country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

ICT120 Introduction To Computer Networks System

tag 0 Download10 Pages / 2,293 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
  • Course Code: ICT120
  • University: CQ University
  • Country: Australia

Question:

Assignment Task

You are a member of the network planning team, and need to write a formal business management report to explain your solutions and recommendations about the future network infrastructure for EZY-Books. Your target audience is executive business people, who have extensive business experience but limited ICT knowledge. They would like to be informed as to how your solutions may be beneficial to their business. Therefore, the report needs to recommend the telecommunications and networking technologies to be used in terms of business benefit.

You may need to compare your recommendation with other available technologies. ICT120 Introduction to Computer Networks Assignment 2 Specifically, you should discuss possible solutions for the following 3 topics in the report.

1. Network Infrastructure
1) Network convergence and unified communications
2) LAN types
3) Cabling plan for the head office and branches, including transmission media and connecting devices
4) WAN connection for the head office and branches
2. Networked Services Propose to deploy 4 types of network services. Candidates can be, but not limited to, VOIP, WWW, Intranet, Extranet, and Email.

3. Data Processing Facilitie

1) 3.1 Data storage solution. Candidates can be, but not limited to, data centre, SAN, Cloud, and distributed database.
2) 3.2 Data processing model. Candidates can be, but not limited to, C/S and P2P.

 

Answer:

Introduction

It is evident that traditional businesses have decided to adopt IT in realization of the realities of the new machine age. This is mainly done to improve the profitability of a business in terms of ease of relaying business information between producers and consumers. EZY – books being a specialized publisher for customized book publication service needs to implement the use of IT infrastructure to ease their day to day operation to both the employees and customers alike. The use of the various components of IT has led to the grow and evolution of businesses, implying that IT has become a necessity. The current economic environment is dominated by globalization, hyper-competition and the knowledge revolution. This new innovative age is obvious through increased interest in PC handling and information planning apparatuses in the assembling what's more, benefit enterprises and broadcast communications foundation, and furthermore to it’s across the board utilization in government offices, instructive associations, and, all the more as of late, in the family. Because of this innovative advancement, the usage and utilization of IT is a huge main impetus behind numerous financial changes. As the usage and commercialization of IT moves toward becoming broader all through the world, the appropriation of novel IT can create new business openings and different advantages (Herring & Androutsopoulos,  2015). The IT tools supply the required infrastructure, which is necessary for providing appropriate types of data at the right time.

It is important to ascertain the problems that has led to the need of the new networking structure in EZY – Books. The problems in this case include the fact that the operation of business in quite old in relation to adoption of modern networking infrastructure in that customer services rely on paper-based forms. This is accompanied by many problems that the company has noted and thus the need for the new IT infrastructure set up.

The network planning solutions will involve the different makeup of the entire networking of the business and its subsequent branches in Melbourne and Brisbane. This is to imply that the report covers the constituent parts of the new proposed infrastructure:

 

Network Convergence and unified communication

This involves having the best mix of technology in regards to addressing specific business needs. The EZY- Books organization can adopt this infrastructure which mainly entails the use of: IP telephony, unified messaging, voice mail, Web conferencing and Videoconferencing. In this case this can act as a solution to reduce intra office and long distance communication cost. These technologies can also act on increasing productivity by use of means of communication such as e-conferencing, by reducing downtime which is implicit in business transactions. The new infrastructure will enable the linking of all customers’ phones to multiple offices by treating the telephones as an intercom and thus a need for only a single internet connection. Basically, this will form an integrated network since there will be a single access point. This will result to easy management as there will be no multiple tools or network infrastructure to manage. This will mainly benefit operation of business since employees can be able to collaborate more effectively. The key reason for adopting this infrastructure setup is because it makes it easier and faster for customers and employees to exchange information and ideas, query, and accessing of data.

