Company XYZ

By: C.t.s. Computer Technology Services  05/12/2011
Keywords: security, Operating Systems, Internet Connection

CTS - "Your Key to IT"

Network Design

The design of the physical network has a major impact on speed and reliability of data transmission.Most organizations now use Cat 5e and Cat 6 structured cabling which offers a robust and flexible solution. Each computer has a dedicated cable to the switch/hub and can be connected or removed from the physical network without disruption.Wireless networking offers a fast, flexible and cost effective solution for buildings where cabling is not yet in place or would be difficult to install.Replacing old hubs with inexpensive switches greatly enhances the speed of data transmission by creating dedicated connections between the source and destination. Gigabit Ethernet switches and adapters are now available at a relatively modest cost and, used as a backbone, provide an excellent means of reducing bottlenecks to the servers.C.T.S. can advise and deploy all aspects of the physical network including cabling, topology, switches and routers. Forming the core of most commercial networks, the performance and reliability of the servers is fundamental in providing an efficient solution.    

When evaluating existing systems and proposing new hardware we endeavour to specify failover protection where possible by utilizing RAID disk systems and redundant power supplies. C.T.S. has found that deploying well specified servers at the outset offers significant benefits as the cost of upgrading older equipment tends to be relatively expensive.From experience we recommend using the Microsoft Windows 2000 and 2003 server operating systems as it offers reliable, well supported platforms that are compatible most proprietary applications. Windows 2000 and 2003 both incorporate Active Directory which streamlines network administration and features Terminal Services for remote administration.Microsoft Small Business Server offers a cost effective solution for organizations with up to 75 users that wish to deploy Windows Server 2003, Exchange Server (e-mail/collaboration tools) and SQL Server (for database applications).C.T.S. offers the expertise to deploy single or multi-server environments to host the e-mail, file and print services that your organization may require.    

The Internet has become an invaluable communications media, data resource and distribution channel for businesses.Until recently most small/medium size businesses accessed the Internet via dial-up modems or ISDN lines providing frustratingly slow access and charges based on the time online. There are now a number of broadband options such as ADSL, Wireless DSL and cable that offer a permanent Internet connection with much faster access for a relatively modest fixed monthly fee.Branch offices and mobile users can securely connect across the Internet to corporate networks using VPN (virtual private networking) to achieve a cost effective wide area networking solution. VPN encrypts the data being transmitted over public networks and is an integral feature of most firewalls.C.T.S. can advise on the most appropriate Internet connection and deploy the necessary routers and firewalls to deliver fast access, security for the local network and remote access using VPN. We can consult with you on the various types of broadband that are on offer, which includes T1 and T3 Services as well as Back-up duel ISP risk control service.  

E-mail has revolutionized business communication and has become an essential resource within most organizations.C.T.S. can deploy a range of solutions to distribute e-mail to each individual workstation including simple low cost e-mail server applications, sophisticated groupware products, e-mail security.

The need to scan e-mail for dangerous or offensive content is becoming increasingly important. Viruses capable of bringing a network to a standstill are spread by e-mail around the globe in a matter of hours. C.T.S. can provide your network and email exchange server the protection your firm needs. By providing the right software and platform. through our implementation content scanning detects, dangerous scripts, attachment types and protects against future viruses based on e-mail exploits.     

Being hit with a computer virus is very real threat and one that can have a devastating effect on your business.Entire networks can be brought down in a matter of minutes bringing operations to a standstill until the system is cleaned. The most notorious viruses are spread by e-mail and once activated can propagate to all the recipients in your address book - including your customers!

Virus protection software can dramatically reduce the risk of infection but is only effective if it is correctly configured and regularly updated with information on the latest viruses. The risk of infection can be further reduced by educating staff on safe practices, applying security updates, utilizing a well configured firewall and an effective spam filter.C.T.S. can install and configure a wide range of virus software and provide guidanceon how to avoid infection. If you have already been infected we can provide a cleansing service and restore systems to normal operation.
Security is a multifaceted issue that must be addressed to avoid abuse to your network from hackers and employees.   

While you are connected to the Internet your network is open to the public unless it is protected by a firewall. Networks that are permanently connected to the Internet via broadband are particularly vulnerable to malicious attacks from hackers and virus infection. A well configured firewall will block uninvited visitors whilst allowing limited access to authorized users and services.Network sensitive information such as personnel records and accounts data can be protected by configuring permissions that only allow access for those who are authorized. Passwords to logon to the network should be changed on a regular basis and should be sufficiently complex that they cannot be guessed easily. C.T.S. IT can advise on all aspects of network security, deploy firewalls and implement a security policy to protect your data and systems.  

The data stored on company's computer systems is normally considered to be one of its most important assets. Data lost due to system failure or accidental deletion can have disastrous consequences.Establishing a documented disaster recovery plan detailing how systems can be restored in different scenarios allows systems to be quickly rebuilt to resume normal operations. The single most important aspect of disaster recovery is to have a recent and reliable copy of all the data.A well structured back-up regime ensures data can be restored days, weeks and months later. Within a client/server environment all data should be stored on the servers so that it is included within the backup. The backup media should be stored in a data safe or offsite to cover the possibility of a fire in the office.C.T.S. can develop a disaster recovery plan for your organization and deploy effective back-up solutions. Should it be required we can assist with restoring failed systems and restoring data.    

A local area network (LAN) supplies networking capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers or other applications. A LAN in turn often connects to other LANs, and to the Internet or other WAN. Most local area networks are built with relatively inexpensive hardware such as Ethernet cables, network adapters, and hubs. Wireless LAN and other more advanced LAN hardware options also exist. Specialized operating system software may be used to configure a local area network. For example, most flavours of Microsoft Windows provide a software package called Internet Connection Sharing (ICS) that supports controlled access to LAN resources.  

Networking (WAN) between distributed offices allows common data resources to be shared and consolidated in a central location.Sites can be linked using leased lines, ISDN or by using a VPN to transfer data across the Internet. Leased lines are still quite expensive and are generally only used by larger companies. ISDN is comparatively slow and can also be expensive if the lines are used for long periods of time. ADSL internet connections are fast and offer a continuous link for a relatively low cost. Secure links can be established over the Internet by using a VPN ensure privacy.VPN utilizes sophisticated encryption and encapsulation technology to allow data to be securely transmitted across the Internet. Remote workers and branch offices can establish network connections from any location using their local Internet connection. This solution can be used with standard dial-up access but is particularly effective where unmetered high speed broadband Internet connections are used.  

Keywords: Internet Connection, Operating Systems, Redundant Power, security, Server Operating, Server Operating Systems

Contact C.t.s. Computer Technology Services


Print this page