StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Network Management in Transcom Tax Analysis Ltd - Case Study Example

Cite this document
Summary
The paper "Computer Network Management in Transcom Tax Analysis Ltd " discusses that the network will interconnect all the functional areas of the company, Transcom Tax Analysis Ltd and their interconnection will help in the data communication process…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Computer Network Management in Transcom Tax Analysis Ltd
Read Text Preview

Extract of sample "Computer Network Management in Transcom Tax Analysis Ltd"

Computer Network Management Table of Contents Computer Network Management 1 Reasons for proposed LAN 1 LAN Designing and Network Configuration Issues to Enhance the Performance 3 Unshielded Twisted Pair Cable (UTP) 3 RJ-45 Connector 4 MAU (Multi-station Access Unit) 4 Token Ring Topology 5 Recommendation of Network Operating System (NOS) 6 Hardware Recommendations 6 Services Provided by NOS 8 Potential Benefits of the Network 9 References 10 Computer Network Management Reasons for proposed LAN The company, Transcom Tax Analysis Ltd is interested in developing a networking system that enables it to interconnect all the workstations within the company premises and those company premises that are located nearby. The system that the company wants should be able to provide a central storage and printing facilities. Moreover, they are in need of adopting a paperless approach for their future procedures. In such type of needs and requirements, the best type of networking for the company, Transcom Tax Analysis Ltd, is LAN. LAN (Local Area Networking is established for developing an intranet between two or more than two sites (Leinwand, 1995). The company has multiple sites that need to be interconnected and all the sites are located in neighbouring areas. The proposed LAN for Transcom Tax Analysis Ltd is the Token Ring LAN. The ring shaped network basically uses baseband transmission with the token access method. The bus usually consists of screened four core cable and the equipment is connected via MAUs. Up to eight PCs can be connected to one MAU (Atkins and Norris, 1995). A total of 260 MAUs can be included in one ring. Several rings can be connected together by means of a bridge. The topology can be a combination of start and rings (Atkins and Norris, 1995). All the MAUs lie on the ring while the computers are connected in a star to the MAU. A special bypass device in the MAU senses which of the computers are not in use and cuts them out of the ring (Leinwand, 1995). Other connections in the MAU are included in the ring. The network follows the Institute of Electrical and Electronic Engineers (IEEE) standard 802.2 for link protocol and 802.5 for connection to the medium (Atkins and Norris, 1995). The normal transmission rate is 4 Mbits/s, but speed of up to 16 Mbits/s is possible. By analysing the company needs and requirements, it is clear that the company is in need of a Token Ring LAN that is designed in association with one or multiple MAUs. One MAU is enough for smaller locations but for larger locations, more than one MAU should be employed (Pountain, 2001). As the company’s working procedures are well spread, they are in need of more than one MAUs, which will be connected together developing one MAU as the central authority. The Token Ring Topology is considered more reliable and secure due to which, the company’s security issue will be resolved. Moreover, the Token Ring Topology is the best choice for those networking environments that have heavy workload. LAN Designing and Network Configuration Issues to Enhance the Performance 1.1 Network Design Unshielded Twisted Pair Cable (UTP) UTP cable is more sensitive to EMI than coaxial or STP cable. UTP cable’s category 5 is suitable for data rates up to 100 Mbps (Pountain, 2001). It has the lowest cost of any cable type. UTP offers an excellent balance of cost and performance characteristics (Leinwand, 1995). In this, all connecting devices are also graded and the overall cabling system only supports the data rates permitted by the lowest grade of component in the system. This cable will best work with the proposed network (Atkins and Norris, 1995). With Token Ring LAN network cards, DB-9 connectors will be used. RJ-45 Connector This is a plastic connector that looks like a large telephone style connector. A slot allows the RJ-45 connector to be inserted only one way. This standard designated with wire, goes with each pin inside the connector (Leinwand, 1995). It has eight pins. It is the most suitable connector for being employed with the proposed network (Atkins and Norris, 1995). MAU (Multi-station Access Unit) The MAU is the central cabling component for IBM Token Ring Network. Token Ring cabling connects the clients to the MAU or one MAU to another (Fitzgerald and Dennis, 1999). Cables that connect MAUs to each other are called patch cables. A MAU usually has eight ports. Each port is connected to an internal MAU ring (Leinwand, 1995). Each MAU has two rings. A ring in and a ring out port so that several MAUs can be connected in series. Each ring out port must connect to the next MAU’s ring in port. By simply connecting the ring in, one MAU to the ring out of the other and vice versa, you can effectively extend the ring (Leinwand, 1995). MAUs are used to close the connection automatically if the cable connecting a workstation becomes broken (Leinwand, 1995). By closing the connection, the malfunctioned workstation is isolated from the network, allowing the rest of the network to remain operational. Token Ring creates the ring in concentrated form called the Multi-station Access Unit (Atkins and Norris, 1995). Token Ring Topology A Token Ring network is a group of computers connected in a loop. The Token Ring network is more reliable as compared to other categories of networks because no collisions occur with the token passing scheme (Pountain, 2001). Token Ring Topology is the choice for network that tends towards heavy workload (Atkins and Norris, 1995). The speed of a Token Ring network can be from 4 Mbps to 16 Mbps depending on the type of cable being used and equipment placed and employed in the network (Fitzgerald and Dennis, 1999). 4 Mbps cards can run only at that data rate however 16 Mbps cards can be configured to run at 4 or 16 Mbps (Leinwand, 1995). All cards on a given network must be running at the same rate. The Token Ring Topology can handle large file transfers such as databases, CAD/CAM and multiple accesses to imaging files more easily (Atkins and Norris, 1995). Some applications of 16 Mbps on Token Ring Topology are not always as efficient as using 4 Mbps (Pountain, 2001). On Token Ring network, even there is no traffic; all the workstations continuously keep on passing electronic tokens among themselves (Fitzgerald and Dennis, 1999). If a workstation has nothing to send, as soon as it receives the token, it passes this token to the next down stream workstation however, token ring is not as wasteful of LAN resources as this description makes it sound, the token almost takes no time to circulate through the LAN (Atkins and Norris, 1995). The Token Ring confirms to the IEEE 802.5 standard (Atkins and Norris, 1995). It can use twisted pair cable (Shielded/Unshielded). The network adapter cards connect to the network cables with DB-9 connectors (Pountain, 2001). The cable attaches to the network with a hermaphroditic connector, which plugs into the MAU. Token Ring networks are wired in a physical star but logically, they are a ring and it is the MAU that makes it possible (Atkins and Norris, 1995). Recommendation of Network Operating System (NOS) The operating system that will work best with the network is Windows NT. This operating system is user friendly and provides a stable approach towards networking. Because of its support to the networking environment, the operating system is employed much in business locations. Windows NT should be employed as it is with more features and allows Graphic User Interface (GUI) due to which, a user-friendly environment is created that enables the users to use the operating system with ease (Leinwand, 1995). The reasons for this recommended network operating system are that, the costs related to deliverance of information to each location of the company will be minimized because of interconnection through networking operating system. Moreover, this option is also time-effective. The procedures will be performed with much accuracy and expertise by using this network operating system. The company currently makes use of Windows 98 that is an older version. The new operating system that is Windows NT allows many new features to be employed, which enable the working on networks much easier and much time lessoning. Hardware Recommendations According to my recommendations, the Transcom Tax Analysis Ltd can get new as well as used computer hardware systems, which will be suitable for all the software to run. First Option Acer Veriton 5900 Intel Core 2 Duo E4300 (1.8GHz 2M 800FSB) ,Q965 Chipset, 160 GB SATA, 512MB DDR2 Maximum supporting up to 2GB DDR II 667MHz RAM Dual Channels Supporting on Four DIMM, Embedded 10/100/1000 base TX Ethernet controller ,1 x Parallel, 1 x Serial , 8 x USB ports; 4 rear connectors and 4 front connectors , 1X VGA Port, PS/2Keyboard,PS/2 Mouse, DVD, Onboard VGA, Windows NT,3 years warranty. Second Option Acer Power FH Intel Dual Core 925 (3.0GHz 2X2MB 800FSB) ,Intel 946GZ / ICH7,80 GB SATA, 512MB DDR2 Maximum supporting up to 2GB DDR II 400/533/667MHz RAM Dual Channels Supporting on Four DIMM,, Intel Graphics Media Accelerator (GMA)3000 with Dynamic Video Memory Technology (DVMT) 3.0 PCI Express X 16 Graphic Card Support, 1 x Parallel, 1 x Serial , 8 x USB ports; 4 rear connectors and 4 front connectors , 1X VGA Port, PS/2Keyboard,PS/2 Mouse, COMBO, Onboard VGA, Windows NT,1 years warranty. Third option