" /> Setting up a computer network for small enterprises - Essay Writing Pros

Setting up a computer network for small enterprises

Setting up a computer network for small enterprises can be one way of increasing competitive advantage [1]. The network can be used to help manage various business operations in ways that may be used to increase the overall business efficiency. A business with a well-established network environment has improved capabilities in areas such as data transfer, communication and storage among others. To build and design a functional SME network, many factors must be taken care of. Factors such as topology and host placement must often be considered. Other considerations may include the selection of software and hardware technologies as well as the thoughtful configuration of the related components [2]. To understand the study topic in a better manner, the essay attempts to design and develop a VPN network for an SME.  Some of the factors to be considered here include: Logical design, Physical design, Network topologies, IP addressing, Security features and policies, Redundancy and failover plans, as well as the VPN service implementation

Scopes and limitations

Don't use plagiarized sources. Get Your Custom Essay on
Setting up a computer network for small enterprises
Just from $13/Page
Order Essay

The Virtual Private Network is intended to help provide a secure connection for SMEs. The VPN is also intended to promote a cost-effective way of communicating. This is especially due to the reason that the network does not necessarily require the leased lines and that the costs associated with support are offloaded [3]. The network, in addition, is intended to promote significant instances of scalability especially in the event that an SME seeks exponential growth or rather transformation from its current state.  Note that while VPN networks have significant popularity and performances, they sometimes harbor numerous limitations. One of the shortcomings of this network is that for starters, there is need to accustom oneself with significant network security details [4]. This also includes configuration and installation information.


Most of the VPN requirement here will include Network parts and VPN service parts. Some of the concise requirements here include:

  • VPN Client

A VPN client includes a computer or even a router and the type of VPN client intended to be used significantly depends on the business needs [5]. Conventionally, any operating system can be configured to function as a VPN provided it supports the L2TP, PPTP or the IPSec protocol.

  • VPN server

The VPN server will function as an instance for the connection of the VPN clients. Here, it will be appropriate to use Windows NT Server 4.0, Windows 2000 Server or even the Windows Server 2003 to function as a VPN Server

  • Firewall

Firewall is also another requirement. Firewalls will be used to prevent the connection from outside networks. The firewall will also be used to block some of the unused ports in the organization [5].

Other requirements include tunneling protocols and authentication protocols.

Solution Design

  1. Logical design

The logical design of the VPN to some degree will be bound by the physical topology but will make significant use of VLANS as well VPNS. The diagram below demonstrates the  connection to the internet alongside a firewall, router as well as extranet servers


Figure 1. Illustration: Logical network design

  1. Physical design

The physical design in this case will make use of the bust topology. The design functions quite the same way as the ring topology. The main difference however, is that, in bus topology data moves up and down in the connection so that it copies itself along its path. The physical design works perfectly well in smaller networks [6]. The physical design is also quite scalable and, therefore, quite important when an SME is intending to expand.


Figure 2. Illustration: physical network design

  1. c) Network topologies

The network topologies in this case will take the form of the Hub-and spoke VPN topology. This topology works perfectly well within an intranet with main and branch offices. This topology can be used to provide employees with full access to the firm’s network. In this type of topology, spokes (multiple remote devices) communicates with the help of a central hub [7].

Figure 3: illustration; network topologies

  1. IP Addressing

To set-up IP address pools to be used in Remote access tunnels, it will be important to make use of the ip local pool which is found in the global configuration mode

  1. Security features and policies

The VPN, in this case, will make use of data encryption as the security feature. This includes the tunnelling approaches which works by encapsulating encrypted data across communication channel

  1. Redundancy and failover plans

Here, redundancy and failover will rely on the RAID approach. One of the benefits of this approach is that disk mirror one another so that in the event of a failover, one disk is available to write and read data. Another thing about the approach is that it incorporates quite a significant instance of speed. This is due to the reason that the system can read from any data location.

  1. VPN service implementation
  • Ensure proper subnet and IP address assignment
  • Ensure a proper configuration of any third-party firewalls
  • Set-up IP address, router and dynamic DNS

Reference List

[1] J. Buckley, Peter., and C. Mark, The future of the multinational enterprise. Springer, 2016.

[2]R. Mijumbi, S. Joan, G. Juan-Luis, B. Niels, T. Filip De, and B. Raouf, “Network function virtualization: State-of-the-art and research challenges.” IEEE Communications Surveys & Tutorials 18, no. 1, 236-262. 2016.

[3]N. Sultan, “Making use of cloud computing for healthcare provision: Opportunities and challenges”. International Journal of Information Management, 34(2), pp.177-184. 2014

[4]E. Kuada, “Security and Trust in Cloud Computing.” Security Solutions for Hyperconnectivity and the Internet of Things: 184. 2016.

[5]D. Nobori, and Shinjo. Yi, “VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls.” In NSDI, pp. 229-241. 2014.

[6] J. Fork, Michael, T. Christopher, Gloe, and G. Kevin, Paterson. “Securing applications on public facing systems.” U.S. Patent 9,749,291, issue

[7] A. Kumar, J. Harris, and A. Soni, Citrix Systems, Inc., Methods and systems for routing packets in a VPN-client-to-VPN-client connection via an SSL/VPN network appliance. U.S. Patent 9,246,878. 2016

Essay Writing Pros
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

Our writers have been trained on how to handle papers placed by our clients. The writer must read and understand before embarking on writing the papers. In case of any issue that needs clarification, writers are encouraged to ask the client or support.

Professional and Experienced Academic Writers

Our team comprises of the best writers and editors. We do thorough vetting during recruitment to make sure that our writers have the knowledge and experience we aspire in the team.

Free Unlimited Revisions

Our aim is to give the client the best outcome. If for some reason you are not satisfied with the wok done, you can ask the paper to be revised or rewritten. This will be done to your satisfaction with no extra charges.

Prompt Delivery and 100% Money-Back-Guarantee

We have writers who work round the clock. This helps in making sure that all our clients’ papers are delivered on time. If we have issues with the deadline, we will ask for extension. If its not possible, the money is fully refunded.

Original & Confidential

Our clients’ confidentiality is highly respected. We can never disclose our clients’ details to third parties. In the same regard, we strive to give our clients 100% original papers. We do not tolerate plagiarism from our writers.

24/7 Customer Support

Clients can reach us any time of the day, and any day of the week. There is a live chat, email or phone numbers to help in ease of communication.

Try it now!

Calculate the price of your order

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

You should never be worried about your papers even in the middle of the night. Our team will work round the clock to deliver.


Essay Writing Service

We have an able team that can deliver your work in the shortest time possible. The academic level or the type of work should never be a hindrance. Our highly competent support team is always around (24/7) to give you any assistance you may need.


Admission Essays & Business Writing Help

Do you need to be admitted in your dream institution but find it challenging to write an admission essay? Our team is in a position to write the best letter that will guarantee you an admission. We do as well write the best business proposals and reports.


Editing Support

Writing can be fun and enjoyable when everything has been done right. Writing is not just enough without proper editing and proofreading. We have a team of editors that ensure everything falls in place, whether its issues to do with grammar or referencing styles.


Revision Support

Once the paper has been done and submitted, that is not the end of it. You can always ask for amendment or improvement if you feel something has not been done right. Our team of writers and editors will gladly assist you to your satisfaction. Revision is free of charge.