2. Perez2
Introduction
Computers are everywhere today, in homes, businesses, and schools just about every
person owns one. For businesses to thrive in today’s job market computers need to be able to
communicate with one another in a large-scale environment to access, and use other resources
such as printers, fax machines, etc. To accomplish this computers are linked/ interconnected
with one another with a variety of networking hardware in what is known as a network. This
allows the computers to be able to share data with one another and use computer peripherals that
are within that same network. Networks can also be linked to one another creating a larger
interconnection of computers. As a network gets bigger though the security risks increase as
well which is why some parts of the network where important data lies are isolated and kept
secured. Even in homes people have a local area network running, which is usually a small
network involving a few computers connected through a some type of networking hardware,
most likely a router. For my written report, I decided to give an example of a network
architecture that can be implemented in a business setting. I will also give reasons and defend
with sound references as to why I chose the certain layout of network, the hardware and software
picked, and the security measures put in place. The report will reflect the concept of SDLC
(system development life cycle) which is used in many business aspects such as in system
analysis and design.
The computer repair shop “PC Fix N Go” is a small local business that handles everyday
computer problems, from slow sluggish running computers, to computer viruses to PC upgrades
3. Perez3
and parts change. PC Fix N Go also sales computer parts, accessories, and gives in-store
consultation on products and possible computer upgrades. The business has slowly been gaining
more and more clients and has decided to implement a network to meet the rise in business
demands. There are twelve employees working at PC Fix N GO, which include four repair
technicians, six sales associate/cashier, a supervisor and the manager/store owner. The
technicians fix computers clients leave and are consultants to customers who have questions on
upgrading PC’s or about certain products, with two technicians working at the store during a
shift. The sales associates help customers when they need to find a product in the store and are
also serve as cashiers, with three sales associates working during a shift. The supervisor is there
to oversee daily store operations and help out on the floor when needed. The storeowner/
manager takes care of daily business tasks to keep everything running smoothly from doing
employee schedules, to payroll, to ordering merchandise and keeping business accounts on
expenses and revenues.
System Development Life Cycle
Projects in have a sequence of phases it goes through from start to finish, it needs to be
planned, designed, implemented and executed. Depending on the project and for what purpose,
the System Development Life Cycle (SDLC) can be implemented, which is particular useful for
business oriented projects. The SDLC can include the following phases:
Planning
System Analysis
System Design
Development
4. Perez4
Testing
Implementation
Maintenance
Planning is the first phase and perhaps most important stage in the SDLC which
involves investigating the current system to give detail of how it works and what it is, and
leads for what will be the the System Proposal. In the planning phase, the client also
gives input as to what features they would like to include in there system and the
operations that would like the system to carry out.
The next phase involved in the SDLC is system analysis where problems with the
current system are pointed out and what course of action to take. In this stage, project
goals are defined in terms of how the new system will function and operate. A schedule
is setup, the number of people who will be involved within the project are defined, as
well as going over the budget. Tools such as gantt charts and flow diagrams are used in
this phase. Context diagrams are also used which show a top –level view of single
system processes and include system boundaries and scope of the system. Unlike a
context, diagram that shows basic general information of the system, a diagram 0 shows
detail of internal processes, data flows, and data stores. All these tools help mold and
shape the system prior to designing it.
After system analysis comes the system design phase where the actual building
and system takes place. The system design takes into consideration past charts and
diagrams, which show specific functions and the parts the system will contain. The
system design phase is split into two sections the logical system design and physical
5. Perez5
system design. The logical system shows detail of how the system will perform and often
shown through blueprints and the physical system showing detail cost of what it took to
build the system through materials, labor, etc.
In the development phase, the company will either use internal IT staff for the
system or hire programmers, software engineers and developers to start production on the
system. Training users of the company also happens during this phase as they are shown
how the system will work and how to use it.
Once the system is built, testing must take place to make sure there are no glitches
or bugs within the system and that it’s operable. If any bugs are found, they are patched
up before finalizing the system. Client feedback is given to assure there desired features
and functions have been included to their satisfaction. Records of documentation of the
project are kept may include: program, system, operations, and user documentation.
