SlideShare a Scribd company logo
1 of 36
Perez1
Luis Perez
Capstone Project written report
Perez2
Introduction
Computers are everywhere today, in homes, businesses, and schools just about every
person owns one. For businesses to thrive in today’s job market computers need to be able to
communicate with one another in a large-scale environment to access, and use other resources
such as printers, fax machines, etc. To accomplish this computers are linked/ interconnected
with one another with a variety of networking hardware in what is known as a network. This
allows the computers to be able to share data with one another and use computer peripherals that
are within that same network. Networks can also be linked to one another creating a larger
interconnection of computers. As a network gets bigger though the security risks increase as
well which is why some parts of the network where important data lies are isolated and kept
secured. Even in homes people have a local area network running, which is usually a small
network involving a few computers connected through a some type of networking hardware,
most likely a router. For my written report, I decided to give an example of a network
architecture that can be implemented in a business setting. I will also give reasons and defend
with sound references as to why I chose the certain layout of network, the hardware and software
picked, and the security measures put in place. The report will reflect the concept of SDLC
(system development life cycle) which is used in many business aspects such as in system
analysis and design.
The computer repair shop “PC Fix N Go” is a small local business that handles everyday
computer problems, from slow sluggish running computers, to computer viruses to PC upgrades
Perez3
and parts change. PC Fix N Go also sales computer parts, accessories, and gives in-store
consultation on products and possible computer upgrades. The business has slowly been gaining
more and more clients and has decided to implement a network to meet the rise in business
demands. There are twelve employees working at PC Fix N GO, which include four repair
technicians, six sales associate/cashier, a supervisor and the manager/store owner. The
technicians fix computers clients leave and are consultants to customers who have questions on
upgrading PC’s or about certain products, with two technicians working at the store during a
shift. The sales associates help customers when they need to find a product in the store and are
also serve as cashiers, with three sales associates working during a shift. The supervisor is there
to oversee daily store operations and help out on the floor when needed. The storeowner/
manager takes care of daily business tasks to keep everything running smoothly from doing
employee schedules, to payroll, to ordering merchandise and keeping business accounts on
expenses and revenues.
System Development Life Cycle
Projects in have a sequence of phases it goes through from start to finish, it needs to be
planned, designed, implemented and executed. Depending on the project and for what purpose,
the System Development Life Cycle (SDLC) can be implemented, which is particular useful for
business oriented projects. The SDLC can include the following phases:
 Planning
 System Analysis
 System Design
 Development
Perez4
 Testing
 Implementation
 Maintenance
Planning is the first phase and perhaps most important stage in the SDLC which
involves investigating the current system to give detail of how it works and what it is, and
leads for what will be the the System Proposal. In the planning phase, the client also
gives input as to what features they would like to include in there system and the
operations that would like the system to carry out.
The next phase involved in the SDLC is system analysis where problems with the
current system are pointed out and what course of action to take. In this stage, project
goals are defined in terms of how the new system will function and operate. A schedule
is setup, the number of people who will be involved within the project are defined, as
well as going over the budget. Tools such as gantt charts and flow diagrams are used in
this phase. Context diagrams are also used which show a top –level view of single
system processes and include system boundaries and scope of the system. Unlike a
context, diagram that shows basic general information of the system, a diagram 0 shows
detail of internal processes, data flows, and data stores. All these tools help mold and
shape the system prior to designing it.
After system analysis comes the system design phase where the actual building
and system takes place. The system design takes into consideration past charts and
diagrams, which show specific functions and the parts the system will contain. The
system design phase is split into two sections the logical system design and physical
Perez5
system design. The logical system shows detail of how the system will perform and often
shown through blueprints and the physical system showing detail cost of what it took to
build the system through materials, labor, etc.
In the development phase, the company will either use internal IT staff for the
system or hire programmers, software engineers and developers to start production on the
system. Training users of the company also happens during this phase as they are shown
how the system will work and how to use it.
Once the system is built, testing must take place to make sure there are no glitches
or bugs within the system and that it’s operable. If any bugs are found, they are patched
up before finalizing the system. Client feedback is given to assure there desired features
and functions have been included to their satisfaction. Records of documentation of the
project are kept may include: program, system, operations, and user documentation.
After testing of the system has taken place, implementation occurs which is
exposing the system into a real working environment. Data conversion takes place,
which is incorporating prior existing data into the new system. This is done through one
of many ways which can include a direct cutover which is an instant change, parallel
operation which runs both systems at the same time, and pilot, phased operations which is
a combination of the earlier methods.
The last step in the SDLC is maintenance and it involves system support for the
created product and security. Users are trained on the workings of the system and how it
functions. Maintenance tasks include Corrective, adaptive, perfective, and preventive
maintenance. Corrective maintenance deals with fixing any last minute errors or
Perez6
problems, while adaptive maintenance is enhancements to the system such as updates and
patches. Perfective maintenance improves on the efficiency, reliability, and
maintainability of the system. Lastly, preventive maintenance deals with any future
problems with the system.
Perez7
Research and Defense (1) peer to peer vs. client/server
Peer to peer and client/server are two types of network architectures that can be
implemented in a network each with its own pros and cons. Some features of peer to peer and
client/server are similar for example in that they connect computers so they can share data and
resources with the main difference being the setup configuration. One of the main differences
between these two network architectures is that in a peer to peer there is no central server so that
means that all workstations on the network share the files equally with one another. Since there
is no server, there is no central storage or a need to authenticate users. In client/server network
there are dedicated servers for certain tasks and the serve determines which users have access to
which files on the network. With that in mind, peer-to-peer networks are usually implemented in
homes and small business while larger businesses tend to go with client/server architecture.
A reason to choose a peer-to-peer network is that it is inexpensive to set up and easy to
configure. The downside to this is that a peer-to-peer network can only support up to ten
workstations before performance begins to suffer. Since resources are freely shared between all
computers, there is no central security and no ways to control or prohibit file access making
peer-to-peer unsecure. The only security feature on a peer-to-peer architecture would be
modifying network shares by adding a password to a folder share, which is still unsecure as
anyone who knows the password on the network can then access the share.
Client/server networks have a server that acts as a centralized security database that
determines who has access to shared resources. This is done through the server having a list of
usernames and passwords and users can’t log in unless they provide the correct credentials to be
granted authorization into the network. One users are validated and log into the network they
Perez8
can only access resources and shares that the administrators have granted them access to making
it much more secured then peer-to-peer. Another advantage to client/server networks is they are
more stable in the aspect that shared resources lie within the sever while in peer-to-peer they are
on the users machines. If a user’s machine has an important share within that workstation and it
crashes, it affects the rest of the machines since they would no longer be able to access the shares
on that specific machine. Backups are also easier done in client/server networks as it just backs
up the files within the server instead of having to back up each workstation on a peer-to-peer
network. Client/server networks also have their downside, according to the article
“Understanding the differences between client/server and peer-to-peer networks” Brien Posey
says, “The primary downside to a client/server network is its cost. Servers can become very
expensive.” “Additionally, client/server networks require an employee to manage them. Unless
you have someone in your office who’s trained in NetWare or Windows NT Server and in all of
the issues that are involved in client/server networking, you’ll have to hire someone from the
outside. And believe me when I say that qualified networking professionals don’t come cheap.”
(Posey)
Depending on the given situation, each of these network architectures are both great and
can work very well if implemented for the correct needs the network and business demands. For
the given business PC FIX N GO, I have decided to implement a peer-to-peer network
architecture for the given fact that it is less expensive and easy to install/configure than a
client/server. The business is small and locally owned which is perfect since a peer-to-peer
network is perfect in this scenario and for home networks. Even though a peer-to-peer is less
secure when it comes to security, for our business network it will work because the number of
employees is few and uses less than 10 hosts (workstations) which won’t strain network
Perez9
performance. Using share passwords shares will work under these conditions. Peer-to-peer
networks do not begin to suffer in performance until 10 or more workstations are added to the
network. As business demands rise and the business expands, perhaps in the future the network
architecture could be changed to a client/server.
Client/Server Architecture example
Peer-To-Peer Architecture example
Perez10
Research and Defense (2) Network Topologies
People often get the confused with the term network architecture and network topology
thinking it is the same thing. The difference between the two is logical and physical meaning
that for the network architecture such as peer-to-peer or client/server it deals with the logic or
how systems communicate over the network. The topology refers to the actual physical layout of
the machines how the workstations are set up and connected to the network hardware. The type
of topology chosen actually also has some impact as to how the workstations will communicate
with one another and how they will affect each other. There are five main types of topologies
and are as follows: (while there are others that consist of combining one or more topologies into
a hybrid)
 Bus
 Ring/Token Ring
Perez11
 Star
 Tree
 Mesh
A Bus topology is an infrastructure that connects all devices with a single cable being the
glue that holds them together and acts as the backbone for the network. All communications are
shared through this one line, when one machine wants to communicate with another all other
requests must wait for one to finish before the next can start. A drawback to bus topologies is
that they cannot have many devices hooked up at one time because they will cause a lot of lag
and wait time as more workstations are added to this network affecting performance. If there is a
communication collision, the computers will wait on the line to see if it’s clear and retransmit
data. Another disadvantage to this layout is that if the medium that links all the machines fails
then the network crashes and becomes unavailable.
In a Ring topology, each device is connected next to another in a circular layout.
