StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Implementation of Network Structure in the Context of Sally and Johns Busines - Assignment Example

Cite this document
Summary
The "Implementation of Network Structure in the Context of Sally and John’s Busines" presents the benefits and disadvantages of network implementation in the context of John and Silly’s business. John and Silly should take proper training in network usage and implementation…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Implementation of Network Structure in the Context of Sally and Johns Busines
Read Text Preview

Extract of sample "Implementation of Network Structure in the Context of Sally and Johns Busines"

?Networking Assignment By Table of Contents Networking Assignment Table of Contents 2 3 Introduction 3 Problem Analysis and Proposed Solution 4 Suggested Solution 5 Implementation of a VPN (Virtual Private Network) 5 Connecting to the Internet 10 Implementation of a Web Site 11 Security Considerations 11 Conclusion and Recommendations 11 Abstract There are seven wonders all over the world and a computer can be acknowledged as eighth. It is used in every walk of life to carry out different tasks. At the present, the majority of business organizations use computers to run their business. However, with the passage of time when size of business grows they need more people to enter and process data through computers simultaneously. In this scenario, they need to implement a computer network. This report discusses the scenario of Sally and John’s business, as they are running their business without having a proper computer network. This report suggests ways that can be adopted to improve their business capabilities. Introduction A computer network consists of a set of a number of parts which include hardware, software, and computers and all these parts are connected with each other using a wired or wireless medium to help business workers work in cooperation. Additionally, a network is established using particular cabling systems, software, communication medium and devices which deal with data traffic. Hence, a computer network allows its users to share files such as MS Word documents and resource such as scanners and printers, and transmits messages and data files electronically (or email) to each other (TechsChange, 2010; Nash, 2000; Norton, 2001; Turban et al., 2005). This report discusses the concept of networking in the context of Sally and John’s business. They are running their business without having a network support so they are facing several problems in managing their business tasks. This report guides them regarding the establishment of an effective network structure. Problem Analysis and Proposed Solution Up till now John and Sally have been using traditional approaches to run and manage their business process. In view of the fact that their business is growing rapidly and there is a need for an effective communication structure in order to deal with growing business needs hence they need to implement a computer network. A computer network is a set of computers which are connected with each other using wired or wireless medium. In this scenario, networks which are used using wires and cables are known as wired networks. On the other hand, wireless networks use microwaves or radio waves for the communication (Mitchell, 2013; Shelly et al., 2005; Malladi & Agrawal, 2002). Some of the basic requirements and objectives of this network implementation are: John and Silly want to improve communication structure for their business The establishment of an effective data and file sharing environment Implementation of secure data access points of communication Getting a support for remote access to the network Getting the facility of remote data transfer and access mechanism Putting into practice modern data communication framework Implementing an effective data recovery and backup mechanism The implementation of a network structure which allows them to transfer and retrieve data at high speed Suggested Solution Implementation of a VPN (Virtual Private Network) In light of business needs and objectives of John and Sally, I would suggest them to implement a modern and efficient network structure for their business. In this scenario, I would suggest them to implement a virtual private network VPN. A virtual private network extends the range of a private network incorporates connections all the way through public or shared networks such as the Internet. Basically, a VPN allows users to send and receive data and files between two computers across a public or shared internetwork in a way that follows the rules and characteristics of a point-to-point private link. In addition, the process of building and configuring a virtual private network is acknowledged as virtual private networking (Microsoft, 2001). In the case of John and Silly’s business, a VPN can be used to connect with each other. As this connection will allow the Silly and Peter to connect with each other at the same time as maintaining the connection with John. Figure 1 demonstrates the practical implementation of this idea: Figure 1An Overview of VPN, Image Source: (Dunigan, 2004) In addition, the basic objective of implementing a VPN is to provide John, Silly and Peter with similar facilities and capabilities which can be offered by a local area network however at a much lower cost. Additionally, a VPN makes use of a shared public framework by taking into consideration a wide variety of privacy and security parameters and measures in addition to tunneling protocols such as Layer Two Tunneling Protocol (L2TP). Hence, a high level of security is implemented which encrypts not only the data, but also determines the authentication of receiving network addresses (Rouse, 2007). Benefits of the Proposed Network Solution Without a doubt a computer network offers a number of advantages. In the scenario of Silly and John’s business it will offer the following advantages: Improved data processing and recording Improved data communication and storage capabilities Excellent data security and privacy Effective data collection process A real-time and online mechanism to get access to the corporate network. In case silly’s computer does not work properly it will not affect the network and others will be able to work effectively. Effective authentication and system security Appropriate data security by providing backups and recovery facilities Effective data management facilities As they all can work at the same time so there will be less data duplication Excellent support for sharing resources such as printers and scanners. Disadvantages of Network In scenario of John and Silly’s business there can be some disadvantages of this network, some of the important disadvantages are outlined below: As this network makes use of the Internet so there is chance of virus attacks DoS (denial of service) attacks Data theft (data and information can be hacked by a hacker) Data leakage Network breakdown Networking knowledge and skills (John, Silly and Peter would have to learn the basics of networking in order to effectively use this network) Network Components, Devices and Equipment The implementation of a virtual private network will require the following components: (Tyson & Crawford, 2013; Cisco, 2013) Corporate internal single wide-area network (WAN) for the business Cable