Verified Document

Proposal For A Small Business Computer Network Essay

PC Selection Peripherals

Networking

Security

Proposal for an Enterprise-Wide Solution for a Small Publishing Company

Small businesses of all types and sizes require viable enterprise-wide solutions to their information technology (IT) needs. This need is especially pronounced in small businesses competing in the publishing industry where all publications are digitized and security needs are paramount. This study is in response to a request from one such publishing firm with 50 employees that requires a proposal for an enterprise-wide solutions including computers, peripherals, networking and security solutions. The company's office is situated in a single-story free-standing building without walls and only pillars supporting the roof and the company has installed glass cubicles for all of its employees. A detailed analysis of the foregoing requirements, including associated costs, is provided below, following by a summary of the research and important findings concerning appropriate computer, peripheral, networking and security solutions for this company in the conclusion.

PC Selection

It will be vitally important to get the new computer network up and running efficiently as soon as possible, and the Lenovo C40 All-In-One personal computer (see picture in Figure 1 below) satisfies this publishing company's IT requirements. This personal computer features the following:

An Intel® Pentium® 3825U Processor,

Windows 10 Home operating system,

21.5" FHD (1920x1080) display with multitouch capabilities,

Intel® HD Graphics,

4.0GB PC3L-12800 DDR3L 1600 MHz of RAM memory,

A hard drive with 500GB 7200 RPM,

DVD optical recorder,

A Lenovo AC wireless network card,

Bluetooth Version 4.0,

A USB optical mouse and keyboard,

A one-year warranty, and,

A slim, space-saving design (Lenovo C40 All-In-One, 2016).

Figure 1. Representative graphic of the Lenovo C40 All-In-One personal computer

Source: http://www.lenovo.com/images/gallery/560x345/lenovo-all-in-one-desktop-c40-main.png

Other features of the Lenovo C40 All-In-One personal computer include the following:

Form Factor: 21.5" all-in-one desktop with multitouch option

Weight: Starting at 12.1 lbs

Dimensions (W ): Starting at 21" x 14" x 2"

Ports: 2 USB 3.0, 3 USB 2.0, HDMI-out, optional HDMI-in, 6-in-1 card reader, LAN, microphone/headphone combo

This personal computer has all of the features needed by the publishing company as outlined in the specifications. The cost of a single personal computer is $459.99 for a total of $9,199.80 for 20 personal computers; however, a quantity discount may be available from the vendor and shipping for any size order is free. Moreover, Lenovo enjoys a solid reputation in the personal computer industry and is committed to providing its customers with world-class products and customer service (Jing, 2012).

Peripherals

Because the proposed Lenovo C40 All-In-One personal computer comes equipped with an optical monitor, keyboard, and mouse as well as Bluetooth Version 4.0 and a network card, the peripheral needs of the publishing firm will be limited to four shared, Lexmark CX310dn Multifunction wireless color laser scanners/copiers/fax machine combinations as depicted in Figure 2 below.

Figure 2. Lexmark CX310dn Multifunction Color Photo Printer (Scanner, Copier, Fax)

Source: http://shop.lenovo.com/ISS_Static/options/images//main/_460_0_28 C0550_V1.jpg

The price of one Lexmark CX310dn Multifunction Color Photo Printer (Scanner, Copier, Fax) machine is $599.00, so four of these units would cost $2,396 unless a quantity discount can be negotiated with Lenovo as part of the total package purchase (customers are limited to a maximum of five of these units for a single purchase) (Lexmark CX310dn Multifunction Color Photo Printer, 2016).

Networking

As noted in the introduction/overview, the small business is located in a single-story free-standing building without walls and only pillars supporting the roof and all employees work in glass cubicles, making the DAP 2695 AirPremier AC1750 the optimal solution for this company's networking needs. As shown in Figure 3 below, the DAP-2695 AirPremier AC1750 Concurrent Dual Band PoE Access Point provides networking support for small businesses with features that allow network administrators to ensure secure and manageable dual-band wireless LAN connections by using high-speed IEEE 802.11ac wireless technology (Wireless AC1750 Simultaneous Dual-Band PoE Access Point, 2016).