Communication is done either clockwise or counterclockwise but not both. Like the the bus
topology an error or failure on the cable causes the loop communication to break which may
cause network to go down. A token is used in a ring topology in which a computer sends the
token to another computer and that computer communicates back to the original with that same
token. The token will travel in a circular motion and only the intended recipient will receive the
message. Only one token is used at a time and all other computers must wait to communicate
until the token is not in used.
The most commonly used network today is the star topology and involves a central
communication point. All devices are connected to this central point of communication, which is
Perez12
either a hub, switch, or router. Unlike the ring or bus topology, a failure in any network cable
will only cut of communications with that workstation connected to it but the network will still
be up and active. A disadvantage to this network is that a lot more cabling is often involved, as
each workstation needs to be connected with its own cable to the central networking hardware,
which makes it more expensive to implement. Also while this topology offers network failure
resistance, there is a single point of failure and that is the central connection point, if that fails the
network will crash.
A tree topology is basically many star topologies formed into a bus, with tree connected
to a hub, switch, or router and acting as the root to that tree. An expanding network can
transform a bus topology into a tree topology.
Lastly a mesh topology is having several computers linked together so traveling messages
have multiple routes to take to reach its destination. This helps because unlike in a ring topology
where there is only one direction in which the message must take, if one line is taken up the
message will find an open route and travel there so little to no wait time is taken in having the
message delivered. The internet itself would be an example of a mesh topology setup in the way
communication’s travel, data is traveling in all directions and when it can’t go in one path, it will
find another route to take. Some mesh topologies are considered either full or partial mesh
meaning all devices are connected or only some connect indirectly to others.
In the article “Network Topologies” Bradley Mitchell says, “Topologies remain an
important part of network design theory. You can probably build a home or small business
computer network without understanding the difference between a bus design and a star design,
Perez13
but becoming familiar with the standard topologies gives you a better understanding of
important networking concepts like hubs, broadcasts, and routes.” (Mitchell)
With knowledge of network architectures and topologies, one can better build a network
that is efficient to the needs of its users. After researching the different types of network
topologies, for the given business scenario I would implement a star topology as it would be both
cost effective and provide ideal performance for the network. It would also provide some partial
failsafe in the event of a cable break or workstation failure. Star topologies are commonly used
in a business setting especially small businesses and it makes it perfect for our network. Having
a network crash and become unavailable becomes costly to a business and affects customer
satisfaction as well as their perception of your business, which can lead to lose of clientele.
Topology Examples
Bus Topology
Perez14
Ring Topology
Star Topology
Tree Topology
Perez15
MeshTopology
Perez16
Research and Defense (3) Hub, Switch or Router?
We all heard the terms Hub, Switch, and Router before, and for the most part we know
they are network devices, but people often get confused as to what differentiates these three
networking hardware. What they all have in common is there main function, which is to connect
multiple computers together in a network or many networks. What sets them apart is the way
they operate and the distinct features each one offers. The way each of these network devices
operates and function has to do with the OSI (Open System Interconnect) model. There are
seven layers of the OSI model which are split into two categories, Upper and Lower layers.
Network devices operate on the lower levels as it deals more with data transmission and
communication. Layers 7-5 are considered the top layers, while 4-1 are the lower layers. The
seven layers of the OSI model are as follows:
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
Hubs operate on layer 1 the physical layer of the OSI model, making it a primitive device
in its function and abilities compare to switches and routers. The fact that a hub doesn’t perform
to the level of switches and routers they are also much cheaper. The hub is said to be a dumb
Perez17
device because instead of forwarding a message to the intended computer, it will send it to all
computers within the network. Hubs also use unnecessary bandwidth due to how they broadcast
their data transmission to all devices on the network, causing slow data transfer speeds and
operations. Security is also an issue because of how data is transmitted to all computers on the
network. Hubs are an example of half-duplex devices because they can’t receive or transmit data
at the same time.
Hub Example
Switches for the most part operate at layer 2, data link though there are some
switches that are multi-layered and can operate at layer 3. Switches unlike hubs are smart
devices in that they actually send the message only to the intended recipient, which also causes
less stress on the network as it’s not using extra bandwidth in unnecessary data transmissions.
Switches also improve on the security of hubs, and they operate in full-duplex meaning they can
both send and receive data on the network simultaneously. The fact that a switch performs and
operates better than a hub also means the device is also pricier.
Switch example
Perez18
Routers operate at layer 3, the network layer and perform better than a switch or hub.
Routers work off IP addresses while switches use a table of mac addresses to filter there data
transmissions while hubs act like a repeater for the whole network. Routers today have built in
operating systems and needs to be configured before use with its pre-installed software. Routers
are also the most secured of the three, in that they can tell the source address of the packet and
can tell if the data is coming within the network or not.
Router Example
Perez19
Even though routers are more expensive than a hub or switch it also performs better and
is more secured. It is well worth to invest in a better device as the pros outweigh the cons. From
a business perspective, one would want to have quality over quantity in products or equipment it
uses/provides. Wireless routers also provide a WAP (wireless access point) which allows using
your internet connection wirelessly for devices such as smartphones or laptops. For our
business, I think a having both router implemented with a switch would be the best choice as it
provides optimal functionality and performance while also providing security for the network.
The switch would allow for more ports that could be used for added devices and allows for
scalability of the network.
Research and Defense (4) Network Cable media
Network cabling is used to connect computers with network hardware devices such as
hubs, switches, and routers. They are considered to be the backbone of the network as it is what
Perez20
physically connects the network together. Network cables are categorized into three main types:
Coaxial, twisted-pair, and fiber optics.
Coaxial cable is the oldest of the three types of cable and is almost never used today to
create networks. They are still in use for cable TV connections due to it being less expensive
than fiber optics, which are now also an available option as well. Coaxial cable uses a single
copper wire with a braided shielding used around it and a plastic outer jacket to cover it all. This
causes the cable to be stiff and not flexible which makes it unsuitable for implementation in a
business setting. If the cable needed to be ran down a ceiling and curved around a corner,
coaxial cable could not be used as bending, the cable would cause damage to the copper inside
the cable.
Coaxial cable Example
According to Jean Andrews from the book “Comptia A+ guide to Hardware Managing,
Maintaining, and Troubleshooting” she says, “Twisted-pair cable is the most popular cabling
method for local networks.” (Andrews p.488) Twisted pair cables come with four pair of wires
with a total of eight and an RJ45 connector. The connector resembles a larger RJ11 phone line
Perez21
connector. Twisted pair cabling have two sub categories UTP, and STP. Unshielded twisted pair
(UTP) is more commonly used and less expensive than STP. Twisted pair cables also come in
categories, CAT for short. An example being CAT-3, CAT-5, and CAT-5e for enhanced. The
higher the category cable the better the quality and thorough put. Shielded twisted pair (STP)
cable uses a cover for the wires inside the cable that prevents EMI (electromagnetic interference)
which makes it more expensive and should only be used when needed.
Twisted pair cable example
Fiber optics is the most expensive of the networking cable media, and transmits data
through pulses of light in glass strands that is cover in a protected sheath. Since fiber optics uses,
light to transmit data and not electronic signals this cable type is immune to EMI
Perez22
(electromagnetic interference). Fiber optics operates in two modes, single-mode and multi-
mode. The glass strands in single-mode are thinner, more difficult to connect, expensive, but
also performs better than multi-mode. Multi-mode since it is cheaper than single-mode is more
popular and works by using multiple paths for the light to travel. As light bounces though it
loses strength, which is why single-mode is better as light travels in a single path. Fiber optics
use four types of connectors ST (straight tip), SC (standard connector) which are older
connectors. The newer connectors are LC (local connector), and MT-RJ (mechanical transferred
register jack). All connector types work with either single-mode or multi-mode fiber optics
cable.
Fiber optics cable example
Perez23
Since coaxial cable is barely used in today’s network and fiber optics is the most
expensive cable of all network media, for the business network I will use UTP twisted pair
cabling. The business because it’s in a locally small store doesn’t need to use STP cable because
in the store there is little to no EMI, since there are no large electrical motors like those found in
elevators in large business buildings, transmitters, or high tension lines to cause interference.
Fiber optics could be used but it would be more expensive to implement while twisted pair could
work just as fine with a fraction of the price.
Research and Defense (5) Security software
After doing, research on network security software I’ve found that some offer a
free trial while others have a fee. Through my searching, I came across a network security
solution software that is free and seems very effective, best of all it is tailored made for small
businesses. Secunia is a company that offers computer security software that protects your
computers and network from cyber-attacks. Secunia offers a variety of computer security
software depending on your company’s level of security needs. There are three categories of
Perez24
products: corporate, small business, and consumer each being geared toward a certain scale of a
network. Within each category is a variety of software, with each matching certain needs of
security for businesses.
For our business network, Secunia small business is a perfect solution for our security
needs, which protects the network from cyber-attacks that aim to steal, spy, or cause damage to
data within our network. According to Secunia, they say “The software you use every day in
your business is vulnerable to cybercrime. Our easy-to-use, flexible solution protects your
computers and stops hackers gaining access to your data”. Secunia also says, “Unprotected
software gives hackers easy access to your intellectual property, records and data, and
traditional antivirus technology isn’t enough to protect the PCs.” Secunia small business
software offers peace of mind by ensuring the integrity of your data and protecting all the PC’s
in your business network, freedom by it being implemented as a cloud-based solution which
keeps computers on the networked secured anywhere, at any time. Constant protection which
actively monitors and updates all PC’s and room to grow which means this software if flexible
and allows for business growth as the network scales.
http://secunia.com/products/consumer/compare/
The link above gives a rundown of the features found on Secunia’s small business
software as well as how it compares to other Secunia computer security products. Secunia is free
of charge now as it is in the beta phase, and can monitor up to 50 hosts i.e. network devices like