After testing of the system has taken place, implementation occurs which is
exposing the system into a real working environment. Data conversion takes place,
which is incorporating prior existing data into the new system. This is done through one
of many ways which can include a direct cutover which is an instant change, parallel
operation which runs both systems at the same time, and pilot, phased operations which is
a combination of the earlier methods.
The last step in the SDLC is maintenance and it involves system support for the
created product and security. Users are trained on the workings of the system and how it
functions. Maintenance tasks include Corrective, adaptive, perfective, and preventive
maintenance. Corrective maintenance deals with fixing any last minute errors or
6. Perez6
problems, while adaptive maintenance is enhancements to the system such as updates and
patches. Perfective maintenance improves on the efficiency, reliability, and
maintainability of the system. Lastly, preventive maintenance deals with any future
problems with the system.
7. Perez7
Research and Defense (1) peer to peer vs. client/server
Peer to peer and client/server are two types of network architectures that can be
implemented in a network each with its own pros and cons. Some features of peer to peer and
client/server are similar for example in that they connect computers so they can share data and
resources with the main difference being the setup configuration. One of the main differences
between these two network architectures is that in a peer to peer there is no central server so that
means that all workstations on the network share the files equally with one another. Since there
is no server, there is no central storage or a need to authenticate users. In client/server network
there are dedicated servers for certain tasks and the serve determines which users have access to
which files on the network. With that in mind, peer-to-peer networks are usually implemented in
homes and small business while larger businesses tend to go with client/server architecture.
A reason to choose a peer-to-peer network is that it is inexpensive to set up and easy to
configure. The downside to this is that a peer-to-peer network can only support up to ten
workstations before performance begins to suffer. Since resources are freely shared between all
computers, there is no central security and no ways to control or prohibit file access making
peer-to-peer unsecure. The only security feature on a peer-to-peer architecture would be
modifying network shares by adding a password to a folder share, which is still unsecure as
anyone who knows the password on the network can then access the share.
Client/server networks have a server that acts as a centralized security database that
determines who has access to shared resources. This is done through the server having a list of
usernames and passwords and users can’t log in unless they provide the correct credentials to be
granted authorization into the network. One users are validated and log into the network they
8. Perez8
can only access resources and shares that the administrators have granted them access to making
it much more secured then peer-to-peer. Another advantage to client/server networks is they are
more stable in the aspect that shared resources lie within the sever while in peer-to-peer they are
on the users machines. If a user’s machine has an important share within that workstation and it
crashes, it affects the rest of the machines since they would no longer be able to access the shares
on that specific machine. Backups are also easier done in client/server networks as it just backs
up the files within the server instead of having to back up each workstation on a peer-to-peer
network. Client/server networks also have their downside, according to the article
“Understanding the differences between client/server and peer-to-peer networks” Brien Posey
says, “The primary downside to a client/server network is its cost. Servers can become very
expensive.” “Additionally, client/server networks require an employee to manage them. Unless
you have someone in your office who’s trained in NetWare or Windows NT Server and in all of
the issues that are involved in client/server networking, you’ll have to hire someone from the
outside. And believe me when I say that qualified networking professionals don’t come cheap.”
(Posey)
Depending on the given situation, each of these network architectures are both great and
can work very well if implemented for the correct needs the network and business demands. For
the given business PC FIX N GO, I have decided to implement a peer-to-peer network
architecture for the given fact that it is less expensive and easy to install/configure than a
client/server. The business is small and locally owned which is perfect since a peer-to-peer
network is perfect in this scenario and for home networks. Even though a peer-to-peer is less
secure when it comes to security, for our business network it will work because the number of
employees is few and uses less than 10 hosts (workstations) which won’t strain network
9. Perez9
performance. Using share passwords shares will work under these conditions. Peer-to-peer
networks do not begin to suffer in performance until 10 or more workstations are added to the
network. As business demands rise and the business expands, perhaps in the future the network
architecture could be changed to a client/server.
