Computer Network Design for Graphic Arts Company

This is a network proposal for DesignIT. DesignIT is an expanding graphic arts company. The company will use additional space to accommodate more employees.

The recommended network design for DesignIT is Ethernet. The company requires a small network design that can be effectively met through Ethernet option. It is inexpensive and flexible choice for DesignIT. The network communication catalogues can use Ethernet products from different vendors. In fact, there are some hardware materials with inbuilt Ethernet components. The Ethernet network type uses a given set of networking rules to determine communication between different devices.

By using Ethernet network, the company will rely on a broadcast network and therefore different nodes will have access to various data packets. Packets used in Ethernet must possess distinct address of source and target. Further, for a computer to open a given packet, various addresses must correspond. Ethernet network is built to support various devices in a given segment. In addition, a device is allowed to send out on the network at any given moment. Any simultaneous transmission may cause collision to occur on the network and therefore retransmission may be initiated randomly at an interval. The Ethernet is most likely to operate at 100 Mbps.

All nodes will share the same bandwidth while the stations will run on the overall bandwidth of the company, but this may decrease when the company adds more stations. The network is designed to ensure flexibility and therefore new stations or high-speed bandwidth can be added later when the company expands (McCabe, 2003).

The preferred network architecture for DesignIT is server-based for enhanced security. Server-based network architecture for the company would ensure that the company creates accounts and related permissions to offer system security. Individual files will be shared on the network within the directory. However, the directory will not be accessible to all users on the network. The server-based network architecture will ensure that network resources are centralised.

For instance, for a small business like DesignIT, the three servers will have dedicated functions for files, printers and other devices as already configured. In this network architecture, servers will not be turned off often and therefore the company resources will be available to users most of the time. This network architecture was chosen because of network scalability to ensure that it can be adjusted to accommodate new requirements as the company expands in the future. The network will be secure relative to other options available because users will not share their resources equally on the network. This implies that only intended users will gain access to specific files and therefore files will not be exposed to other users or employees. In addition, the company will have an opportunity to divide the network based on user needs.

As the company continues to grow, it will have specialised departments and therefore different servers will be designated for different departments, such as design, accounting, sales and human resource among others. Once the company attain such a growth level, it will not reconsider its network architecture, but simply exploit scalability option to support file sharing and create new user groups with related rights.

The suggested LAN and Wireless LAN (WLAN) wiring considerations for DesignIT should account for its current user needs. LAN and Wireless LAN (WLAN) wiring considerations require careful consideration to ensure that the correct technologies are used for network reliability. DesignIT will have to consider the physical layer or topology between devices in the office. LAN connection will provide speed, ease of troubleshooting, reliability, and is generally cost-effective. LAN will require effective planning. However, the design of the space purchased for DesignIT does not have many restrictions. DesignIT requires speed and reliability and therefore LAN will meet these user needs. Since the company has settled for server-based network architecture, scalability will provide expansion solutions. LAN will serve many static computers used in the office.

Wireless LAN (WLAN) will provide flexibility with regard to location and speed of installation. DesignIT will eliminate the need for physical network connection with its wireless LAN. It would be extremely useful in the conference room for visitors or during presentations. It will act as a temporary Internet source. DesignIT will have to evaluate security of its WLAN to ensure that they are effective and safe. The space purchased and the design will not restrict the use of WLAN. However, testing during installation will be required to ensure that WLAN is well installed. Both WLA and LAN will offer different benefits and risks to the company, but they are generally necessary for flexibility, speed and reliability required (Sheesley, 2005).

The recommended hardware options and costs for the company are imperative to ensure that DesignIT gets the right hardware options at the right costs. Different vendors offer various hardware options that can be adapted and focus on the needs of small businesses. Prices of hardware options vary considerably. DesignIT will focus on discounts on components purchased.

The wireless router is put at corner space to give a stronger signal toward the conference room for mobile devices and will enhance effectiveness and the consistency of the network.

The hardware materials for a small office for each area include the following:

Server Room

  • 1 x Internet Port: $169
  • 1 x Broadband Router: $170
  • 1 x Desktop PC: $ 650
  • 1 x 8 Port Gigabit Switch: $208.99

Ethernet

  • 10 Base-T Ethernet cards: $30-50 each
  • 10/100 Base-T Ethernet cards: $45-120 each
  • Unmanaged Shared Media Ethernet hubs: $10-20 per port
  • Switched Ethernet hub (10/100): $100-150 per port
  • Fast Ethernet hub: $40-75 per port

Four Cubicles

  • 4 x Desktop Pc’s: $ 2600
  • 3 x Colour laser printers: $ 1520
  • 1 x Print Server: $50-$70
  • 4x Wireless Access Point (Router): $85
  • 4 x 4 port Gigabit Switch: $283

Reception

  • 1 x Desktop Pc: $650
  • 1 x Power Over Ethernet Adapter: $25

Conference Room

  • 2 x Wireless Laptops: $2560

Costs related to the backbone must also be determined. It will connect a switch in the server room with another switch in one of the cubicles. This would allow the technician to extend the network across different parts of the office.

Security considerations for firewall will be based on several factors. Firewall will be deployed in the network system. DesignIT must recognise that firewall deployment even for a small office can be a complex process. Thus, it will require careful planning. Various firewall deployment considerations will be assessed for the company to ensure that only the best option is deployed. Traffic will be considered for the network. Not any traffic will be allowed through the firewall.