Figure 3. DAP-2695 AirPremier AC1750 Concurrent Dual Band PoE Access Point

Source: http://content.us.dlink.com/wp-content/uploads/2014/03/DAP2695A1 ImageLSideRight.png

The DAP-2695 networking device provides small business network administrators will several operation modes including: Access Point, Wireless Distribution System (WDS) with Access Point, WDS/Bridge (No AP Broadcasting), and Wireless Client (Wireless AC1750 Simultaneous Dual-Band PoE Access Point, 2016). According to the vendor, "With WDS support, network administrators can set up multiple DAP-2695 access points throughout a facility and configure them to bridge with one another while also providing network access to individual clients" (Wireless AC1750 Simultaneous Dual-Band PoE Access Point, 2016, para. 4).

In addition, the DAP-2695 also provides support for other...

Moreover, the DAP-2695 is specifically designed for indoor use and the vendor offers a limited lifetime warranty (Wireless AC1750 Simultaneous Dual-Band PoE Access Point, 2016). Prices for the DAP-2695 range from $249.97 from Provantage to $342.81 from Newegg.com, with a median price of $296.60 offered by Sears. This price range is deemed highly cost effective given this device's features, including several that are specifically designed to protect the security of the network as discussed below.
Security

Unfortunately, one of the harsh realities of launching a new computer network environment for small businesses is their vulnerability to security threats. For instance, Hutchings and Smith (2013) emphasize that, "Small businesses face a number of computer security threats and may lack the time and/or technical resources to install software updates and patches to fix software and security bugs or address wireless network security, rendering them vulnerable to network exploitation" (p. 2). Fortunately,

the DAP-2695 supports the enterprise version of WPA2 (802.11i) using a built-in internal RADIUS server together with support for the RADIUS server backend, thereby allowing users to create their accounts within their own personal computers in order to help maintain a secure wireless network (Wireless AC1750 Simultaneous Dual-Band PoE Access Point, 2016).

In addition, rogue AP detection, wireless LAN segmentation, MAC address filtering, SSID broadcast disable, and wireless broadcast scheduling are included in this configuration in order to provide additional security for small business wireless networks (Wireless AC1750 Simultaneous Dual-Band PoE Access Point, 2016). According to the vendor, "[The DAP-2695] also includes a wireless client isolation mechanism, which limits direct client-to-client communication. Additionally, the DAP-2695 supports Network Access Protection (NAP), a feature of Windows Server® 2008, allowing network administrators to define multiple levels of network access based on individual client's need" (Wireless AC1750 Simultaneous Dual-Band PoE Access Point, 2016, para. 5).

It is important to note, though, that the above-described security features offered by the DAP-2695 should not be regarded as the end-all solution to this small publishing firm's computer security requirements. As Tysaic (2015) points out, "A lack of resources and a false sense of security can make small businesses enticing targets for hackers" (p. 18). Other steps that this company should take as part of its implementation of this computer network include those set forth in Table 1 below.

Table 1

Basic computer network security steps for small businesses

Step

Description/Rationale

Install proper network and work station controls.

An IT specialist needs to make sure the company has a properly configured firewall. Anti-virus software and current patches need to be applied to all hardware and software. Companies also should make sure access to data and systems is limited to individuals for whom access has been approved.

Establish a culture of security

Training is a key element in creating an environment where the importance of data security is appreciated and treated with the appropriate serious attitude. Employees need to understand the dangers of visiting unsafe websites while at work. They need to know what phishing emails look like, and that one click on a nefarious link can result in a major breach. Many companies block access to certain sites in the name of security

Use strong passwords

Having one employee use a weak password such as "Password 1" can put the whole organization at risk. Systems should encourage or even require passwords that use a combination of numbers and letters and are more difficult for hackers to crack. Employees should not use the same password for all sites and systems, and should be sure to use separate passwords for business and personal systems. Unique, complex passwords are essential.

Monitor vendors

Companies need to ask whether vendors have access to company data and whether data are secure after being accessed or obtained by the vendor.

Conduct periodic testing

Test systems at least yearly to identify vulnerabilities. Depending on the size and industry, some companies undergo more frequent testing.

Source: Adapted from Tysiac, 2015, p. 18

Conclusion

Any small business with 50 employees that is poised to grow even larger in the foreseeable future will require a flexible network solution that can grow with the company. The configuration of personal computers, peripherals, networking and security features outlined above will provide this company with excellent computing support for its current needs and will allow the company to expand this network as the need arises. Although training and implementation costs are not taken into account, it is reasonable to conclude that the entire network envisioned herein can be installed and made operational for around $15,000, a real bargain considering the ability of this configuration to expand significantly in the future.

