- The hardware components
- Software licensing
- Software installation
- How by the Humber Recruitment agency uses the network to manage its resources
- Network system
- Top 5 Network Issues
1. The case - For the case i have found the "ME-880B Micro ATX PC Desktop Computer Case" It is small and simple with good ventilation for a long running time. It also comes with a 500w power supply unit (psu) which is a good amount of power for the parts i will chose as it will not need a large amount of power to run.
2. The motherboard - The motherboard i have suggested is the "ASROCK H61M-DGS" as it is mini atx so it will fit inside the case, It also has an LGA 1155 processor socket with witch i can fit an Intel processor from the 1155 series. Although this motherboard is compatible with 16gb of ram; i will not actually put that much in this machine as it will not be needed for the usage it will be getting.
3. The power supply (psu) - I have already listed the power supply in "The case" description.
4. The Memory (RAM) - I have found some Corsair value select 4gb ddr3 ram. This ram is very basic but i wouldn't suggest anymore for a receptionist. It has an average speed of 1333mhz which would be an overkill for the use but i wouldn't recommend any less as the motherboard is quite modern and will need at least that to run.
5. The CPU - For the processor i have picked out the Intel Core i3 2120 as it is a low end i3 but will do all the processing that it is needed to do and have some more room to play with. It is 3.3GH Dual core which will use less power as we only have a 500w psu.
6. The Graphics Card - I have not chosen a graphics card (gpu) for this particular build because the motherboard has basic integrated graphics which is low end but he/she will not need a high quality picture.
1. The Operating System (OS) - The OS was a hard choice for me, having to chose between Windows 7 and Open SUSE (Linux) ... Although Open SUSE is free of charge as is all Linux operating systems but it is harder to use for your average person. Windows 7 however is simple, there are no terminals that you have to use and it is easy to navigate around. It is also more supported and has an much larger audience so therefore is more well known than Linux. Open SUSE is a business distribution which would be useful to a receptionist as it has many tools that are also free and they come pre installed on this OS. After some discussions and looking at the pros and cons of each OS I decided to go for Windows 7 as it has a larger support group and is much easier to use.
2. The Office Package - As I chose windows 7 as the OS for this build i thought i would go for your basic Microsoft office package. This package is not free but it does have a very nice user interface (ui) and is simple to use. The package comes with a word processing software (Microsoft Word) and a power point software (Microsoft Power-point). My other option would be Open Office as it is free to use and comes with the equivalent to all of Microsoft office's software package. I chose to not go with open office because of its stability, there aren't as many software updates and it has to be done manually, also i feel that with windows 7 as the operating system; it would make since to go for another Microsoft software package.
2. Virus software - Norton antivirus was my choice for an anti virus software's it has allot of support and protects against almost all types of viruses, as oppose to McAfee antivirus witch was my 2nd choice. I decided to go for Norton as it has better user reviews and has a higher rate than McAfee.
Registering Software - By registering your software you will get many advantages that unregistered will not get.
1. Program Access - Many software companies give a free trial witch expires after a certen amount of days before the program no longer run's. Sometimes programs require the user to register the software before you continue using the program. allot of software is open sauce witch is free and you have access to the source code so you can modify the program.
2. Program features - An advantage of software registration is the ability to access and use more features in the program. Most of the time, unregistered versions of software will limit the amount of features you can access. Also these features will be blocked to make the user more inclined to register the software.
3. Program upgrades - Software registration should allow the user to upgrade the software for it to be more functional to use. The producers of the software are constantly creating add-ons for their software so any unregistered software will be outdated due to under updated programs. If you are using outdated software, it might become difficult to receive any help from online support. Some software's require a payment before you are able to register the software but allot of software allows free registration.
4. Notifications - Registered software will allow the creators to notify you of there are any updates available to you, whereas unregistered software will prevent the company from notifying you. Companies like "Adobe" state in their terms and conditions that registering their software allows for timely notification of product updates, revisions, free extensions, new products and optional emails containing special offers and discounts.
there are three main types of software licence, single user, multi user and open source.
2. Single user is a software licence that only one person is permitted to use. Sometimes they can use it on multiple devices.
3. Multi user is a software licence that can be used by multiple people. This licence is usually used in companies like schools or large organisations where lots of people need to use the same piece of software.
Benefits and implications of installing software.
Some of the benefits of installing software are:
Jobs become easier and sometimes they are faster to do with particular software applications.
System can be protected with anti virus and firewall software.
Some of the implications to installing software are:
Sometimes software can have bugs and it doesn't work properly.
