Free Essay

Small Business Network Plan

In:

Submitted By geeeez81
Words 1308
Pages 6
m

Small Business Network Plan
Gareth McCartney
CIS – 175: Introduction to Networking
Assignment 6
August 29th 2010

When designing and building a small business network we must consider the fact that small businesses generally lack the support associated with corporate IT offices. Therefore small business networks should ideally be straightforward and easy to manage. Since the needs of organizations vary, complications will always arise if we attempt to use a generic plan. The main principle we should use in creating this plan is to “follow the simplest approach to achieve the desired result” (Breeding, 2010). Our goal is the create the best possible network with the greatest functionality while maintaining the lowest possible cost. Typically a small business network would consist of around twenty four computers, possibly two servers, a network printer and access to other networks and/or the internet. However for this paper we will limit this network to two workstations one quality printer Internet access multiple email addresses.
In most situations, the available finances to connect machines together to share files, printers and internet is limited. Therefore we should consider the cost of acquiring and setting up network adapters, hubs and other network devices such as gateways.
An important factor that should be considered is the available options for connecting to the internet. Most areas of the United States have access to dial-up internet service through standard modems, most people prefer higher bandwidths which would require additional investment in broadband link such as Digital Subscriber Line (DSL) or the even fast Cable connection. This may demand additional equipment depending on the service provider.
As stated, most small business networks are not maintained by an IT department. A small business would probably have may have only one person managing computing issues and even then probably only on a part-time basis (Breeding, 2010). Whatever configuration is selected should match the meet the available resources. If the configuration is simple enough, anyone should be able to maintain the network. Those small businesses generally rely on “in-house staff” to keep the network going, usually organizations hire a consultant to establish their computer environment (Breeding, 2010). For the purpose of this exercise, I will serve as that consultant.
There are a few more factors such as installing cabling, restrictions in wireless use and electrical shielding or interference that should be considered when creating this network, however, for we will assume all the necessary cabling is installed and there are no restrictions for this exercise.
We will being this plan with a the internet connection. In contrast to the many ways that organizations and large businesses connect to the Internet, the small or home office typically connects to the Internet in the following ways: * Using individual Internet connections for each computer * Using a residential gateway * Using a host computer
Since we will be creating this network for a home office we will be using a residential internet connection. A residential connection provides sufficient network speed and data transfer to carry out all the need of a small business. The residential connection simply consists of a modem connecting internet provided to user. For our network we will be using a Cable modem as well as a fiber optic cable internet service. The cost of this is approximately subscription of $69 per month with an installation cost of $100. The Network will initially be setup by the Service provider but that network terminates with a modem and an Ethernet cable which is intended to be connected to a computer. This is where our home office network begins
To provide a connection between the two computers in the small office network, each computer on the network has to be either directly connected to each or connected through a hub. Since this network involves another peripheral, we will create the connection using a hub. Each connected device must have a Network adapter. Network adapter choices include the following: * Internal network adapters using a Peripheral Component Interconnect (PCI) slot of your computer. * PCMCIA or PC Card network adapters installed in PC Card slots commonly found on laptop or notebook computers. * USB network adapters connected to either a USB port typically found on the back of a computer or a USB port on a USB hub.
It is very important to consideration the physical installation of the adapter. For example, PCI adapters require opening the computer and insert the adapter in an empty PCI slot for installation. On the other hand a USB network adapter does not require any internal installation and as a result may be a better simpler solution. Most Laptop computers sold now, will likely have and use PCMCIA or PC Card adapters. So for this network our computers will consist of two Laptop computers purchased from a local electronics store for approximately $1050 ($525 each)

We should now consider the type of network technology we will use for this network. Networking technology enables your computers to send information to each other (Microsoft-TechNet). The most common networking technologies used for home networking include: * Ethernet * Phone-line * Wireless
For convenience purposes I have selected to create a wireless network. This is simply because a wireless network would add to the convenience of the network and allow for an easy upgrade in the future. This also removes the hassle of running wires through and around walls that would be necessary to accommodate a wired Ethernet network. While Ethernet adapters are generally low cost, the cabling and hub needs add to the complexity and cost (Microsoft-TechNet). A wired network would also required equipment consists of an Ethernet adapter and either coaxial cable (for 10Base2) to serially connect each computer together, or twisted pair cable (for 10BaseT or 100BaseT) to connect each computer to a hub. The wireless network avoids all this complexity.
The wireless network technology uses radio signals to communicate so there is no cabling required. There are many wireless products, however, wireless networks based on the IEEE 802.11 standard are becoming the preferred solution. Organization or large business wireless networks are more likely to be using IEEE 802.11. If your home or small network is also based on IEEE 802.11, you can use the same network adapter to access both work and home or small office networks. IEEE 802.11b can operate at a speed of 11 Mbps. Wireless equipment consists of a wireless adapter installed in each computer. For this project we will be using a IEEE 802.11 wireless router which cost approximately $39. The wireless router will be connected to the cable modem, setup by the internet provider. This will then allow the router to provide internet access to any connected computer.
The final peripheral of this network will be the printer. Since we will be using a wireless network we will also be using a wireless printer. Though wireless printers will need to be initially hardwired to a computer to setup, after the setup, they can be used be a connection similar that of other wireless devices on the network. New additions to the network would also be able to connect to this network printer adding to network ease. The cost of the printer would be approximately $70.
Diagram 1. Shows a graphical representation of the star network used for this home office.
The total cost to establish this network, including the cost of peripherals, is:
Internet service $69
Internet service installation $100
Computers $1050
Wireless Router $39
Wireless Printer $70
Total $1328

