assessment task2

9
1 Name Job Date Tony Starks Helpdesk technician 27/08 10:00 am Steve Rogers IT assistant 28/08 10:00 am Bruce Banners Support technician 29/08 10:00 am Computer workgroups need to be scalable. Scalability is the ease at which a network system can be expanded or upgraded should the need arise. As a rule, all computer workgroup networks should: Support growth in the number of users for the foreseeable life of the technology Allow for increase in data traffic and storage needs as the network grows Be flexible to allow for the incorporation of new technologies as they emerge When new workgroups established, it is important to conduct and audit on the needs of the network users to find out what resources they need to access. This process will then inform your decision on that and with whom resources should be shared. In general, there are some basic areas and resources need to be shared. Hardware peripherals - Printers and scanners Data - Customer lists, Databases of sales information Services - Such as email Other computers - Both desktop and laptop computers Personal digital assistants and smart phones

Upload: fang

Post on 04-Jan-2016

212 views

Category:

Documents


0 download

DESCRIPTION

bsbitb501b

TRANSCRIPT

1

Name Job DateTony Starks Helpdesk technician 27/08 10:00 amSteve Rogers IT assistant 28/08 10:00 amBruce Banners Support technician 29/08 10:00 am

Computer workgroups need to be scalable. Scalability is the ease at which a network system can be expanded or upgraded should the need arise. As a rule, all computer workgroup networks should:

Support growth in the number of users for the foreseeable life of the technology

Allow for increase in data traffic and storage needs as the network grows

Be flexible to allow for the incorporation of new technologies as they emerge

When new workgroups established, it is important to conduct and audit on the needs of the network users to find out what resources they need to access. This process will then inform your decision on that and with whom resources should be shared. In general, there are some basic areas and resources need to be shared.

Hardware peripherals - Printers and scanners

Data - Customer lists, Databases of sales information

Services - Such as email

Other computers - Both desktop and laptop computers

Personal digital assistants and smart phones

Equipment requirement

For a computer workgroup to be established, certain equipment must be used. As a rule, all workgroup networks should have computers that want to share resources on the network, along with:

Computers equipped with network cardsIt is an expansion card that enables a computer to connect to a network;

such as a home network, or the Internet using an Ethernet cable with an RJ-45 connector.

2

Ethernet hubA common connection point for devices in a network, hubs are commonly

used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.

Ethernet cablesAlternatively referred to as a cord, connector or plug, a cable is one or

more wires covered in a plastic covering that connects a computer to a power source or other device. The picture is an example of what the power cord may look like for your computer or monitor. The power cord is just one example of millions of other cables found in and around computers.

Benefit of computer network

File Sharing: Networks offer a quick and easy way to share files directly. Instead of using a disk or USB key to carry files from one computer or office to another, you can share files directly using a network.

Software Cost and Management: Many popular software products are available for networks at a substantial savings in comparison to buying individually licensed copied for all of your computers. You can also load software on only the file server which saves time compared to installing and tracking files on independent computers. Upgrades are also easier because changes only have to be done once on the file server instead of on individual workstations.

Security: Specific directories can be password protected to limit access to authorized users. Also, files and programs on a network can be designated as "copy inhibit" so you don’t have to worry about the illegal copying of programs.

Resource Sharing: All computers in the network can share resources such as printers, fax machines, modems, and scanners.

Communication: Even outside of the internet, those on the network can communicate with each other via electronic mail over the network system. When connected to the internet, network users can communicate with people around the world via the network.

Flexible Access: Networks allow their users to access files from computers throughout the network. This means that a user can begin work on a project

3

on one computer and finish up on another. Multiple users can also collaborate on the same project through the network.

Workgroup Computing: Workgroup software like Microsoft BackOffice enables many users to contribute to a document concurrently. This allows for interactive teamwork.

4

Network diagram

Workgroup network diagrams can be used to keep track of computers and peripherals in a network. They are typically used when several routers are required, a large number of computers are in use in one workgroup if a number of workgroups are working alongside each other. When this is the case, the network diagram can be used to:

Identify the relationship between computers

Identify where peripherals are attached

Establish the security required for peripherals to be assessed

One of the key steps in the process of using and designing network diagrams is in systematically using consistent symbols for the network diagram, so that information about components of the network can be gained accurately from the diagram. Typically, the larger an organization is, the more important and the more complex the network diagram becomes. There are now many different types of software that can be used to assist in the creation of network diagrams, each giving different levels of flexibility. Base on the scenario, the network diagram for this firm should be like this:

5

Implementation

Timelines for establishing a computer workgroup are based on a range of factors, and can take anywhere from a few days through to a number of months, depending on the complexity of the workgroup being established. Key factors that can contribute to establishing timeline constraints are:

Organizational policy and procedures, especially in regard to the approval process for large system changes and expenditure

The number of people involved in the implementation phase of the workgroup

The number of computers in the new workgroup

The range of security features and shared resources to be managed

The availability of IT professionals and technicians for consultation in designing the preferred workgroup

The availability of IT technicians to assist in installing specialist aspects of the workgroup.

Network access point

Network access points provide access for one or more computers or other devices to a computer network. Modems, routers, bridges and wireless access points are all subcategories of network access points that provide different types of access to the network or the Internet. Read on to learn about how each access point differs in its functionality

ModemShort for MODulator/DEModulator, the older phone modem has been almost entirely supplanted by cable or DSL-based modems in the modern world. These devices provide access to Wide Area Networks such as the networks of telecommunications and cable providers. However, modems are typically only able to provide access to one connected device at a time.

RouterA router is a device that provides multiple devices access to a given network. Modern routers usually do so using the Network Address Translation protocol to effectively assign one Internet address to multiple devices. Most routers are not capable of directly interfacing with cable or DSL providers, however, so it is usually necessary for a modem to be used in concert with the router.

6

BridgeA bridge is a device that allows two or more networks to connect and communicate simultaneously. It is distinct from a router in that it does not provide routing capabilities. As such, bridges are typically used to extend the range of a wired or wireless network in concert with a router.

Wireless Access PointsWireless access points are commonly known as Wi-Fi access points. These access points allow devices supporting a wireless connection standard to connect to their associated network. Wireless access points may be separate devices, but are typically integrated into routers and sometimes into modems to provide both wired and wireless connection capabilities.

Network access points come in a number of varieties and are frequently used in combination; e.g., it is possible to connect to a bridge that connects to a router that finally connects to the wider Internet via a modem. Understanding which types of access points provide which types of network services is vital to correctly configuring and connecting to a home network or the Internet.

ReferenceWorkbookhttp://www.conceptdraw.com/samples/network-diagramhttp://www.computerweekly.com/feature/How-to-set-up-your-small-businesscomputer-network-Essential-Guidehttp://www.wikihow.com/Set-up-a-Computer-Network