Acer Power FH Intel Core 2 Duo (2.0GHz) ,Intel 946GZ / ICH7,160 GB SATA, 1GB DDR2 Maximum supporting up to 2GB DDR II 400/533/667MHz RAM Dual Channels Supporting on Four DIMM,, Intel Graphics Media Accelerator (GMA)3000 with Dynamic Video Memory Technology (DVMT) 3.0 PCI Express X 16 Graphic Card Support,, 1 x Parallel, 1 x Serial , 8 x USB ports; 4 rear connectors and 4 front connectors , 1X VGA Port, PS/2Keyboard,PS/2 Mouse, COMBO, Onboard VGA, Windows NT,1 years warranty. Along with the above mentioned options for the hardware, for networking the following devices are must: MAU (Hub) Token Analyzer NAUN (Nearest Addressable Upstream Neighbour) for trouble shooting Token Ring Stations NIC (Network Interface Card) Cables Protocol Sockets Services Provided by NOS The proposed network operating system that is Windows NT is supportive in terms of employment of Ethernet ports (Atkins and Norris, 1995). It is supportive in the provision of all features that an operating system provides like processing support, protocol hold up, mechanical hardware recognition and other functions of operating systems (Leinwand, 1995). The network operating system, Windows NT provides security in terms of authenticity, validation, approval and other accessing options (Fitzgerald and Dennis, 1999). It also accommodates the network users in terms of information bank services (Fitzgerald and Dennis, 1999). It enables the users to share information all the way through the network (Pountain, 2001). Due to networking, the time consumed in the current operations will also be lessoned because of sharing of files, folders and other information over the network within no time through the usage of Token Ring Network (Atkins and Norris, 1995). It is user friendly and accommodates the user with the best support in terms of working. Potential Benefits of the Network The network that is proposed to the company, Transcom Tax Analysis Ltd is beneficial in terms of helping the company in completing its working procedures. The new network will reduce the time used in processing and completion of a task and will also minimize the time for responses as the company’s different premises and workstations can interact with one another within very less time and can pass the needed information quickly. The network will interconnect all the functional areas of the company, Transcom Tax Analysis Ltd and their interconnection will help in data communication process. Within very less time, the information will be transferred from one workstation to another. Because of full computerization, the working in terms of management of paper records will be minimized and record maintenance will go to a central location by means of hub. The company, Transcom Tax Analysis Ltd, is also concerned about its network security. The networking that is going to be established within the company premises and other nearby premises will make employment of a firewall, which will stop any unauthorized entry from internet side. It will stop all kinds of unnecessary internet passages for useless and harmful applications (Pountain, 2001). The router/firewall is called the choke point because it is the point at which, all the traffic could get choked off it if malfunctions good backups (Leinwand, 1995). Firewalls keep most obvious entry points locked down and act as a gateway from the company’s inside network to the outside world (Atkins and Norris, 1995). All the workstations at the company premises and other premises in the neighbouring locations will be interconnected, which will reduce all types of extra costs and time. Because of the interconnection, the company’s working procedures will be much enhanced and up to date. With improvement of technology, there are fair chances of the company’s business improvement. References Pountain, Dick. (2001). The New Penguin Dictionary of Computing. New York: Penguin Books. Leinwand, A. (1995). Network Management: A Practical Perspective. Routledge: Addison Wesley. pp. 67-86. Atkins, J and Norris, M. (1995). Total Area Networking. New York: John Wiley & Sons. pp. 134-155. Fitzgerald, J and Dennis, A. (1999). Business Data Communications and Networking. New York: John Wiley & Sons. pp. 45-72. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computer Network Management in Transcom Tax Analysis Ltd Case Study, n.d.)
Computer Network Management in Transcom Tax Analysis Ltd Case Study. Retrieved from https://studentshare.org/information-technology/1547834-computing-network-management
(Computer Network Management in Transcom Tax Analysis Ltd Case Study)
Computer Network Management in Transcom Tax Analysis Ltd Case Study. https://studentshare.org/information-technology/1547834-computing-network-management.
“Computer Network Management in Transcom Tax Analysis Ltd Case Study”, n.d. https://studentshare.org/information-technology/1547834-computing-network-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Network Management in Transcom Tax Analysis Ltd

