Preview

Computer Based Technology

Powerful Essays
Open Document
Open Document
6376 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Based Technology
Contents Page Introduction 2 Aims and Objectives 2 User Requirements 3 Diagram of Network Installation 4 Equiptment Needed for Network Installation 5 Network Topology 7 Specification of Laptops 9 Specification of Computers 10 Specifications of Speakers 12 Hard Drive Locations 11 Specification of File and Mail Servers 14 Full Software Specification 19 Buisness Internet Access Provider 23 802.11 Standard 24 Complete Project Costing 26 Summary 27 Conclusion 27 Glossary of Terms 28 Reference List 31

Introduction

A network is defined as ‘A collection of computers or devises connected together by communication devices, in order to share resources, data and information.’ In order to carry out this project, specific topics will be researched to bring together the networking and infrastructure of the library. These including drawing out the network floor plan, relating the network to the matching topology, discussing and justifying specifications for chosen multimedia laptops, computers and peripherals, specifications for core components such as an Email and File Server, a full software specification, a business internet access providers and lastly discussing the 802.11 standard. The final section describes the conclusion as to the proposed system with viable cost model, and the benefits achieved.

Aim and Objectives

As a communication consultant, the aim of this research project is to provide a report detailing and outlining the design of the IT network infrastructure of the Library and how it interlinks with the nearby coffee shop, a list of the major components needed to build the network and a safety policy to ensure a safe and secure network from malicious attacks. A variety of products and companies will be taken into consideration for the most suitable option along with a review and justification of the selected products. The goal is to work towards achieving the most suitable system and network set up

You May Also Find These Documents Helpful

  • Good Essays

    Mr. Green has decided to implement a network within his small business. This is a good choice in moving forward with his growing operations and size. He has several questions, and already has a few opinions about how he will go about this implementation, including both the software and hardware involved. My job as a private computer consultant will be to clarify some of the common misconceptions made by Mr. Green, and ensure that his network implementation will allow him to reach the goals he has as a small business owner.…

    • 1204 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Authorized personnel will be properly screened for access to the IT infrastructure. Management of physical components include that of the cabling, NIC cards, LAN switches and wireless access points (WAPs). For purposes of this document explanation are given: the workstation cabling will use RJ45 jacks to physical connect to LAN switches; the NIC interfaces between the computer and the LAN physical media; the LAN switch is the device that connects workstations into the physical Ethernet LAN, providing a dedicated Ethernet connection for workstations and servers and the wireless access point; for wireless LANs, a radio transceiver is used to transmit IP packets from a WLAN NIC to a wireless access point (WAP). The logical components of the LAN Domain and their purposes consist of the system administration, which is responsible for setting up user LAN accounts with login ID and password. The design of directory and file services are the servers, directories, and folders to which the user can gain access; configuration of workstation and server TCP/IP software and communication protocols addresses the IP addressing, IP default gateway router, subnet mask address. The default gateway router acts as the entry/exit to the LAN. The subnet mask address defines the IP network number and IP host number.…

    • 1007 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    capstone example

    • 1267 Words
    • 4 Pages

    To build and roll out a top level enterprise-wide telecommunications network for the ABC Company. As ABC’s Technical contractors meeting the ABC Company’s technical needs by meeting the requirements for each of their separate office locations in San Francisco, Detroit, Washington, Indianapolis, Tampa, Paris, Liverpool, Tokyo, and Sao Paulo. With local LANs that are in each office that connect to a WAN to share data files and multimedia. There are many different pieces of equipment needed when setting up and maintain a large business network. Each piece of equipment has many different choices in brands and even capabilities that set them apart from each other. Each piece of equipment can be detrimental to the flow and success of the network at hand. Now that we have discussed the importance of equipment on the network let us move on to discussing each piece of equipment needed to running a successful network.…

    • 1267 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Our company is called TrainAmerica; we are in the technology training business focused on Microsoft products such as the…