The total recurring costs: $69 per months

.

Diagram 1.

References
M. Breeding .(2010). Designing and Building the Best Small Office Network From the Ground Up. Retrieved from http://www.networkcomputing.com/netdesign/soho1.html

Microsoft-TechNet (2010). Designing and Building the Best Small Office Network From the Ground Up. Retrieved from http://technet.microsoft.com/en-us/library/bb457037.aspx

Similar Documents

Premium Essay

Decision

...Management of Small Business Firms | Analysis Report – Assignment 2 | Mersha TantaryS0223372MGMT11109 – Introduction to ManagementGenevieve HealyCQUniversity Sydney Campus | 5/10/2012 5/10/2012 Executive Summary The focus of the paper is on the article by Verreynne (2012) the secret to running a successful small firm? Mind your own business. The main idea is to determine the success small businesses and how their management practices differ from the large companies. The small business can differ from the lifestyle focused and the growth oriented firms, the lifestyle focused emphasise most on the customer and employee retention through providing them a sense of ownership whereas the growth oriented firms keep working in learning and development. Behind the unique way on how the small firms manage their companies, there is a laxity of business plans in most of the organisations which end up with slower progress or growth. While leadership in small firms are the best aspect compare to other firms since most of people in the organisation play an important role by working independently. Small entrepreneurial businesses without family ties and household or family businesses are strongly concerned with economic security, business survival, maintenance, and growth. For the small businesses, leaders are vision process-oriented, where managers are organizational-oriented. Both leaders and managers focus on people, but managers also focus on systems and structures. Leaders...

Words: 3394 - Pages: 14

Premium Essay

Bsbrsk501B

...Assessment Task 2 Recruitment & Selection Consultation Business Profile – P&C Micros From head offices in Melbourne Australia, this innovative design and manufacturing company, best known for its “Zone” brand of lasertag games, produces and distributes a range of products into the entertainment and theme park industry across the world. P&C Micros relies heavily on ground technical expertise and support for its products with its regional corporate support offices in Asia, North America, South America, Russia and Europe and also many sales and distribution staff in various other countries across all time zones. • Family owned business. • Multinational company. • Manufacturers and suppliers of lasertag equipment as well as a range of products for the entertainment and theme park industry. • Location Head Office: Carlton, Victoria (Australia) Employees: Less than 20. • Support Branches Asia, North America, South America, Russia, Europe. Employees: Sales and technical support staff only. • Major Clients Family Entertainment Centres (FECs) Future Direction – P&C Micros To cater for increasing product demand, and to help keep costs down, the company has recently moved manufacturing and production to China. This resulted in some restructuring of staff conditions at Head Office with a change to job structure and expected work requirements of some staff. The company intends to expand further in China and...

Words: 1132 - Pages: 5

Free Essay

How to Open a New Business

...Plan your business as a teenager A business plan has to be written down for a future business plan. The plan will guide you step by step to make it much easier to start. It will also help you in how to plan in doing it. Business plans are naturally imperative. You start here, today, with certain resources and capacity. You want to get to a there, a point in the future (usually three to five generations out) at which time your business will have a particular set of resources and abilities as well as greater judiciousness and increased benefits. Your plan shows how you will get from here to there. Well, we cannot just start a business without knowing what we want to trade to sell to promote to partnership to import to export independent contractor to home-based bossiness and many others you can think of. You will commitment an idea for a business earlier than you do anything else. This you potency does entity you are sensual about; because you’re new business will explore a great arrangement of your time and money. Consider if it is achievable. Before going too far, think about how plausible your concept is. Is it something that society would actually spend money for? Will it turn abundant of a profit to be value spending your time to create it or absolutely do it? You will additional Plan your business as a teenager A business plan has to be written down for a future business plan. The plan will guide you step by step to make it much easier to start. It will also...