computers, or peripherals. After that, the cost will still be free for up to 5 hosts and then an
additional low monthly fee for any extra host. Our network will have only 5-12 hosts, which
makes it ideal for our scenario. The only downside I could see when researching this product is
that, since it’s a cloud-based program it requires internet connection to use. Also the fact that
Perez25
this product is in the beta phase means there could be unknown bugs and glitches within the
program not yet known as well as vulnerabilities. Secunia can be used with or without an anti-
virus, though the product seems to be an all in one security solution.
Planning
Now that the research is complete, and the network architecture, infrastructure,
and hardware and software have been chosen, it is now time to plan an outline and create the
network for our business. The small business “PC Fix N GO” network will have nine
workstations, a printer, personal laptop, a wireless N- router, and a switch. Six of the
workstations will be used as cash registers as well as finding and ordering products. Two, will
be used for the repair technicians to give consultations on upgrades to clients and to keep a list of
appointments and documentations on machines worked on. To turn the workstations into cash
registers we will use a POS (point of sale) software such as QuickBooks point of sale from intuit.
They have a free trial valued at $600 that comes with a cash drawer, barcode scanner, receipt
printer, credit card reader, and a Gopayment mobile card reader. The hardware is easy and quick
to install, with most connections being made through the computers serial ports. POS software
Perez26
provides an all in one solution for financial transactions and allows the business to save money
by utilizing some of the computers on the networks to function as cash registers.
http://intuitpayments.com/pointofsale?gclid=CIiJtoyT2rYCFQFp4Aod7VsAnQ&ef_id=UW9hfg
AABbDQVEUM:20130420210521:s
The site above is intuit Point of Sale QuickBooks webpage with the customer
representative number for information on how to receive the free hardware that comes with it.
After the trail period there is a small monthly fee, for information on prices after the 30 day trail
one can inquire through the same number. The other computer will be used by the store
owner/manager for keeping track of payroll, schedules, and database of clientele, and his
personal laptop will keep a backup of all records. The network will also consist of a multi-
functional printer that customers can also use in store to make copies of documents for a small
fee.
For the network’s architecture, we will use peer-to-peer as it better fits the small business
needs. The topology will be a star connected to a router, and a switch for additional ports, for the
network cable we will implement is UTP (unshielded twisted pair). Below is a Gannt chart
Perez27
outline for the preparation and planning of the network.
Analysis
PC Fix N GO is a small locally owned company that has steadily been growing and is
now seeing more business than ever before. The business is growing very fast that it needs to
have structure and organization, to accomplish this task the company has decided to implement a
computer network. According to Samara Lynn from PC mag in the article “How to Set Up a
Home or Small Business Network” she says “A computer network is an essential element of
modern business, and it’s increasingly indispensable in the home, too.” In today’s modern day
era where everyone seems to be connected online, it would make sense for businesses to move
forward with the technological advances and stay current with trends of today. A costs
document/table will be created to show the amount that was spent on building the network. All
Perez28
the equipment such as workstations and peripherals will be bought brand new, with the company
allowing a budget not to exceed $4,000 for the creation of the network.
Expenses Table
Network Hardware/software Cost
ISP(Internet Service Provider) Comcast
XFINITY [Blast Package]
Up to50 mbps download speeds and uploads
up to 10mbps Online protection with constant
guard security suite
Special offer for new customers for six months
at a rate of $59.99 monthly
Then $74.95 monthly
(9) e-machines EL1360GUW12P desktop
AMD dual core E-300 1.30GHz ,2GB DDR3,
500 GB HDD, DVD-RW, Windows 7 Home
Premium 64-bit includes 20 inch monitor,
keyboard, mouse
List price $369.99 - $70.00 savings =$299.99
$299.99 x 9 = $2699.91 for 9 workstation
desktops
Samsung XE303C12-A01US Chrome book
Dual Core 1.7 GHz, 2GB DDR3 11.6 inch
monitor screen
$249.00
Comcast Modem with XFINITY Blast package $7.99 monthly for modem rental
Network software
Secunia
Intuit QuickBooks POS(Point of Sale)
Secunia is free during its beta phase and has
monthly charge after that for more than 5 hosts
on a network.
QuickBooks(POS) has a free trail and then a
Perez29
monthly fee
NetGear WNR3500L-100NAS Rangemax
Wireless-N gigabit Router
$129.99 -$70.00 savings = $59.99
Cate5e 500-foot 350 MHz UTP RJ-45 Cable $74.05
OKI MB 491 Multifunctional Printer
Monochrome LED, with up to 1200 x 1200
dpi, up to 40 ppm, Duplex Printing, 256 MB
memory, USB, and Ethernet enabled, Scan,
Copy, FAX
$499.99
Netgear 8-port Gigabit Network Switch $59.99 -$15.00 rebate = $44.99
Initial Cost for Network Startup = 3,695.91
Network upkeep/monthly maintenance cost will vary
The equipment chosen was based on personal brand preferences and from comparing
prices and performance of hardware, and software. The total cost to get the network up and
running is $3,695.91 with a budget of $4,000, which gave us an amount of $304.09 left over that
can be put towards any future expenses and network maintenance.
Design
Below is a diagram view of how the network would look like once everything is
connected and up and running. The software used to make this diagram is called Edraw, and it
allows creation of network diagrams and other works. The software has a free trial version and
Perez30
can be downloaded from http://www.edrawsoft.com/Network-Diagrams.php and is available for
various windows OS’s.
Screenshot of software
Exported Image to MS Word
Perez31
Implementation
During this phase the network equipment and devices are connected, it is be ready to be
launched in an actual working environment. Our wireless router will be connected to the cable
modem which provides the internet which allows the router to share internet connection with
additional devices. Three workstations, the multi-functional printer and our switch will be
physically connected to our router, with the laptop being wirelessly connected to the network.
The switch provides an additional eight ports with six being used for computers one for the
multi-functional printer and another to connect to the router. The wired connections will be
made using CAT 5-e UTP Ethernet cable. After the router is configured and wireless security
Desktop 2
Desktop 1
Desktop 9
Router
Modem
Multi-functional Printer
ISP
Laptop
Switch
Desktop 5
Desktop 6
Desktop 4
Desktop 3
Desktop 8
Desktop 7
Perez32
protocols set, and all equipment installed and connected, the business PC FIX N GO would now
have a network implemented with its business processes and will be ready to provide a higher
level of service to its customers. The employees and owner will be taught on the workings of the
network, and any issues found within the first weeks of deploying this network would be
addressed and fix.
Security Plan
The security plan/policy for our small business network can be broken down into three
categories: Assets, Risks, and security measures to protect our network. Assets would include
anything of value to the company that needs to be protected which can include both physical and
non-physical. Risks are anything that can cause harm to the business network and the types of
risks a network is exposed to. Security measures would include preventive actions taken to
insure the protection both operational and functional of the network.
Assets include the following physical and non-physical items:
 Desktops
 Laptops
 Network hardware such as modem, router, and network cable
 User names and passwords
 Network configuration set up information such as routers SSID and password
 Employee records
 Customer records
 Important business documents such as company financial records
Perez33
Risks to the assets Include:
 Natural Disasters: Floods, Fires, Earthquakes, Hurricanes, etc.
 Hardware Component failure
 Software bugs or glitches
 Malware: viruses, Trojan horses, worms, root kits, spyware, adware, etc.
 Hack attacks/ cyber-attacks: Social engineering, Phishing, IP spoofing, Denial of service
attacks, password cracking
 Disgruntled employee
 Uninformed user mistakes
 Loss of data through corruption
Preventive actions to the risks include:
 User awareness training
 Well established security policy to include: group, email, password, backup and
restore policies
 Implementation of security cameras, and alarm systems
 Natural disaster plan of recovery
 Purchase of insurance for the business
 Network protection software such as a firewall, strong anti-virus
Conclusion
Whether it’s creating a SOHO (small office home office) or small to large business
network, implementing a network is very beneficial no matter where it’s setup. Creating a
Perez34
network is not very hard at all and just requires some hardware and network components.
Networks make it easier for businesses to share resources thus reducing the costs. It allows them
to stay in contact with its customers and expand as a business. Networks are flexible and can be
scaled along with the business as it grows. Within a network data can also be better protected
through backup’s and online or offsite storage. Organization becomes easier by using software
to setup agendas or schedules and organize events. Most homes today have a home network
which adds to the fact of how important networks are today, a business of any kind or size that
doesn’t implement one in today’s technological era cannot hope to thrive or succeed.
References APA 6th edition
1. Smith,D.(n.d.).Retrievedfrom http://citationmachine.net/index2.php
2. Campbell,S. Howto set up a small businesscomputernetwork.Retrievedfrom
http://www.makeuseof.com/tag/how-to-set-up-a-small-business-computer-network/
3. Shelly,G.,&Rosenblatt,H.(2011). Systemsanalysisand design.Mason,Ohio:Cengage
Learning.
4. Retrievedfrom http://www.google.com/search?hl=en&gs_rn=9&gs_ri=psy-
ab&cp=12&gs_id=62&xhr=t&q=information
technology&bav=on.2,or.r_qf.&bvm=bv.45175338,d.dmg&biw=1920&bih=908&um=1&ie=UTF-
8&tbm=isch&source=og&sa=N&tab=wi&ei=_85pUYzTOsLE4APG9IGgDQ
5. (n.d.).Retrievedfrom http://petersheehan.blogspot.com/2009/01/seven-phases-of-systems-
development_11.html
6. Posey,B.M. (n.d.).Retrievedfrom http://www.techrepublic.com/article/understanding-the-
differences-between-clientserver-and-peer-to-peer-networks/1055415
Perez35
7. (n.d.).Retrievedfromhttp://www.google.com/search?q=client/server
architecture&bav=on.2,or.r_qf.&bvm=bv.45175338,d.dmg&biw=1920&bih=908&um=1&ie=UTF
-8&hl=en&tbm=isch&source=og&sa=N&tab=wi&ei=FzVqUe78IsXD4APO9YHgCg
8. Sharma,R. (n.d.).Retrievedfrom http://en.kioskea.net/faq/2761-what-is-network-architecture
9. Mitchell,B.(n.d.).Retrievedfrom
http://compnetworking.about.com/od/networkdesign/a/topologies.htm
10. Buzzle.(n.d.).Retrievedfrom http://www.buzzle.com/articles/router-vs-switch-vs-hub.html
11. (n.d.).Retrievedfrom http://support.microsoft.com/kb/103884
12. Andrews,J.(2010). Comptia A+ guideto hardwaremanaging,maintaining,and
troubleshooting.(5thed.).BostonMA:Course TechnologyCengage Learning.
13. Winkelman,R. (n.d.).Retrievedfrom http://fcit.usf.edu/network/chap4/chap4.htm
14. (n.d.).Retrievedfrom http://secunia.com/products/smb/smallbusiness/
15. Grover,S. (n.d.). Howto turn yourcomputerinto a cash register.Retrievedfrom
http://www.ehow.com/how_7147926_turn-computer-cash-register.html
16. LYNN,S. (n.d.).Retrievedfrom http://www.pcmag.com/article2/0,2817,2366262,00.asp
17. (n.d.).Retrievedfrom http://www.edrawsoft.com/Network-Diagrams.php
18. (n.d.).Retrievedfrom http://wwwb.comcast.com/internet-service.html
19. Tiger direct. (n.d.).Retrievedfrom http://www.tigerdirect.com/applications/SearchTools/item-
details.asp?EdpNo=7666279&Sku=A180-C2101B20
20. Google.(n.d.).Retrievedfrom http://www.google.com/imghp?hl=en&tab=wi
21. Tiger direct. (n.d.).Retrievedfrom http://www.tigerdirect.com/applications/SearchTools/item-
details.asp?EdpNo=4917324&Sku=S203-121404
22. Tiger direct. (n.d.).Retrievedfrom http://www.tigerdirect.com/applications/SearchTools/item-
details.asp?EdpNo=19382&CatId=2668
Perez36
23. Tiger direct. (n.d.).Retrievedfrom http://www.tigerdirect.com/applications/SearchTools/item-
details.asp?EdpNo=520046&CatId=762
24. Tiger direct. (n.d.).Retrievedfrom http://www.tigerdirect.com/applications/SearchTools/item-
details.asp?EdpNo=4917859&CatId=2715
25. (n.d.).Retrievedfrom http://technet.microsoft.com/en-us/library/cc723503.aspx
26. (n.d.). Retrieved from http://www.tigerdirect.com/applications/SearchTools/item-
details.asp?EdpNo=234660&CatId=2796