connectors Wireless devices for the communication of data and information Business workstations Data servers Network servers Data backup server Network Router Micro Hub Transmission cable UTP Wireless Networking A wireless network is a network which is built using microwaves or radio waves. It does not make use of the wires to transmit data. In its place it uses radio waves to establish connect to other computers. A wireless router is used to build this kind of network. Some of the advantages and disadvantages of this networking are outlined below: (Information Point Technologies, 2013) Advantages of Wireless Networking: It can be established in the areas where wires cannot reach It can go beyond the limits even the boundaries of the countries There is no need for wires It is a very high speed networking It allows the users to access the network from any location. It allows the users to access the network from home, office or any other place It is affordable Disadvantages of Wireless Networking Security is the major problem in wireless networking When the area covered by a network increases it affects the range and quality of wireless signals The speed of wireless networks is much lesser than wired networks Connecting to the Internet In order to connect to the Internet Silly will need to take an Internet connection from any Internet Service Provider (ISP). In this scenario, an ISP is an internet service provider that charges a monthly fee (in some cases yearly fee) in return for offering the user Internet access. In addition, ISPs offer a wide variety of services such as dial-up service, cable, DSL, or other types of Internet access. When Silly will take a connection from an ISP, she will be provided with a username and a password which she can use to connect to the Internet. When she will connect to the Internet a temporary IP address (Internet Protocol address) will be assigned to Silly’s computer. The Internet uses IP addresses for the communication. Every computer on the Internet is identified through an IP address. In addition, every computer on the Internet has a unique IP address which distinguishes it from the other computers. Moreover, Silly can use the Internet once she gets a connection from an ISP (Kayne, 2013; Shelly et al., 2005). Peter will also be able to connect to the Internet using an Internet connection. In this scenario, Peter can also use an an IP address to get access to this local area network. Basically, a private IP address lies within the given IP address ranges, which are particularly established for private uses by Internet standards groups: (Mitchell, 2013) 10.0.0.0 to 10.255.255.255 169.254.0.0 to 169.254.255.255 (reserved for APIPA only) 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 In addition, private IP addresses are particularly utilized on local networks such as school, building, home and business LANs comprising airports and hotels (Mitchell, 2013). Implementation of a Web Site Sally and John should implement a website. It is easy to establish a web site. For this purpose, they will need to search for a suitable web site designer. They need to explain their requirements to that designer and develop the web site. After that they will need to buy a domain name for their business. In this way they can publish their web site on the Internet. Security Considerations Without a doubt, the implementation of a network brings a number of advantages and opportunities for John and Silly. However, it can also create some security challenges such as virus attacks, data theft and illegal access to their network. In this scenario, there is need to consider all these factors while implementing this network. Conclusion and Recommendations This report has presented a detailed analysis of implementation of network structure in the context of Sally and John’s business. They are running their business without having a proper network arrangement. Now they have decided to implement a network structure which is aimed at improving business processes of John and Silly’s business. In this scenario, they have decided to implement a VPN network. This report has discussed the benefits and disadvantages of network implementation in the context of John and Silly’s business. In order to make this implementation a success, John and Silly should take proper training about network usage and implementation. They should also take effective security measures to deal with security challenges. They should install antivirus software and network firewalls. They should also hire an IT expert who deals with their IT operations. In this way it will reduce their burden. References Cisco, 2013. Cisco VPN 3000 Series Concentrators. [Online] Available at: http://www.cisco.com/en/US/products/hw/vpndevc/ps2284/index.html [Accessed 13 January 2013]. Dunigan, T., 2004. Virtual Private Networks. [Online] Available at: http://www.csm.ornl.gov/~dunigan/vpn.html [Accessed 14 January 2013]. Information Point Technologies, 2013. Wireless Networking (Wi-Fi) – Advantages and Disadvantages to wireless networking. [Online] Available at: http://ipoint-tech.com/wireless-networking-wi-fi-advantages-and-disadvantages-to-wireless-networking/ [Accessed 14 January 2013]. Kayne, R., 2013. What is an ISP? [Online] Available at: http://www.wisegeek.com/what-is-an-isp.htm [Accessed 13 January 2013]. Malladi, R. & Agrawal, D.P., 2002. Current and future applications of mobile and wireless networks. Communications of the ACM , 45 (10), pp.144 - 146. Microsoft, 2001. Virtual Private Networking: An Overview. [Online] Available at: http://technet.microsoft.com/en-us/library/bb742566.aspx [Accessed 10 January 2013]. Mitchell, B., 2013. What is (Computer) Networking? [Online] Available at: http://compnetworking.about.com/cs/basicnetworking/f/whatsnetworking.htm [Accessed 10 January 2013]. Mitchell, B., 2013. What Is a Private IP Address?. [Online] Available at: http://compnetworking.about.com/od/workingwithipaddresses/f/privateipaddr.htm [Accessed 13 January 2013]. Nash, J., 2000. Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc. Norton, P., 2001. Introduction to Computers, Fourth Edition. Singapore: McGraw-Hill. Rouse, M., 2007. virtual private network (VPN). [Online] Available at: http://searchenterprisewan.techtarget.com/definition/virtual-private-network [Accessed 15 January 2013]. Shelly, Cashman & Vermaat, 2005. Discovering Computers 2005. Boston: Thomson Course Technology. TechsChange, 2010. Computer Networks. [Online] Available at: http://tecschange.org/classic/networks/network-syllabus.html [Accessed 12 January 2013]. Turban, E., Leidner, D., McLean, E. & Wetherbe, J., 2005. Information Technology for Management: Transforming Organizations in the Digital Economy. New York: Wiley. Tyson, J. & Crawford, S., 2013. How VPNs Work. [Online] Available at: http://www.howstuffworks.com/vpn.htm [Accessed 14 January 2013]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networkinh Assignment Example | Topics and Well Written Essays - 1500 words”, n.d.)
Networkinh Assignment Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1466396-networkinh
(Networkinh Assignment Example | Topics and Well Written Essays - 1500 Words)
Networkinh Assignment Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1466396-networkinh.
“Networkinh Assignment Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1466396-networkinh.
  • Cited: 0 times