Words: 2486 - Pages: 10

Premium Essay

Photography Networks

...RDI PHOTOGRAPHY NETWORK DESIGN PROPOSAL STRAYER UNIVERSITY CIS 532, Network Architecture and Analysis JANUARY 19, 2014 Abstract The analysis and proposed expansion of an existing network can be a daunting task for any company small or large. To be a truly successful company there should be the ability to manage not only the company, but to look to the future and investments in that future. This type of analysis and investment no matter the size of the company should not only be successful, but should be a seamless and virtually transparent operation. This paper will briefly address some elements of this analysis and proposed expansion upgrade starting with a brief history of what will be named the RDI Photography Company or RDI in future reference. This will be followed by a basic introduction for the consulting company followed by their proposed actions. This will include a brief project description and proposal breakdown of services, plan for merging the existing small networks and preparations for a possible company merger. Also included is possible considerations needed to meet project equipment needs, budget and time constraints, and conclusion. An inclusive plan if completely fleshed out could also incorporate the five process areas and nine knowledge areas of the Project Management Body of Knowledge (PMBOK®), as well as a brief description of the projects risk and risk assessment and the monitoring and control plan. For this paper, this information...

Words: 2609 - Pages: 11

Free Essay

Assignment

...ASSIGNMENT ON MANAGEMENT OF TECHNOLOGY RAJESWARI.G ID NO. 2010HZ58075 ASSIGNMENT ON In your opinion, what are some important criteria which the firms should take to increase the quality and productivity of their products and service? Assignment on Productivity Improvement Page 2 Important criteria which the firms should take to increase the quality and productivity of their products and services There are few things to be considered for a Firm to increase the market value/productivity by improving the quality of the product, This is generally can be achieved, By improving the existing product, By introducing new products, Product launching / Advertising the same By improving the services for the newly or existing products, Immediate response for the complaints , querries Cost effective , easy accessible products etc., Let we discuss the points in detail, 4 Quick Steps to Improve an Existing Product You may have a niche marketing website that just isn’t producing sales for you at the rate at which you had hoped it would…..or maybe it isn’t producing any income for you at all or it could be that you haven’t actually figured out that what you are selling is, in fact, a niche market product. You might need to do a little ‘tweaking’ and modify your strategies somewhat to get the site performing better. There really are some things that you can do to improve your existing product. Step #1: Bill Cosby, the famous entertainer, once said, “I don’t know what...

Words: 5382 - Pages: 22

Free Essay

Plag Check

...Multi-Layered Security Plan The following Multi-Layered Security Plan outline I am submitting for approval and implementation for Richman Investments, will provide a sound security plan for the firms most important mission critical assets, identifying and reducing vulnerabilities, Risks and threats to the firms confidential proprietary intelligence, sensitive customer data and other important assets within each of the Seven Domains that make up the core for the IT infrastructure as a whole. An aggressive approach should be mapped out in a 3-5 year progressive implementation achievement plan starting with one or two security initiatives where success can be clearly demonstrated and evaluated. First, indentifying Risk, Threat and Vulnerabilities within each of the seven Domains that make-up the firms IT infrastructure. Secondly, proposed security measures and controls for headquarters and each branch office. Keeping information assets secure is challenging for any business, regardless of its size. It seems there's no limit to the ingenuity and maliciousness of today's cybercriminals, hackers and identity thieves. In fact, hackers have become so sophisticated and organized that their operational methods are similar to those of traditional software development and business practices(Symantec 2008). What's more, while yesterday's attack activity consisted of a single compromise...

Words: 866 - Pages: 4

Premium Essay

Entrepreneurship and Innovation

...Entrepreneurs play a vital role in economic development as key contributors to technological innovation and new job growth. Further, entrepreneurs help build communities in ways such as providing jobs, conducting business locally, creating and participating in entrepreneurial networks, investing in community projects, and giving to local charities. Realizing both the economic and social impact of entrepreneurship, many states and local communities have implemented aggressive strategies aimed at cultivating and nurturing entrepreneurs. In order for governments to effectively develop policies that will foster entrepreneurship, they must first understand the difference between entrepreneurs and small business owners, common misconceptions about entrepreneurs, and where entrepreneurs are located. Using this information, combined with entrepreneurial strategies outlined by the National Governors Association (NGA) Center for Best Practices, state governments can develop specific and effective measures to support entrepreneurs. While cursory inspection shows entrepreneurial growth companies (EGCs) and small business owners have a lot in common, there are certain distinct differences between the two. Controlled growth and continued profitability are the goal for many small businesses while EGCs are generally geared toward rapid growth and productivity gains. In addition, EGCs often have significant economic effects on a community, accounting for a large portion of new job growth...