Hence, certain traffic will be blocked. Available security strategies for the network will be assessed. These may include choke point, fail safe, least privilege, simplicity, forced universal participation, defence-in-depth and defence diversity among others. Appropriate strategies will be identified for deployment and they will be included in the network and user policy of the DesignIT.

Antivirus security solutions will be considered for the company’s network. Antivirus solutions are necessary for spyware, malware, viruses and other forms of network and computer threats. These threats need effective antivirus solutions to control them. The company will only consider full options from reputable vendors. Only vendors that are known to update their solutions regularly will be considered. In addition, any selected solutions must be independently tested for effectiveness, quality assurance and ensure that the most recent solutions are available to users. Only the new generation of antivirus solutions that offer full Internet protection will be considered for installation. The company will focus on specific criteria to determine the effectiveness of the chosen solution.

  • A good antivirus solution will not consume much space or use most of the system capabilities to perform well. The chosen antivirus solution must not slow down the system performance or interfere with other programmes.
  • Only antivirus solution with fast scan period will be selected under this criterion. System scan should be fast and effective. It should not last for several hours before a scan can be completed.
  • The solution must be proactively heuristics. That is, the antivirus solution must proactively act to stop system attacks and not necessarily through signature updates. The solution must protect data within the network system.
  • Another criterion that the antivirus solution must meet is international recognition. That is, the solution must be in award winning categories and globally recognised for its efforts in the Internet security.
  • Finally, the antivirus solution must have widespread support to ensure that help can be sought from any location.

DesignIT must understand that network security for any form of business, large or small, has increasingly turned to be a difficult affair because of many emerging hackers and new Internet threats that are always released at any given moment. The company, as a small business, is exposed to so much more viruses, worms, Trojan horses, spyware, and all forms of threats. DesignIT must strive for the best Internet and system security solutions. On this note, the chosen firewall and antivirus solutions will be designed to meet unique needs of the company and ensure adaptation to other emerging threats.

DesignIT must also understand that effective network protection also offer some business advantages, particularly among clients who are conscious of their business and personal details’ security and confidentiality.

The recommended software options and costs for DesignIT include the following:

  • Kaspersky $ 50 – Kaspersky has solutions for small businesses, home and mobile users. It is noted as one of the most credible companies with proactive solutions to malicious attacks. The company has considerable market share, positive ratings and growing reputation in the recent past.
  • Norton Internet Security $ 50 – Norton is touted as the next generation solution for the Internet security that provides effective solution for PCs, tablets, Mac and smartphones. It has five layers to ensure maximum protection. Norton is a complete antivirus and Internet security solution for any site or anything done online.
  • NOD32 $ 60 – the solution is developed by ESET. This product is among the best antivirus solutions in the world. It is difficult for NOD32 to miss viruses when tested or subjected to rigorous Virus Bulletin tests. In a decade now, NOD32 has successfully passed all the Virus Bulletin tests without missing any threats.

These solutions are for single users.

Labour costs Equipment costs Service costs
Hourly rate $90
7 days
5 hrs per day
$ 3150
All equipment for the job would cost $ 1000 The cost is based on calls and the nature of the problem
Minimum cost $ 50 per hour

It is recognised that several single point of failures may take place within the network system (Oracle, 2011). However, the most likely single point of failure is hardware failure, specifically network failure.

By creating redundant network components, network failure can be mitigated effectively. In this case, redundant systems will include Internet connection, network cabling, network interface card, switches, gateways and routers.

By using redundancy, DesignIT would ensure that any system failure would not impair the whole network. Hence, redundant software and hardware systems would be deployed to mitigate such failures. Replicated systems will deployed at the most vulnerable locations identified on the network system. These redundancy components will be deployed in the Directory Server to ensure optimal availability. High availability will be achieved through a redundant server on the network. The solution is not expensive, simple to deploy and can be easily managed. It also offers system scalability because of replication specifically for read operations and therefore effective design is necessary. However, redundancy may result in overhead management.

References

McCabe, J. D. (2003). Network Analysis, Architecture and Design. San Francisco, CA: Morgan Kaufmann Publishers. Web.

Oracle. (2011). Availability and Single Points of Failure. Web.

Sheesley, J. (2005). Small Office Networking (2nd ed.). California: TechRepublic. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2020, September 10). Computer Network Design for Graphic Arts Company. https://studycorgi.com/computer-network-design-for-graphic-arts-company/

Work Cited

"Computer Network Design for Graphic Arts Company." StudyCorgi, 10 Sept. 2020, studycorgi.com/computer-network-design-for-graphic-arts-company/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2020) 'Computer Network Design for Graphic Arts Company'. 10 September.

1. StudyCorgi. "Computer Network Design for Graphic Arts Company." September 10, 2020. https://studycorgi.com/computer-network-design-for-graphic-arts-company/.


Bibliography


StudyCorgi. "Computer Network Design for Graphic Arts Company." September 10, 2020. https://studycorgi.com/computer-network-design-for-graphic-arts-company/.

References

StudyCorgi. 2020. "Computer Network Design for Graphic Arts Company." September 10, 2020. https://studycorgi.com/computer-network-design-for-graphic-arts-company/.

This paper, “Computer Network Design for Graphic Arts Company”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.