CHECK THESE SAMPLES OF Implementation of Network Structure in the Context of Sally and Johns Busines

A business process method for virtualized enterprises

This future implementation will be directed towards achieving a more advanced system and form of business and organizational structure.... Expanding the explanation further, Tech Target (2007) explain that “virtual systems management (VSM), is the process of remotely managing the allocation and use of resources in conventional networks as well as in virtual area networks (VANs), virtual private networks (VPNs), virtual network computing (VNC) and virtual servers....
8 Pages (2000 words) Research Paper

Polyprod Change Management

Due to the rapid development in the Polyprod Company, severe managerial, documentation and personnel problems have resulted.... It is necessary for change to be initiated in the company.... In this article, the consultant uses the Mckinsey 7S models and the Weisbord model to generate solution that can improve these departments....
16 Pages (4000 words) Assignment

ARLA Foods Relationship Marketing Practices

This proposal will examine ARLA Foods' implementation of new strategies of relationship marketing and its corresponding self-realignment activities.... “In a few hundred years, when the history of out time is written from a long-term perspective, it is likely that the most important event those historians will see is not technology, not the Internet, not e-commerce....
14 Pages (3500 words) Essay

Impact of Information and Communication Technology in Academic Libraries, over the Last 25 Years

implementation of information and communication technology can be seen all around us.... Each field of present life has totally transformed and emerged… This research presents the detailed analysis of the implementation of new technology at libraries.... Before we start our discussion about implementation of ICT in library we should know the basic concepts.... This research is In past few years the operational structure of each area of life has transformed and emerged as more organized, disciplined, managed, and easy to handle structures....
12 Pages (3000 words) Essay

Strategy Innovation and Change

implementation of strategy often calls for changes in organisational resources depending upon the desired transformation.... The decisions with corporate strategy evaluate the extent of organisational activities by centring them on competitive advantages.... As it can be observed, the primary aim of strategic management… 6-7)....
15 Pages (3750 words) Essay

Analysis of Complete Web Solutions Company

The author's objective in this paper is to explore services, marketing approaches, organizational structure, management of change and financial control as the new manager of Complete Web Solutions Company which offers web designing and developing services to private businesses… Measure the volume of staff activity....
13 Pages (3250 words) Assignment

Providing Basic Computer Education to the Filipino Youth

The CIDA FUTION room will be housed in the De La Salle-College of Saint Benilde School of Design and Arts (SDA) Building, a 14-story structure on P.... … The paper "Providing Basic Computer Education to the Filipino Youth' is a great example of a personal statement on education....
6 Pages (1500 words) Personal Statement

Affect Architecture on Behavior of the Society

This paper "Affect Architecture on Behavior of the Society" tells that in an examination of how scholars have argued and expressed understanding of architecture, it is possible to develop coherent arguments on how power control affects behavior and people (Lockton, 2011).... hellip; The diverse set of concepts and methods in some of the journals helps in understanding the ways in which architecture regulates the social, economic, and political phenomena....
6 Pages (1500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us