Network Design Consultation

Student’s Name

Professor’s Name

Course title



The network consultation guides one through the process of designing a network for the small business. A typical network of this sort includes three computer users, two laptops, a server, one quality networked printer and access to wireless network. The main aim is to build and design the best network for the organization, with top degree of functionality and security at the same time maintaining a low and reasonable cost. The business scale should be flexible so that as the business grows the network should also grow with it. A Small business has a reserved networking and computing requirements. The business may have a number of computers and laser printers. The network for the small office network should allow the members to share data, and printers as well as other peripherals. The computing requirements in small organizations may be met by use of a single LAN with one to two servers, and using off-the-shelf components. A small business LAN is usually managed by one person with a moderate experience and technical knowledge (Gregory, 2002).

Network design for a small billing business

A network design that allows one server to control the networking, filter internet and serve printers is the easiest since the owner can manage his business at a single point. It should have easy connections that grow with the business. Web and mail servers could be used from a hosted service and thus having one internet connection. This is recommended since it is a cost effective and is efficient for a small business. The recurring cost of maintenance could be reduced by a big rate. In this business, the owner will consider using the following devices for his billing business.

The modem serves as a network adapter that configures the internet technology on the business operating system. For proper networking, the modem is first installed before the other software to confirm compatibility. The modem is connected to an AP router that is used when transmitting data between wired and wireless networking devices. The two laptops use wireless networking from the router to access network while the workstations and the other 3 users use LAN and are connected to the main server via the switch box. The two working stations are placed in a local area network which is secure to protect data and the working stations themselves.

The LAN’s IP addresses are private and available to the local network only. The workstations and the network printers are given an IP address automatically by the server, as well as to the wireless network that hook the three users and the laptops.  The IP Addresses may be allocated permanently to the printers and workstations for easy locations accessibility. Therefore it is vital for the business owner to give an IP address to the LAN available depending on the type of business. A Switch is a mechanical device that is used for separation of machines to prevent data from going to machines that are not intended on the network. By using it, the network usage is reduced and the security of every machine is separated from the traffic created by other machines. It controls the network hard drive that transfers files to all the other computers.

The basic configuration recommended for a secure computing environment.

For a secure computing environment, the user should establish different security policies to protect data and threats. Implementing a basic firewall that manages threats and protects the system and the use of basic Antivirus software or even an anti-spyware program that protects from virus is the main methods used by business owners to protect information and the devices. Since there will be a wireless connection, a robust password is advised since wireless traffic is highly detected by software. Review of the router and firewall logs helps to identify any abnormal network connections as well as any Internet traffic. Use passwords are encouraged for all accounts.

Diagram of the network configuration

-800100-714375 SEQ Figure * ARABIC 1

-86677515938501014095-87185595251143000CABLE MODEM



233362528479759525002847975NETWORK HARDRIVE FOR FILE SHARING




3038475-7905754133850542925NETWORK PRINTER


The 3 users

Network architecture and Internet access configuration

Network architecture, is the structural and logical layout of the network that consists of transmission devices, hardware and software as well as communication protocols and mode of transmission such as wireless or wired and connectivity between components. LAN is the best network type that can be used in a small business. The other computers are served by only one server (Gregory, 2002).

The networking consultation applies to the fundamental networking concepts solutions and terminology on computer networking. The networking allows one to implement network using the physical media and data links created. Ethernet and Wi-Fi deploy the LANs as they guide on the network design to be used on any business.

Hardware recommendations and related costs

This are the tangible devices required by the user to access either through a dial up connection or direct connection to a host computer. Connecting cable lines enable connection to the Internet bringing about increase in users and speed of connections on the web. A router is recommended as it is the main part of the architecture. It transmits information from one place to another in data grams. A switchbox is required as it is the central control of all the actions taking place; it distributes traffic based on application or load content. Printer prints data from the connected computer. Pc is has components such as the key board, mouse monitor, data storage, hard drive and the system unit. A Modem is used to configure and to set up the internet technology on the operating system.

