Luis Perez ITS written report

51
Perez 1 Luis Perez Capstone Project written report

Transcript of Luis Perez ITS written report

Page 1: Luis Perez ITS written report

Perez 1

Luis Perez

Capstone Project written report

Page 2: Luis Perez ITS written report

Perez 2

Introduction

Computers are everywhere today, in homes, businesses, and schools just about every

person owns one. For businesses to thrive in today’s job market computers need to be able to

communicate with one another in a large-scale environment to access, and use other resources

such as printers, fax machines, etc. To accomplish this computers are linked/ interconnected

with one another with a variety of networking hardware in what is known as a network. This

allows the computers to be able to share data with one another and use computer peripherals that

are within that same network. Networks can also be linked to one another creating a larger

interconnection of computers. As a network gets bigger though the security risks increase as

well which is why some parts of the network where important data lies are isolated and kept

secured. Even in homes people have a local area network running, which is usually a small

network involving a few computers connected through a some type of networking hardware,

most likely a router. For my written report, I decided to give an example of a network

architecture that can be implemented in a business setting. I will also give reasons and defend

with sound references as to why I chose the certain layout of network, the hardware and software

picked, and the security measures put in place. The report will reflect the concept of SDLC

(system development life cycle) which is used in many business aspects such as in system

analysis and design.

The computer repair shop “PC Fix N Go” is a small local business that handles everyday

computer problems, from slow sluggish running computers, to computer viruses to PC upgrades

and parts change. PC Fix N Go also sales computer parts, accessories, and gives in-store

Page 3: Luis Perez ITS written report

Perez 3

consultation on products and possible computer upgrades. The business has slowly been gaining

more and more clients and has decided to implement a network to meet the rise in business

demands. There are twelve employees working at PC Fix N GO, which include four repair

technicians, six sales associate/cashier, a supervisor and the manager/store owner. The

technicians fix computers clients leave and are consultants to customers who have questions on

upgrading PC’s or about certain products, with two technicians working at the store during a

shift. The sales associates help customers when they need to find a product in the store and are

also serve as cashiers, with three sales associates working during a shift. The supervisor is there

to oversee daily store operations and help out on the floor when needed. The storeowner/

manager takes care of daily business tasks to keep everything running smoothly from doing

employee schedules, to payroll, to ordering merchandise and keeping business accounts on

expenses and revenues.

System Development Life Cycle

Projects in have a sequence of phases it goes through from start to finish, it needs to be

planned, designed, implemented and executed. Depending on the project and for what purpose,

the System Development Life Cycle (SDLC) can be implemented, which is particular useful for

business oriented projects. The SDLC can include the following phases:

Planning

System Analysis

System Design

Development

Testing

Page 4: Luis Perez ITS written report

Perez 4

Implementation

Maintenance

Planning is the first phase and perhaps most important stage in the SDLC which

involves investigating the current system to give detail of how it works and what it is, and

leads for what will be the the System Proposal. In the planning phase, the client also

gives input as to what features they would like to include in there system and the

operations that would like the system to carry out.

The next phase involved in the SDLC is system analysis where problems with the

current system are pointed out and what course of action to take. In this stage, project

goals are defined in terms of how the new system will function and operate. A schedule

is setup, the number of people who will be involved within the project are defined, as

well as going over the budget. Tools such as gantt charts and flow diagrams are used in

this phase. Context diagrams are also used which show a top –level view of single

system processes and include system boundaries and scope of the system. Unlike a

context, diagram that shows basic general information of the system, a diagram 0 shows

detail of internal processes, data flows, and data stores. All these tools help mold and

shape the system prior to designing it.

After system analysis comes the system design phase where the actual building

and system takes place. The system design takes into consideration past charts and

diagrams, which show specific functions and the parts the system will contain. The

system design phase is split into two sections the logical system design and physical

system design. The logical system shows detail of how the system will perform and often

Page 5: Luis Perez ITS written report

Perez 5

shown through blueprints and the physical system showing detail cost of what it took to

build the system through materials, labor, etc.

In the development phase, the company will either use internal IT staff for the

system or hire programmers, software engineers and developers to start production on the

system. Training users of the company also happens during this phase as they are shown

how the system will work and how to use it.