Words: 14612 - Pages: 59

Premium Essay

Club It

...department for a small business may seem costly, it is well worth developing to help a business reach their goals. Businesses, who seek to use a consultant IT service department can expect to operate their business more effectively. Consultant IT services provides businesses with software applications and the essential tools which improve a business operation by decreasing the business financial liability but increasing their flexibility and revenue. “Make sure that the IT investments go toward projects that earn the company the most money” (Rainer, & Turban, E (2008). Information systems, second edition, para. 1. Generally a small business like the size of Club IT would need to look at software applications, data storage capability and business IT consulting services in determining the viability of hiring a consulting IT department. Currently Club IT information resources include a small informational gateway from the Internet the worldwide communication network and Intranet a private network. In determining if Club IT should obtain an IT service provider if the role of such provider would strengthen their private network and achieve the outcome of cost effectiveness, data effectiveness, managerial effectiveness and sustainability The goal is to determined through the use of informational software application resources and clearly define that Club IT would benefit and can take advantage of restructuring their business by applying the resources identified to plan a competitive...

Words: 595 - Pages: 3

Premium Essay

Aspects of an Effective Security Policy

... 1. Feasibility for small businesses B. Employee responsibility III. Program implementation A. Risk assessment B. Security Policy C. Training 1. Insider Threat IV. Disaster Recovery Plan A. Why have a DRP B. Seven steps of planning V. Conclusion Aspects of an Effective Security Policy Today almost every business from large cooperation’s to your local small business owner, Aunt Nancy’s homemade quilts, rely heavily on information technology to develop sales strategies, promote their product by reaching out to consumers via social media, sell and distribute their goods, develop new products, and run daily operations from accounting to time cards. The scale at which they use technology may vary, but the need for each business large or small, to incorporate an effective security program is key to keeping their systems up and running while at the same time providing enough freedom to themselves or their employees to remain competitive and productive. In short too much security may result in a loss of business and profits, not enough security, the same thing can happen and much worse. For an effective security program to be establish and work, a business must incorporate a security policy that works for it. I will be covering some of the steps required by any business to successful incorporate a security program. Keep in mind that no two businesses are alike and so no one security policy will work for every business. So the...

Words: 2348 - Pages: 10

Free Essay

Small Business

...Small Business Paper 1 Over the last few years major retail companies have been hacked. Target, Sony and even Walmart, you may think that only big name companies get hacked. But to be honest small business are the major target of hackers because they do not have the resource or knowledge as the top dogs. According to Symantec Threat Report 82% of stolen information could have been protected if business had and follow a security plan. So what are some threats that small business face today, for example let’s take a look at a kiosk at a shopping center. Kiosk’s is an 8 billion dollar industry in the United States, the average mall has 20 kiosk and they sell apparel, cell phone and accessories all the way down to home décor. Why are kiosks at the mall so vulnerable to system threat? Because most of them us an iPad or computer to make their daily transactions. Let’s take a look at some of the threats a kiosk had to deal with. Number one since they use a computer or iPad that’s need to be connected to a network this alone is a huge threat because hackers can easily hack the network and get customers financial information. According to Symantec/Small Business Technology Institute Study 60% of small business have open wireless networks. This leads me to the second threat that a small business can get is a malicious code. Small businesses try to save money so they don’t really think about an anti-spyware program or anti-virus because of this the system is defenseless against a...

Words: 641 - Pages: 3

Premium Essay

Strategic Plan

...u09d1 Project Plan Draft Julian G. Romero II IT 4990 Integrated Action Learning Project 8430 Favero Cove Converse, TX 78109 210-310-2397 Instructor: Joe Johnson Table of Contents Work in progress… Executive Summary 2econd2n0ne.com is a newly developed motorcycle parts and apparel store created by my good friend Mr. Brockton Gardner. Mr. Gardner is a motorcycle enthusiast, and is in tune with the motorcycle industry with a great number of people who are also enthusiasts that he’s networked with; qualities that can spell success for his website as soon as it goes live. There are many factors to consider before going live with one of those factors being security. My project proposal is a security plan that will protect Mr. Gardner, and his website, from the variety of Internet and physical security threats. This security plan is not a complete overhaul of current systems and methods used, but a plan to harden current security measures. An environmental scan conducted on the website, and Mr. Gardner, has shown that although security measures are being taken there can be some improvements to further protect his investment, and reduce the chances of a malicious attack. Internet threats aren’t the only concerns. Physical security must be considered because mobile devices, to include laptops, are lost and stolen on a daily basis. Most mobile devices carry considerable amounts of sensitive or private information giving all the more reason...