This is the network mainly made for an office, building or room. This is the interconnection of devices within a small geographical area allowing for sharing of resources like printers and information within a business building. The local area network comprises of different technologies like: bus technology, ring technology and star technology. In the bus technology interconnectivity of computers is done through a single wire. Computers continue to share files and data even if one of the connected computers stops working. This is the oldest technology in the networking business.

The ring technology involves interconnection of computers in a ring or circle form. In this topology a computer is connected to each computer on either sides. If the computer decides to send a file to a computer that is further in distance, then the file is transferred through residing computers.

Unlike the ring topology the star topology, though similar, makes use of a switch in the center that is connected to every computer in the ring (Liang & Turban, 2011). Through a hub the other computers are connected to the switch. Data transfer between connected computers happen through the switch in that all conveyed data travels from hub to switch then to designate machine. Wi-Fi can also be considered as a local area network when its put in consideration of wireless LAN.

The above topologies can be applicable in the office environs to help in daily operation of the business in relation to transfer of information between offices. This set up can also help in the storage of documents in a file server to allow for easy retrieval by the sales representatives. This can be applicable in both the head branch in Sydney and the branches.

The most prolific cabling plan for the head office of EZY - Books is adoption of a local area networking topology in this case the star topology is more applicable since it is effective in transfer and interconnection of computers and other devices. The most effective cabling for this setup is use of Ethernet cables for connection between the devices, cat 6 and above being most recommended for the setup. The connection from switch to computers and routers will involve a straight-through cabling while that of switch to switch will involve a crossover connection. Wi-Fi connection can also be applicable through connection from switch to the Wi-Fi modem.

 


The connection between the head office and branches at Melbourne and Brisbane will involve the use of wide area network that will require a connection through fiber optic cables since they allow for transmission of data and information over long distances and at a higher bandwidth. Wide area network is as a result of connecting more than one local area network. In this case the connection will be from server to router which will then be distributed to the branch through connection of switches. This connection will help in the collaboration of head office and branches. It will also help in the operation of both the head office and branches.

Above is the cabling plan of the offices. Computers are connected through star topology as shown above .Each office will a printer that is connected to the network in the office. The network from the server are linked to the server through firewall that filters data. The server is located in the cloud and accessed by all offices regularly at equal rates.

A WAN consists of more than one local-area networks. This entails connection of computers through public networks or through satellites. Internet is considered to be the largest existence of WAN. Effectiveness of communication is vital and this connection seeks to provide viable channels for communications. The branch office which can be found in remote areas are mostly connected to head office by WAN. Resources in branch office are limited to the number of employees in the branch and thus they have less important servers (Kim & Feamster, 2013). The most important servers are kept in the man office and as such the WAN connection happens between the servers either through wireless transmission like satellites or through wire connections like the fiber optic cables which is the most considered media of transmission. The WAN connection in this case can be of three topologies full mesh site to site WAN, hub and spoke site to site WAN and partial mesh site to site WAN. Connections like this are done through routers where branch office connects to the router of head office. Traffic is routed through head office router when branches need to communicate to each other. The WAN connection comprises of LAN network in each office connected together has shown below to form  a wider network

Networked services runs at the application layer and above providing data storage, communication, presentation and manipulation implemented using a client server or peer to peer architecture basing on application layer. The four networked services that can be deployed in this case are: intranet, extranet, VOIP and email.

This is a web-based application that runs on the local area network displaying company information. It is considered to be a versatile cost-effective way to support business needs. Intranet can help EZY- Books in strategic business support, knowledge management, surveys on customers, monitoring processes and collection of data, video and teleconferencing and forms the server, all this is achieved in conjunction with other software like databases. Attributing to the range application of intranet it goes to prove of how important it is to the growth of a business.

 

Extranet Business application

EZY- Books’ intranet can be extended to the supply chain through extranet application. It is mainly an extension of company network. Is a collective Internet association with clients and exchanging accomplices intended to give access to particular organization data, and encourage nearer working connections (Comer, 2018). The applicable devices in an extranet are a router. Firewall, server and a dedicated WAN. Extranet can be applied in helping customers in their order inquiry, online discussions and mostly customer services. This will help resolve customer complaints.