Client/Server Architecture example
Peer-To-Peer Architecture example
10. Perez10
Research and Defense (2) Network Topologies
People often get the confused with the term network architecture and network topology
thinking it is the same thing. The difference between the two is logical and physical meaning
that for the network architecture such as peer-to-peer or client/server it deals with the logic or
how systems communicate over the network. The topology refers to the actual physical layout of
the machines how the workstations are set up and connected to the network hardware. The type
of topology chosen actually also has some impact as to how the workstations will communicate
with one another and how they will affect each other. There are five main types of topologies
and are as follows: (while there are others that consist of combining one or more topologies into
a hybrid)
Bus
Ring/Token Ring
11. Perez11
Star
Tree
Mesh
A Bus topology is an infrastructure that connects all devices with a single cable being the
glue that holds them together and acts as the backbone for the network. All communications are
shared through this one line, when one machine wants to communicate with another all other
requests must wait for one to finish before the next can start. A drawback to bus topologies is
that they cannot have many devices hooked up at one time because they will cause a lot of lag
and wait time as more workstations are added to this network affecting performance. If there is a
communication collision, the computers will wait on the line to see if it’s clear and retransmit
data. Another disadvantage to this layout is that if the medium that links all the machines fails
then the network crashes and becomes unavailable.
In a Ring topology, each device is connected next to another in a circular layout.
Communication is done either clockwise or counterclockwise but not both. Like the the bus
topology an error or failure on the cable causes the loop communication to break which may
cause network to go down. A token is used in a ring topology in which a computer sends the
token to another computer and that computer communicates back to the original with that same
token. The token will travel in a circular motion and only the intended recipient will receive the
message. Only one token is used at a time and all other computers must wait to communicate
until the token is not in used.
The most commonly used network today is the star topology and involves a central
communication point. All devices are connected to this central point of communication, which is
12. Perez12
either a hub, switch, or router. Unlike the ring or bus topology, a failure in any network cable
will only cut of communications with that workstation connected to it but the network will still
be up and active. A disadvantage to this network is that a lot more cabling is often involved, as
each workstation needs to be connected with its own cable to the central networking hardware,
which makes it more expensive to implement. Also while this topology offers network failure
resistance, there is a single point of failure and that is the central connection point, if that fails the
network will crash.
A tree topology is basically many star topologies formed into a bus, with tree connected
to a hub, switch, or router and acting as the root to that tree. An expanding network can
transform a bus topology into a tree topology.
Lastly a mesh topology is having several computers linked together so traveling messages
have multiple routes to take to reach its destination. This helps because unlike in a ring topology
where there is only one direction in which the message must take, if one line is taken up the
message will find an open route and travel there so little to no wait time is taken in having the
message delivered. The internet itself would be an example of a mesh topology setup in the way
communication’s travel, data is traveling in all directions and when it can’t go in one path, it will
find another route to take. Some mesh topologies are considered either full or partial mesh
meaning all devices are connected or only some connect indirectly to others.
In the article “Network Topologies” Bradley Mitchell says, “Topologies remain an
important part of network design theory. You can probably build a home or small business
computer network without understanding the difference between a bus design and a star design,
13. Perez13
but becoming familiar with the standard topologies gives you a better understanding of
important networking concepts like hubs, broadcasts, and routes.” (Mitchell)
With knowledge of network architectures and topologies, one can better build a network
that is efficient to the needs of its users. After researching the different types of network
topologies, for the given business scenario I would implement a star topology as it would be both
cost effective and provide ideal performance for the network. It would also provide some partial
failsafe in the event of a cable break or workstation failure. Star topologies are commonly used
in a business setting especially small businesses and it makes it perfect for our network. Having
a network crash and become unavailable becomes costly to a business and affects customer
satisfaction as well as their perception of your business, which can lead to lose of clientele.
Topology Examples
Bus Topology
16. Perez16
Research and Defense (3) Hub, Switch or Router?
We all heard the terms Hub, Switch, and Router before, and for the most part we know
they are network devices, but people often get confused as to what differentiates these three
networking hardware. What they all have in common is there main function, which is to connect
multiple computers together in a network or many networks. What sets them apart is the way
they operate and the distinct features each one offers. The way each of these network devices
operates and function has to do with the OSI (Open System Interconnect) model. There are
seven layers of the OSI model which are split into two categories, Upper and Lower layers.