Words: 2765 - Pages: 12

Free Essay

Computer Viruses

...much a must have in every household, school, or business cyber-criminals have moved from just being a hacker for fun into an estimated multi-million dollar world of computer crimes. New revenue streams have been realized and viruses in choice Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. As firms of all sizes, industrial orientation, and geographic location increasingly rely on computers to operate, concerns about computer crime have also risen, in part because the practice appears to be thriving despite the concerted efforts of both the law enforcement and business communities to stop it. But computer experts and business consultants alike note that both international corporations and modest family-owned businesses can do a great deal to neutralize computer "viruses" and other manifestations of computer crime. “http://rahimimohammad.blogspot.com/p/law-for-computer-crimesand-economic.html” Many analysts believe, however, that small business owners are less likely to take steps to address the threat of computer crime than are larger firms. Indeed, many small businesses admit that they are passive about the threat because of costs associated with implementing safeguards and the perception that computer "hackers" and other threats are far more likely to pick on bigger companies. But as Tim McCollum flatly stated in Nation's Business, "companies increasingly are falling prey to...

Words: 4313 - Pages: 18

Free Essay

Buisness Analysis

...Management June 16, 2013 Table of Contents Abstract 3 Brief Company background 3 Discussion of business problem(s) 4 High level solution 4 Benefits of solving the problem 4 Business/technical approach 5 Business process changes 5 Technology or business practicess used to augment the solution 5 Conclusions and overall recommendations 12 High-level implementation plan 12 Summary of project 12 Abstract The principal objective of this paper is to identify the different kinds of software and hardware available to improve the economic growth of the Smith Enterprise business. To add several IT strategic planning in order to solve the problem in the MacKenn Enterprises Company. Smith Enterprises currently is losing money and has no inventory or supply management. It has no ability to track down current cost or any financial data. The company has no support of cataloging for pricing of any product. Records are not filed, and there is no real organization. By implementing new technology to this company it can be more productive and self sufficient. With new software and other new equipment it will make a tremendous impact and smooth management of the company. Brief Company background The name of the company is Smith Enterprises. The company is just a small owned home business that has three family members who run the company. The company makes personalized items on items such as coffee cups...

Words: 2892 - Pages: 12

Free Essay

Accountant

...INDIVIDUAL PAPER WEEK 6 BUSINESS PROPOSAL MIANQI SHEN ECO/561 MARCH 23, 2015 MARK ERENBURG GOOGLE'S NEW WIRELESS SERVICE About the end of March 2015 Google will begin offering its own wireless service. Google's market structure as a wireless provider will be an oligopoly market structure which is when a standardized product is sold by a small number of sellers. Providers must differentiate their services. Each provider makes its own decisions. The wireless industry is regulated so providers are not completely free to set their own prices and offerings. Google is starting its wireless service on a small scale. When Google enters a new market it usually does so in a big way. Google’s next move is launching a wireless carrier service sold directly to end users (Epstein, 2015). We will look at the business feasibilities based on the economic conditions and the impacts. According to the Economist Intelligence Unit (EIU), the world economy will grow by 2.9% in 2015. The world GDP was estimated to have increased by 2.5% in 2014. Global growth will be boosted by lower oil prices: a 10% fall is thought to add 0.2 percentage points to world GDP. The world economy most likely will be held back by weakness in the euro area and Japan, and by slower growth in emerging markets. China will see expansion slow to 7%, but America will be the best-performing rich-world economy in 2015, with growth forecast at 3.3% (The Economist, 2015). Let us referring...

Words: 2132 - Pages: 9

Free Essay

It 240 Lan Week 1 Appendix B

... 1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component. I think that for this particular situation I would set up an extended star network. I would choose this one because the business is relatively small and plans to grow, this type of network setup is very easy to add users onto and also still provides the access restriction needed for lower level employees and the ease of access for higher level employees without them being able to see what the other is able to access. “As the name implies, this topology is a star of stars. A central device, usually a switch, sits in the middle. Instead of attached computers forming the star’s arms, other switches (or hubs) are connected to the central switch’s ports. Computers and peripherals are then attached to these switches or hubs, forming additional stars. The extended star is sometimes referred to as a “hierarchical star” because there are two or more layers of stars, all connecting back to the central star (Tomsho, 2011).” I think that this network would be perfect for a small company that is planning to grow. Having more than one central location for all users to connect to will also improve network speed, security, and...

Words: 790 - Pages: 4