StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Installing a Networking System at ABA Financials - Case Study Example

Cite this document
Summary
The paper entitled 'Installing a Networking System at ABA Financials' gives detailed information about all the details of installing a networking system at ABA Financials which is an upcoming financial service and consulting firm to be located in New York City…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Installing a Networking System at ABA Financials
Read Text Preview

Extract of sample "Installing a Networking System at ABA Financials"

Networking Project Report Networking Project Report Introduction This report outlines all the details of installing a networking system at ABA Financials which is an upcoming financial service and consulting firm to be located New York City. The firm has about 130 employees and the computer network system designed is expected to promote the effectiveness of operations and support further growth of the firm. The report will outline the components of the network including the hardware and software and also show the topology and cabling diagram of the network. It will show the IP allocation for both the intranet and Internet components of the network. It will also show the location of the hubs, wireless access points, repeaters and all components of the security system. It will finally outline the budget of the network including the installation expenses as well as maintenance costs. Components of the Network The network to serve the over 130 employees at the company will consists of three categories of devices including the end devices, intermediary devices and the Network media. These will form the infrastructure that supports the network. The devices and media are the physical components or hardware of the network. The hardware is the physical items of the network that can be seen. These include the laptops or PCs used in the company, switches, routers, wireless access points and the cabling platform to connect these devices. The network will not be complete without end devices which the staff will be using. The end devices include computers or laptops at the work stations. Other devices will be printers, security cameras, VoIP phones, tablets, PDAs and wireless debit or credit card readers (Kurose & Keith, 2010). The network will have a host device that will be the source or the destination of all the information transmitted in the network. The network will also have intermediary devices that will work behind the scenes to ascertain flow of data across the network. These intermediary devices will include network access devices such as switches and wireless access points, networking devices such as routers and security devices such as routers (Kurose & Keith, 2010). These will be involved in the management and control of data flow. Other devices to complete the network will be the network media. Network media include metallic wires within cables, glass or plastic fibers which will include the fiber optic cables for wireless transmission. Topology and Cabling Diagram Topology and cabling diagrams provide a visual map of the network will appear after connection or how the connection will be done. This computer network will use two types of topology diagrams; physical topology diagram and logical topology diagram (King, 2010). Physical Topology Diagram This will show the physical location of the intermediary devices, the cabling network and also the configured ports. Logical topology diagram This will show the devices, ports and IP addressing. The two diagrams are shown below Types of network in the System This computer system will utilize both the Local Area Network (LAN) as well as the Wide Area Network (WAN). The LAN is a network infrastructure that offers access to the users of end devices in a small environmental area while the WAN is a network infrastructure that offers access to a wide or large geographical area (Kurose & Keith, 2010). LAN The LAN that will be used in this network will connect end devices in the company including all the main offices and staff operational areas. It will be controlled and administered by the system administrator in the organization. It will provide high speed bandwidth to all the internal end devices such as laptops and all intermediary devices in the organization. WAN WAN normally covers a large geographical area and will be administered by the service provider. In this network, the WAN will be provides by the service providers (SPS) or the Internet service providers (ISPS). It will link the LAN in the computer network in the company. The Internet The network in this installation will be formed by a combination of LANs and WANs in the connection. The internet will be used to assist the LAN and Wan to communicate with other resources or networks outside the company in order to receive information. The internet is a worldwide compilation of interlinked networks which function in collaboration with each other to exchange data using customized standardized (Kurose & Keith, 2010). Internet users usually exchange information in a variety of ways through fiber-optic cables, wireless transmission and satellite links. The operations of the internet can be summarized as shown in the diagram below: The diagram shows a collection of many LANs and WANs. The internet is a compilation of several networks and is not owned or controlled by a single individual. To ensure that the company benefits from the internet, then it will be necessary to have diverse and well connected infrastructure that will be compatible with the accepted technologies and standards as the mode of operation of major network administrative agencies. These organizations or agencies have the responsibility of assisting in the maintenance of the structure and customization of internet protocols and functions. The Intranet Intranet is a term describing the collection of LANs and WANs associated with a single organization like the ABC Company. The intranet is specifically designed and customized to serve the needs of the staff members in an organization. This is a type of internet that is only accessible to only the users in the specified firm. In the intranet, the management or other staff members will be publishing their information including news about events or activities in the firm; newsletters as well as staff contact information (Kurose & Keith, 2010). The intranet thus serves the purpose of enhancing the efficiency of the operations of a company. The IP allocation for the Intranet and Internet The IP allocation for the computer network in the firm will appear as show below: Wireless Networking The computer network installed in the firm will apply the wireless networking technology in order to enhance and increase the use of laptops within the firm and enhance staff mobility. Wireless technology is convenient to use and does not require too much maintenance like the wired one. Wireless technology in short allows two or more devices like computers to communicate via customized network protocols without the use of cables. Components of the Wireless Network The network will apply two types of wireless networks: ad hoc and the one using network access points. The two types of networks will be in application to ensure that in case one fails, the other serves the purpose. Ad-hoc The ad hoc wireless network is also known as peer-to-peer wireless network and is composed of several computers each fitted with a wireless networking interface card. Each pc can communicate directly with the others which are all linked via a wireless system (King, 2010). The computers in the system will be sharing files and printers and will thus minimize movements in the company. This will ensure that the movements in the organization are minimized and efficiency enhanced. The Ad-Hoc wireless interface appears as shown below: Point Access Point This wireless connection uses an access point or base station. In this type of networking the access points function as a hub, offering connectivity for the wireless laptops. It can link a wireless LAN to a cabled one enabling the wireless PCs to access all the resources in the network. The two types of access points that will be used in this diagram include hardware access points and software access points (King, 2010). Hardware access points provide a complete support for all the wireless network devices. The configuration will appear as shown below: While the software access point will appear as