StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Network Simulation for Small Businesses - Literature review Example

Cite this document
Summary
"Network Simulation for Small Businesses" paper intends to design a network, which can be used for small businesses, and the network can be simulated using OMNET+ because it has many features, which allows easier analysis, communication of the development as well as troubleshooting. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful

Extract of sample "Network Simulation for Small Businesses"

Download file to see previous pages

Network design involves the connectivity of computers in order to enable the transmission of data from one location to another within the same building or other buildings. In the network design, there are four elements that are necessary to enable connectivity which include the protocol, network connection, network topology, and network security. In network topology, various types are available for use and they include ring network, bus network, and star network(Stewart and Adams, 2008).

There are a number of network topologies that are available since they facilitate network security. These include ring topology, star topology, and bus topology, however, small businesses are recommended to use star topology because of its ability to facilitate identification of faulty when there is a network breakdown (White, White, Fisch and Pooch, 1996). In star topology, if there is a breakdown except one, the system is not affected. This allows repairs that return connectivity. It also allows connectivity to many computers because of its star nature.

In-ring topology, all machines are connected to each other as in a ring that is one computer can be connected to one or two computers and any other connection from a third or fourth computer can be accessed from another computer. This topology is tedious in establishing a network and it involves high bandwidth. In the case of pass topology, the connection is done using Ethernet where all computers are connected to a certain cable that transmits information. This topology is less costly in setting up but insecure and costly in maintenance.

In addition, bus topology is risky to entire connectivity as it utilizes one cable which when broken, communication is halted (Stewart, 2010). Star topology is the most preferred because it requires less cost when adding new devices to the network, there are two other advanced technologies: extended star can be applied whereby repeaters or hubs are placed between a physical star topology that gives extra space for connectivity (McFarland, Sambi, Sharma and Hooda, 2011).     

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Simulation for Small Businesses Literature review, n.d.)
Network Simulation for Small Businesses Literature review. https://studentshare.org/information-technology/2049321-network-simulation-for-a-small-business
(Network Simulation for Small Businesses Literature Review)
Network Simulation for Small Businesses Literature Review. https://studentshare.org/information-technology/2049321-network-simulation-for-a-small-business.
“Network Simulation for Small Businesses Literature Review”. https://studentshare.org/information-technology/2049321-network-simulation-for-a-small-business.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Simulation for Small Businesses

Network Security

The world of network security is quite hostile since a small percentage of the population can cause untold damage to a global network.... hellip; The rapid growth of networking has also come with its own challenges, mainly in the area of network security.... He also defines a network as an interlinked system.... Therefore, network security can be defined as the safety of interlinked systems.... The rapid growth of networking has also come with its own challenges, mainly in the area of network security....
7 Pages (1750 words) Term Paper

Factors of E-Commerce Environment

his discussion stresses that with the developments in the information technology there have emerged a large number of opportunities and prospects for the businesses.... Though, the information technology has offered countless opportunities to businesses however also caused a number of legal, privacy and ethical issues.... In this scenario, the web based businesses are facing a more open and less secure arrangement that can cause various serious problems for business arrangement....
7 Pages (1750 words) Essay

Network Security as a Business Benefit

It includes everyday jobs like conducting transactions and communications among businesses, government agencies and individuals.... The paper "network Security as a Business Benefit" develops the assumption every organization needs its own proper security system to maintain its reputation.... Once a reliable system is built everything that goes on with the network can be evaluated with respect to that policy.... hellip; network can be defined as 'any set of interlinking lines resembling a net, for example, 'a network of Roads '....
6 Pages (1500 words) Case Study

Steps in Network Designing

Unshielded twisted pair is the wiring that is being commonly used in telephone companies and businesses nowadays.... As technology takes big leaps in the modern world an Internet network has become the necessity of any small business.... Introduction As technology takes big leaps in the modern world an Internet network has become the necessity of any small business.... Soho or home networks typically use a single switch or simply an all-purpose device such as a DSL router, WiFi Router or Gateway which may include a small embedded Ethernet switch....
2 Pages (500 words) Essay

Computer Networks Principles

hellip; The first scenario discusses a small training business.... Considering the “small business” which is our case study in this assignment, and the scalability which has the priority, the design in case of availability is considered to be a normal design.... As systems and networking advisors, we need to design a computer network for the business based on the structure of the company and the number of computers and we will consider the fact that the network needs to be scalable and reliable....
14 Pages (3500 words) Assignment

Network Security of LAN used in Small Office and Home Office

The study was conducted with 15 small businesses, whose representatives have been interviewed.... Without such a password system, a hacker can quickly obtain access by exhaustive search Another fact worthy to note is that less than two thirds (62 percent) of these small businesses use automatic patching.... Even small businesses now have the capability to compete with effectiveness compared with larger companies as the internet offers the ability for them to expand the geographical scope of their market....
60 Pages (15000 words) Essay

Computer Technology and the Networked Organization

nbsp;small businesses such as medium-sized food store commonly are deprived support from big IT firms.... There are no two businesses that have the similar needs and complications arising at the same time.... nbsp;  This paper outlines that many businesses employ a specialist to launch their computer surrounding and then depend on internal staff to keep it running.... Smaller businesses have more uncertain computing and networking specification depending with the clients....
4 Pages (1000 words) Assignment

Managing a Small Business

This paper deals with the various aspects of small businesses and their management, and specifically enlarges upon one of the important management issues that bedevil the small businesses viz.... It supplied this technology to a number of other companies who capitalized on this economical alternative and built up successful businesses.... (EEL), Wolverhampton, belong to the category of small enterprises in environmental control business....
16 Pages (4000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us