More Related Content

What's hot

Ans mi0034-database management system-sda-2012-ii
Ans mi0034-database management system-sda-2012-iiAns mi0034-database management system-sda-2012-ii
Ans mi0034-database management system-sda-2012-iizafarishtiaq
 
Performance Review of Zero Copy Techniques
Performance Review of Zero Copy TechniquesPerformance Review of Zero Copy Techniques
Performance Review of Zero Copy TechniquesCSCJournals
 
DABResume4-11-2016
DABResume4-11-2016DABResume4-11-2016
DABResume4-11-2016David Baxley
 
IRJET- A Comprehensive Review on Query Optimization for Distributed Databases
IRJET- A Comprehensive Review on Query Optimization for Distributed DatabasesIRJET- A Comprehensive Review on Query Optimization for Distributed Databases
IRJET- A Comprehensive Review on Query Optimization for Distributed DatabasesIRJET Journal
 
Characteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management SystemCharacteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management SystemCharthaGaglani
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
System analysis and design mobile inventory
System analysis and design mobile inventorySystem analysis and design mobile inventory
System analysis and design mobile inventoryAhmed Zein
 
Brian Coles USA JOBS 2016 (1)
Brian Coles USA JOBS 2016 (1)Brian Coles USA JOBS 2016 (1)
Brian Coles USA JOBS 2016 (1)Brian Coles
 
SYSTEM DESIGN by Neeraj Bhandari (Surkhet Nepal)
SYSTEM DESIGN by Neeraj Bhandari (Surkhet Nepal)SYSTEM DESIGN by Neeraj Bhandari (Surkhet Nepal)
SYSTEM DESIGN by Neeraj Bhandari (Surkhet Nepal)Neeraj Bhandari
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9Ian Sommerville
 
SHARED CONTEXT FOR IMPROVING COLLABORATION IN DATABASE ADMINISTRATION
SHARED CONTEXT FOR IMPROVING  COLLABORATION IN DATABASE ADMINISTRATION SHARED CONTEXT FOR IMPROVING  COLLABORATION IN DATABASE ADMINISTRATION
SHARED CONTEXT FOR IMPROVING COLLABORATION IN DATABASE ADMINISTRATION ijdms
 
Database Administration
Database AdministrationDatabase Administration
Database AdministrationBilal Arshad
 

What's hot (19)

Lesson02 database system architecture
Lesson02 database system architectureLesson02 database system architecture
Lesson02 database system architecture
 
Ans mi0034-database management system-sda-2012-ii
Ans mi0034-database management system-sda-2012-iiAns mi0034-database management system-sda-2012-ii
Ans mi0034-database management system-sda-2012-ii
 
Performance Review of Zero Copy Techniques
Performance Review of Zero Copy TechniquesPerformance Review of Zero Copy Techniques
Performance Review of Zero Copy Techniques
 
RAMBABU
RAMBABURAMBABU
RAMBABU
 
En35793797
En35793797En35793797
En35793797
 
DABResume4-11-2016
DABResume4-11-2016DABResume4-11-2016
DABResume4-11-2016
 
IRJET- A Comprehensive Review on Query Optimization for Distributed Databases
IRJET- A Comprehensive Review on Query Optimization for Distributed DatabasesIRJET- A Comprehensive Review on Query Optimization for Distributed Databases
IRJET- A Comprehensive Review on Query Optimization for Distributed Databases
 
Fulltext01
Fulltext01Fulltext01
Fulltext01
 
Characteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management SystemCharacteristics and Advantages of Database Management System
Characteristics and Advantages of Database Management System
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
System analysis and design mobile inventory
System analysis and design mobile inventorySystem analysis and design mobile inventory
System analysis and design mobile inventory
 
Dba
DbaDba
Dba
 
Needs for mis
Needs for misNeeds for mis
Needs for mis
 
Brian Coles USA JOBS 2016 (1)
Brian Coles USA JOBS 2016 (1)Brian Coles USA JOBS 2016 (1)
Brian Coles USA JOBS 2016 (1)
 
SYSTEM DESIGN by Neeraj Bhandari (Surkhet Nepal)
SYSTEM DESIGN by Neeraj Bhandari (Surkhet Nepal)SYSTEM DESIGN by Neeraj Bhandari (Surkhet Nepal)
SYSTEM DESIGN by Neeraj Bhandari (Surkhet Nepal)
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
SHARED CONTEXT FOR IMPROVING COLLABORATION IN DATABASE ADMINISTRATION
SHARED CONTEXT FOR IMPROVING  COLLABORATION IN DATABASE ADMINISTRATION SHARED CONTEXT FOR IMPROVING  COLLABORATION IN DATABASE ADMINISTRATION
SHARED CONTEXT FOR IMPROVING COLLABORATION IN DATABASE ADMINISTRATION
 
Database Administration
Database AdministrationDatabase Administration
Database Administration
 
Lesson01 Database introduction
Lesson01 Database introductionLesson01 Database introduction
Lesson01 Database introduction
 