shown: Weaknesses of the Infrastructure and Design This network design and infrastructure will still have some drawbacks thought they can be managed. Some of the problems associated with wireless communications include security issues. In a computer system consisting of LAN and WAN which are linked via cables as well as wireless networking, intruders can easily get access to the system. Intruders include malicious hackers who can interfere with the functioning of the network. It is important to install and maintain a secured system which cannot be interrupted by anyone. As a result of this problem it might be difficult to maintain privacy in the company. This problem can however be solved through installation of a Wired Equivalent Privacy) WEP. This WEP will be in an encrypted form which is even much secured than the normal wired network. The encrypted network will be difficult to crack. The WEP technology can also be enhanced with WPA and WPA2 which will further improve the security of the system (Mansfield-Devine, 2009). Another issue with this network system is that it can have issues with decoding information from devices such as printers, decoders and shortwave receivers. There are also problems with eavesdropping unless with experienced specialists. It is thus important to observe that the cabled networked will not be put away (Mansfield-Devine, 2009). Other Security Threats Other than security risked posed by hackers interfering with the system, the network might have issues with BYOD environment and cloud computing requirements. The security details installed will secure corporate data and ensure efficient and effective functioning of the system. Complete network security will consist of several items including protocols, WAP2 technology, devices and technologies to mitigate any risks. The system will be installed with relevant security measures to prevent attacks from viruses, worms and Trojans. These damage the software of any system and alter its functioning or even completely damage the entire network. The company should also be wary of spyware and adware that can affect the system. These usually collect information from a system secretly without the knowledge of other users (Simmonds, Sandilands & Van Ekert, 2004). The system will be installed with logical and secured passwords to ensure that no one interferes with its functioning without authorization from the system administrator. Other than external threats, the company should consider internal threats. The administration should ensure that none of the 130 employees cause privacy problems in relation to the company data. It has been established that employees in various company can be involved in security and privacy breaches which calls for establishing of a centralized control point. The management will have a clearly defined policy to control security and privacy issues in the firm (Simmonds, Sandilands & Van Ekert, 2004). Solutions to Security Issues It is difficult to control all the security issues with a computer networking system using a single security solution. As a result, security measures are installed in form of multiple layers of several security details. In case one of the security layer or detail fails, then the others can take cover and ensure the system is always secured. The network will entail various components installed to monitor and control the traffic flow (Simmonds, Sandilands & Van Ekert, 2004). This system will consist of the following components: Antivirus and Antispyware These will be installed to safeguard the software of employees from malicious programs such as viruses and worms Firewall filtering The system will also be installed with firewall filtering devices to block any illegal or unpermitted access to the network. It will also include a host-based firewall system to block illegal or unpermitted access to the host devices or at least filter the devices that can access information from the host (Simmonds, Sandilands & Van Ekert, 2004). This will include a basic filtering device installed in the network’s main router to prevent unauthorized network. Since this is a network to serve an entire organization, it will require other security details. These will include a dedicated firewall system to enhance security, access control lists and intrusion prevention system (IPS). The security detail will be completed by a virtual private network (Simmonds, Sandilands & Van Ekert, 2004). Budget/Cost of the Installation The budget will consist of the following: Hardware Category Computers, enough computers will be required to serve the 130 employees. Laptops Servers Firewalls Routers Switches Cabling Warranties Licenses Renewals New Purchases New Warranties New Licenses Routine Hardware Implementation Software Category Server Software Laptop Software Desktop Software Antivirus Anti-Spam Backup Software Licenses Renewals New Purchases New Licenses Routine Software Implementation The total budget of installing the computer networking system is expected to be $100,000. Budget of Maintenance Cost The maintenance personnel will include an IT manager and three technicians. The IT manager will be a qualified and experienced person having a degree in information, communication and technology. The person will have proper command and be able to guide the three technicians who will work under him. The technicians should also have a degree in information communication or other related degrees such as degree in computer science, a degree in internet and networking. The salary of the IT manager will range from $77,000 to $80,000 annually (Department of Labour, 2014). The three technicians will get salaries ranging from $50,000 to $70,000 on annual basis. Conclusion The report has outlined the entire process of installation of a computer networking system of the ABC Company. It has given all the requirements including all the devices required both hardware and software that will be required. It has also provided the initial budget of the installation as well as the cost of maintaining the system. The report has also outlined the details regarding the security system of the network. The network will have both LAN and WAN and will also involve wireless networking which experiences serious security risks if it is not checked and controlled. The network is expected to enhance the efficiency and the functioning of the entire workforce and operations in the Company. References Department of Labour, Occupational Employment Statistics, Retrieved on 30 Nov. 2014. King, R. (2010). "Computing: Small Companies Take Flight". Bloomberg BusinessWeek. Retrieved on 30 Nov. 2014 Kurose J. F & Keith W. R. (2010). Computer Networking: A Top-Down Approach Featuring the Internet, New York: Pearson Education Mansfield-Devine, S. (2009). "Darknets". Computer Fraud & Security 2009 (12): 4–6. Simmonds, A; Sandilands, P. & Van Ekert, L (2004). "An Ontology for Network Security Attack". Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285: 317–323 Member Responsibility We shared our work equally between the two of us depending on the deliverables of the report. Though we worked in consultations each of us conducted advanced research on the assigned areas in coming up with the report. After completing the assigned parts, we consolidated the work, wrote the report and is now ready for presentation and marking. We assigned the tasks as follows: Member1: List of requirements including hardware and software and budget of both the installation and maintenance and security issues. Member 2: Topology and Cabling Diagram, Design of IP allocation for both Intranet and Internet and design of the network. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Installing a Networking System at ABA Financials Case Study Example | Topics and Well Written Essays - 2250 words, n.d.)
Installing a Networking System at ABA Financials Case Study Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/information-technology/1849460-data-communication-and-networking-project
(Installing a Networking System at ABA Financials Case Study Example | Topics and Well Written Essays - 2250 Words)
Installing a Networking System at ABA Financials Case Study Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/information-technology/1849460-data-communication-and-networking-project.
“Installing a Networking System at ABA Financials Case Study Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/information-technology/1849460-data-communication-and-networking-project.
  • Cited: 0 times