It is a technology that mainly works by converting voice into digital signals thus enabling one to make a call from a computer, a voice over IP phone or any other data driven device. This can be applicable in both the intranet and extranet as a mode of communication since it enables flexibility. It can proves advantageous to EZY- Books by being cost effective, accessible and has a good voice quality.

It can be utilized for intra-organization correspondences, showcasing purposes and planning with colleagues, providers and clients. Some normal favorable circumstances of business email over conventional mail or phone interchanges are cost reduction, bring down overhead and speed. Email software is accessible for each size business, taking into consideration altered business and representative connections. Email works by a sender sending a message using email client, where the text is uploaded to Simple Mail Transfer Protocol serves as outgoing. The outgoing mail is queued and waits as SMTP communicates to DNS in order to connect to recipient email server. On logging in to email account the email client downloads all the new messages from the recipient’s email server.

 

Data processing facilities

The most applicable storage for the EZY- Books would be cloud storage since it’s the perfect file sharing tool, in cases where emails can’t send large multimedia files and documents. This storage offers a reliable data backup solution, effective access to files and a simpler way of sharing files. Cloud storage also allows access to any type of computer thus allows for usability. In business recovery of data due to an accident is something that is of utmost importance, which through use of cloud storage can be easy to recover. Cloud storage allows for accessibility of stored files from anywhere provided there is an internet connection. Distributed databases can also be used in the branches since the resources in branches are limited in terms of servers (Pathan, 2016).

The applicable data processing model in this case would be the client to server model which works by partitioning workloads between source providers (servers) and the clients (service requesters). This can be used to source data from the main servers of EZY- Books by the branches and employees of the company. It is mostly used to source information from the cloud.

Another applicable processing model is the peer to peer which involves more than one pc are connected to each other and share resources without necessarily going through a separate server computer. This can be most effective in an office setup where employees need to share information with each other or to the head of the company. Mainly used in LAN networking.

Conclusion

It is evident from the report that application of modern IT will help in facilitating EZY- Books business to take care of the complaints that were raised as a result of using an old form of relying service by the business. This can be accomplished by the paper-based forms being replaced by email applications or a website application. Video conferencing can help in communicating with customers to ease the trouble of face to face communication. In this way the email forms filled can be hosted in the company’s server thus avoiding loss over the same. Processing orders will be improved by applying the use of the IT infrastructure (McConnell, 2014). The documents stored locally by the sales representatives of the company can be shared to each one of them through peer to peer connection or host their documents on a common server like the cloud server for easier and fast retrieval of information. Observing of best applicable IT practices and infrastructure goes a long way in ensuring profitability of a business.

 

References

Comer, D.E., 2018. The Internet book: everything you need to know about computer networking and how the Internet works. Chapman and Hall/CRC.

Herring, S.C. and Androutsopoulos, J., 2015. Computer-mediated discourse 2.0. The handbook of discourse analysis, 2, pp.127-151

Liang, T.P. and Turban, E., 2011. Introduction to the special issue social commerce: a research framework for social commerce. International Journal of electronic commerce, 16(2), pp.5-14.

Kim, H. and Feamster, N., 2013. Improving network management with software defined networking. IEEE Communications Magazine, 51(2), pp.114-119.

McConnell, D., 2014. Implementing computing supported cooperative learning. Routledge.

Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Introduction To Computer Networks System. Retrieved from https://myassignmenthelp.com/free-samples/ict120-introduction-to-computer-networks-system.

"Introduction To Computer Networks System." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/ict120-introduction-to-computer-networks-system.

My Assignment Help (2019) Introduction To Computer Networks System [Online]. Available from: https://myassignmenthelp.com/free-samples/ict120-introduction-to-computer-networks-system
[Accessed 05 July 2020].