Once the system is built, testing must take place to make sure there are no glitches

or bugs within the system and that it’s operable. If any bugs are found, they are patched

up before finalizing the system. Client feedback is given to assure there desired features

and functions have been included to their satisfaction. Records of documentation of the

project are kept may include: program, system, operations, and user documentation.

After testing of the system has taken place, implementation occurs which is

exposing the system into a real working environment. Data conversion takes place,

which is incorporating prior existing data into the new system. This is done through one

of many ways which can include a direct cutover which is an instant change, parallel

operation which runs both systems at the same time, and pilot, phased operations which is

a combination of the earlier methods.

The last step in the SDLC is maintenance and it involves system support for the

created product and security. Users are trained on the workings of the system and how it

functions. Maintenance tasks include Corrective, adaptive, perfective, and preventive

maintenance. Corrective maintenance deals with fixing any last minute errors or

problems, while adaptive maintenance is enhancements to the system such as updates and

Page 6: Luis Perez ITS written report

Perez 6

patches. Perfective maintenance improves on the efficiency, reliability, and

maintainability of the system. Lastly, preventive maintenance deals with any future

problems with the system.

Research and Defense (1) peer to peer vs. client/server

Page 7: Luis Perez ITS written report

Perez 7

Peer to peer and client/server are two types of network architectures that can be

implemented in a network each with its own pros and cons. Some features of peer to peer and

client/server are similar for example in that they connect computers so they can share data and

resources with the main difference being the setup configuration. One of the main differences

between these two network architectures is that in a peer to peer there is no central server so that

means that all workstations on the network share the files equally with one another. Since there

is no server, there is no central storage or a need to authenticate users. In client/server network

there are dedicated servers for certain tasks and the serve determines which users have access to

which files on the network. With that in mind, peer-to-peer networks are usually implemented in

homes and small business while larger businesses tend to go with client/server architecture.

A reason to choose a peer-to-peer network is that it is inexpensive to set up and easy to

configure. The downside to this is that a peer-to-peer network can only support up to ten

workstations before performance begins to suffer. Since resources are freely shared between all

computers, there is no central security and no ways to control or prohibit file access making

peer-to-peer unsecure. The only security feature on a peer-to-peer architecture would be

modifying network shares by adding a password to a folder share, which is still unsecure as

anyone who knows the password on the network can then access the share.

Client/server networks have a server that acts as a centralized security database that

determines who has access to shared resources. This is done through the server having a list of

usernames and passwords and users can’t log in unless they provide the correct credentials to be

granted authorization into the network. One users are validated and log into the network they

can only access resources and shares that the administrators have granted them access to making

it much more secured then peer-to-peer. Another advantage to client/server networks is they are

Page 8: Luis Perez ITS written report

Perez 8

more stable in the aspect that shared resources lie within the sever while in peer-to-peer they are

on the users machines. If a user’s machine has an important share within that workstation and it

crashes, it affects the rest of the machines since they would no longer be able to access the shares

on that specific machine. Backups are also easier done in client/server networks as it just backs

up the files within the server instead of having to back up each workstation on a peer-to-peer

network. Client/server networks also have their downside, according to the article

“Understanding the differences between client/server and peer-to-peer networks” Brien Posey

says, “The primary downside to a client/server network is its cost. Servers can become very

expensive.” “Additionally, client/server networks require an employee to manage them. Unless

you have someone in your office who’s trained in NetWare or Windows NT Server and in all of

the issues that are involved in client/server networking, you’ll have to hire someone from the

outside. And believe me when I say that qualified networking professionals don’t come cheap.”

(Posey)

Depending on the given situation, each of these network architectures are both great and

can work very well if implemented for the correct needs the network and business demands. For

the given business PC FIX N GO, I have decided to implement a peer-to-peer network

architecture for the given fact that it is less expensive and easy to install/configure than a

client/server. The business is small and locally owned which is perfect since a peer-to-peer

network is perfect in this scenario and for home networks. Even though a peer-to-peer is less

secure when it comes to security, for our business network it will work because the number of

employees is few and uses less than 10 hosts (workstations) which won’t strain network

performance. Using share passwords shares will work under these conditions. Peer-to-peer

networks do not begin to suffer in performance until 10 or more workstations are added to the

Page 9: Luis Perez ITS written report

Perez 9

network. As business demands rise and the business expands, perhaps in the future the network

architecture could be changed to a client/server.