    • 4435 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    I will design a Local Area Network (LAN) for DesignIT, a Local Area Network (LAN) is a network of computers, and other network devices such as printers which exchange data, and are located under one roof. LAN networks are mostly used in small organizations or small businesses. The computers in a LAN communicate through protocols and share data such as files and emails. Every computer in a network is assigned a unique Internet Protocol (IP). When a computer communicates by sending a request to the LAN network, it is routed to a particular server that has the requested data. The server then communicates back to the IP address of requesting computer with the information that was requested (Kenyon, 2002). There are three servers for DesignIT, the Web Server will be used to connect the company to the internet, and the File Server will be utilized for sharing while the Small Business Server will be utilized as a Mail Server.…

    • 1635 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Information Technology

    • 389 Words
    • 2 Pages

    Use the Microsoft Baseline Security Analyzer (MBSA) to detect the patches and updates that may be missing from your current installation. MBSA compares your installation to a list of currently available updates maintained in an XML file. MBSA can download the XML file when it scans your server or you can manually download the file to the server or make it available on a network server.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 406 Words
    • 2 Pages

    In the final project, you play the role of a network consultant hired to design a new network for a company called Acme Manufacturing. Acme expects a network design document that includes your recommendations.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 729 Words
    • 3 Pages

    1. In relation to your current business environment (or one that you are familiar with), identify at least two different types of information technology that may be used when completing work tasks.…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This paper will help to clearly define the network design of XYZ Corporation by ABC Computing. Together we will meet your IT challenges in a seamless, highly organized fashion. What we must address together, are the following:…

    • 5888 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    information technology

    • 420 Words
    • 2 Pages

    What are the two meanings of “corporate ethics” in organization today? What does each definition imply for IT practices? How does the economic environment affect this?…

    • 420 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information Technology

    • 765 Words
    • 4 Pages

    The act was implemented in Federal Reserve Board Regulation E which outlined the responsibilities of the customer and of the financial institution. When an EFT error has occurred the responsibility of the customer include:…

    • 765 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Porter's 5 Forces Analysis

    • 1823 Words
    • 8 Pages

    Students and staff should be able to access a personal drive or folder which they access with a username and password. By allowing these accounts students and staff can access their personal data where ever and whenever they want whilst on the network. All the computers that are accessible should be connected to the network. The network should allow students to connect their laptops and various devise to retrieve their data and submit assignments and projects. High speed connectivity is necessary for when students need to copy or upload large files. Internet access can be controlled and limited to reduce the risk of students downloading illegal software as well as firewalls as mentioned above can restrict the sites and content available. Wi-Fi hotspots should be available so that students can access the network at their leisure. An intranet will be setup which will store all the students’ and staffs’ data. Staff and students should be able to access an ‘online’ library that stores class notes, project notes and helpful resources. The library will be primarily stored on the intranet. These additions will make the network very user friendly and users will not need any assistance once they have used the network a few times. Administrators should have full control over the data on the network and monitor the staff and students’ activities. With the use of an intranet all the data added to the servers can be monitored and assessed. Gigabit Ethernet or fibre optic cables can be used to connect the network relatively cheaply but maintaining high speeds. The network would be one big network with many subnets for use of the staff and…

    • 1823 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Assignment

    • 676 Words
    • 3 Pages

    In this assignment you are required to design a network for a typical company that requires its computers to communicate with each other and on the internet.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Anciety

    • 3305 Words
    • 14 Pages

    Although the first exposure to English was in 1762 to 1764 when the British invaded Manila, English from that time never had any lasting influence. English was assimilated when the United States took over the Philippines. In 1898, Spain ceded control of the Philippines to the United States under the Treaty of Paris, and thereafter the Americans controlled the Philippines until it gained its independence in 1946. The Americans established a system of public education wherein English was used as the main language of instruction. After independence, the Philippine government continued public education in English, while simultaneously establishing Filipino as its national language. A parallel system of private schools, many of which were established by the Catholic and the Protestant churches, follows the dual-language system, although private schools tend to use English more than Filipino in their instruction.…

    • 3305 Words
    • 14 Pages
    Good Essays