Viewers also liked

презентація портфоліо середа н.а.2016 рік
презентація портфоліо середа н.а.2016 рікпрезентація портфоліо середа н.а.2016 рік
презентація портфоліо середа н.а.2016 рікМаксим Федотов
 
Engaging Students in the Target Culture
Engaging Students in the Target CultureEngaging Students in the Target Culture
Engaging Students in the Target CultureRyan King
 
Project Based Learning
Project Based LearningProject Based Learning
Project Based LearningRyan King
 
1. Group 1 Overview, Conclusions, Phase 3 Re-submission
1. Group 1 Overview, Conclusions, Phase 3 Re-submission1. Group 1 Overview, Conclusions, Phase 3 Re-submission
1. Group 1 Overview, Conclusions, Phase 3 Re-submissionLuis Perez
 
Incorporating Authentic Texts in the Classroom
Incorporating Authentic Texts in the ClassroomIncorporating Authentic Texts in the Classroom
Incorporating Authentic Texts in the ClassroomRyan King
 

Viewers also liked (8)

презентація портфоліо середа н.а.2016 рік
презентація портфоліо середа н.а.2016 рікпрезентація портфоліо середа н.а.2016 рік
презентація портфоліо середа н.а.2016 рік
 
Christopher R Storlie Resume V3
Christopher R Storlie Resume V3Christopher R Storlie Resume V3
Christopher R Storlie Resume V3
 
Engaging Students in the Target Culture
Engaging Students in the Target CultureEngaging Students in the Target Culture
Engaging Students in the Target Culture
 
Project Based Learning
Project Based LearningProject Based Learning
Project Based Learning
 
1. Group 1 Overview, Conclusions, Phase 3 Re-submission
1. Group 1 Overview, Conclusions, Phase 3 Re-submission1. Group 1 Overview, Conclusions, Phase 3 Re-submission
1. Group 1 Overview, Conclusions, Phase 3 Re-submission
 
Pavan-CV
Pavan-CVPavan-CV
Pavan-CV
 
Incorporating Authentic Texts in the Classroom
Incorporating Authentic Texts in the ClassroomIncorporating Authentic Texts in the Classroom
Incorporating Authentic Texts in the Classroom
 
thesis
thesisthesis
thesis
 

Similar to Luis Perez ITS written report

12th CBSE Computer Science Project
12th CBSE Computer Science Project12th CBSE Computer Science Project
12th CBSE Computer Science ProjectAshwin Francis
 
Hashtag Recommendation System in a P2P Social Networking Application
Hashtag Recommendation System in a P2P Social Networking ApplicationHashtag Recommendation System in a P2P Social Networking Application
Hashtag Recommendation System in a P2P Social Networking Applicationcsandit
 
Product and sevices management system
Product and sevices management systemProduct and sevices management system
Product and sevices management systemVinod Gurram
 
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxRunning head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxjeanettehully
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfAgaram Technologies
 
Microsoft Sync Framework (part 1) ABTO Software Lecture Garntsarik
Microsoft Sync Framework (part 1) ABTO Software Lecture GarntsarikMicrosoft Sync Framework (part 1) ABTO Software Lecture Garntsarik
Microsoft Sync Framework (part 1) ABTO Software Lecture GarntsarikABTO Software
 
Distributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingDistributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingHaseeb Rehman
 
Mobile store management
Mobile store management Mobile store management
Mobile store management Rupendra Verma
 
College management
College managementCollege management
College managementanandhan30
 
Systems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdfSystems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdfrohit219406
 
Software Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docxSoftware Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docxrosemariebrayshaw
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisHitesh Jangid
 
Anil Nembang: Hures Company Case Study
 Anil Nembang: Hures Company Case Study Anil Nembang: Hures Company Case Study
Anil Nembang: Hures Company Case StudyAnil Nembang
 
Project Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptxProject Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptxAjayPatre1
 

Similar to Luis Perez ITS written report (20)

12th CBSE Computer Science Project
12th CBSE Computer Science Project12th CBSE Computer Science Project
12th CBSE Computer Science Project
 
Brilient login system
Brilient login systemBrilient login system
Brilient login system
 
group project
group projectgroup project
group project
 
Hashtag Recommendation System in a P2P Social Networking Application
Hashtag Recommendation System in a P2P Social Networking ApplicationHashtag Recommendation System in a P2P Social Networking Application
Hashtag Recommendation System in a P2P Social Networking Application
 
Product and sevices management system
Product and sevices management systemProduct and sevices management system
Product and sevices management system
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docxRunning head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
Running head NETWORK DIAGRAM AND WORKFLOW1NETWORK DIAGRAM AN.docx
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
Microsoft Sync Framework (part 1) ABTO Software Lecture Garntsarik
Microsoft Sync Framework (part 1) ABTO Software Lecture GarntsarikMicrosoft Sync Framework (part 1) ABTO Software Lecture Garntsarik
Microsoft Sync Framework (part 1) ABTO Software Lecture Garntsarik
 
Computers in management
Computers in managementComputers in management
Computers in management
 
Job portal
Job portalJob portal
Job portal
 
Distributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingDistributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server Computing
 
Mobile store management
Mobile store management Mobile store management
Mobile store management
 
College management
College managementCollege management
College management
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Systems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdfSystems analysis project 10 can you answer the 4 questions at the t.pdf
Systems analysis project 10 can you answer the 4 questions at the t.pdf
 
Software Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docxSoftware Design ImplementationConnie FarrisColor.docx
Software Design ImplementationConnie FarrisColor.docx
 
Ignou MCA 6th Semester Synopsis
Ignou MCA 6th Semester SynopsisIgnou MCA 6th Semester Synopsis
Ignou MCA 6th Semester Synopsis
 
Anil Nembang: Hures Company Case Study
 Anil Nembang: Hures Company Case Study Anil Nembang: Hures Company Case Study
Anil Nembang: Hures Company Case Study
 
Project Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptxProject Documentation Student Management System format.pptx
Project Documentation Student Management System format.pptx
 

