Monthly Archives: November 2016

IT Networking: Cost-Savings, Productivity and Security

IT NetworkingBy engaging small business decision makers in discussions about their IT networking needs, you can highlight how automating services like faxing will save your prospect’s or client’s company on manual labor, which indirectly translates into substantial salary savings over the course of the year.

At the very least, network-based faxing will free up staff to focus on higher-level activities, rather than “babysitting” an archaic fax machine.

Listen for Other IT Networking Opportunities

As you get to know more about the prospect’s or client’s business, keep your antenna up for additional solution opportunity areas, such as centrally-managed Internet access for each desktop.

Besides faxing and Internet access, a client/server network makes sharing, protecting and securing information much easier. Through permissions and auditing, small business owners can ensure that only those authorized have access to sensitive information.

By centralizing the storage of data, small businesses can also more easily protect data with a tape backup drive, antivirus software, firewall software and an uninterruptible power supply (UPS).

Who Are You Promoting IT Networking To?

Tailoring your message for different audiences and interests is also key. If you’re discussing IT networking with the president or owner of the company, the hot buttons might include costs, the value of proactive technology investments, industry trends, competitive factors and lower labor costs through more automation.

The Bottom Line about IT Networking

If you’re discussing IT networking with middle management or employees in the trenches, make sure to shift gears. Staff and the internal guru will likely want to talk about ease of use and administration, how the network will make their job easier and the amount of training required to become proficient.

IT Consulting: Networking Steps

Starting an IT consulting business requires patience and dedication. The hardest part is often getting new clients. In this article, learn some more of the steps you should take before beginning your IT consulting practice.

Step Sixteen: Get Your Networking Contacts into a Follow Up Plan

With every business card you collect, jot down the date that you met them and any relevant notes about them. If you have a follow up request like they said “hey give me a call about that,” or “hey call me on Tuesday about setting that up”, immediately jump on those.

Follow up on the request tomorrow if not sooner. If you can’t follow up with a personal call, send a handwritten note that says you look forward to seeing them again and if you need any help between now and when we meet again, give me a call. Include your card in the note, and put your contact’s card on a rolodex and put him on a 30, 60-day call back schedule.

Step Seventeen: Re-Evaluate Your Networking Organization Options

Take another look at the different networking groups you attended as a guest. Which ones did you like? Which ones have the most potential for the most business opportunities?  Start joining and participating.  The purpose is to get known and to raise your profile in the community.

Pick out at least 4 groups and join them.  Drop off your check personally to the director or office manager.  Be direct and tell him or her that you have this new IT consulting business and that you are looking for small business that you can help out with LANs, etc. Ask them what is the best way to get to know these small business owners that are most likely to need your IT consulting services.

At every 60-90 minute event, you should be talking to eight or ten people. Half of them may be a waste of time, half of them could be potential clients, half could be potential referrals. It’s a matter of staying organized and keeping your name in front of them.

After you go through the first ninety days and you’ve gone to one of these every week, move on to more sustainable networking.

Step Eighteen: Do Your First Direct Mail Campaign

Have your testimonials in place from your earlier clients, and get your networking organizations’ directory on disc. Send out a personal letter and your business card to every member who may fit into the IT consulting sweet spot. Offer them a free 30-minute needs assessment coupon with an expiration date. Tell them you look forward to seeing them at upcoming event and then you can always follow up with a phone call.

Wireless Home Security Camera

Home security is an important issue for any person. A person’s home is their castle and they want to feel safe and secure. There are several security measures that can be implemented to ensure security such as alarms but one that ensures peace of mind is a wireless home security camera package.

What’s need in the package is a camera to fit either just outside the front or back door that transmits a wireless signal. The best one to buy would be one that has night vision to ensure you can see everything at night. The second would be a receiver. Some receivers have screens so you can watch what’s going on no matter where you are and others need to be connected to a computer or television to see the transmission.

If connected to a computer or television the live feed from the camera can be directly recorded to a hard drive or a cassette or DVD depending on which is convenient. Several cameras can be implemented to get several signals meaning more coverage of the home and the surrounding area.

These wireless home security packages are common and can be purchased at most electronics stores. They are on the expensive side but are worth the purchase for the kind of technology it has. With almost everything becoming wireless these days it was only a matter of time until cameras became wireless also.

