Choice of Network Operating System
Ocper, Inc has a LAN network, characterized by high speeds, a narrow coverage since its geographical scope is limited and uses Wi-Fi and Ethernet technologies. It seeks to achieve greater connectivity between numbers of workstations.
In choosing a network operating system, several factors are considered. These include; security standards allowed by the system in question, competence of the software in tracking and correcting connectivity challenges and the future of the system in regard to scalability. Efficiency and effectiveness to the end users and network administrators is also a major factor to be considered in choosing a network operating system (Beasley, 2009).
Many network operating systems are available, but these are adopted based on how large the network is, technologies supporting it and the number of workstations it supports. LAN manager, a network operating system provided by Microsoft was adopted and used by many organizations, as it underwent many changes rapidly to improve its capabilities. Later on, the advent of Windows NT advanced server show a shift to this more stable and reliable NOS (Beasley, 2009).
In the new network, it is recommended that Windows NT Advanced Server should be the choice for Network Operating System. It is both stable and reliable, giving it an upper hand over other operating systems. Windows NT is also compatible with both 16-bit and 32-bit windows, which are the most commonly used in organizations. It’s preferable for its user-friendly interface, and that it’s easier to learn and use. Windows NT also allows for easier scalability of the network without affecting the current state of the system (Elahi & Elahi, 2006).
Windows NT also uses the TCP/IP protocol in establishment of connections. This makes it more secure and easier to track and correct problems without affecting the whole network. It is not only cheaper but faster and offers the network advanced capabilities. It is particularly recommended for the Server PC which is hosting the website of the company.
Adding new servers
Ocper Inc uses a Local Area Network since it’s just a small company with less needed connectivity. It employs peer to peer connections to its computers, where all the computers have the same capacity in the network. This, however, despite having some advantages like ease in making the set up and use and that the breakdown of one computer doesn’t affect the other computers, it isn’t a good topology. It can only support very few computers effectively mostly given as a maximum of eight workstations, and addition of other computers only serves to expose the network to regular breakdowns. It, therefore, limits the network from further expansion (Elahi & Elahi, 2006).
Addition of new servers to the system can be made possible by using the Windows Server for Small Businesses. It’s software that automatically detects and determines the IP addressing method of a server, tests its hardware compatibility according to the requirements, ensures the software is updated and eventually adds up a server to the network (Beasley, 2009).
However, some changes will be needed for the network to attain stability. A major change is the move from peer-to-peer connections, which limit the capability of the network to handle many workstations, to a client to server topology. This network is best for many computers for in enables effective resource sharing and also better security since the files are stored in the server. The windows server for small businesses will also need to be installed, for easier addition of servers without affecting the existing connections.
VPN access
The LAN connectivity is provided through the purchase of IP Virtual Private Network (VPN) service from the Internet Service Provider (ISP). This VPN services allows for a secure network to be established over a public network such as internet, while still making internet services available to all the offices. VPN allows for multiple network connections reducing the costs incurred and the time taken to physically interconnect different networks (Lewis, 2006).
It’s possible in two ways; remote access connections which link a user to a remote network and the site-to-site connection which focuses on the networks, as opposed to the users. It interconnects independent networks, such that a user of one network is given access to another, available in the VPN. This technology remains unknown to the network users, who, to the best of their knowledge believe that they have a direct access to the main network.
VPN uses authentication as a security mechanism against unauthorized access. Authentic users are given public keys, used in encryption of the packets and private keys, unique and only known to individuals and used in decrypting the packets. This enhances confidentiality to a greater extent, since attackers may gain access to the site but not to the information. Data integrity is also achieved, through continuous monitoring to track any damages or changes made to the original packets (Lewis, 2006).
Beasley, J. S. (2009). Networking (2nd ed.). Upper Saddle River, NJ: Prentice Hall.
Elahi, A., & Elahi, M. (2006). Data, network, and Internet communications technology. Clifton Park, NY: Thomson Delmar Learning.
Lewis, M. (2006). Comparing, designing, and deploying VPNs. Indianapolis, Ind.: Cisco Press.