Luis Perez ITS written report

  • 2. Perez2 Introduction Computers are everywhere today, in homes, businesses, and schools just about every person owns one. For businesses to thrive in today’s job market computers need to be able to communicate with one another in a large-scale environment to access, and use other resources such as printers, fax machines, etc. To accomplish this computers are linked/ interconnected with one another with a variety of networking hardware in what is known as a network. This allows the computers to be able to share data with one another and use computer peripherals that are within that same network. Networks can also be linked to one another creating a larger interconnection of computers. As a network gets bigger though the security risks increase as well which is why some parts of the network where important data lies are isolated and kept secured. Even in homes people have a local area network running, which is usually a small network involving a few computers connected through a some type of networking hardware, most likely a router. For my written report, I decided to give an example of a network architecture that can be implemented in a business setting. I will also give reasons and defend with sound references as to why I chose the certain layout of network, the hardware and software picked, and the security measures put in place. The report will reflect the concept of SDLC (system development life cycle) which is used in many business aspects such as in system analysis and design. The computer repair shop “PC Fix N Go” is a small local business that handles everyday computer problems, from slow sluggish running computers, to computer viruses to PC upgrades
  • 3. Perez3 and parts change. PC Fix N Go also sales computer parts, accessories, and gives in-store consultation on products and possible computer upgrades. The business has slowly been gaining more and more clients and has decided to implement a network to meet the rise in business demands. There are twelve employees working at PC Fix N GO, which include four repair technicians, six sales associate/cashier, a supervisor and the manager/store owner. The technicians fix computers clients leave and are consultants to customers who have questions on upgrading PC’s or about certain products, with two technicians working at the store during a shift. The sales associates help customers when they need to find a product in the store and are also serve as cashiers, with three sales associates working during a shift. The supervisor is there to oversee daily store operations and help out on the floor when needed. The storeowner/ manager takes care of daily business tasks to keep everything running smoothly from doing employee schedules, to payroll, to ordering merchandise and keeping business accounts on expenses and revenues. System Development Life Cycle Projects in have a sequence of phases it goes through from start to finish, it needs to be planned, designed, implemented and executed. Depending on the project and for what purpose, the System Development Life Cycle (SDLC) can be implemented, which is particular useful for business oriented projects. The SDLC can include the following phases:  Planning  System Analysis  System Design  Development
  • 4. Perez4  Testing  Implementation  Maintenance Planning is the first phase and perhaps most important stage in the SDLC which involves investigating the current system to give detail of how it works and what it is, and leads for what will be the the System Proposal. In the planning phase, the client also gives input as to what features they would like to include in there system and the operations that would like the system to carry out. The next phase involved in the SDLC is system analysis where problems with the current system are pointed out and what course of action to take. In this stage, project goals are defined in terms of how the new system will function and operate. A schedule is setup, the number of people who will be involved within the project are defined, as well as going over the budget. Tools such as gantt charts and flow diagrams are used in this phase. Context diagrams are also used which show a top –level view of single system processes and include system boundaries and scope of the system. Unlike a context, diagram that shows basic general information of the system, a diagram 0 shows detail of internal processes, data flows, and data stores. All these tools help mold and shape the system prior to designing it. After system analysis comes the system design phase where the actual building and system takes place. The system design takes into consideration past charts and diagrams, which show specific functions and the parts the system will contain. The system design phase is split into two sections the logical system design and physical
  • 5. Perez5 system design. The logical system shows detail of how the system will perform and often shown through blueprints and the physical system showing detail cost of what it took to build the system through materials, labor, etc. In the development phase, the company will either use internal IT staff for the system or hire programmers, software engineers and developers to start production on the system. Training users of the company also happens during this phase as they are shown how the system will work and how to use it. Once the system is built, testing must take place to make sure there are no glitches or bugs within the system and that it’s operable. If any bugs are found, they are patched up before finalizing the system. Client feedback is given to assure there desired features and functions have been included to their satisfaction. Records of documentation of the project are kept may include: program, system, operations, and user documentation. After testing of the system has taken place, implementation occurs which is exposing the system into a real working environment. Data conversion takes place, which is incorporating prior existing data into the new system. This is done through one of many ways which can include a direct cutover which is an instant change, parallel operation which runs both systems at the same time, and pilot, phased operations which is a combination of the earlier methods. The last step in the SDLC is maintenance and it involves system support for the created product and security. Users are trained on the workings of the system and how it functions. Maintenance tasks include Corrective, adaptive, perfective, and preventive maintenance. Corrective maintenance deals with fixing any last minute errors or
  • 6. Perez6 problems, while adaptive maintenance is enhancements to the system such as updates and patches. Perfective maintenance improves on the efficiency, reliability, and maintainability of the system. Lastly, preventive maintenance deals with any future problems with the system.
  • 7. Perez7 Research and Defense (1) peer to peer vs. client/server Peer to peer and client/server are two types of network architectures that can be implemented in a network each with its own pros and cons. Some features of peer to peer and client/server are similar for example in that they connect computers so they can share data and resources with the main difference being the setup configuration. One of the main differences between these two network architectures is that in a peer to peer there is no central server so that means that all workstations on the network share the files equally with one another. Since there is no server, there is no central storage or a need to authenticate users. In client/server network there are dedicated servers for certain tasks and the serve determines which users have access to which files on the network. With that in mind, peer-to-peer networks are usually implemented in homes and small business while larger businesses tend to go with client/server architecture. A reason to choose a peer-to-peer network is that it is inexpensive to set up and easy to configure. The downside to this is that a peer-to-peer network can only support up to ten workstations before performance begins to suffer. Since resources are freely shared between all computers, there is no central security and no ways to control or prohibit file access making peer-to-peer unsecure. The only security feature on a peer-to-peer architecture would be modifying network shares by adding a password to a folder share, which is still unsecure as anyone who knows the password on the network can then access the share. Client/server networks have a server that acts as a centralized security database that determines who has access to shared resources. This is done through the server having a list of usernames and passwords and users can’t log in unless they provide the correct credentials to be granted authorization into the network. One users are validated and log into the network they
  • 8. Perez8 can only access resources and shares that the administrators have granted them access to making it much more secured then peer-to-peer. Another advantage to client/server networks is they are more stable in the aspect that shared resources lie within the sever while in peer-to-peer they are on the users machines. If a user’s machine has an important share within that workstation and it crashes, it affects the rest of the machines since they would no longer be able to access the shares on that specific machine. Backups are also easier done in client/server networks as it just backs up the files within the server instead of having to back up each workstation on a peer-to-peer network. Client/server networks also have their downside, according to the article “Understanding the differences between client/server and peer-to-peer networks” Brien Posey says, “The primary downside to a client/server network is its cost. Servers can become very expensive.” “Additionally, client/server networks require an employee to manage them. Unless you have someone in your office who’s trained in NetWare or Windows NT Server and in all of the issues that are involved in client/server networking, you’ll have to hire someone from the outside. And believe me when I say that qualified networking professionals don’t come cheap.” (Posey) Depending on the given situation, each of these network architectures are both great and can work very well if implemented for the correct needs the network and business demands. For the given business PC FIX N GO, I have decided to implement a peer-to-peer network architecture for the given fact that it is less expensive and easy to install/configure than a client/server. The business is small and locally owned which is perfect since a peer-to-peer network is perfect in this scenario and for home networks. Even though a peer-to-peer is less secure when it comes to security, for our business network it will work because the number of employees is few and uses less than 10 hosts (workstations) which won’t strain network
  • 9. Perez9 performance. Using share passwords shares will work under these conditions. Peer-to-peer networks do not begin to suffer in performance until 10 or more workstations are added to the network. As business demands rise and the business expands, perhaps in the future the network architecture could be changed to a client/server. Client/Server Architecture example Peer-To-Peer Architecture example
  • 10. Perez10 Research and Defense (2) Network Topologies People often get the confused with the term network architecture and network topology thinking it is the same thing. The difference between the two is logical and physical meaning that for the network architecture such as peer-to-peer or client/server it deals with the logic or how systems communicate over the network. The topology refers to the actual physical layout of the machines how the workstations are set up and connected to the network hardware. The type of topology chosen actually also has some impact as to how the workstations will communicate with one another and how they will affect each other. There are five main types of topologies and are as follows: (while there are others that consist of combining one or more topologies into a hybrid)  Bus  Ring/Token Ring
  • 11. Perez11  Star  Tree  Mesh A Bus topology is an infrastructure that connects all devices with a single cable being the glue that holds them together and acts as the backbone for the network. All communications are shared through this one line, when one machine wants to communicate with another all other requests must wait for one to finish before the next can start. A drawback to bus topologies is that they cannot have many devices hooked up at one time because they will cause a lot of lag and wait time as more workstations are added to this network affecting performance. If there is a communication collision, the computers will wait on the line to see if it’s clear and retransmit data. Another disadvantage to this layout is that if the medium that links all the machines fails then the network crashes and becomes unavailable. In a Ring topology, each device is connected next to another in a circular layout. Communication is done either clockwise or counterclockwise but not both. Like the the bus topology an error or failure on the cable causes the loop communication to break which may cause network to go down. A token is used in a ring topology in which a computer sends the token to another computer and that computer communicates back to the original with that same token. The token will travel in a circular motion and only the intended recipient will receive the message. Only one token is used at a time and all other computers must wait to communicate until the token is not in used. The most commonly used network today is the star topology and involves a central communication point. All devices are connected to this central point of communication, which is