Most people need some sort of security measure in place, not for protection, but for peace of mind that they are safe in their home. Although there are several other measures that can be implemented in terms of security, the wireless home security camera is a valuable tool for keeping an eye on things at all times. It will complement any other security measure you have in place and will not disappoint.

TCP/IP architecture model

1.    Network interface(Data link) layer
2.    Network layer
3.    Transport layer
4.    Application layer

Network interface layer
The lowest layer of the TCP/IP model. Its task is to provide access to the transmission physical medium and it differs according to the implementation of the medium.

Network layer
The network layer provides network addressing, routing and datagram transmission.  Used protocols that will be of interest further regarding DHCP are IP and ARP.

IP protocol
It is the basic protocol of the network layer and in general the internet as a whole. It sends datagrams, which are independent units that contain information about the destination, source and the sequence number of the datagram. The sequence number is used for message reconstruction, since the delivery order of the datagrams might not be the same as their order in the message and delivery reliability isn’t guaranteed at all.
IP protocol versions:
”    IP v4 – 32 bit addresses. Provides approximately 4 billion unique addresses which aren’t sufficient at present times.
”    IP v6 – 128 bit addresses. The transition to v6 will bring (is bringing) higher security, QoS, packet segmentation and many more IP addresses. (the transition from IP v4 to IP v6 must be supported by the system provider)

ARP protocol
The ARP abbreviation stands for Address Resolution Protocol. This protocol is used to find the physical address (MAC) based on a known IP address. If required ARP sends information concerning the wanted address to all the stations in the network – Broadcast. The stations consequently answer with a message containing their MAC. If the wanted device/station is outside the node/segment, the appropriate router will answer instead of it.

Transport layer
The transport layer is implemented only in terminal devices and it adjusts the behavior of the network according to the requirements of the device/application.

Application layer
The application layer is composed of programs that use net services to fulfill the needs of users. Examples of specific protocols are for instance FTP, DNS and DHCP.
Application protocols use TCP, UDP or both services at the same time. So called ports are used to differentiate between application protocols, they represent a type of label of the application. It is possible to change the ports in the settings of the service, but each service has a default port that isn’t changed for most services and is used as an unwritten standard.

”    FTP = 21
”    DNS = 53
”    DHCP = 67 + 68

Networking Terms: Educating Your Clients

It is very important to educate your small business prospects and clients on key small business networking terms and buzzwords.  After all, in order to “win them over”, you need to be speaking the same language. In fact, you may even want to prepare a “cheat sheet”, based on the below definitions, to help you in your prospect and client pre-sales activities.

•    NIC (Network Interface Card) – a printed circuit board, adapter card or the underlying supporting chipset that snaps into the motherboard of a desktop PC, notebook or server and transmits and receives packets on a network; used to connect to networks including a local area network (LAN), wide area network (WAN), or a broadband network for high-speed cable modem or DSL-based Internet access or other dedicated Internet access service; most common NIC used by small businesses is the 10/100Mbps Ethernet adapter.

•    NOS (Network Operating System) – an OS designed for communications between networked computer systems; popular NOS’s include Apple Mac OS, Linux, Microsoft Windows NT/2000 and Novell NetWare.

•    Peer-to-Peer Network – an inexpensive alternative to a client/server network in which a PC doubles as both a workstation (used by an end user) and a server (from which resources are shared); although virtually any OS can be configured for peer-to-peer networking, peer-to-peer networks are often assembled from Microsoft’s least expensive consumer OS’s, such as Microsoft Windows 98, Microsoft Windows Me and Microsoft Windows XP Home Edition.

•    RAID (redundant array of independent disks) is technology generally used to increase a server’s reliability — by simultaneously writing data to multiple hard drives. While many people also use RAID to improve server performance, RAID eliminates a single point of hard drive failure. Years ago, you could only get the benefits of RAID through SCSI-based hard drives. Today, IDE hard drives can also enjoy entry-level RAID fault tolerance benefits.

•    SCSI (small computer systems interface) is a high-end interface for connecting both internal and external computer peripheral devices. Years ago, only SCSI-based storage devices were used in most servers.

•    Server – any computing device or peripheral on a network designed to provide shared services and resources to network users; primarily characterized by multi-user usage, as compared to a desktop or notebook PC; common servers include the file, printer, e-mail messaging and collaboration, Web, proxy and database server.

•    Wireless Ethernet – set of standards and in-progress standards that allow Ethernet networks to run without physical cabling and utilize radio waves for transmission.