Sale!

Design and implementation of a small office network (case study of liscotech block)

 

A small business network design will of course be a function of the number of users, and the programs that make it up. For most small businesses a peer to peer network with a file server, a router, and a few workstations will be adequate.

Original price was: ₦ 3,000.00.Current price is: ₦ 2,999.00.

Description

ABSTRACT

A small business network design will of course be a function of the number of users, and the programs that make it up. For most small businesses a peer to peer network with a file server, a router, and a few workstations will be adequate. Your file server can basically be a standard PC that you consider to be your file server. Small Office Network Internet – ISP Wire to office Modem Translates electronic data Router Disperses electronic data Network Adaptor Required for each Computer Wired NIC (network interface card) or Ethernet card Wireless Adaptor. Setting up an office network provides a central location for your company’s critical data, which allows multiple people to use it, and makes backups much easier and more reliable.

In this work, we are focusing on the network and hardware components required to set this system up, along with their layout for LISCOTECH block.

DEFINITION OF TERMS

L.A.N

local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. A term that has grown in popularity for new smaller networks is S.O.H.O (Small Office Home Office)

W.A.N

Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries. (e.g. Internet)

TCP/IP

The Transmission Control Protocol / Internet Protocol Suite  (commonly known as TCP/IP) is the set of communications protocols used for the Internet and other similar networks. These protocols tell the computer and network devices how to communicate with each other, it also sets limits and settings for the network.

Router

A router is a networking device whose software and hardware are usually tailored to the tasks of routing and forwarding information. For example, on the Internet, information is directed to various paths by routers. Routers generally contain a specialized operating system, RAM, and one or more processors, as well as two or more network interfaces.

Switch

Network switch is a computer networking device that connects network segments. Connecting the networking devices and allowing them to communicate with each other directly.

Patch Cable (Cat 5e)

A Network cable with an RJ45 on either end, interconnects the components of a network.

WEP / WPA-PSK

Wireless Equivalent Privacy / Wi-Fi Protected Access – Pre-shared key:  are both systems that encrypt data with a specific password, when the data is traveling wirelessly from one network point to anther, each piece of data is in itself encrypted so that it cannot be intercepted or accessed unless the password is present. WPA-PSK is used more commonly than the WEP system, due to the WEP being limited to a smaller algorithm.

TABLE OF CONTENTS

 TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWELDGEMENT

ABSTRACT

DEFINITION OF TERMS

TABLE OF CONTENT

CHAPTER ONE

  • INTRODUCTION
  • AIM OF THE PROJECT
  • OBJECTIVE OF THE PROJECT
  • SIGNIFICANCE OF THE PROJECT
  • BENEFIT OF THE PROJECT
  • PROBLEM AND LIMITATION OF THE PROJECT

CHAPTER TWO

LITERATURE REVIEW

2.0      LITERATURE REVIEW

2.1      OVERVIEW OF A WIRELESS NETWORK

2.2     HISTORICAL OF A WIRELESS NETWORK

2.3     REVIEW OF DIFFERENT TYPES OF WIRELESS NETWORKS

2.4    PROPERTIES WIRELESS NETWORKS

2.5     THE DIFFERENCE BETWEEN SWITCHES AND ROUTERS

2.5    DETERMINING THE BEST FOUNDATION

CHAPTER THREE

DESIGN METHODOLOGY

3.1      COMPONENTS FOR SETTING UP A SMALL OFFICE NETWORK

3.2      NETWORK INSTALLATION

3.3      SYSTEM DIAGRAM

3.4      SYSTEM DIAGRAM DESCRIPTION

CHAPTER FOUR

RESULT ANALYSIS

4.1 CONSTRUCTION PROCEDURE AND TESTING

4.2 ASSEMBLING SECTION

4.3 TESTING OF SYSTEM OPERATION

4.4    DIFFERENCE BETWEEN A SWITCH AND A ROUTER

4.5   HOW TO CHOOSE A SWITCH

4.6   ROUTER SELECTION

4.7   FACTORS AFFECTS SMALL OFFICE NETWORK CONFIGURATION

CHAPTER FIVE

5.0      CONCLUSION AND REFERENCES

  • CONCLUSION

5.2     REFERENCES

CHAPTER ONE

1.0                                                        INTRODUCTION

Small office a term that refers to the small or home office environment and the business culture that surrounds it. A small office is often thought of as being the smallest of small businesses. It is a privately owned and operated business or individuals who are self-employed. Small office is often characterized as being a small in both the size of the office space and number of students of LISCOTECH block using the nework.