Network devices operate on the lower levels as it deals more with data transmission and
communication. Layers 7-5 are considered the top layers, while 4-1 are the lower layers. The
seven layers of the OSI model are as follows:
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
Hubs operate on layer 1 the physical layer of the OSI model, making it a primitive device
in its function and abilities compare to switches and routers. The fact that a hub doesn’t perform
to the level of switches and routers they are also much cheaper. The hub is said to be a dumb
17. Perez17
device because instead of forwarding a message to the intended computer, it will send it to all
computers within the network. Hubs also use unnecessary bandwidth due to how they broadcast
their data transmission to all devices on the network, causing slow data transfer speeds and
operations. Security is also an issue because of how data is transmitted to all computers on the
network. Hubs are an example of half-duplex devices because they can’t receive or transmit data
at the same time.
Hub Example
Switches for the most part operate at layer 2, data link though there are some
switches that are multi-layered and can operate at layer 3. Switches unlike hubs are smart
devices in that they actually send the message only to the intended recipient, which also causes
less stress on the network as it’s not using extra bandwidth in unnecessary data transmissions.
Switches also improve on the security of hubs, and they operate in full-duplex meaning they can
both send and receive data on the network simultaneously. The fact that a switch performs and
operates better than a hub also means the device is also pricier.
Switch example
18. Perez18
Routers operate at layer 3, the network layer and perform better than a switch or hub.
Routers work off IP addresses while switches use a table of mac addresses to filter there data
transmissions while hubs act like a repeater for the whole network. Routers today have built in
operating systems and needs to be configured before use with its pre-installed software. Routers
are also the most secured of the three, in that they can tell the source address of the packet and
can tell if the data is coming within the network or not.
Router Example
19. Perez19
Even though routers are more expensive than a hub or switch it also performs better and
is more secured. It is well worth to invest in a better device as the pros outweigh the cons. From
a business perspective, one would want to have quality over quantity in products or equipment it
uses/provides. Wireless routers also provide a WAP (wireless access point) which allows using
your internet connection wirelessly for devices such as smartphones or laptops. For our
business, I think a having both router implemented with a switch would be the best choice as it
provides optimal functionality and performance while also providing security for the network.
The switch would allow for more ports that could be used for added devices and allows for
scalability of the network.
Research and Defense (4) Network Cable media
Network cabling is used to connect computers with network hardware devices such as
hubs, switches, and routers. They are considered to be the backbone of the network as it is what
20. Perez20
physically connects the network together. Network cables are categorized into three main types:
Coaxial, twisted-pair, and fiber optics.
Coaxial cable is the oldest of the three types of cable and is almost never used today to
create networks. They are still in use for cable TV connections due to it being less expensive
than fiber optics, which are now also an available option as well. Coaxial cable uses a single
copper wire with a braided shielding used around it and a plastic outer jacket to cover it all. This
causes the cable to be stiff and not flexible which makes it unsuitable for implementation in a
business setting. If the cable needed to be ran down a ceiling and curved around a corner,
coaxial cable could not be used as bending, the cable would cause damage to the copper inside
the cable.
Coaxial cable Example
According to Jean Andrews from the book “Comptia A+ guide to Hardware Managing,
Maintaining, and Troubleshooting” she says, “Twisted-pair cable is the most popular cabling
method for local networks.” (Andrews p.488) Twisted pair cables come with four pair of wires
with a total of eight and an RJ45 connector. The connector resembles a larger RJ11 phone line
21. Perez21
connector. Twisted pair cabling have two sub categories UTP, and STP. Unshielded twisted pair
(UTP) is more commonly used and less expensive than STP. Twisted pair cables also come in
categories, CAT for short. An example being CAT-3, CAT-5, and CAT-5e for enhanced. The
higher the category cable the better the quality and thorough put. Shielded twisted pair (STP)
cable uses a cover for the wires inside the cable that prevents EMI (electromagnetic interference)
which makes it more expensive and should only be used when needed.
