Connectivity and Security
Network connectivity today means more than Ethernet cables and wireless access points. People today are more connected while mobile than ever before and many of them want access to company email and data while they are out of the office. Balancing those needs while maintaining security is a challenge that needs to be addressed in the design phase of any network.
This includes where data is stored, either in-house or offsite with cloud-based solutions, what types of information should be accessible, who should be able to access it, and which types of devices should be included. Firewalls and access servers need to be secure without slowing down operations.
Redundancy and Backing Up
Redundancy means having backup devices in place for any mission-critical components in the network. Even small organizations should consider using two servers. Two identical servers, for example, can be configured with fail-safes so that one will take over if the other fails or requires maintenance. A good rule of thumb is to have redundant components and services in place for any part of a network that cannot be down for more than an hour.
If an organization hosts it own Web servers, or cannot be without Internet connectivity, a second connection should be in place. Having an extra switch, wireless router, and a spare laptop onsite is a good practice for ensuring that downtime is kept to a minimum.
Standardization of Hardware and Software
Standardization of the hardware and software used in a network is important for ensuring the network runs smoothly. It also reduces costs associated with maintenance, updates and repairs. Conducting a full audit of the current computer systems, software and peripherals will help to determine which should be standardized.
A CEO or director may require special consideration, but if 90 percent of the employees use the same notebooks, with the same word processing and email programs, a software or hardware patch across the organization can be conducted much less expensively than if everyone used a different computer model with different software installed on each.
Disaster Recovery Plan
A detailed disaster recovery plan should be a part of any network design. This includes, but is not limited to, provisions for back-up power and what procedures should be followed if the network or server crashes. It should also include when data is backed up, how it is backed up and where copies of the data are stored. A comprehensive disaster recovery plan includes office disasters, building disasters, and metropolitan-wide disasters.
In most cases, important data should be backed up daily. Many organizations do a full weekly backup, with daily incremental backups that copy any files that have been modified since the last weekly backup. Backup files should be stored in a secure location off-site in the event of a building disaster, such as a fire.
Future Growth of the Organization
While it is not always possible to anticipate how large an organization may be five years in the future, some allowances for future growth must be built into the network design. For example, Microsoft Small Business Server can be an excellent choice for many small organizations. However, if your office already has sixty employees, Small Business Server could soon be a wasted investment, as it has a limit of only 75 users. Network design should factor in at least 20 percent growth per year, including everything from switch ports to data backup systems.
Titany answered the question on November 30, 2021 at 12:04
- Explain three advantages of extranet networks in organizations(Solved)
Explain three advantages of extranet networks in organizations
Date posted: November 30, 2021. Answers (1)
- Explain two circumstances under which unshielded fibre optic cables are used to build a LAN(Solved)
Explain two circumstances under which unshielded fibre optic cables are used to build a LAN
Date posted: November 30, 2021. Answers (1)
- Outline two roles of a browser(Solved)
Outline two roles of a browser
Date posted: November 30, 2021. Answers (1)
- Explain two types of UTP cables used during network installation(Solved)
Explain two types of UTP cables used during network installation
Date posted: November 30, 2021. Answers (1)
- Define the term throughput as used in data transmission(Solved)
Define the term throughput as used in data transmission
Date posted: November 30, 2021. Answers (1)
- Describe the email protocols(Solved)
Describe the email protocols
Date posted: November 30, 2021. Answers (1)
- Outline four requirements for internet installation in organizations(Solved)
Outline four requirements for internet installation in organizations
Date posted: November 30, 2021. Answers (1)
- Jonah intends to troubleshoot a network for his company. Explain three troubleshooting methods that he should apply(Solved)
Jonah intends to troubleshoot a network for his company. Explain three troubleshooting methods that he should apply
Date posted: November 30, 2021. Answers (1)
- Describe two categories of communication software(Solved)
Describe two categories of communication software
Date posted: November 30, 2021. Answers (1)
- Outline uses of computer networks in an organization(Solved)
Outline uses of computer networks in an organization
Date posted: November 30, 2021. Answers (1)
- Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection(Solved)
Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection
Date posted: November 30, 2021. Answers (1)
- Virtualization is an emerging technology that is widely used in corporate networks. Explain benefits of this technology(Solved)
Virtualization is an emerging technology that is widely used in corporate networks. Explain benefits of this technology
Date posted: November 30, 2021. Answers (1)
- Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays(Solved)
Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays
Date posted: November 30, 2021. Answers (1)
- Outline two weaknesses of CSMA/CD(Solved)
Outline two weaknesses of CSMA/CD
Date posted: November 30, 2021. Answers (1)
- User Datagram Protocol (UDP) is the preferred protocol to several network applications. Explain three types of applications that use UDP(Solved)
User Datagram Protocol (UDP) is the preferred protocol to several network applications. Explain three types of applications that use UDP
Date posted: November 30, 2021. Answers (1)
- Explain three functions of a data link layer in OSI reference model(Solved)
Explain three functions of a data link layer in OSI reference model
Date posted: November 30, 2021. Answers (1)
- Difference between broadcast and collision domains as used in data transmission(Solved)
Difference between broadcast and collision domains as used in data transmission
Date posted: November 30, 2021. Answers (1)
- Routing information protocol (RIP) is contemporary routing protocol. Explain features of this protocol that influence its adoption(Solved)
Routing information protocol (RIP) is contemporary routing protocol. Explain features of this protocol that influence its adoption
Date posted: November 30, 2021. Answers (1)
- Differentiate between pre-shared key and digital signature
(Solved)
Differentiate between pre-shared key and digital signature
Date posted: November 30, 2021. Answers (1)
- Explain uses of internet in business firms(Solved)
Explain uses of internet in business firms
Date posted: November 30, 2021. Answers (1)