Submitted by: Submitted by akfisher1981
Views: 536
Words: 668
Pages: 3
Category: Science and Technology
Date Submitted: 02/20/2012 05:30 PM
Local Area Network
NTC245
CCCCC 12, 2011
XXXXXX
Taylor & Sons Financial Consulting Local Area Network Plan
Abstract
Team A has been tasked with creating a local area network for Taylor and Sons Financial Consulting. The company is planned to have one hundred users on the network. Taylor and Sons is located on floors one, two and three of an office building. When installing or upgrading a company’s local area network, many aspects should be considered. The two key aspects to consider are protocol and security. Protocol should address system/network backups in the event of failures and network configuration. Next, security should include access restrictions, firewall, anti-spyware and anti-virus.
Protocols
Protocols are essential to a company’s network. Protocols are used to transfer data between different network nodes. A basic corporate network is based off TCP/IP which is Transmission Control Protocols and Internet Protocol. It uses a series of numbers to assign computer locations and grant access to the server. The TCP/IP will be the platform/network configuration used to build the company’s network.
From there, the inter-building side of the protocol is established. These include the Ethernet setup, internet, intranet, wireless configuration and other miscellaneous aspect that may be needed along the way. These protocols are used to interconnect devices and other computers to each other. The system and network should include backup servers in the event of failures. They should be placed in series to ensure seamless data access and no loss of access.
The final protocols involve protocols used for applications. Application protocols are installed as required. Application protocols can be used to restrict user access to specific applications or levels of data. A clerk and a system administrator would have completely different access to programs so the applications protocol can be used to specify which user gets what rights....