Client/Server Architecture example

Peer-To-Peer Architecture example

Page 10: Luis Perez ITS written report

Perez 10

Research and Defense (2) Network Topologies

People often get the confused with the term network architecture and network topology

thinking it is the same thing. The difference between the two is logical and physical meaning

that for the network architecture such as peer-to-peer or client/server it deals with the logic or

how systems communicate over the network. The topology refers to the actual physical layout of

the machines how the workstations are set up and connected to the network hardware. The type

of topology chosen actually also has some impact as to how the workstations will communicate

with one another and how they will affect each other. There are five main types of topologies

and are as follows: (while there are others that consist of combining one or more topologies into

a hybrid)

Bus

Ring/Token Ring

Page 11: Luis Perez ITS written report

Perez 11

Star

Tree

Mesh

A Bus topology is an infrastructure that connects all devices with a single cable being the

glue that holds them together and acts as the backbone for the network. All communications are

shared through this one line, when one machine wants to communicate with another all other

requests must wait for one to finish before the next can start. A drawback to bus topologies is

that they cannot have many devices hooked up at one time because they will cause a lot of lag

and wait time as more workstations are added to this network affecting performance. If there is a

communication collision, the computers will wait on the line to see if it’s clear and retransmit

data. Another disadvantage to this layout is that if the medium that links all the machines fails

then the network crashes and becomes unavailable.

In a Ring topology, each device is connected next to another in a circular layout.

Communication is done either clockwise or counterclockwise but not both. Like the the bus

topology an error or failure on the cable causes the loop communication to break which may

cause network to go down. A token is used in a ring topology in which a computer sends the

token to another computer and that computer communicates back to the original with that same

token. The token will travel in a circular motion and only the intended recipient will receive the

message. Only one token is used at a time and all other computers must wait to communicate

until the token is not in used.

The most commonly used network today is the star topology and involves a central

communication point. All devices are connected to this central point of communication, which is

Page 12: Luis Perez ITS written report

Perez 12

either a hub, switch, or router. Unlike the ring or bus topology, a failure in any network cable

will only cut of communications with that workstation connected to it but the network will still

be up and active. A disadvantage to this network is that a lot more cabling is often involved, as

each workstation needs to be connected with its own cable to the central networking hardware,

which makes it more expensive to implement. Also while this topology offers network failure

resistance, there is a single point of failure and that is the central connection point, if that fails the

network will crash.

A tree topology is basically many star topologies formed into a bus, with tree connected

to a hub, switch, or router and acting as the root to that tree. An expanding network can

transform a bus topology into a tree topology.

Lastly a mesh topology is having several computers linked together so traveling messages

have multiple routes to take to reach its destination. This helps because unlike in a ring topology

where there is only one direction in which the message must take, if one line is taken up the

message will find an open route and travel there so little to no wait time is taken in having the

message delivered. The internet itself would be an example of a mesh topology setup in the way

communication’s travel, data is traveling in all directions and when it can’t go in one path, it will

find another route to take. Some mesh topologies are considered either full or partial mesh

meaning all devices are connected or only some connect indirectly to others.

In the article “Network Topologies” Bradley Mitchell says, “Topologies remain an

important part of network design theory. You can probably build a home or small business

computer network without understanding the difference between a bus design and a star design,

Page 13: Luis Perez ITS written report

Perez 13

but becoming familiar with the standard topologies gives you a better understanding of

important networking concepts like hubs, broadcasts, and routes.” (Mitchell)

With knowledge of network architectures and topologies, one can better build a network

that is efficient to the needs of its users. After researching the different types of network

topologies, for the given business scenario I would implement a star topology as it would be both

cost effective and provide ideal performance for the network. It would also provide some partial

failsafe in the event of a cable break or workstation failure. Star topologies are commonly used

in a business setting especially small businesses and it makes it perfect for our network. Having

a network crash and become unavailable becomes costly to a business and affects customer

satisfaction as well as their perception of your business, which can lead to lose of clientele.