References

Hutchings, A. & Smith, R. G. (2013, May). Cloud computing for small business: Criminal and security threats and prevention measures. Trends & Issues in Crime and Criminal Justice, 456, 1-4.

Jing, S. (2012,…

Sources used in this document:
References

Hutchings, A. & Smith, R. G. (2013, May). Cloud computing for small business: Criminal and security threats and prevention measures. Trends & Issues in Crime and Criminal Justice, 456, 1-4.

Jing, S. (2012, March 1). Analysis of Lenovo globalization strategy and enlightenment to Chinese enterprises. Canadian Social Science, 8(2), 86-89.

Lenovo C40 All-In-One. (2016). Lenovo. Retrieved from http://shop.lenovo.com/us/en / desktops/lenovo/c-series/c40-30/#galleryPhoto.

Lexmark CX310dn Multifunction Color Photo Printer. (2016). Lenovo. Retrieved from http://shop.lenovo.com/SEUILibrary/controller/e/web/LenovoPortal/en_US/catalog.workflow:item.detail-hide_menu_area=true&GroupID=460&Code=28C0550.
Wireless AC1750 Simultaneous Dual-Band PoE Access Point. (2016). D-Link. Retrieved from http://us.dlink.com/products/business-solutions/wireless-ac1750-simultaneous-dual-band-poe-access-point/.
Cite this Document:
Copy Bibliography Citation

Related Documents

Managerial Impact on Small Businesses
Words: 16627 Length: 55 Document Type: Term Paper

This is because this thesis has some limitations that should be observed when taking into consideration the importance of the thesis and its assistance. This thesis has concentrated on a subject that has been an extremely large and leading one, that is, the managerial impact on small businesses and the underlying reasons being reluctance shown by small business managers to make use of information technology and Internet. Undoubtedly, this

Network Design Proposal
Words: 4024 Length: 15 Document Type: Business Proposal

Network Design Proposal Network Requirements ABC School Stats/User Counts Having a current strength of approximately 845 students, ABC School provides education from Pre-Kindergarten to the 12th Grade. According to the requirements of The New York School District, 250 Curriculum computers along with 75 Administration computers are to be installed. The requirements for the wiring per room of layer 1 are that it should adjust a total of 25 computers, 24 of which will

Network and Computer Security
Words: 1914 Length: 6 Document Type: Essay

Computer and Network Security Description of Information Environment of my Workplace My workplace is Verizon Communication and I have been working for the company for more than 5 years. The Verizon Communication major business is to provide communication solutions for businesses and individuals through the wired and wireless communication devices. The company provides complete communication systems and devices for individual, small business, medium business and enterprises. However, the company sells bulk of

Business Continuity and Disaster Recovery
Words: 2036 Length: 7 Document Type: Essay

Protection for employees If employees adhere to the rules of the acceptable use policy, there are less liable to questionable issues. This also prevents them from engaging in hazardous internet issues, for instance, they are less likely to disclose their contacts to crackers using social engineering approaches. Moreover, ABBA should settle on using universal guidelines and principles with respect to network security, it risk assessment, risk analysis, and risk management. In

Business Plan for Slow Wing
Words: 4373 Length: 15 Document Type: Research Proposal

Inventory Management Strategy. In his book, Streetwise Project Management, Dobson (2003) advocates the use of a just-in-time inventory management strategy to keep inventories low and manufacturing process more productive. This approach, though, will require close coordination with a Brazilian supplier, warehousing operations, planners and forecasters, and transportation directors throughout the inventory management process. In this regard, Epps (1995) advises, that such an approach requires the efficient transportation of materials from

Business Research in Need of Research on
Words: 702 Length: 2 Document Type: Capstone Project

Business Research In need of research on a variety of items I approached the internet in search of what was needed. The information I was in need of included data concerning; 1) financial needs, 2) regulatory issues, 3) SBA information, 4) offices supplies and equipment, 5) print costs for literature, and 6) current tour offerings. I discovered that the financial needs for my travel agency would be relative minimal based on the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now