Some software that is downloaded may contain viruses and harm your computer system
Some software takes up a lot of your internal memory.
1. Installation of computer software - Any new devices on your machine often use device drivers and plug-ins to ensure proper use of the device. The installation process often can vary depending on the type of software you are installing and it can also vary depending on what system you are running. Some software such as an operating system will come with a installer, this software specializes in undertaking what is needed for the installation process. Installing a software program typically involves code being copied or generated from the installation files to new files on the local computer for easier access by the operating system.
3. Flow diagram of how to install Windows 7
How by the Humber Recruitment agency uses the network to manage its resources
For the network I have decided to go with a star network topology on a client server because I feel that this is the best way for the network to function. Everyone on the network can file share; share the same scanner, printer and any other peripherals you want to add to a network. Each machine on the network will share the same internet connection so it will be cheaper than buying each and every machine its own router. The other choice world be a peer to peer but I decided not to go with this for security as every user on the network would have to have admin rights so if every user had admin rights accidental software changes resulting in damage to the network and data loss. I feel that this is a good enough excuse for choosing a star network topology as accidental changes to the settings can cause catastrophic events and in the worse cases, it could potentially ruin the companies reputation.
I have decided to go for a LAN (local Area Network) for the company as it is in a single building. They will also need a wide area network (WAN) as the receptionist will need to connect to the internet for ordering and Email etc. Hard wiring was my choice of a connection so you don't have to mess around with wi-fi passwords, people Hacking the wifi and other things like that. The cons about hard wiring are that if it isn't done properly it can look messy, it can be damaged (physically) easier than wireless as a wire can get kinks in it, it can break and it can be a lot to handle while installing.
1. User login (With limited and necessary access) - The company will need to give users a limited access because with admin rights they could mess up the whole network system, a receptionist will not need admin rights because all she is doing is basic word processing, Emailing and placing orders which can all be done in a limited access account. The Admin of the network will need admin rights so he/she can control everything on the network and monitor what everyone is doing at the same time. Each user has an individual username and password.
2. Shared hardware resources - on the network I have designed, every user on the network will be able to share hardware resources i.e. Printer, Scanner and a Projector if need be. This is good because instead of every user having their own cheap hardware which will be prone to breakage; they can all share more expensive and good quality hardware which means less maintenance and more use before any problems.
3. Shared storage - With shared storage, everyone on the network can store everything in the same place. The administrator can then back up everyone's files more regularly so nothing will be lost of there are any problems. Shared storage is also good for sharing pieces of work with other network users which is allot faster than email or any other type of messaging; also when doing this you can share more at once, you can upload or save as much work as you want where as emailing where you are limited on the amount you send.
4. Shared security - Shared security is the best option for security on this network as the administrator can monitor all of the internet traffic on the network. It is best to share internet security so you don't have to have a separate security software for every machine on the network, instead you can have just one security software on the gateway on the network.
5. Data backup - As described in the 'Shared storage' paragraph, the network administrator can backup every user's files at one given time instead of backing up each individual user's data.
Top 5 Network Issues
1. Unplugged cables - When you begin troubleshooting you should always ensure that all of your physical connections are intact. You should check all of the connections in your computer system and other parts of your network i.e. your router and modem. Take time to make sure that all of the cables are connected properly, if a cable appears to be broken or damaged, you must replace it with an identical one and check your system to make sure it is properly working again.
2. Improperly Configured Settings - When a router is set up there are a number of settings and controls that need to be configured to ensure your network runs smoothly. It is possible to experience connectivity issues due to the settings being improperly configured. Locate your routers configuration page to ensure that all of the settings are set to the recommended layout that the manufacturer has suggested, if you are unsure of these settings then contact your routers manufacturer.
3. Conflicting Applications - Many self-installed applications use a portion of your networks bandwidth. Some of witch use more than others and take up a heavy portion of your bandwidth and can slow down your entire network. Check your network manager to ensure that none of your applications are using too much of your system resources and close the ones that are.
4. Invisible pc's - In allot of cases, network file-sharing problems stem from improper work-group and PC naming. Ensure that your machine has a unique name; multiple PCs identified as 'Desktop' or 'Dell' can cause mix-ups. Don't use spaces in your names and don't create names of more than 15 characters. You must also ensure that all of your machines have the same work-group name.
5. Cover the airwaves - Firewalls and security suites are futile against packet sniffers that capture wireless traffic on a given frequency. use the strongest encryption your wi-fi equipment supports to ensure your safety. From strongest to weakest, your options are WPA2, WPA and WEP.