Network Management Capstone

Network Management Capstone

This research article will generally focus on two networking management aspects thus the LAN equipment and aspects of security in networking management. The project in this case involves a national business that plans to establish a web-based presence, which will help the business expand its operations in the global market place. The business firm also plans to open a website along with several offices in specific cities across the globe. While opening the offices in the cities, the business firm will aim to consider the local custom of those specific countries. In doing this, the business firm plans to use Linuxin various locations where the business ventures are. Linux as an operating system would be the most effective operating system in this situation. Alternatively, the Linux operating systems runs on devices in which the operating systems are built into firmware and other embedded systems hence easing the business operations across all its websites and locations (Castelli, 2004).

In reference to the business and the planned new offices in different cities across the globe, the best computer networking management aspect to implement in this situation is the local area networking system or better known as LAN (Lazar, 2002). Local area networks are generally computer networks, which covers a specific geographical area. Alternatively, LAN is simply a wireless router, which provides networking services throughout a business venture, home or offices. In most cases, LAN is effective in covering larger territorials and is efficient in data transmission (Lazar, 2002).

In relation to this, the national business will have to develop the LAN equipment models around its new offices in the new locations for easy transmission of data. The models in this case will consist of different equipment in which the business venture will have to connect to transmit media and data through the NIC or better known as the network interface card. In doing this, the business venture will have four different categories of Local area networks models. The four LAN categories include the transmission media, the network interface card, the computing device and the internet work device. After the installation of the LAN models in the new premises, the national business venture needs to ensure that it is in a better position to reduce collision numbers in the LAN. This would be essential to the network operation and the designing systems. Additionally, this aspect is important in reducing networking delays (Shaw, 2003).

The network security is also an important aspect during the installation of the LAN models in the new businesses franchise and offices across the foreign cities. Generally, network security entails policies and provision adaptation by the network administrator for the purpose of preventing and monitoring unauthorized network access, modifications, misuse and computer network denials. In most cases, network securities entails data access authorization, which is mostly controlled by a network administrator. The business franchise will have to choose an ID and a password, which will allow it access programs and data regarding the business franchise (Davies, 2004). The network security in this case will cover various computer networks set up by the national business franchise. The type of network security in this case will be private which means that only the organization will be able to access the system.

Conclusion

The use of Linux in the new locations where the franchise seeks to establish itself is generally a good move by the organization. Alternatively, the use of LAN models would be essential in this type of organization especially when designing the networking systems.

Reference

Castelli, M., & Safari Tech Books Online. (2004). LAN switching first-step. Indianapolis, IN: Cisco Press.

Davies, D. W., & Price, W. L. (2004). Security for computer networks: An introduction to data security in teleprocessing and electronic funds transfer. Chichester [West Sussex: Wiley.

Lazar, J., & ebrary, Inc. (2002). Managing IT. Hershey, PA: Idea Group Pub.

Shaw, R. (2003). Wireless networking made easy: Everything you need to know to build your own PANs, LANs, and WANs. New York: American Management Association.

Wang, J. (2009). Computer network security: Theory and practice. Beijing: Higher Education Press.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply