Special Project in Computer Hardware Servicing NCII
Mr. Jonel Mateo
CASE STUDY 01: NETWORK DESIGN
CASE STUDY SITUATION
You are interested in starting your own Music Store, QualitySounds, in a suburban area of your town. You need to design and build a network and computing solution for your stores. You have done some initial planning and you will start with two stores (but you plan to add two more stores across town within one year). Your store will sell new and used music and allow customers to get “online” in your stores and download music. You also will offer classes on how to setup music downloads and configure MP3 devices. You took computer networking courses in college and you feel you can tackle this solution yourself. Upon initial planning, you have identified the following requirements for your network:
* Connects three office computers and one computer used for Point-of-Sale (POS) services at each of your stores. You also want six (6) computers in the lobby/store where patrons can download music and you can run “training classes” for people to learn about using MP3 players and get other basic information. The two offices have to be connected into one cohesive network, sharing POS services and other critical company information. You also need to provide a “hand out” casual area for people to stop in and discuss music and connect wirelessly to the Internet (you might even offer free coffee to entice people to come in to your store). * Provides adequate security for all of the company communications and documents (especially sensitive sales documents). All POS services must be protected. All general network access should be segmented from the company POS services. * Fast and have additional capacity as the company grows * Provides for centralized printing * Supports the eventual addition of other stores to the network * Provides customers with a general information Website and a secure Website where clients can buy services, and products * Provides for limited downtime (24 hour downtime maximum) * Provides for centralized management and control of the computers in the two stores, so that you can maintain the network from off-site * Provides for long-term cost effectiveness * Provides a suite of software tools for the employees to effectively communicate and a POS solution for the stores
The company does not have any equipment. Your plan should include a complete network and computer system that meets these requirements and future expansion plans.
The two store locations will (eventually) be within a five-mile radius of each other. The locations are within a suburban area that has current technological infrastructures and related technology offerings. The stores will need a sales system and print services for invoices.
Complete your proposal including costs for computing equipment, network infrastructure, network servers, printers, and related hardware, software, and accessories. Include as much detail as possible as well as justification as to your selections. Diagram and explain your physical network and computer design as well as the logical network design (server installation, domain layout, etc.). As you are a small business, cost is a major factor and should be minimized.
You May Also Find These Documents Helpful
-
The proposed network is designed to serve DesignIT which consist 56’x36’ office space, 4 cubicles, 1 office, 1 server room, 1 receptionist desk and 1 conference room.…
- 768 Words
- 4 Pages
Powerful Essays -
PAN, LAN, HAN, MAN or WAN –Given that the Little Country Store is a little secretly run organization, I would choose to setup a Local Area Network (LAN) for their framework designing. The LAN configuration is the best option for a productive Small Office/Home Office (SOHO) where periphery contraptions, for instance, printers and scanners may be bestowed to different PCs on the framework. Making usage of this preferred standpoint makes using a framework more calm than purchasing a printer for each individual PC. This LAN will have three PCs masterminded in a comparative building structure with a most extraordinary detachment of 200 feet between PCs.…
- 605 Words
- 3 Pages
Good Essays -
This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…
- 801 Words
- 4 Pages
Good Essays -
Sunica Music and Movies is a small but growing multimedia chain with currently four locations. These locations currently act independently from each other and have little to no communication between each other and each other’s stock. There is no web site which limits the business to local and word of mouth. There is also an accounting issue due to no centralization of funds. Because of these issues the company has lost customers and revenue. With the implementation of a Wide Area Network (WAN), and proper security steps, Sunica Music and Movies will have the ability to access, implement and use a centralized inventory database from any store. The creation of a webpage will also be necessary to be the company global as well as create an intranet between stores for secure location to location data transfer. There will need to be site set ups, one for the primary location of the web servers and data centralization and a backup location for disaster recovery.…
- 697 Words
- 3 Pages
Good Essays -
The Network will be Server based running four or five servers each with a certain task. The network will host at least 250 computers not including the servers with room to accommodate at least 50 more computers for future employees. I will implement a number of switches to accommodate the three or more floors that we need to access.…
- 261 Words
- 2 Pages
Satisfactory Essays -
Computer Dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. The current network is a poorly designed mix of Ethernet and token ring (Ethernet in two buildings and token ring in the other). The networks in all three buildings are heavily overloaded, and the company anticipates significant growth in network traffic. There is currently no network connection among the buildings, but this is one objective in…
- 487 Words
- 2 Pages
Good Essays -
1. What problems did the Rank Group find with the Hard Rock’s three main internal information systems (restaurant operations, merchandising, and financial)? Why was this a problem? [table]…
- 275 Words
- 2 Pages
Satisfactory Essays -
Based on our text I think a physical star has a lot of advantages and it would be better suited for this example. A peer to peer has too many disadvantages to work in this scenario. It is not centralized, there is a lack of security in this setup and only a small group of computer will be able to connect at a time with a peer to peer. With a server based network it will be easier to add and manage multiple computers, all file will be centralized and this way I can add 50 computers each to the five servers in compliance with what the client needs are based on the example. A switch is easiest to replace and in terms of what offer the best access it would be a network interface card.…
- 437 Words
- 2 Pages
Satisfactory Essays -
Sunica Music and Movies is a company that currently has four locations. This business is ready to improve the way they do business by implementing a computerized network that will allow for centralized accounting and inventory as well as starting a web-based e-commerce site. The following document provides an in-depth look at the implementation of policy and procedures that will help this transition to become successful.…
- 3396 Words
- 14 Pages
Best Essays -
This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…
- 3275 Words
- 11 Pages
Powerful Essays -
Networking plays a vital part in business today. It provides the tool to link people, software and hardware together. It is not bound by time differences, and it provides businesses the opportunity to work together in ways that would not have been possible 20 years ago. More and more corporations depend on networking within different faucets of their organization. With…
- 1138 Words
- 5 Pages
Better Essays -
It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…
- 287 Words
- 2 Pages
Good Essays -
Network is the mediator between client computer and server. It connects client computers to the server and allows the sharing of information stored in server computers. A local business (EROS) hair me to design Network for the third and fifth floors, so that After carefully considering the requirements I and my team have prepared the following network design for third and fifth floors. The network design is given above. The goal of the designed is to the provide the best performance, avilability, speed and over all, maximun security to serve groing adjacent for two floors of orgaization’s needs.…
- 755 Words
- 4 Pages
Good Essays -
I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new…
- 368 Words
- 2 Pages
Satisfactory Essays -
Program1 is an on-line music store that specializes in custom made music appliances programming, repairs, and the sale of personal computers, laptops, I-Pod’s, MP3 players, CD’s, instruments, and other devices associated with music. Program1 will use revenue from studio time sold along with any cash generated from entertainment events to help satisfy the entertainment services in the on-ground stores. The on-line feature will allow a convenient shopping experience for customers to purchase all of the products on-line. In addition, Program 1 will differentiate their products and services by having a variety of all genres of music from the 60’s through current day selections. Finally, Program 1 will provide a niche unlike its competitors by serving communities on a global frontier which will be an effective method for accomplishing their mission.…
- 2865 Words
- 12 Pages
Better Essays