The case for this module intends to ensure that you can: (a) describe the general structure of a computer network, (b) present some typical procedures for securing and maintaining networks, and (c) identify the links between the technological components and the overall sociotechnical framework of the firm.
Before writing-up this case, read and review the following documents (we recommend reading in this same order):
1. Network Structure: http://www.pcmech.com/article/network-structure/
2. Network Structure Design: http://www.geeksnerds.co.uk/it-support/computer-network/
3. Securing your network with Policies and Procedures: http://www.brighthub.com/computing/smb-security/articles/4776.aspx
4. Ten steps to securing Networks: http://howto.techworld.com/security/1862/ten-steps-to-secure-networking/
5. Sociotechnical systems in the 21st century: http://www.bayswaterinst.org/storage/Sociotechnical%20systems%20theory%20in%20the%2021st%20Century.pdf
6. Sociotechnical knowledge creation and storage in organizations: http://www.iriboffice.com/LinkClick.aspx?fileticket=6n0yNKnHr5A%3D&tabid=245&mid=636
Now, imagine you are starting a new business; you are opening a medium-sized food store in your hometown. (if a food store does not suit you, then any similar-sized business is fine for this assignment.) Specifically, you now must design the technology and networking architecture for your business.
For this case, write a description and justification for the technology and network architecture you decide upon and design. Be sure to articulate the structure, your procedure for securing and maintaining the network, and discuss and rationalize the sociotechnical linkages that you design between your organization and the technology.
Technology and network architecture that will be used in medium sized stores will be IPX/SPX. The reason for this is that all the computers in the store need to be connected but at the same time these computers must have access to the internet. Customers must be able to access some representatives through the internet and the store purchase personnel must be able to access suppliers through the internet. The topology for the network will be a star. Each of the computers in the network will be connected to a central hub. The star topology will be used in the store because this will prevent the passing of data packages through an excessive number of nodes. Also since, the store is medium sized; each device is isolated by the link that connects it to the hub. This enables easy isolation of problematic computers. Most important, this typology will enable the inspection of the traffic through the network. If there is any suspicious behavior it will be detected immediately. The network architecture design will be "from peer-to-peer". The reason why this architecture is used is to keep the network architecture design simple and uncomplicated. This architecture will be used so that all nodes act as server as well as client. So there is no need of dedicated server. If the store grows and the demand on the system grows the total capacity of the system will also grow. This flexibility has motivated me to select "peer-to-peer" network architecture.
There will be several measures taken for the security of the system. These measures include the setting up of a firewall, anti-virus, and anti-spyware. Security will be incorporated in the entire network for the store. There will be strong protection from outside attack through perimeter security. Measures will be taken to ensure data security, secure networking, and platform security. There will be physical security ...
This solution gives you strong points concerning computer network