CHECK THESE SAMPLES OF Installing a Networking System at ABA Financials

Networking

The VPN allows users to connect to the network system through a remote connection system.... The VPN allows users to connect to the network system through a remote connection system.... The new rout connection to its route point ensures none of the data packets are not addressed in the LAN system on the remote network.... An internet connection for a stable internet service provider and a digital service line (DSL) modem which is a modem and a broadband router, a router which routes traffic from the local network to the internet, clients computers which connects to the main frame computer to form a network system, these are the computers that the users will use, and the windows 2008 sever essentials that will provide file sharing and used for remote access....
3 Pages (750 words) Research Paper

Competitive Advantages of Computer Networking

The staffs must be headed by the network administrator to ensure "smooth flow" of information in the system.... (Midkiff, 2004)Question B:There are a lot of possible options to use in implementing a network system.... On the two types of network designs, the peer-to-peer type of system is most recommended.... This kind of system will allow the groups to utilize all the resources of the centres, including storage capacity, bandwidth and computer power....
2 Pages (500 words) Essay

Social Networking in Cyberspace: Values Portrayed In Popular Media

The research shall take into consideration the broad aspects of the development of internet sphere into a super-medium which has considerable influence in the way of shaping a modern internet culture that contributes to the value system of individuals.... The current research proposal endeavors to develop a concrete theory on the values surrounding the internet sphere with a focus on social networking websites.... hellip; The rise of social networking websites has been fraught with controversies as being attributed to begetting different ills as the destruction of privacy and paving the way to bigger crimes like frauds, child molestation, and pornography among others....
1 Pages (250 words) Research Proposal

Introduction to Networking

Therefore, through needs assessment, it becomes easier to know the vulnerabilities that a computer system may face.... Apart from Adventure works questionnaire, the other method that can be used to conduct the needs assessment of a computer network includes system analysis.... Therefore, through needs assessment, it becomes easier to know the vulnerabilities that a computer system may face.... Apart from Adventure works questionnaire, the other method that can be used to conduct the needs assessment of a computer network includes system analysis....
2 Pages (500 words) Essay

Problems when installing software

One of the most common problems in installing a software in an organization is lack of full compatibility with the installer of the organization operating system.... The main problem brought about by installing a Trojan infected software into an organization is as stipulated below.... This problem arises in scenarios where poor requirements gathering process is done particularly on the operating system needs of the software.... aris, H 2006, Safe and sound software: creating an efficient and effective quality system for software medical device organizations....
2 Pages (500 words) Essay

Perspectives of Networking

Twisted Pair CableFor an entrepreneur who wants to establish a global satellite radio system, I would begin with using at least two GEO satellites strategically placed above the globe.... 2007). Some characteristics such as security are difficult to compare and contrast because they differ in terms of their Computer Science, Information Technology and networking al Affiliation) According to Forouzan et al.... Data communications and networking (4th ed....
1 Pages (250 words) Coursework

The Project of Installing New Equipment

The paper 'The Project of installing New Equipment' presents are two main financing sources for the project of installing new equipment.... One is raising funds through the issuance of securities, and the other is debt financing, i.... .... issuance of preference capital....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us