My Assignment Help. 'Introduction To Computer Networks System' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/ict120-introduction-to-computer-networks-system> accessed 05 July 2020.

My Assignment Help. Introduction To Computer Networks System [Internet]. My Assignment Help. 2019 [cited 05 July 2020]. Available from: https://myassignmenthelp.com/free-samples/ict120-introduction-to-computer-networks-system.


MyAssignmenthelp.com has been satisfying students' needs over a decade now. With years of experience in providing assignment help, we are capable of understanding students' requirements better and fulfill them perfectly. To meet the students' needs, we have appointed 3000+ experts, who cover more than 100 subjects while assignment help. Some of our popular services include corporate finance assignment help, MATLAB assignment help, database assignment help, operating system assignment help and web development assignment help.

Latest Networking Samples

CO4509 Computer Security Assignment

Download : 0 | Pages : 14
  • Course Code: CO4509
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction: Computer security is a major concern for every organisation and most importantly to safe guard the data stored on the system from any loss. It is important to secure the information from data loss or inception of viruses or malware in the system. Security completely deals with securing the data stored on the network from any unauthorized loss. Every organisation is dependent on computer for performing certain tasks thus ...

Read More arrow

HS1011 Data Communication And Networks Methodology

Download : 0 | Pages : 5
  • Course Code: HS1011
  • University: Victoria University
  • Country: Australia

Answer: Introduction The given three scenario are analyzed for the selection of the network management tool. With the increase in the complexity of the network it is crucial to select a robust network monitoring solution and thus the Manage Engine network monitoring tool is selected for analyzing the data flow in the network. It can be used for monitoring the network activities and get the status of each of the network devices connected with ...

Read More arrow

CS2S562 Secure Software Development

Download : 0 | Pages : 2

Answer: Introduction: Internet of things is simply network of  any physical computing devices. The IoT devices are used literary in day to day activities. So many devices are constructed emulating the internet of things.  Since there are so many devices of internet of things, i simulated a home automation system using C sharp programming language, visual studio 2015 IDE. From the requirement of the console system application of th...

Read More arrow

COIT20261 Network Routing And Switching 2

Download : 0 | Pages : 4

Answer: A 1: a)                           b)                   c)   Here /27 is the subnet mask, ie) 255.255.255.224   Binary Format of Given Address is,   154.78.177.3         --->10011010.01001110.10110001.000 00011   2...

Read More arrow

CI7130 Network And Information Security

Download : 0 | Pages : 13
  • Course Code: CI7130
  • University: Kingston University London
  • Country: United Kingdom

Answer: Introduction: The aim of this report is to address the issues and challenges being faced by the AO world plc organization considering the last IT installation and the operations involved within the activities of the organization. Since the organization is based on online services, it has become a considerable factor for addressing the vulnerabilities related to the challenges and issues in the security of the network. The organization...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,355,831

Orders

4.9/5

Overall Rating

5,080

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2109 Order Completed

99% Response Time

Emma Zhong

Ph.D in Project Management with Specialization in Project Communications Management

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

2594 Order Completed

95% Response Time

Michael Johnson

Masters of MSc in Economics

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

154 Order Completed

97% Response Time

Harold Alderete

PhD in Economics

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Very pleased with the work I get back from the assignment help. Thank you for the work provided.

flag

User Id: 455661 - 05 Jul 2020

Australia

student rating student rating student rating student rating student rating

Awesome fantastically ] perfect I loved his work right on time loved it thank you

flag

User Id: 452319 - 05 Jul 2020

Australia

student rating student rating student rating student rating student rating

I wasn’t impressed. I had to do a lot of editing and the writing is just not impressive

flag

User Id: 447023 - 05 Jul 2020

Australia

student rating student rating student rating student rating student rating

Quick turn-around. Easy to understand. All requirements covered. I will be using MAH again!

flag

User Id: 383727 - 04 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?