  • 12. Perez12 either a hub, switch, or router. Unlike the ring or bus topology, a failure in any network cable will only cut of communications with that workstation connected to it but the network will still be up and active. A disadvantage to this network is that a lot more cabling is often involved, as each workstation needs to be connected with its own cable to the central networking hardware, which makes it more expensive to implement. Also while this topology offers network failure resistance, there is a single point of failure and that is the central connection point, if that fails the network will crash. A tree topology is basically many star topologies formed into a bus, with tree connected to a hub, switch, or router and acting as the root to that tree. An expanding network can transform a bus topology into a tree topology. Lastly a mesh topology is having several computers linked together so traveling messages have multiple routes to take to reach its destination. This helps because unlike in a ring topology where there is only one direction in which the message must take, if one line is taken up the message will find an open route and travel there so little to no wait time is taken in having the message delivered. The internet itself would be an example of a mesh topology setup in the way communication’s travel, data is traveling in all directions and when it can’t go in one path, it will find another route to take. Some mesh topologies are considered either full or partial mesh meaning all devices are connected or only some connect indirectly to others. In the article “Network Topologies” Bradley Mitchell says, “Topologies remain an important part of network design theory. You can probably build a home or small business computer network without understanding the difference between a bus design and a star design,
  • 13. Perez13 but becoming familiar with the standard topologies gives you a better understanding of important networking concepts like hubs, broadcasts, and routes.” (Mitchell) With knowledge of network architectures and topologies, one can better build a network that is efficient to the needs of its users. After researching the different types of network topologies, for the given business scenario I would implement a star topology as it would be both cost effective and provide ideal performance for the network. It would also provide some partial failsafe in the event of a cable break or workstation failure. Star topologies are commonly used in a business setting especially small businesses and it makes it perfect for our network. Having a network crash and become unavailable becomes costly to a business and affects customer satisfaction as well as their perception of your business, which can lead to lose of clientele. Topology Examples Bus Topology
  • 16. Perez16 Research and Defense (3) Hub, Switch or Router? We all heard the terms Hub, Switch, and Router before, and for the most part we know they are network devices, but people often get confused as to what differentiates these three networking hardware. What they all have in common is there main function, which is to connect multiple computers together in a network or many networks. What sets them apart is the way they operate and the distinct features each one offers. The way each of these network devices operates and function has to do with the OSI (Open System Interconnect) model. There are seven layers of the OSI model which are split into two categories, Upper and Lower layers. Network devices operate on the lower levels as it deals more with data transmission and communication. Layers 7-5 are considered the top layers, while 4-1 are the lower layers. The seven layers of the OSI model are as follows: 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical Hubs operate on layer 1 the physical layer of the OSI model, making it a primitive device in its function and abilities compare to switches and routers. The fact that a hub doesn’t perform to the level of switches and routers they are also much cheaper. The hub is said to be a dumb
  • 17. Perez17 device because instead of forwarding a message to the intended computer, it will send it to all computers within the network. Hubs also use unnecessary bandwidth due to how they broadcast their data transmission to all devices on the network, causing slow data transfer speeds and operations. Security is also an issue because of how data is transmitted to all computers on the network. Hubs are an example of half-duplex devices because they can’t receive or transmit data at the same time. Hub Example Switches for the most part operate at layer 2, data link though there are some switches that are multi-layered and can operate at layer 3. Switches unlike hubs are smart devices in that they actually send the message only to the intended recipient, which also causes less stress on the network as it’s not using extra bandwidth in unnecessary data transmissions. Switches also improve on the security of hubs, and they operate in full-duplex meaning they can both send and receive data on the network simultaneously. The fact that a switch performs and operates better than a hub also means the device is also pricier. Switch example
  • 18. Perez18 Routers operate at layer 3, the network layer and perform better than a switch or hub. Routers work off IP addresses while switches use a table of mac addresses to filter there data transmissions while hubs act like a repeater for the whole network. Routers today have built in operating systems and needs to be configured before use with its pre-installed software. Routers are also the most secured of the three, in that they can tell the source address of the packet and can tell if the data is coming within the network or not. Router Example
  • 19. Perez19 Even though routers are more expensive than a hub or switch it also performs better and is more secured. It is well worth to invest in a better device as the pros outweigh the cons. From a business perspective, one would want to have quality over quantity in products or equipment it uses/provides. Wireless routers also provide a WAP (wireless access point) which allows using your internet connection wirelessly for devices such as smartphones or laptops. For our business, I think a having both router implemented with a switch would be the best choice as it provides optimal functionality and performance while also providing security for the network. The switch would allow for more ports that could be used for added devices and allows for scalability of the network. Research and Defense (4) Network Cable media Network cabling is used to connect computers with network hardware devices such as hubs, switches, and routers. They are considered to be the backbone of the network as it is what
  • 20. Perez20 physically connects the network together. Network cables are categorized into three main types: Coaxial, twisted-pair, and fiber optics. Coaxial cable is the oldest of the three types of cable and is almost never used today to create networks. They are still in use for cable TV connections due to it being less expensive than fiber optics, which are now also an available option as well. Coaxial cable uses a single copper wire with a braided shielding used around it and a plastic outer jacket to cover it all. This causes the cable to be stiff and not flexible which makes it unsuitable for implementation in a business setting. If the cable needed to be ran down a ceiling and curved around a corner, coaxial cable could not be used as bending, the cable would cause damage to the copper inside the cable. Coaxial cable Example According to Jean Andrews from the book “Comptia A+ guide to Hardware Managing, Maintaining, and Troubleshooting” she says, “Twisted-pair cable is the most popular cabling method for local networks.” (Andrews p.488) Twisted pair cables come with four pair of wires with a total of eight and an RJ45 connector. The connector resembles a larger RJ11 phone line
  • 21. Perez21 connector. Twisted pair cabling have two sub categories UTP, and STP. Unshielded twisted pair (UTP) is more commonly used and less expensive than STP. Twisted pair cables also come in categories, CAT for short. An example being CAT-3, CAT-5, and CAT-5e for enhanced. The higher the category cable the better the quality and thorough put. Shielded twisted pair (STP) cable uses a cover for the wires inside the cable that prevents EMI (electromagnetic interference) which makes it more expensive and should only be used when needed. Twisted pair cable example Fiber optics is the most expensive of the networking cable media, and transmits data through pulses of light in glass strands that is cover in a protected sheath. Since fiber optics uses, light to transmit data and not electronic signals this cable type is immune to EMI
  • 22. Perez22 (electromagnetic interference). Fiber optics operates in two modes, single-mode and multi- mode. The glass strands in single-mode are thinner, more difficult to connect, expensive, but also performs better than multi-mode. Multi-mode since it is cheaper than single-mode is more popular and works by using multiple paths for the light to travel. As light bounces though it loses strength, which is why single-mode is better as light travels in a single path. Fiber optics use four types of connectors ST (straight tip), SC (standard connector) which are older connectors. The newer connectors are LC (local connector), and MT-RJ (mechanical transferred register jack). All connector types work with either single-mode or multi-mode fiber optics cable. Fiber optics cable example
  • 23. Perez23 Since coaxial cable is barely used in today’s network and fiber optics is the most expensive cable of all network media, for the business network I will use UTP twisted pair cabling. The business because it’s in a locally small store doesn’t need to use STP cable because in the store there is little to no EMI, since there are no large electrical motors like those found in elevators in large business buildings, transmitters, or high tension lines to cause interference. Fiber optics could be used but it would be more expensive to implement while twisted pair could work just as fine with a fraction of the price. Research and Defense (5) Security software After doing, research on network security software I’ve found that some offer a free trial while others have a fee. Through my searching, I came across a network security solution software that is free and seems very effective, best of all it is tailored made for small businesses. Secunia is a company that offers computer security software that protects your computers and network from cyber-attacks. Secunia offers a variety of computer security software depending on your company’s level of security needs. There are three categories of
  • 24. Perez24 products: corporate, small business, and consumer each being geared toward a certain scale of a network. Within each category is a variety of software, with each matching certain needs of security for businesses. For our business network, Secunia small business is a perfect solution for our security needs, which protects the network from cyber-attacks that aim to steal, spy, or cause damage to data within our network. According to Secunia, they say “The software you use every day in your business is vulnerable to cybercrime. Our easy-to-use, flexible solution protects your computers and stops hackers gaining access to your data”. Secunia also says, “Unprotected software gives hackers easy access to your intellectual property, records and data, and traditional antivirus technology isn’t enough to protect the PCs.” Secunia small business software offers peace of mind by ensuring the integrity of your data and protecting all the PC’s in your business network, freedom by it being implemented as a cloud-based solution which keeps computers on the networked secured anywhere, at any time. Constant protection which actively monitors and updates all PC’s and room to grow which means this software if flexible and allows for business growth as the network scales. http://secunia.com/products/consumer/compare/ The link above gives a rundown of the features found on Secunia’s small business software as well as how it compares to other Secunia computer security products. Secunia is free of charge now as it is in the beta phase, and can monitor up to 50 hosts i.e. network devices like computers, or peripherals. After that, the cost will still be free for up to 5 hosts and then an additional low monthly fee for any extra host. Our network will have only 5-12 hosts, which makes it ideal for our scenario. The only downside I could see when researching this product is that, since it’s a cloud-based program it requires internet connection to use. Also the fact that