Topology Examples

Bus Topology

Page 14: Luis Perez ITS written report

Perez 14

Ring Topology

Star Topology

Tree Topology

Page 15: Luis Perez ITS written report

Perez 15

Mesh Topology

Page 16: Luis Perez ITS written report

Perez 16

Research and Defense (3) Hub, Switch or Router?

We all heard the terms Hub, Switch, and Router before, and for the most part we know

they are network devices, but people often get confused as to what differentiates these three

networking hardware. What they all have in common is there main function, which is to connect

multiple computers together in a network or many networks. What sets them apart is the way

they operate and the distinct features each one offers. The way each of these network devices

operates and function has to do with the OSI (Open System Interconnect) model. There are

seven layers of the OSI model which are split into two categories, Upper and Lower layers.

Network devices operate on the lower levels as it deals more with data transmission and

communication. Layers 7-5 are considered the top layers, while 4-1 are the lower layers. The

seven layers of the OSI model are as follows:

7. Application

6. Presentation

5. Session

4. Transport

3. Network

2. Data Link

1. Physical

Hubs operate on layer 1 the physical layer of the OSI model, making it a primitive device

in its function and abilities compare to switches and routers. The fact that a hub doesn’t perform

to the level of switches and routers they are also much cheaper. The hub is said to be a dumb

device because instead of forwarding a message to the intended computer, it will send it to all

Page 17: Luis Perez ITS written report

Perez 17

computers within the network. Hubs also use unnecessary bandwidth due to how they broadcast

their data transmission to all devices on the network, causing slow data transfer speeds and

operations. Security is also an issue because of how data is transmitted to all computers on the

network. Hubs are an example of half-duplex devices because they can’t receive or transmit data

at the same time.

Hub Example

Switches for the most part operate at layer 2, data link though there are some

switches that are multi-layered and can operate at layer 3. Switches unlike hubs are smart

devices in that they actually send the message only to the intended recipient, which also causes

less stress on the network as it’s not using extra bandwidth in unnecessary data transmissions.

Switches also improve on the security of hubs, and they operate in full-duplex meaning they can

both send and receive data on the network simultaneously. The fact that a switch performs and

operates better than a hub also means the device is also pricier.

Switch example

Page 18: Luis Perez ITS written report

Perez 18

Routers operate at layer 3, the network layer and perform better than a switch or hub.

Routers work off IP addresses while switches use a table of mac addresses to filter there data

transmissions while hubs act like a repeater for the whole network. Routers today have built in

operating systems and needs to be configured before use with its pre-installed software. Routers

are also the most secured of the three, in that they can tell the source address of the packet and

can tell if the data is coming within the network or not.

Router Example

Page 19: Luis Perez ITS written report

Perez 19

Even though routers are more expensive than a hub or switch it also performs better and

is more secured. It is well worth to invest in a better device as the pros outweigh the cons. From

a business perspective, one would want to have quality over quantity in products or equipment it

uses/provides. Wireless routers also provide a WAP (wireless access point) which allows using

your internet connection wirelessly for devices such as smartphones or laptops. For our

business, I think a having both router implemented with a switch would be the best choice as it

provides optimal functionality and performance while also providing security for the network.

The switch would allow for more ports that could be used for added devices and allows for

scalability of the network.

Research and Defense (4) Network Cable media

Network cabling is used to connect computers with network hardware devices such as

hubs, switches, and routers. They are considered to be the backbone of the network as it is what

Page 20: Luis Perez ITS written report

Perez 20

physically connects the network together. Network cables are categorized into three main types:

Coaxial, twisted-pair, and fiber optics.

Coaxial cable is the oldest of the three types of cable and is almost never used today to

create networks. They are still in use for cable TV connections due to it being less expensive

than fiber optics, which are now also an available option as well. Coaxial cable uses a single

copper wire with a braided shielding used around it and a plastic outer jacket to cover it all. This

causes the cable to be stiff and not flexible which makes it unsuitable for implementation in a

business setting. If the cable needed to be ran down a ceiling and curved around a corner,

coaxial cable could not be used as bending, the cable would cause damage to the copper inside

the cable.

