Local Area Network

Submitted by: Submitted by

Views: 536

Words: 668

Pages: 3

Category: Science and Technology

Date Submitted: 02/20/2012 05:30 PM

Report This Essay

Local Area Network

NTC245

CCCCC 12, 2011

XXXXXX

Taylor & Sons Financial Consulting Local Area Network Plan

Abstract

Team A has been tasked with creating a local area network for Taylor and Sons Financial Consulting. The company is planned to have one hundred users on the network. Taylor and Sons is located on floors one, two and three of an office building. When installing or upgrading a company’s local area network, many aspects should be considered. The two key aspects to consider are protocol and security. Protocol should address system/network backups in the event of failures and network configuration. Next, security should include access restrictions, firewall, anti-spyware and anti-virus.

Protocols

Protocols are essential to a company’s network. Protocols are used to transfer data between different network nodes. A basic corporate network is based off TCP/IP which is Transmission Control Protocols and Internet Protocol. It uses a series of numbers to assign computer locations and grant access to the server. The TCP/IP will be the platform/network configuration used to build the company’s network.

From there, the inter-building side of the protocol is established. These include the Ethernet setup, internet, intranet, wireless configuration and other miscellaneous aspect that may be needed along the way. These protocols are used to interconnect devices and other computers to each other. The system and network should include backup servers in the event of failures. They should be placed in series to ensure seamless data access and no loss of access.

The final protocols involve protocols used for applications. Application protocols are installed as required. Application protocols can be used to restrict user access to specific applications or levels of data. A clerk and a system administrator would have completely different access to programs so the applications protocol can be used to specify which user gets what rights....