Justification on appropriate network services to meet network requirements
The process we used in selecting the appropriate network services were mainly the perceived and or estimated network requirements of the new building. One of the main variables we considered in planning and equipment procurement and placement was the fact that there will be 6 instructional computer labs inside the two-floor building and that within each of those six instructional computer lab, there will be a total of 22 computers including those that are intended for staff and student use. In total the information technology team will have to deal with network requirements of 132 computers.
Firstly, the most basic of the network services the team decided to include was the placement of computers on almost every room in the new building. Simply, without a computer, the users in that particular room (that has no computer in it) would be unable to connect with and collaborate on a virtual basis with the rest of the building . So, in order to ensure that the building can enjoy a full connectivity feature, the information technology team would have to ensure that every room has a decent number of computers with full connectivity features such as access to the World Wide Web and connected to the network sharing system of the entire building .
Considering that most of the rooms in the building will be used as a library in which books and other important documents and both print and non-print materials will be stored, installing computers on every corner would never be a bad idea because the staff can, in fact, request the information technology team to install a library management software. Most library management software solutions require a fully functional network of computers (so that it can allow more than just one person to access the wide collection of books and documents in the library) in order to maximize its function. So, it only makes sense for us to include these network services.
Justification on security implementation for the network
It is considered mandatory for computer networks that are intended to be used by an organization to be routinely checked and maintained not only in terms of functionality but also in terms of security , especially for organizations that are legally bound to protect the information that pass through their network either for the purpose of storage or just handling . Often, leakage of any form of private information would make the data handlers, or in this case, the person or group of people who managed the confidential files, liable .
In this case, what the information technology team would be dealing with is a two-floored building that will be used as the location of libraries, some classrooms and administrative offices, and computer laboratories. There will be two groups of people that will be using the building: the students who will use the classrooms, libraries, and computer laboratories; and the administrative personnel and library staff who will work in the offices and libraries. What this means is that the IT team should be able to create a network where the administrators can specify which types of data would only be accessible to the staff and which types of data to the students. Blocking student access to non-essential and confidential data from the university is an essential aspect of the entire network security management process and the IT team should consider it as the primary rationale for managing the security of the network.
Cisco Systems. (2014). Building a Small Office Network: Determining the Best Foundation. Cisco Networks.
IT Donut. (2014). Building a Network. The IT Donut: Resources for your Business.
PC World. (2014). Building a Simple Computer Network. PC World.
PC World. (2014). Step by Step: How to build a Safe, Secure Network. PC World.