Coaxial cable Example

According to Jean Andrews from the book “Comptia A+ guide to Hardware Managing,

Maintaining, and Troubleshooting” she says, “Twisted-pair cable is the most popular cabling

method for local networks.” (Andrews p.488) Twisted pair cables come with four pair of wires

with a total of eight and an RJ45 connector. The connector resembles a larger RJ11 phone line

Page 21: Luis Perez ITS written report

Perez 21

connector. Twisted pair cabling have two sub categories UTP, and STP. Unshielded twisted pair

(UTP) is more commonly used and less expensive than STP. Twisted pair cables also come in

categories, CAT for short. An example being CAT-3, CAT-5, and CAT-5e for enhanced. The

higher the category cable the better the quality and thorough put. Shielded twisted pair (STP)

cable uses a cover for the wires inside the cable that prevents EMI (electromagnetic interference)

which makes it more expensive and should only be used when needed.

Twisted pair cable example

Fiber optics is the most expensive of the networking cable media, and transmits data

through pulses of light in glass strands that is cover in a protected sheath. Since fiber optics uses,

light to transmit data and not electronic signals this cable type is immune to EMI

Page 22: Luis Perez ITS written report

Perez 22

(electromagnetic interference). Fiber optics operates in two modes, single-mode and multi-

mode. The glass strands in single-mode are thinner, more difficult to connect, expensive, but

also performs better than multi-mode. Multi-mode since it is cheaper than single-mode is more

popular and works by using multiple paths for the light to travel. As light bounces though it

loses strength, which is why single-mode is better as light travels in a single path. Fiber optics

use four types of connectors ST (straight tip), SC (standard connector) which are older

connectors. The newer connectors are LC (local connector), and MT-RJ (mechanical transferred

register jack). All connector types work with either single-mode or multi-mode fiber optics

cable.

Fiber optics cable example

Page 23: Luis Perez ITS written report

Perez 23

Since coaxial cable is barely used in today’s network and fiber optics is the most

expensive cable of all network media, for the business network I will use UTP twisted pair

cabling. The business because it’s in a locally small store doesn’t need to use STP cable because

in the store there is little to no EMI, since there are no large electrical motors like those found in

elevators in large business buildings, transmitters, or high tension lines to cause interference.

Fiber optics could be used but it would be more expensive to implement while twisted pair could

work just as fine with a fraction of the price.

Research and Defense (5) Security software

After doing, research on network security software I’ve found that some offer a

free trial while others have a fee. Through my searching, I came across a network security

solution software that is free and seems very effective, best of all it is tailored made for small

businesses. Secunia is a company that offers computer security software that protects your

computers and network from cyber-attacks. Secunia offers a variety of computer security

software depending on your company’s level of security needs. There are three categories of

Page 24: Luis Perez ITS written report

Perez 24

products: corporate, small business, and consumer each being geared toward a certain scale of a

network. Within each category is a variety of software, with each matching certain needs of

security for businesses.

For our business network, Secunia small business is a perfect solution for our security

needs, which protects the network from cyber-attacks that aim to steal, spy, or cause damage to

data within our network. According to Secunia, they say “The software you use every day in

your business is vulnerable to cybercrime. Our easy-to-use, flexible solution protects your

computers and stops hackers gaining access to your data”. Secunia also says, “Unprotected

software gives hackers easy access to your intellectual property, records and data, and

traditional antivirus technology isn’t enough to protect the PCs.” Secunia small business

software offers peace of mind by ensuring the integrity of your data and protecting all the PC’s

in your business network, freedom by it being implemented as a cloud-based solution which

keeps computers on the networked secured anywhere, at any time. Constant protection which

actively monitors and updates all PC’s and room to grow which means this software if flexible

and allows for business growth as the network scales.

http://secunia.com/products/consumer/compare/

The link above gives a rundown of the features found on Secunia’s small business

software as well as how it compares to other Secunia computer security products. Secunia is free

of charge now as it is in the beta phase, and can monitor up to 50 hosts i.e. network devices like

computers, or peripherals. After that, the cost will still be free for up to 5 hosts and then an

additional low monthly fee for any extra host. Our network will have only 5-12 hosts, which

makes it ideal for our scenario. The only downside I could see when researching this product is

that, since it’s a cloud-based program it requires internet connection to use. Also the fact that

Page 25: Luis Perez ITS written report

Perez 25

this product is in the beta phase means there could be unknown bugs and glitches within the

program not yet known as well as vulnerabilities. Secunia can be used with or without an anti-

virus, though the product seems to be an all in one security solution.