Cost Table listing all the items needing purchasing and the associated cost.

Item Cost Quantity Total Cost

2working station $150 2 $300

2laptops $400 2 $800

Printer $300 1 $300

Cables $100 1 $100

Router $100 1 $100

Switch box $100 1 $100

Network hard drive $100 1 $100

Software’s (Microsoft office) $500 1 $500

(Operating System) $600 1 $600

(Timer) $50 1 $50

Cost of installation $300 1 $300

Internet Expenses $200 1 $200

Electricity Expenses $100 1 $100

Modem $100 1 $100

Business License $200 1 $200

Miscellaneous Expenses(telephone etc) $1,000 1 $1,000


balance $150

Software recommendations and related costs

Software is the intangible utilities and Operating System that allows the computer to function, and the programs that do real work for users. For instance: windows 7&8, word processors and database, spreadsheets. Management systems and timers as well as any other software found in the ROM memory are software

Deployment in bandwidth, distance, and number of users

Network is a classification of devices that are linked to each other. Networks can be grouped into a variety of uniqueness, such as the topology, means used to transport the data, scale communications protocol used, advantage, and organizational scope. Different technologies are organized in different framework of networking for instance in topology which has bus, ring star, tree and mesh classification. Topology is a crucial part of network design theory. One can build a small business computer network without perception of the difference between star design and a bus design, but when familiar with the typical topology provides one with a better understanding on the essentials of networking concepts such as routers, hubs, and broadcasts. Bandwidth is rate of data transfer within a band of wavelengths in a computer network. It is said to be the volume of data an internet connection can handle per second. The rate/speed of bandwidth is measured in bits per second (bps). An internet connection with a larger bandwidth can move a huge amount of data in a short span compared to an internet connection with a bandwidth that is relatively low. Network failure and a large decrease in the signal strength can hinder the bandwidth rate.

Characteristics of various communication protocols

A communications protocol is a structure of rules for data switch between computers. A protocol should define the semantics, syntax and synchronization of communication. The character depends on how it is independently implemented. It can be implemented as software or hardware and even as both. A technical standard should be developed to bring the protocol into an agreement.

Deploy a basic Ethernet LAN and compare it to other network topologies

Network topologies are ways in which network elements are connected, thus the logical and physical arrangement of network nodes. Ethernet topology compared to other topologies has the simplest connection and has less network nodes. It is only preferred to a less load to avoid traffic.

Ethernet LAN network topology is cost effective mode of achieving high speed LAN transmissions since it can operate with as low as 10 to 100MB/s as compared to other topologies that are expensive. It supports various writing configurations and works best with a huge number of LAN as well as the micro-to-main frame applications. It is the easiest to install as compared to other network topologies. When compared to other network topologies, Ethernet is not a high-level performer when it comes to high-load environments. This protocol Carrier Sense Multiple Access/Collision Detection slows down significantly when many workstations compete for the one cabling trunk. It has a linear bus decentralized control which may complicate isolation of problems (Ekert, 2004).

Use technology and information resources to research issues in networking

The Networking and Information Technology Research issues are done to support technology leadership, science, and engineering and bolster economic competitiveness. The research focuses on identifying issues that will help the countries out-educate, out-innovate and out-build the world. Networking and information technology assists in Cyber security and information assurance from any attacks. High-confidence software and systems have priorities such as; Management of autonomous and complex systems; Development of science and technology for creation of cyber-physical systems (CPS); Development of technology assurance; Improvement of quality of high-confidence real-time system and software; as well as the improvement of CPS education to expand a new generation of experts (Edgar, 2005).


Gregory, R. (2002). Securing wireless networks. The Internet Protocol Journal, 5(3).

Edgar, D. (2005). Ieee 802.11. The Internet Protocol Journal, 5(1).

Ekert , V. L. (2004). An ontology for network security attacks. Lecture Notes in Computer

Science, 317-323. doi: Lecture Notes in Computer Science 3285.