National Health Service - United Kingdom

This is done with a view to carry out analysis and share information through out the system.... hellip; The NHS is managed by the United Kingdom, Department of Health and is funded by the tax payer.... National Health Service (NHS) of the United Kingdom is the largest organisation in Europe providing health care....
16 Pages (4000 words) Essay

The Supply Chain Management at Actavis

hellip; It also includes comprehensive findings, recommendations, and analysis before and after implementation of ERP integrated with Supply Chain Management (SCM) for Actavis to implement an ERP system.... This was done by interviewing Actavis management and Employees in the Payroll, Human Resources (HR), and Finance areas that will be impacted....
20 Pages (5000 words) Essay

Theory and Problems of Operations Management

The paper "Theory and Problems of Operations management" supports the idea that supermarkets will benefit greatly if they adopt the operating techniques and tools by reducing their operating costs, reduce costs associated with poor stock controls, improved customer satisfaction, reduced expediting costs and ultimately improve their sales revenue.... Operations management is a science that deals with the coordination of all functions of an organization.... The key factors that have led to the development of operations management include; globalization, total quality management, empowerment, and technology....
9 Pages (2250 words) Essay

Critical factors for successful implementation of ERP systems

Personnel and field people, ordinary employees, including middle-level and top management have to refocus along the line of technological innovations.... External and internal environments in organizations are becoming complex; thus they are handled with a globally-oriented brand of management, with the aid of Information Technology.... Corporate management is now handling a global-scale brand of management, requiring a different kind of strategy, much distinct from traditional management....
12 Pages (3000 words) Research Paper

Travel Development and Construction Rail Terminals

With the use of PESTlE and Porters' model of analysis, we have scanned the external environments that may become barriers to the high speed railway development plans.... The extent to which the marketing concept that should be applied in the High Speed Railway will now depend on the information gathered by the network.... A new high speed rail network would transform the UK's economic geography.... A Y-shaped national high speed rail network linking London to Birmingham, Manchester and Leeds, and including stops in the East Midlands and South Yorkshire, as well as direct links to the HS1 line and into Heathrow Airport, would cost £32 billion to construct, and would generate benefits of around £44 billion, as well as revenues totaling a further £27 billion....
21 Pages (5250 words) Essay

Analysis of Micron Software

The paper "analysis of Micron Software " highlights that the system was well developed and was able to cover all the stated functionalities in the software specification.... However, because of the weaknesses and limitations realized, there is a need to improve the system.... hellip; The source code for Micron is easily available for further development and future modification of the system....
19 Pages (4750 words) Case Study

Strategic Information Systems

Through adoption and formulation of ERP programs, a company will be able to produce more and management its work force more effectively.... has enjoyed improved and less hectic management processes that have enhanced good employer-employee relationships.... hellip; The author states that computer systems have provided businesses today with an opportunity to maximize on their time, resources and human labor through introduction of programs like the ERP....
15 Pages (3750 words) Essay

Security, Risk, and Compliance

The paper "Security, Risk, and Compliance" addresses network security, in the context of risk analysis and federal guidelines.... To this end, it is crucial that an organization conduct a thorough risk analysis that identifies vulnerabilities and proposes solutions to these vulnerabilities.... hellip; The conclusion from this study states that network breaches are serious problems that can lead to a lot of headaches and heartaches not just for the organization itself, but for the people whose information is stored by the organization's network....
8 Pages (2000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us