Planning

Now that the research is complete, and the network architecture, infrastructure,

and hardware and software have been chosen, it is now time to plan an outline and create the

network for our business. The small business “PC Fix N GO” network will have nine

workstations, a printer, personal laptop, a wireless N- router, and a switch. Six of the

workstations will be used as cash registers as well as finding and ordering products. Two, will

be used for the repair technicians to give consultations on upgrades to clients and to keep a list of

appointments and documentations on machines worked on. To turn the workstations into cash

registers we will use a POS (point of sale) software such as QuickBooks point of sale from intuit.

They have a free trial valued at $600 that comes with a cash drawer, barcode scanner, receipt

printer, credit card reader, and a Gopayment mobile card reader. The hardware is easy and quick

to install, with most connections being made through the computers serial ports. POS software

Page 26: Luis Perez ITS written report

Perez 26

provides an all in one solution for financial transactions and allows the business to save money

by utilizing some of the computers on the networks to function as cash registers.

http://intuitpayments.com/pointofsale?

gclid=CIiJtoyT2rYCFQFp4Aod7VsAnQ&ef_id=UW9hfgAABbDQVEUM:20130420210521:s

The site above is intuit Point of Sale QuickBooks webpage with the customer

representative number for information on how to receive the free hardware that comes with it.

After the trail period there is a small monthly fee, for information on prices after the 30 day trail

one can inquire through the same number. The other computer will be used by the store

owner/manager for keeping track of payroll, schedules, and database of clientele, and his

personal laptop will keep a backup of all records. The network will also consist of a multi-

functional printer that customers can also use in store to make copies of documents for a small

fee.

For the network’s architecture, we will use peer-to-peer as it better fits the small business

needs. The topology will be a star connected to a router, and a switch for additional ports, for the

network cable we will implement is UTP (unshielded twisted pair). Below is a Gannt chart

Page 27: Luis Perez ITS written report

Perez 27

outline for the preparation and planning of the network.

Analysis

PC Fix N GO is a small locally owned company that has steadily been growing and is

now seeing more business than ever before. The business is growing very fast that it needs to

have structure and organization, to accomplish this task the company has decided to implement a

computer network. According to Samara Lynn from PC mag in the article “How to Set Up a

Home or Small Business Network” she says “A computer network is an essential element of

modern business, and it’s increasingly indispensable in the home, too.” In today’s modern day

era where everyone seems to be connected online, it would make sense for businesses to move

forward with the technological advances and stay current with trends of today. A costs

document/table will be created to show the amount that was spent on building the network. All

Page 28: Luis Perez ITS written report

Perez 28

the equipment such as workstations and peripherals will be bought brand new, with the company

allowing a budget not to exceed $4,000 for the creation of the network.

Expenses Table

Network Hardware/software Cost

ISP(Internet Service Provider) Comcast

XFINITY [Blast Package]

Up to50 mbps download speeds and uploads

up to 10mbps Online protection with constant

guard security suite

Special offer for new customers for six months

at a rate of $59.99 monthly

Then $74.95 monthly

(9) e-machines EL1360GUW12P desktop

AMD dual core E-300 1.30GHz ,2GB DDR3,

500 GB HDD, DVD-RW, Windows 7 Home

Premium 64-bit includes 20 inch monitor,

keyboard, mouse

List price $369.99 - $70.00 savings =$299.99

$299.99 x 9 = $2699.91 for 9 workstation

desktops

Samsung XE303C12-A01US Chrome book

Dual Core 1.7 GHz, 2GB DDR3 11.6 inch

monitor screen

$249.00

Comcast Modem with XFINITY Blast package $7.99 monthly for modem rental

Network software

Secunia

Intuit QuickBooks POS(Point of Sale)

Secunia is free during its beta phase and has

monthly charge after that for more than 5 hosts

on a network.