  • 25. Perez25 this product is in the beta phase means there could be unknown bugs and glitches within the program not yet known as well as vulnerabilities. Secunia can be used with or without an anti- virus, though the product seems to be an all in one security solution. Planning Now that the research is complete, and the network architecture, infrastructure, and hardware and software have been chosen, it is now time to plan an outline and create the network for our business. The small business “PC Fix N GO” network will have nine workstations, a printer, personal laptop, a wireless N- router, and a switch. Six of the workstations will be used as cash registers as well as finding and ordering products. Two, will be used for the repair technicians to give consultations on upgrades to clients and to keep a list of appointments and documentations on machines worked on. To turn the workstations into cash registers we will use a POS (point of sale) software such as QuickBooks point of sale from intuit. They have a free trial valued at $600 that comes with a cash drawer, barcode scanner, receipt printer, credit card reader, and a Gopayment mobile card reader. The hardware is easy and quick to install, with most connections being made through the computers serial ports. POS software
  • 26. Perez26 provides an all in one solution for financial transactions and allows the business to save money by utilizing some of the computers on the networks to function as cash registers. http://intuitpayments.com/pointofsale?gclid=CIiJtoyT2rYCFQFp4Aod7VsAnQ&ef_id=UW9hfg AABbDQVEUM:20130420210521:s The site above is intuit Point of Sale QuickBooks webpage with the customer representative number for information on how to receive the free hardware that comes with it. After the trail period there is a small monthly fee, for information on prices after the 30 day trail one can inquire through the same number. The other computer will be used by the store owner/manager for keeping track of payroll, schedules, and database of clientele, and his personal laptop will keep a backup of all records. The network will also consist of a multi- functional printer that customers can also use in store to make copies of documents for a small fee. For the network’s architecture, we will use peer-to-peer as it better fits the small business needs. The topology will be a star connected to a router, and a switch for additional ports, for the network cable we will implement is UTP (unshielded twisted pair). Below is a Gannt chart
  • 27. Perez27 outline for the preparation and planning of the network. Analysis PC Fix N GO is a small locally owned company that has steadily been growing and is now seeing more business than ever before. The business is growing very fast that it needs to have structure and organization, to accomplish this task the company has decided to implement a computer network. According to Samara Lynn from PC mag in the article “How to Set Up a Home or Small Business Network” she says “A computer network is an essential element of modern business, and it’s increasingly indispensable in the home, too.” In today’s modern day era where everyone seems to be connected online, it would make sense for businesses to move forward with the technological advances and stay current with trends of today. A costs document/table will be created to show the amount that was spent on building the network. All
  • 28. Perez28 the equipment such as workstations and peripherals will be bought brand new, with the company allowing a budget not to exceed $4,000 for the creation of the network. Expenses Table Network Hardware/software Cost ISP(Internet Service Provider) Comcast XFINITY [Blast Package] Up to50 mbps download speeds and uploads up to 10mbps Online protection with constant guard security suite Special offer for new customers for six months at a rate of $59.99 monthly Then $74.95 monthly (9) e-machines EL1360GUW12P desktop AMD dual core E-300 1.30GHz ,2GB DDR3, 500 GB HDD, DVD-RW, Windows 7 Home Premium 64-bit includes 20 inch monitor, keyboard, mouse List price $369.99 - $70.00 savings =$299.99 $299.99 x 9 = $2699.91 for 9 workstation desktops Samsung XE303C12-A01US Chrome book Dual Core 1.7 GHz, 2GB DDR3 11.6 inch monitor screen $249.00 Comcast Modem with XFINITY Blast package $7.99 monthly for modem rental Network software Secunia Intuit QuickBooks POS(Point of Sale) Secunia is free during its beta phase and has monthly charge after that for more than 5 hosts on a network. QuickBooks(POS) has a free trail and then a
  • 29. Perez29 monthly fee NetGear WNR3500L-100NAS Rangemax Wireless-N gigabit Router $129.99 -$70.00 savings = $59.99 Cate5e 500-foot 350 MHz UTP RJ-45 Cable $74.05 OKI MB 491 Multifunctional Printer Monochrome LED, with up to 1200 x 1200 dpi, up to 40 ppm, Duplex Printing, 256 MB memory, USB, and Ethernet enabled, Scan, Copy, FAX $499.99 Netgear 8-port Gigabit Network Switch $59.99 -$15.00 rebate = $44.99 Initial Cost for Network Startup = 3,695.91 Network upkeep/monthly maintenance cost will vary The equipment chosen was based on personal brand preferences and from comparing prices and performance of hardware, and software. The total cost to get the network up and running is $3,695.91 with a budget of $4,000, which gave us an amount of $304.09 left over that can be put towards any future expenses and network maintenance. Design Below is a diagram view of how the network would look like once everything is connected and up and running. The software used to make this diagram is called Edraw, and it allows creation of network diagrams and other works. The software has a free trial version and
  • 30. Perez30 can be downloaded from http://www.edrawsoft.com/Network-Diagrams.php and is available for various windows OS’s. Screenshot of software Exported Image to MS Word
  • 31. Perez31 Implementation During this phase the network equipment and devices are connected, it is be ready to be launched in an actual working environment. Our wireless router will be connected to the cable modem which provides the internet which allows the router to share internet connection with additional devices. Three workstations, the multi-functional printer and our switch will be physically connected to our router, with the laptop being wirelessly connected to the network. The switch provides an additional eight ports with six being used for computers one for the multi-functional printer and another to connect to the router. The wired connections will be made using CAT 5-e UTP Ethernet cable. After the router is configured and wireless security Desktop 2 Desktop 1 Desktop 9 Router Modem Multi-functional Printer ISP Laptop Switch Desktop 5 Desktop 6 Desktop 4 Desktop 3 Desktop 8 Desktop 7
  • 32. Perez32 protocols set, and all equipment installed and connected, the business PC FIX N GO would now have a network implemented with its business processes and will be ready to provide a higher level of service to its customers. The employees and owner will be taught on the workings of the network, and any issues found within the first weeks of deploying this network would be addressed and fix. Security Plan The security plan/policy for our small business network can be broken down into three categories: Assets, Risks, and security measures to protect our network. Assets would include anything of value to the company that needs to be protected which can include both physical and non-physical. Risks are anything that can cause harm to the business network and the types of risks a network is exposed to. Security measures would include preventive actions taken to insure the protection both operational and functional of the network. Assets include the following physical and non-physical items:  Desktops  Laptops  Network hardware such as modem, router, and network cable  User names and passwords  Network configuration set up information such as routers SSID and password  Employee records  Customer records  Important business documents such as company financial records
  • 33. Perez33 Risks to the assets Include:  Natural Disasters: Floods, Fires, Earthquakes, Hurricanes, etc.  Hardware Component failure  Software bugs or glitches  Malware: viruses, Trojan horses, worms, root kits, spyware, adware, etc.  Hack attacks/ cyber-attacks: Social engineering, Phishing, IP spoofing, Denial of service attacks, password cracking  Disgruntled employee  Uninformed user mistakes  Loss of data through corruption Preventive actions to the risks include:  User awareness training  Well established security policy to include: group, email, password, backup and restore policies  Implementation of security cameras, and alarm systems  Natural disaster plan of recovery  Purchase of insurance for the business  Network protection software such as a firewall, strong anti-virus Conclusion Whether it’s creating a SOHO (small office home office) or small to large business network, implementing a network is very beneficial no matter where it’s setup. Creating a
  • 34. Perez34 network is not very hard at all and just requires some hardware and network components. Networks make it easier for businesses to share resources thus reducing the costs. It allows them to stay in contact with its customers and expand as a business. Networks are flexible and can be scaled along with the business as it grows. Within a network data can also be better protected through backup’s and online or offsite storage. Organization becomes easier by using software to setup agendas or schedules and organize events. Most homes today have a home network which adds to the fact of how important networks are today, a business of any kind or size that doesn’t implement one in today’s technological era cannot hope to thrive or succeed. References APA 6th edition 1. Smith,D.(n.d.).Retrievedfrom http://citationmachine.net/index2.php 2. Campbell,S. Howto set up a small businesscomputernetwork.Retrievedfrom http://www.makeuseof.com/tag/how-to-set-up-a-small-business-computer-network/ 3. Shelly,G.,&Rosenblatt,H.(2011). Systemsanalysisand design.Mason,Ohio:Cengage Learning. 4. Retrievedfrom http://www.google.com/search?hl=en&gs_rn=9&gs_ri=psy- ab&cp=12&gs_id=62&xhr=t&q=information technology&bav=on.2,or.r_qf.&bvm=bv.45175338,d.dmg&biw=1920&bih=908&um=1&ie=UTF- 8&tbm=isch&source=og&sa=N&tab=wi&ei=_85pUYzTOsLE4APG9IGgDQ 5. (n.d.).Retrievedfrom http://petersheehan.blogspot.com/2009/01/seven-phases-of-systems- development_11.html 6. Posey,B.M. (n.d.).Retrievedfrom http://www.techrepublic.com/article/understanding-the- differences-between-clientserver-and-peer-to-peer-networks/1055415
  • 35. Perez35 7. (n.d.).Retrievedfromhttp://www.google.com/search?q=client/server architecture&bav=on.2,or.r_qf.&bvm=bv.45175338,d.dmg&biw=1920&bih=908&um=1&ie=UTF -8&hl=en&tbm=isch&source=og&sa=N&tab=wi&ei=FzVqUe78IsXD4APO9YHgCg 8. Sharma,R. (n.d.).Retrievedfrom http://en.kioskea.net/faq/2761-what-is-network-architecture 9. Mitchell,B.(n.d.).Retrievedfrom http://compnetworking.about.com/od/networkdesign/a/topologies.htm 10. Buzzle.(n.d.).Retrievedfrom http://www.buzzle.com/articles/router-vs-switch-vs-hub.html 11. (n.d.).Retrievedfrom http://support.microsoft.com/kb/103884 12. Andrews,J.(2010). Comptia A+ guideto hardwaremanaging,maintaining,and troubleshooting.(5thed.).BostonMA:Course TechnologyCengage Learning. 13. Winkelman,R. (n.d.).Retrievedfrom http://fcit.usf.edu/network/chap4/chap4.htm 14. (n.d.).Retrievedfrom http://secunia.com/products/smb/smallbusiness/ 15. Grover,S. (n.d.). Howto turn yourcomputerinto a cash register.Retrievedfrom http://www.ehow.com/how_7147926_turn-computer-cash-register.html 16. LYNN,S. (n.d.).Retrievedfrom http://www.pcmag.com/article2/0,2817,2366262,00.asp 17. (n.d.).Retrievedfrom http://www.edrawsoft.com/Network-Diagrams.php 18. (n.d.).Retrievedfrom http://wwwb.comcast.com/internet-service.html 19. Tiger direct. (n.d.).Retrievedfrom http://www.tigerdirect.com/applications/SearchTools/item- details.asp?EdpNo=7666279&Sku=A180-C2101B20 20. Google.(n.d.).Retrievedfrom http://www.google.com/imghp?hl=en&tab=wi 21. Tiger direct. (n.d.).Retrievedfrom http://www.tigerdirect.com/applications/SearchTools/item- details.asp?EdpNo=4917324&Sku=S203-121404 22. Tiger direct. (n.d.).Retrievedfrom http://www.tigerdirect.com/applications/SearchTools/item- details.asp?EdpNo=19382&CatId=2668
  • 36. Perez36 23. Tiger direct. (n.d.).Retrievedfrom http://www.tigerdirect.com/applications/SearchTools/item- details.asp?EdpNo=520046&CatId=762 24. Tiger direct. (n.d.).Retrievedfrom http://www.tigerdirect.com/applications/SearchTools/item- details.asp?EdpNo=4917859&CatId=2715 25. (n.d.).Retrievedfrom http://technet.microsoft.com/en-us/library/cc723503.aspx 26. (n.d.). Retrieved from http://www.tigerdirect.com/applications/SearchTools/item- details.asp?EdpNo=234660&CatId=2796