Today, the small office has become a popular choice for a work environment because Internet-based technologies allow individuals to work from home using email, Web, VoIP, and remote access software to communicate with global employers. A small office is a good choice for professionals who operate their own service-based small business (i.e., real estate, pet care, legal services) and for some Internet-based business including email marketing services, SEO consulting or ecommerce.

A small business network design will of course be a function of the number of users, and the programs that make it up. For most small businesses a peer to peer network with a file server, a router, and a few workstations will be adequate. Your file server can basically be a standard PC that you consider to be your file server. Small Office Network Internet – ISP Wire to office Modem Translates electronic data Router Disperses electronic data Network Adaptor Required for each Computer Wired NIC (network interface card) or Ethernet card Wireless Wireless Adaptor

Having a strong network infrastructure is key to ensuring your IT works efficiently and effectively for ones business. In this work, a custom network that is structured around your office needs was designed. The primary aim is to create a network that is user-friendly and empowers you to grow your small business office.

1.2                                                   AIM OF THE PROJECT

The main aim of this work is to describe some of the ways to connect the computers of the small office network together to form an internal network in LISCOTECH block.

1.3                                               OBJECTIVE OF THE STUDY

In this Design and implementation a Small Office Network course description, student involved will learn how to design and implement secure and manageable network infrastructure. This course is designed for users that already have a general understanding of network infrastructure.

1.4                                         SIGNIFICANCE OF THE PROJECT

Building a small office network means starting with a foundation of switches and routers. The study will help you understand the difference between switches and routers and develop a clear vision for what network foundation of the school needs.

1.5                                              BENEFITS OF THE PROJECT

File Sharing

Sharing files with one or more computer can be beneficial in group working situations, also for central storage and backup.

Productivity

Productivity is enhanced when a group of computer are networked, faster responses to group working documents and files are possible.

Resources

Networked resource can be computers, their hard drives printers and network attached storage, this can be beneficial where printers and storage are limited or in some cases can be counter productive.

Shared Internet Services

Shared Internet services are one of the major benefits to any organisation, allowing groups to use a single internet gateway to supply the internet to the full range of systems attached. Also this is advantages with shared Mail etc.

Wireless Access

Networks are breaking free of wired networks and going wireless; this allows a certain amount of freedom when using devices as Wireless Laptops, P.D.A’s, printers, camera’s and many other new devices. This can allow network systems and resources to be in places never planned for network access or places where a Temporary office is required.

Data Backup: All of your critical business files can be backed up from any computer at any time, ensuring that if you have any systems breakdown, your important files can be restored quickly and easily.

Wireless networks are available which operate on the same principles as cordless telephones. This eliminates unsightly wires and allows freedom of movement. Standard network cabling and cards are extremely affordable and can be set up quickly.

1.6                            PROBLEM AND LIMITATION OF THE PROJECT

Security

Opening your personal computer onto a network, there are many things that are required to be considered before you plug the cable in, Access control, access rights and making sure you know everything you want to be secure remains that way. Firewalls, Constraint shared folders; permissions can help with access control.

Viruses and Adware

A particularly well advertised threat, a good antivirus program can guard you against attacks but monitoring and usage control can also make the network more secure against these threats, within a network there are many dangers, if machines are not protected as a whole one infected file can spread to all machines on the network.

Data Protection (Personal / Company)

Data protection is a real concern for sensitive data, opening your machine onto a network system could be like opening the flood gates to un warranted data sharing, making sure person data and company data is appropriately protected is very important. The data protection act for information electronically stored and distributed is a very important guide line to getting this situation right

Internet Violations

The Internet is a fantastic resource but also can be deadly enemy, making sure appropriate measures to protect your company and its data is very important to everyone, if you imagine your network is joined to every other network in the world and on this network there can be people of different skill levels and people with malicious intent. We would like to state that the internet is a safe and secure place to work but it is not the case, firewalls and protection previously stated are good places to start, not sharing folders and resources unnecessarily, and using appropriate passwords also helps.

Wireless Access

Wireless Networks can be a hazard if not secured and managed properly, as these routers / access points can sometimes have a range over 300 meters. Unknown Access to your network can easily happen, if your internet gateway is vulnerable and someone accesses it even though you may be unaware, they could download sensitive data from your network or get access through your network to the internet and access materials that are unsolicited or even hack another network from yours, these kind of violations are less common but still a risk.

 

Reviews

There are no reviews yet.

Be the first to review “Design and implementation of a small office network (case study of liscotech block)”

Your email address will not be published. Required fields are marked *