Twisted pair cable example
Fiber optics is the most expensive of the networking cable media, and transmits data
through pulses of light in glass strands that is cover in a protected sheath. Since fiber optics uses,
light to transmit data and not electronic signals this cable type is immune to EMI
22. Perez22
(electromagnetic interference). Fiber optics operates in two modes, single-mode and multi-
mode. The glass strands in single-mode are thinner, more difficult to connect, expensive, but
also performs better than multi-mode. Multi-mode since it is cheaper than single-mode is more
popular and works by using multiple paths for the light to travel. As light bounces though it
loses strength, which is why single-mode is better as light travels in a single path. Fiber optics
use four types of connectors ST (straight tip), SC (standard connector) which are older
connectors. The newer connectors are LC (local connector), and MT-RJ (mechanical transferred
register jack). All connector types work with either single-mode or multi-mode fiber optics
cable.
Fiber optics cable example
23. Perez23
Since coaxial cable is barely used in today’s network and fiber optics is the most
expensive cable of all network media, for the business network I will use UTP twisted pair
cabling. The business because it’s in a locally small store doesn’t need to use STP cable because
in the store there is little to no EMI, since there are no large electrical motors like those found in
elevators in large business buildings, transmitters, or high tension lines to cause interference.
Fiber optics could be used but it would be more expensive to implement while twisted pair could
work just as fine with a fraction of the price.
Research and Defense (5) Security software
After doing, research on network security software I’ve found that some offer a
free trial while others have a fee. Through my searching, I came across a network security
solution software that is free and seems very effective, best of all it is tailored made for small
businesses. Secunia is a company that offers computer security software that protects your
computers and network from cyber-attacks. Secunia offers a variety of computer security
software depending on your company’s level of security needs. There are three categories of
24. Perez24
products: corporate, small business, and consumer each being geared toward a certain scale of a
network. Within each category is a variety of software, with each matching certain needs of
security for businesses.
For our business network, Secunia small business is a perfect solution for our security
needs, which protects the network from cyber-attacks that aim to steal, spy, or cause damage to
data within our network. According to Secunia, they say “The software you use every day in
your business is vulnerable to cybercrime. Our easy-to-use, flexible solution protects your
computers and stops hackers gaining access to your data”. Secunia also says, “Unprotected
software gives hackers easy access to your intellectual property, records and data, and
traditional antivirus technology isn’t enough to protect the PCs.” Secunia small business
software offers peace of mind by ensuring the integrity of your data and protecting all the PC’s
in your business network, freedom by it being implemented as a cloud-based solution which
keeps computers on the networked secured anywhere, at any time. Constant protection which
actively monitors and updates all PC’s and room to grow which means this software if flexible
and allows for business growth as the network scales.
http://secunia.com/products/consumer/compare/
The link above gives a rundown of the features found on Secunia’s small business
software as well as how it compares to other Secunia computer security products. Secunia is free
of charge now as it is in the beta phase, and can monitor up to 50 hosts i.e. network devices like
computers, or peripherals. After that, the cost will still be free for up to 5 hosts and then an
additional low monthly fee for any extra host. Our network will have only 5-12 hosts, which
makes it ideal for our scenario. The only downside I could see when researching this product is
that, since it’s a cloud-based program it requires internet connection to use. Also the fact that
25. Perez25
this product is in the beta phase means there could be unknown bugs and glitches within the
program not yet known as well as vulnerabilities. Secunia can be used with or without an anti-
virus, though the product seems to be an all in one security solution.
Planning
Now that the research is complete, and the network architecture, infrastructure,
and hardware and software have been chosen, it is now time to plan an outline and create the
network for our business. The small business “PC Fix N GO” network will have nine
workstations, a printer, personal laptop, a wireless N- router, and a switch. Six of the
workstations will be used as cash registers as well as finding and ordering products. Two, will
be used for the repair technicians to give consultations on upgrades to clients and to keep a list of
appointments and documentations on machines worked on. To turn the workstations into cash
registers we will use a POS (point of sale) software such as QuickBooks point of sale from intuit.
They have a free trial valued at $600 that comes with a cash drawer, barcode scanner, receipt
printer, credit card reader, and a Gopayment mobile card reader. The hardware is easy and quick
to install, with most connections being made through the computers serial ports. POS software
26. Perez26
provides an all in one solution for financial transactions and allows the business to save money
by utilizing some of the computers on the networks to function as cash registers.
http://intuitpayments.com/pointofsale?gclid=CIiJtoyT2rYCFQFp4Aod7VsAnQ&ef_id=UW9hfg
AABbDQVEUM:20130420210521:s
The site above is intuit Point of Sale QuickBooks webpage with the customer
representative number for information on how to receive the free hardware that comes with it.
After the trail period there is a small monthly fee, for information on prices after the 30 day trail
one can inquire through the same number. The other computer will be used by the store
owner/manager for keeping track of payroll, schedules, and database of clientele, and his
personal laptop will keep a backup of all records. The network will also consist of a multi-
functional printer that customers can also use in store to make copies of documents for a small
fee.
For the network’s architecture, we will use peer-to-peer as it better fits the small business
needs. The topology will be a star connected to a router, and a switch for additional ports, for the
network cable we will implement is UTP (unshielded twisted pair). Below is a Gannt chart
27. Perez27
outline for the preparation and planning of the network.
Analysis
PC Fix N GO is a small locally owned company that has steadily been growing and is
now seeing more business than ever before. The business is growing very fast that it needs to
have structure and organization, to accomplish this task the company has decided to implement a
computer network. According to Samara Lynn from PC mag in the article “How to Set Up a
Home or Small Business Network” she says “A computer network is an essential element of
modern business, and it’s increasingly indispensable in the home, too.” In today’s modern day
era where everyone seems to be connected online, it would make sense for businesses to move
forward with the technological advances and stay current with trends of today. A costs
document/table will be created to show the amount that was spent on building the network. All
28. Perez28
the equipment such as workstations and peripherals will be bought brand new, with the company
allowing a budget not to exceed $4,000 for the creation of the network.
Expenses Table
Network Hardware/software Cost
ISP(Internet Service Provider) Comcast
XFINITY [Blast Package]
Up to50 mbps download speeds and uploads
up to 10mbps Online protection with constant
guard security suite
Special offer for new customers for six months
at a rate of $59.99 monthly
Then $74.95 monthly
(9) e-machines EL1360GUW12P desktop
AMD dual core E-300 1.30GHz ,2GB DDR3,
500 GB HDD, DVD-RW, Windows 7 Home
Premium 64-bit includes 20 inch monitor,
keyboard, mouse
List price $369.99 - $70.00 savings =$299.99
$299.99 x 9 = $2699.91 for 9 workstation
desktops
Samsung XE303C12-A01US Chrome book
Dual Core 1.7 GHz, 2GB DDR3 11.6 inch
monitor screen
$249.00
Comcast Modem with XFINITY Blast package $7.99 monthly for modem rental
Network software
Secunia
Intuit QuickBooks POS(Point of Sale)
Secunia is free during its beta phase and has
monthly charge after that for more than 5 hosts
on a network.
QuickBooks(POS) has a free trail and then a
29. Perez29
monthly fee
NetGear WNR3500L-100NAS Rangemax
Wireless-N gigabit Router
$129.99 -$70.00 savings = $59.99
Cate5e 500-foot 350 MHz UTP RJ-45 Cable $74.05
OKI MB 491 Multifunctional Printer
Monochrome LED, with up to 1200 x 1200
dpi, up to 40 ppm, Duplex Printing, 256 MB
memory, USB, and Ethernet enabled, Scan,
Copy, FAX
$499.99
Netgear 8-port Gigabit Network Switch $59.99 -$15.00 rebate = $44.99
Initial Cost for Network Startup = 3,695.91
Network upkeep/monthly maintenance cost will vary
The equipment chosen was based on personal brand preferences and from comparing
prices and performance of hardware, and software. The total cost to get the network up and
running is $3,695.91 with a budget of $4,000, which gave us an amount of $304.09 left over that
can be put towards any future expenses and network maintenance.
Design
Below is a diagram view of how the network would look like once everything is
connected and up and running. The software used to make this diagram is called Edraw, and it
allows creation of network diagrams and other works. The software has a free trial version and
30. Perez30
can be downloaded from http://www.edrawsoft.com/Network-Diagrams.php and is available for
various windows OS’s.
