In this paper, I have chosen to write about the network configuration that is required in a book store. In such a business there are a good number of computers and other peripherals that are supposed to be interconnected. To come up with a good computer and other devices on the network, three major elements are dealt with. These are the network topology, the protocol and the internet connection.
Among the three network topologies that are available: that is the star topology, bus topology and ring topology, star topology best fit this kind of network devices configuration because it is simple to identify a fault in case of any breakage in the network system. In addition, if one computer fails, it does not affect the functioning of the rest and therefore work can continue as that one is being repaired. Another advantage of star topology is its simplicity to increase the devices that are connected to it. Since there is high possibility that the business is going to grow in future, this can be an advantage (Abrams, 2004)
For the ring topology each and every computer that is in the topology is connected to two other computers. Though it’s tedious to establish this network, its bandwidth is relatively high. The other network topology is bus topology that is mostly used by Ethernets. In this set up all computers are attached to one continuous cable. Though the cost of setting up this topology is less, the managing cost it very high. In addition, it uses one cable therefore in case of any breakage, the whole system is disabling.
Comparing the tree topologies, star is the best because in case of increase in the devices there are two other advanced technologies: extended star can be applied whereby repeaters or hubs are placed between a physical star topology to give room for more connections.
After identifying the right topology you also need to determine which type of specific rules and electric signal will the computers that are interconnected use. The rules control the key features of the network such as access methods, cabling required, physical topologies data transfer speed. This is the protocols and the major network protocols that are mostly implemented are the Ethernet, Local Talk, Token ring, FDDI, ATM (Kenneth, 2008).
The widely used protocol is the Ethernet that apply Carrier Sense Multiple Access/collision Detection (CSMA/CD) access method. In this the computer detect whether there is a signal in the transmission line, if there is no it sends its signal. If there is an electric signal that has been sent the computer waits till it reaches the destination then it sends. This kind of protocol has the advantage of transmitting the data through wireless access points, coaxial, twisted pair, and optic cables at speed ranging from 10-1000 mbps and works best in star and star network setup. There is a higher standard of Ethernet called Fast Ethernet that has been developed that has a speed of 100 mbps. Its drawback is that it uses very expensive hubs and NICs. Moreover it requires category 5 twisted pair or optic cables that are expensive.
The other protocol is the local talk that use a technology that is almost like that used by Ethernet called carrier sense multiple access with collision avoidance (CSMA/CA). Apple computer technologist developed this network protocol. The only difference of CSMA/CA from CSMA/CD the computer sends a message to the recipient computer before sending the signal. The disadvantage with this protocol is its speed. It transmits a maximum of 230 kbps.
Another protocol is Token ring whose method of access is token passing. The connection is done in a manner that it enables the movement of signal around the computer network in a logical ring. Its speed ranges from 4-16 mbps.
There is also FDDI (Fiber Distributed Data interface) protocol that is used mainly in the interconnection of a number of local area networks. It also uses token passing as an access. It uses a dual ring physical topology where signal is passes on one ring and in case of breakage on that ring the data is transmitted through the secondary ring in the opposite direction. It has the advantage over the others because it works in the fiber optic cable and its speed is 100 mbps.
Lastly is Asynchronous Transfer Mode (ATM) that has transmission speed of at least 155 mbps. Its mode of transmission is in form of small fixed packets. It’s the only protocol that supports media varieties.
Out of all these protocols, Ethernet protocols are the most suitable for my book store business. The information that is communicated between computers in different section of the premise like the cash tables, the store, the managers computer and others needs to have a relatively higher speed. In addition, it uses twisted pair and coaxial cables that are available and cheaper and also enables the use of laptops since enables wireless access.
My network will use the client server architecture because there is going to be a central server where databases and all the sensitive information are stored. Peer-to-peer is not appropriate because in only apply where all computers are in the same flat form.
My networks setup
In terms of security my network should serve the indented purpose as far as prevention of intrusion that can lead to attacks (Sengar, 2009).
The primary way of ensuring security is making sure that the laid network devices are protected from any attack like theft since breakdown in the setup leads to hindering of service. Ensuring that the intellectual property is secured is a factor. This is by using VPN and secure sockets layers to ensure data confidentiality, integrity and non-repudiation (Haenens, 2007).
Use of firewall is also necessary because there are some information that are supposed to be know the management only hence the information that the other employees get should be filtered. In addition, all the computers have the latest anti-viruses to deal with upcoming viruses.
Any employee that uses the system must log on using a user name and password that expires every two weeks and should be renewed by making a request so that the administrator is aware.
References
Abrams, M. D. (2004). Computer networks: a tutorial. University of Michigan: IEEE Computer Society Press.
Cobb, A. L., & Haenens, L. (2007). Cyberidentities: Canadian & European presence in cyberspace. University of Ottawa Press,.
Kenneth, K. J. (2008). Tutorial, local computer networks. University of California: IEEE Computer Society.
Malik, S. (2007). Network security principles and practice. Cisco Press.
Sengar, A. (2009). IT Infrastructure Management. Texas: S. K. Kataria & Sons.
Sproull, L., & Kiesler, S. (2008). Connections: new ways of working in the networked organization. MIT Press.