Benchmark testing can be used to test the conference facilities for the company. This is a process where end to end IT systems are determined for their performance. This test is suitable because there is only six month a period that is not enough to carry out prototype testing. Since the current network has security issues raised, benchmark testing ensures that security concerns in the testing process are also addressed. This test can be carried out to ensure that audio and video streaming are clear. Equipment load test and dialing facility performance are also checked in this process (Tracy, & Fuller, 2008).
The naming structure of the network devices will be according to the department and the station. If it will be at the satellite stations, then the city name of those stations will also be used. The table below shows how devices in the network will be named.
Since there will be many devices, the naming conventional will be based on departments and floors.
The problem with the current network is because there are many points to manage. It is difficult to track the activities of the users by the system administrator because there are many servers in the organization. It is also possible that data can be tapped by hackers. Scaling the security administration of multiple network devices. The latency in a network can be caused by propagated delay. This is the speed that the information travels from source to destination. This is caused by the transmission media. Routing and switching latencies can also be the main concern that Mr. Smith is concerned about. The network design will change to improve on the security of the network and the transmission speed (Campbell, 2010).
There are various network devices that are required to implement the network. One important device that will be required is the router. This is the device that is used to manage the traffic. It will direct the various packets in the network and manage the collision. The servers are used to manage the hosts and routers in the network. All computers are connected to one server. There are also wireless access points. They are used to manage the strength of the wireless signals in the network. There are also network cables which are used to connect one computer to another. They transmit communication signals between computers in the network (Howard, Kleinrock, & Kahn, 2004).
The needs of the key departments will change the network design. This is because there will be a change in the security design of the key departments. With the new design, there will be the need to isolate the key departments and have them operate in different domains which has higher security.
References
Campbell, S. (2010). How to set up a small business computer network. Retrieved on 26 September 2013 from http://www.makeuseof.com/tag/how-to-set-up-a-small-business-computer-network/
Howard, F., Kleinrock, L., & Kahn, R. (2004). Computer communication network design: Experience with theory and practice. Retrieved on 26 September 2013 from http://www.lk.cs.ucla.edu/data/files/Frank/Computer%20Communication%20Network%20Design---Experience%20with%20Theory%20and%20Practice.pdf
Tracy, W., & Fuller, J. (2008). How home networking works. Retrieved on 26 September 2013 from http://computer.howstuffworks.com/home-network.htm