QuickBooks(POS) has a free trail and then a

Page 29: Luis Perez ITS written report

Perez 29

monthly fee

NetGear WNR3500L-100NAS Rangemax

Wireless-N gigabit Router

$129.99 -$70.00 savings = $59.99

Cate5e 500-foot 350 MHz UTP RJ-45 Cable $74.05

OKI MB 491 Multifunctional Printer

Monochrome LED, with up to 1200 x 1200

dpi, up to 40 ppm, Duplex Printing, 256 MB

memory, USB, and Ethernet enabled, Scan,

Copy, FAX

$499.99

Netgear 8-port Gigabit Network Switch $59.99 -$15.00 rebate = $44.99

Initial Cost for Network Startup = 3,695.91

Network upkeep/monthly maintenance cost will vary

The equipment chosen was based on personal brand preferences and from comparing

prices and performance of hardware, and software. The total cost to get the network up and

running is $3,695.91 with a budget of $4,000, which gave us an amount of $304.09 left over that

can be put towards any future expenses and network maintenance.

Design

Below is a diagram view of how the network would look like once everything is

connected and up and running. The software used to make this diagram is called Edraw, and it

allows creation of network diagrams and other works. The software has a free trial version and

can be downloaded from http://www.edrawsoft.com/Network-Diagrams.php and is available for

various windows OS’s.

Page 30: Luis Perez ITS written report

Perez 30

Screenshot of software

Exported Image to MS Word

Page 31: Luis Perez ITS written report

Perez 31

Desktop 2

Desktop 1

Desktop 9

Router

Modem

Multi-functional Printer

ISP

Laptop

Switch

Desktop 5Desktop 6

Desktop 4

Desktop 3

Desktop 8

Desktop 7

Created by Trial Version

Created by Trial Version

Created by Trial Version

Implementation

During this phase the network equipment and devices are connected, it is be ready to be

launched in an actual working environment. Our wireless router will be connected to the cable

modem which provides the internet which allows the router to share internet connection with

additional devices. Three workstations, the multi-functional printer and our switch will be

physically connected to our router, with the laptop being wirelessly connected to the network.

The switch provides an additional eight ports with six being used for computers one for the

multi-functional printer and another to connect to the router. The wired connections will be

made using CAT 5-e UTP Ethernet cable. After the router is configured and wireless security

Page 32: Luis Perez ITS written report

Perez 32

protocols set, and all equipment installed and connected, the business PC FIX N GO would now

have a network implemented with its business processes and will be ready to provide a higher

level of service to its customers. The employees and owner will be taught on the workings of the

network, and any issues found within the first weeks of deploying this network would be

addressed and fix.

Security Plan

The security plan/policy for our small business network can be broken down into three

categories: Assets, Risks, and security measures to protect our network. Assets would include

anything of value to the company that needs to be protected which can include both physical and

non-physical. Risks are anything that can cause harm to the business network and the types of

risks a network is exposed to. Security measures would include preventive actions taken to

insure the protection both operational and functional of the network.

Assets include the following physical and non-physical items:

Desktops

Laptops

Network hardware such as modem, router, and network cable

User names and passwords

Network configuration set up information such as routers SSID and password

Employee records

Customer records

Important business documents such as company financial records

Risks to the assets Include:

Page 33: Luis Perez ITS written report

Perez 33

Natural Disasters: Floods, Fires, Earthquakes, Hurricanes, etc.

Hardware Component failure

Software bugs or glitches

Malware: viruses, Trojan horses, worms, root kits, spyware, adware, etc.

Hack attacks/ cyber-attacks: Social engineering, Phishing, IP spoofing, Denial of service

attacks, password cracking

Disgruntled employee

Uninformed user mistakes

Loss of data through corruption

Preventive actions to the risks include:

User awareness training

Well established security policy to include: group, email, password, backup and

restore policies

Implementation of security cameras, and alarm systems

Natural disaster plan of recovery

Purchase of insurance for the business

Network protection software such as a firewall, strong anti-virus

Conclusion

Whether it’s creating a SOHO (small office home office) or small to large business

network, implementing a network is very beneficial no matter where it’s setup. Creating a

network is not very hard at all and just requires some hardware and network components.

Networks make it easier for businesses to share resources thus reducing the costs. It allows them

Page 34: Luis Perez ITS written report

Perez 34

to stay in contact with its customers and expand as a business. Networks are flexible and can be

scaled along with the business as it grows. Within a network data can also be better protected

through backup’s and online or offsite storage. Organization becomes easier by using software

to setup agendas or schedules and organize events. Most homes today have a home network

which adds to the fact of how important networks are today, a business of any kind or size that

doesn’t implement one in today’s technological era cannot hope to thrive or succeed.

