstance is incapacitated to link among them and thus creates inconsistencies in information sharing and knowledge about the company as a whole, at any given point of time. A computer network would make possible the process of getting the entire job done for every customer within an affordable time than usual. It would make sure that information regarding ones choice and preferences would be catered and stored for future benefits. The network would enrich the communication among the divisions which in turn would assist greater workability and functionality in operation. 3. Recommendation overview: The network proposal for the Bead Bar could be surrendered into LAN and WAN. The internal network within the divisions would have a LAN network; however the inter-department contact would be made feasible using WAN as they are geographically separated. The LAN network would make sure to connect the personnel of the particular department itself and the swift communication would be an outcome of it. For the LAN network, switches and hubs are used for connecting the particular division itself and for WAN routers are used for interconnecting each other. 4. Network topology The exposure of the company into departments and the geographical locations make sure that all the information is catered evenly and promote sharing of information. Figure 1 : Network Design 5. Explanation of the Network Design: The three divisions of the company are interconnected using the network cable in a wired network using both LAN and WAN. Using LAN, the computers are interconnected within the same premises so that all the employees are able to communicate on demand. The head office possess central server where all the information is stored pertaining to all the departments in their database. The other premises are networked using the LAN technologies. The switch is two layered and used to take care of the storing and forwarding mechanism Tanenbaum (2003). Using WAN the network connections are using the public data services and get connect to internet and using VPN technology, using login credentials. 6. Network Topology: The LAN technology follows a star topology with connecting hubs. The interconnecting devices facilitate the use and sharing of information. Star topology promotes the efficient use of network resources. 7. Advantages of the architecture: Having a star topology takes less expensive in relation to mesh topology. In a star, every device needs only one link and one I/O port to inter-connect with a number of other devices (Forouzan, 2003). The installation and configuration of the star topology is quite easy and makes possible the effective use of time and need. The cabling requirement is less in compared with other technologies and any additions, deletions and movement involves only one connection between that device and hub. Quite robust in nature; if one link fails the other connections do not cease to operate. This factor also enhances the fault identification and fault isolation mechanism. As long as the hub is in working condition, the monitoring of links are possible to detect link problems and bypass defective links. A WAN is used for connecting to the internet so as to get connected with the other departments across geographic locations. VPN technology is used to so that their develops a secured channel through which the user of the network can establish a secure connection for communication. It would possess proper login credentials for accessing information and makes sure that its encryption technology debars any tapping and illicit use of information. The database server would be responsible for storage of all data and information centrally and all the users access the information using their credentials. The VPN technology makes sure that only authorized users are enabled to access information pertaining to the specified department and others would be debarred from the very system. 8. Drawbacks of the architecture: The VPN technology is quite expensive to implement and manage. The expensive nature of the wireless switches and hubs is quite a disadvantage. The use of internet as a resource to map their requirements would take lesser cost and make efforts to create a virtual company but security measures must be a challenge to the organization in question. 9. Conclusion The primary objective to inter-connect has been taken into description and the network topology has been elaborated to give shape to the entire network for interconnecting the various divisions in the company. The network architecture for the firm and the drawbacks are carefully noted and examined for their feasibility and cost factors. The long term evaluation is made and it can be concluded that taking care of the network advantages would benefit the firm in the long run to achieve the amount of customer satisfaction in the long run. Furthermore the topology would be able to manage its resources and make a distinct move towards the very nature of their being. Further up gradations to the network can be managed effectively so that they are taken care for growth and envelopment of their future plans. References/ Bibliography Forouzan A. Behrouz (2003). TCP/IP Protocol Suite, second edition. Tata McGraw Hill. Tanenbaum, A. S (2003). Computer Networks, Pearson Education. Read More

CHECK THESE SAMPLES OF The Network Architecture

Annual Potential Loss Application Attack Threat

These enhancements will add even more layers of security to the basic proposed network architecture with greater concern for security.... It is widely accepted that the more layers of protection the more security, in this kind of network architecture.... The paper "Annual Potential Loss Application Attack Threat" gives advice on how to increase the security level given by the base level proposed architecture.... Actually, network firewalls have no capacity what so ever to protect against custom web applications (Eschenauer and Gligor, 1)....
10 Pages (2500 words) Case Study

Iphone Network and Technology

iPhone network and Technology Harris Kamran Telecommunication Outline Note: Each bullet point represents a paragraph in the paper....
12 Pages (3000 words) Research Paper

Cellular Networks Comparison

The Network Architecture of UMTS entails simply models continuously on the network.... EV-DO network architecture is centered on wireless Internet Protocol architecture while the functional components of EV-DO are the Core Network (CN), the Radio Access Networks (RAN), and the Mobile Station (MS).... he WiMax refers to Worldwide Interoperability for Microwave Access, the WiMax network architecture is built on the Internet Protocol based where the network is split into three rations called ASN (the access service networks,) the mobile stations (MS), and the connectivity service network (CSN) which runs Internet Protocol linkage (Goff 77)4....
5 Pages (1250 words) Essay

4G Wireless Networks

In relation to determine service availability of 4G WiMax network, it has been viewed that 4G WiMax network possesses limited sort of service availability due to the reason that the network does not consider and often cut–off the additional users except the existing ones in using the connection.... The services and application of 3G wireless network has been identified to facilitate the mobile users in order to accomplish incessant connectivity utilizing different videos, data and voice services through various networks as well as devices....
4 Pages (1000 words) Research Paper

Network Infrastructure Basics

The TCP/IP protocol suite works independently of the physical network architecture (Dye, McDonald, and Rufi, 2008).... The paper "Network Infrastructure Basics" describes that the network and sharing center is a tool like a network mapping and network location that allows viewing and specific additional settings and profiling of networks.... The application can also be used for network connectivity troubleshooting issues.... Protocols are sets of standards that facilitate communication between network hosts....
4 Pages (1000 words) Assignment

Neuromorphic Computing Technology

Nawrot (2014) indicates that the design of The Network Architecture was based on and inspired by the nervous system of insects that processes odor.... To understand the working of The Network Architecture that was developed by these scientists, it is imperative to first understand the characteristics of silicon neurons as they are the building blocks that were used in the new architecture....
5 Pages (1250 words) Research Paper

Living in a Network-Centric World

The study "Living in a network-Centric World" focuses on the critical analysis of the peculiarities of a new dimension of living in a network-centric world.... The world has become a global village due to the introduction of data networks, especially the Internet....
5 Pages (1250 words) Case Study

3G and 4G Wireless Networks

Nevertheless, The Network Architecture of the 3G and the 4G Networks contrasts in that; while the 4G Networks allows for the combination of both the Wide Area cellular-based and the Local Area Network connections, the 3G network architecture is only limited to the Wide Area Cellular-based networking connections (Agbinya, 2009).... The paper "3G and 4G Wireless Networks" compares 3G to 4G wireless networks in terms of services and application, network architecture, data throughput, user perceptions, identifies why the competition between the 4G LTE carriers was so fierce and the benefits of competition to the subscribers....
5 Pages (1250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us