Preview

Computer networks assignment

Powerful Essays
Open Document
Open Document
2030 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer networks assignment
Table of Contents

Introduction
Below is the report is a report outlining the steps that were undertaken in order to come up with a computer network design that will benefit the company, and help improve the security and safety of the company’s information while also improving communication among the four offices.
Task 1
To improve my work I could use some images depicting each and every device. Available media….
Wired Media
Cable type
Types
Connectors
Unshielded twisted pair
Category 5
Category 5e
Category 6

Rj-45
Rj-45
Rj-45
Fiber Optic
Single Mode

Multimode

Fc,Lc,Sc

Mt- Rj

Coaxial cable
Thicknet
thinnet
Vampire taps

Wireless Media
Media Type
Speed
Installation Cost Approximate
23Ghz Microwave
6Mbps at 50Kms
1000000 ksh
Intrabuilding Infrared
10Mbps
34000 ksh

The media to be used will be wired media so as to cater for the huge demands of the company and also because of its advantages over wireless media.
Available connectors
1. Rj-45
2. Rj-11
3. Straight tip connector
4. Ferrule connector
5. Lucent connector.

Cabling and installation Cost
Office one
Server – 55,000 Ksh
Wireless Router – 8,000 Ksh
Switch –12,000 Ksh
Cat 5e cable – (305 meter) = 7500Ksh
RJ 45 connectors – 100 *14 = 1400ksh
Cabinet – 15,000Ksh
Wall Jacks – 25 Kshs each (25*7) = 175Ksh (both 7 offices)
Expert personnel to set up the network = 10,000Ksh
Total = 109,075 Ksh for one office.
The same costs will apply also in the other offices.
Total cost for Four offices = 436,300 Ksh
Data Transfer Rates
Available data transfer rates as per the cables.
Cable
Maximum data rate speed
Cat 5
100 mbps
Single Mode Fiber cable
10Gbps
Recommendations
Cable
Connector
Reasons
Category 5e, reasons for purchasing cat 5eutp cable.
Rj-45
Cat 5e cable is the most popular of all utp cables,

Has a superior bandwidth as compared with cat5 cable.

Rj 45 connector since it is the standard connector used

You May Also Find These Documents Helpful

  • Satisfactory Essays

    one of the fiber-optic media instead of copper media since copper is limited to a 90 meter…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    However, the insecurity can be solved by using the RIP protocol for information that is less sensitive to the network design (Lathem et el, 2006). Similarly, when the information is redistributed, the traffic may be overwhelming. But the network administrators will have to divide the traffic so that all the routers can each carry their weight of the information. The problems with the flow of traffic will be fixed and distributed through the routers. Each router will be used for certain information and that way the routers will not be overworked. Also the security will be set up so that all confidential information goes through those securities enabled routing protocol. Internet will be purchased internet from the best vendor nearby like Verizon. In the design a router will be installed in each office and lab, then configure them to operate on the network with appropriate security configuration. Finally, the internet connection would come from those routers and all the labs and offices would run on that…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Scalability: The network design is scalable so that more network cable equipment can be added if needed and as funding becomes available without having to redo the installed network…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The many complexities of network design are vast, wide and most often tailored to the customer and their uses. In the case of Kudler Fine Foods the network is the backbone of the company compromising the bulk of communications as well as the point of sale network. The design of these networks is a collaborative procedure aimed at ensuring that the services provided meet the needs of the customer. In the search of the ideal plan for network development I will discuss and explain principles of distributed and centralized computer systems. Accomplishing this by describing different network topologies; the standards and protocols that are essential to networking. The responsibilities essential in providing telecommunication services to include security, privacy, reliability and performance. How we distinguish and understand the uses of voice over the internet protocol, Centrex and other forms of telecommunications. With our main goal is to develop a system to utilize in our company that will ensure a proper management of our resources. The timeline for this is to have an implemented plan in place within 30 days of commencement. Our outline of six months to have the plan implemented is not outside the rational. Considering the internal and external resources implemented in the project.…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    Chapter 4 all Labs

    • 325 Words
    • 3 Pages

    Standards are important for NIC, Connectors and Media, because of the Stability, Consistency, and Minimization of packet errors.…

    • 325 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Networking Project Week 4

    • 1212 Words
    • 5 Pages

    One might think that a hospitals soul operations is to provide doctors and nurses to assist patients with their sickness and diseases. However, there is a ton of operations and systems that go on in the background. At Patton-Fuller Community Hospital, they split up their business information systems in four ways. Patton-Fuller Community Hospital use this system to improve communication and collaboration between senior management, employees, doctors, nurses and patients. In addition, the current system is suppose to improve the efficiency of hospital operations, relationships with current and future patients, and assist senior executives in managing hospital finances.…

    • 1212 Words
    • 5 Pages
    Better Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    5. Half-Duplex – A system in which signals may be sent in two directions, but not at the same time. In a half-duplex system, one end of the link must finish transmitting before the other end may begin.…

    • 1273 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Produce a report that justifies the need for network managers to undertake routine performance management activities. Please ensure that your justification for these activities relates to reasons of efficiency and how they affect the quality of the service provided.…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    It241 Appendix B

    • 1021 Words
    • 5 Pages

    2 For the wireless technology you identified, what is the standard transmission distance and transfer speed? 75 Mbps and 35 miles.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Quick Check

    • 747 Words
    • 3 Pages

    10. A new company will have 30 workstations in one building sharing a single network. All users must be able to share files and printers with each other. Access to shared information must be secure and simple to administer. The best technology for this system is:…

    • 747 Words
    • 3 Pages
    Good Essays