References APA 6 th edition

1. Smith, D. (n.d.). Retrieved from http://citationmachine.net/index2.php

2. Campbell, S. How to set up a small business computer network. Retrieved from

http://www.makeuseof.com/tag/how-to-set-up-a-small-business-computer-network/

3. Shelly, G., & Rosenblatt, H. (2011). Systems analysis and design. Mason, Ohio: Cengage

Learning.

4. Retrieved from http://www.google.com/search?hl=en&gs_rn=9&gs_ri=psy-

ab&cp=12&gs_id=62&xhr=t&q=information

technology&bav=on.2,or.r_qf.&bvm=bv.45175338,d.dmg&biw=1920&bih=908&um=1&ie=UTF-

8&tbm=isch&source=og&sa=N&tab=wi&ei=_85pUYzTOsLE4APG9IGgDQ

5. (n.d.). Retrieved from http://petersheehan.blogspot.com/2009/01/seven-phases-of-systems-

development_11.html

6. Posey, B. M. (n.d.). Retrieved from http://www.techrepublic.com/article/understanding-the-

differences-between-clientserver-and-peer-to-peer-networks/1055415

7. (n.d.). Retrieved from http://www.google.com/search?q=client/server

architecture&bav=on.2,or.r_qf.&bvm=bv.45175338,d.dmg&biw=1920&bih=908&um=1&ie=UTF

-8&hl=en&tbm=isch&source=og&sa=N&tab=wi&ei=FzVqUe78IsXD4APO9YHgCg

Page 35: Luis Perez ITS written report

Perez 35

8. Sharma, R. (n.d.). Retrieved from http://en.kioskea.net/faq/2761-what-is-network-architecture

9. Mitchell, B. (n.d.). Retrieved from

http://compnetworking.about.com/od/networkdesign/a/topologies.htm

10. Buzzle. (n.d.). Retrieved from http://www.buzzle.com/articles/router-vs-switch-vs-hub.html

11. (n.d.). Retrieved from http://support.microsoft.com/kb/103884

12. Andrews, J. (2010). Comptia A+ guide to hardware managing, maintaining, and

troubleshooting. (5th ed.). Boston MA: Course Technology Cengage Learning.

13. Winkelman, R. (n.d.). Retrieved from http://fcit.usf.edu/network/chap4/chap4.htm

14. (n.d.). Retrieved from http://secunia.com/products/smb/smallbusiness/

15. Grover, S. (n.d.). How to turn your computer into a cash register. Retrieved from

http://www.ehow.com/how_7147926_turn-computer-cash-register.html

16. LYNN, S. (n.d.). Retrieved from http://www.pcmag.com/article2/0,2817,2366262,00.asp

17. (n.d.). Retrieved from http://www.edrawsoft.com/Network-Diagrams.php

18. (n.d.). Retrieved from http://wwwb.comcast.com/internet-service.html

19. Tiger direct. (n.d.). Retrieved from http://www.tigerdirect.com/applications/SearchTools/item-

details.asp?EdpNo=7666279&Sku=A180-C2101B20

20. Google. (n.d.). Retrieved from http://www.google.com/imghp?hl=en&tab=wi

21. Tiger direct. (n.d.). Retrieved from http://www.tigerdirect.com/applications/SearchTools/item-

details.asp?EdpNo=4917324&Sku=S203-121404

22. Tiger direct. (n.d.). Retrieved from http://www.tigerdirect.com/applications/SearchTools/item-

details.asp?EdpNo=19382&CatId=2668

23. Tiger direct. (n.d.). Retrieved from http://www.tigerdirect.com/applications/SearchTools/item-

details.asp?EdpNo=520046&CatId=762

Page 36: Luis Perez ITS written report

Perez 36

24. Tiger direct. (n.d.). Retrieved from http://www.tigerdirect.com/applications/SearchTools/item-

details.asp?EdpNo=4917859&CatId=2715

25. (n.d.). Retrieved from http://technet.microsoft.com/en-us/library/cc723503.aspx

26. (n.d.). Retrieved from http://www.tigerdirect.com/applications/SearchTools/item-

details.asp?EdpNo=234660&CatId=2796