.

Thursday, March 7, 2019

Bead Bar Network Paper

Bead restraint specializes in do beads jewellery for the clients. They have three cleavages namely studios, franchises and bead bar on board that requires to be attached for synchronisation of activities. It is required to bring to pass a engagement design and the appropriate topographic anatomy which would be of safe(p) to the company for communicating the requirements and sharing development to keep in synchronization with the current state of the business.The earnings topology would be discussed which would make the dialogue feasible and possible with regard to all the physical and lucre barriers.The network design is the architecture which would give a clear picture of the interconnection of devices and the departments to still the sharing of business information. The final section discusses the pros and cons of the proposed topology in question. Background information of Bead Bar Bead Bar as an organization is departmentalized into three divisions namely studios, f ranchises and bead bar on board. The bear situation does not create a network among the divisions and thus creates inconsistencies in information sharing and knowledge about the company as a whole, at any given point of time.A computer network would facilitate the process of give wayting the entire job done for every customer at a lesser time than usual. It would make sure that information regarding ones choice and preferences would be catered and stored for future benefits. The network would enrich the communication among the divisions which in turn would facilitate greater workability and functionality in operation. Recommendation overview The network good word for the Bead Bar could be capitulated into local area network and WAN.The indwelling network at bottom the divisions would have a LAN network however the inter-department communication would be made possible employ WAN. Creating a LAN would create an internal network which can be made possible for connecting the perso nnel in the very department itself. For the LAN network, switches and hubs are dod for connecting the sole division itself and for WAN routers are used for interconnecting each other. Explanation of the Network design All the three divisions of the company are interconnected using the network cable in a wired network using twain LAN and WAN. using LAN the computers are interconnected within the office or building premises so that all the employees are able to get information on demand. The head office has a central emcee where all the information us stored in the database. The other offices are likewise networked using the LAN technologies. The switch is two layered and used to channel care of the storing and forwarding mechanism as stated in Tanenbaum (2003). Using WAN the network connections are using the public data run and get connect to internet and using VPN technology, using login credentials.Network Topology The LAN technology follows a star topology with hubs. The i nterconnecting devices used facilitate the use and share of information. The hubs are used to store and forward the information. Star topology is used which would facilitate the efficient use of network resources (Star Topology). Advantages of the architecture Having a star topology would make it less expensive in congeneric to mesh topology. In a star, each device needs all one liaison and one I/O port to connect it to any number of other devices (Forouzan, 2003). It makes the star topology easy to erect and reconfigure with time and need. Star topology requires far less cabling and any additions, deletions and moves carry only one connection between that device and hub. It is quite broad-shouldered in nature if one link fails the others do not forfeit to operate. This factor also enhances the fault identification and fault isolation. As longsighted as the hub is in working condition, it is quite easy to monitor link problems and bypass defective links. A WAN is used for connecting to the internet so as to get connected with the other departments across geographic locations. VPN technology is used to validate the user of the network so that the connection established is secure in nature. It would use the login name and password facilities to enable a secure way of handling data. A database server is used so that all the information is stored centrally and all the users bother the information using their credentials. The VPN also makes sure that not all users would be able to access all for ms of data an data security and integrity is confine using the login credentials. Drawbacks of the architecture The VPN technology would be quite expensive to experience (VPN). The cost of switches and hubs would be costly. The use of websites where all the computers are used for accessing instantaneously the internet would have made the architecture more accessible just security would have been less. Even the cost of web server would be incurred qui te high. Conclusion The primary objective to connect has been taken into figure and the network topology has been discussed to give shape to the entire network for interconnecting with the sundry(a) divisions in the company.The network architecture and the drawbacks associated with it are thoroughly examined for its feasibility and communication. The network topology would have an upper hand on the drawbacks and is quite commensurate to inter-connect the enterprise to capitalize on its resources. References/ Bibliography Forouzan A. Behrouz (2003). TCP/IP Protocol Suite, sec edition. Tata McGraw Hill. Physinfo (2006). Network Topologies. Retrieved October 26, 2007 from http//physinfo. ulb. ac. be/cit_courseware/networks/pt2_1. htm

No comments:

Post a Comment