Screenshot of software
Exported Image to MS Word
31. Perez31
Implementation
During this phase the network equipment and devices are connected, it is be ready to be
launched in an actual working environment. Our wireless router will be connected to the cable
modem which provides the internet which allows the router to share internet connection with
additional devices. Three workstations, the multi-functional printer and our switch will be
physically connected to our router, with the laptop being wirelessly connected to the network.
The switch provides an additional eight ports with six being used for computers one for the
multi-functional printer and another to connect to the router. The wired connections will be
made using CAT 5-e UTP Ethernet cable. After the router is configured and wireless security
Desktop 2
Desktop 1
Desktop 9
Router
Modem
Multi-functional Printer
ISP
Laptop
Switch
Desktop 5
Desktop 6
Desktop 4
Desktop 3
Desktop 8
Desktop 7
32. Perez32
protocols set, and all equipment installed and connected, the business PC FIX N GO would now
have a network implemented with its business processes and will be ready to provide a higher
level of service to its customers. The employees and owner will be taught on the workings of the
network, and any issues found within the first weeks of deploying this network would be
addressed and fix.
Security Plan
The security plan/policy for our small business network can be broken down into three
categories: Assets, Risks, and security measures to protect our network. Assets would include
anything of value to the company that needs to be protected which can include both physical and
non-physical. Risks are anything that can cause harm to the business network and the types of
risks a network is exposed to. Security measures would include preventive actions taken to
insure the protection both operational and functional of the network.
Assets include the following physical and non-physical items:
Desktops
Laptops
Network hardware such as modem, router, and network cable
User names and passwords
Network configuration set up information such as routers SSID and password
Employee records
Customer records
Important business documents such as company financial records
33. Perez33
Risks to the assets Include:
Natural Disasters: Floods, Fires, Earthquakes, Hurricanes, etc.
Hardware Component failure
Software bugs or glitches
Malware: viruses, Trojan horses, worms, root kits, spyware, adware, etc.
Hack attacks/ cyber-attacks: Social engineering, Phishing, IP spoofing, Denial of service
attacks, password cracking
Disgruntled employee
Uninformed user mistakes
Loss of data through corruption
Preventive actions to the risks include:
User awareness training
Well established security policy to include: group, email, password, backup and
restore policies
Implementation of security cameras, and alarm systems
Natural disaster plan of recovery
Purchase of insurance for the business
Network protection software such as a firewall, strong anti-virus
Conclusion
Whether it’s creating a SOHO (small office home office) or small to large business
network, implementing a network is very beneficial no matter where it’s setup. Creating a
34. Perez34
network is not very hard at all and just requires some hardware and network components.
Networks make it easier for businesses to share resources thus reducing the costs. It allows them
to stay in contact with its customers and expand as a business. Networks are flexible and can be
scaled along with the business as it grows. Within a network data can also be better protected
through backup’s and online or offsite storage. Organization becomes easier by using software
to setup agendas or schedules and organize events. Most homes today have a home network
which adds to the fact of how important networks are today, a business of any kind or size that
doesn’t implement one in today’s technological era cannot hope to thrive or succeed.
References APA 6th edition
1. Smith,D.(n.d.).Retrievedfrom http://citationmachine.net/index2.php
2. Campbell,S. Howto set up a small businesscomputernetwork.Retrievedfrom
http://www.makeuseof.com/tag/how-to-set-up-a-small-business-computer-network/
3. Shelly,G.,&Rosenblatt,H.(2011). Systemsanalysisand design.Mason,Ohio:Cengage
Learning.
4. Retrievedfrom http://www.google.com/search?hl=en&gs_rn=9&gs_ri=psy-
ab&cp=12&gs_id=62&xhr=t&q=information
technology&bav=on.2,or.r_qf.&bvm=bv.45175338,d.dmg&biw=1920&bih=908&um=1&ie=UTF-
8&tbm=isch&source=og&sa=N&tab=wi&ei=_85pUYzTOsLE4APG9IGgDQ
5. (n.d.).Retrievedfrom http://petersheehan.blogspot.com/2009/01/seven-phases-of-systems-
development_11.html
6. Posey,B.M. (n.d.).Retrievedfrom http://www.techrepublic.com/article/understanding-the-
differences-between-clientserver-and-peer-to-peer-networks/1055415