Bill`s Restaurant Supply Business

Bill’sRestaurant Supply Business

Bill’sRestaurant Supply Business


  1. Formula in column F for calculating total expenses for each day:

F5=SUM (B5:E5)

F6=SUM (B6:E6)

F7=SUM (B7:E7)

F8=SUM (B8:E8)

F9=SUM (B9:E9)

F10=SUM (B10:E10)

  1. Formula in row 13 to calculate the total expenses for the week in each category:

B13=SUM (B5:B11)

C13=SUM (C5:C11)

D13=SUM (D5:D11)

E13=SUM (E5:E11)

F13=SUM (F5:F12)

3. Formula/Functionin column g to show ‘’YES’’ for payments equal to and morethan 100.00 on a daily basis.

G5=IF (F5-100&gt=0,&quotYES&quot,&quot &quot)

G6=IF (F6-100&gt=0,&quotYES&quot,&quot &quot)

G7=IF (F7-100&gt=0,&quotYES&quot,&quot &quot)

G8=IF (F8-100&gt=0,&quotYES&quot,&quot &quot)

G9=IF (F9-100&gt=0,&quotYES&quot,&quot &quot)

G10=IF (F10-100&gt=0,&quotYES&quot,&quot &quot)

G11=IF (F11-100&gt=0,&quotYES&quot,&quot &quot)


Networkis essential especially for Bill, who wishes to expand his smallbusiness. It will help him manage his operations, like data transfer,communication, resource sharing, and storage. Resources includeprinters, Internet, Scanners, Fax among other peripheral devices. Thetype of network for small geographical coverage is LAN (Local AreaNetwork). This network can either be

  1. Wired networking.

  2. Wireless networking.


Thisnetworking technology utilizes Ethernet cables and network adapters.Two computers can be connected directly to each other but alsocentral devices are installed to accommodate more computers in thenetwork. The central devices include hubs and switches. In addition,Peer to Peer network can ensure collaboration by making it simple forusers to share files and backup files across the network.

Theinstallation of a wired network is time-consuming and is difficultespecially when location of the computers is separate rooms.

Ethernetcables, hubs, and switches are cheap, making it easy to acquire themfor installation.

Manufacturershave continually been improving the Ethernet technology thereforewired networking remain highly reliable.

Ethernetshowcase superior performance offering a theoretical maximumperformance speed of 100mbps.

Wirelessnetworking/ WiFi

Inthe place of Ethernet cables, hubs and switches, wireless networkuses radio waves for computer connection. WiFi also facilitatesconnection of other devices including personal digital assistants(PDAs), telephone and other devices to a wireless router also calleda wireless access point (WAP).

Theyhave a number of advantages including their ease of installation.Users achieve high mobility and flexibility. It’s also easier toremove or add more clients to the wireless network.

Disadvantageincludes potential interference with electromagnetic waves frommicrowaves, phones, and other devices. Security challenges becauseopen connections are susceptible to interception. Wireless networkinstallation cost is more than the wired network.

WirelessLAN offers a theoretical maximum performance speed of 54mbps, almosthalf that of wired LAN. Performance also degrades as computers moveaway further from the Access Point.

Iwould recommend Bill to install a Wireless LAN for his business.

Someof the new hardware he will have to acquire is as follows:

WirelessAccess Point (WAP) – A device that communicate with the computersvia means of an antenna

  1. Personal computers (PCs) fitted Network Interface Cards (NICs) / Wireless Network adaptors that connect to the wireless network.

  2. Router- A device that forwards data packets across networks, especially WAN and LAN, hence linking the home network with Internet if needed.


Securityissues and concernsandthe protective measures taken

Eavesdropping–Wireless networks are vulnerable to interception and listening by athird unauthorized party. Solution to this problem is to dataencryption of the data stream. This encryption is made possibleimplementing the802.11 standards that provide for wired equivalentprivacy (WEP).

IllicitEntry– Wireless networks advertize their presence, and if a clientsenses the network, it attempts to connect. To avoid successfulconnection of unwanted users, the network should rather be morerestricted. Extensible Authentication Protocol (EAP) and the RemoteAccess Dial-In User Protocol (RADIUS) should be put to use to providestrong authentication for users accessing the network (Richard, 2002,p.9).

Denial-of-Service(DOS)- This is a deliberate interference where an attacker tries to renderthe network unable to serves its legitimate users. This issue istackled by the surveying the area for likelihood of signals thatcause interference and jamming for a planned wireless before itsinstallation.

Radiointerference– This is the accidental interference of the network withelectromagnetic waves from microwaves, phones, and other devices.This issue is also tackled by the survey of the area for existingelectromagnetic waves. Radio interference can also be caused by otherwireless networks nearby.

Lossof a network card –Either by theft or misplacement, this compromises the whole networkcryptographic system. New keys must be provisioned immediately to theremaining users (Richard, 2002, p.11)


Prof.Teodora Bakardjieva. Introduction to Computer Networking. VarnaFree University “Chernorizec Hrabar” Institute of Technology.

Carroll,J, B. (2009). Introduction to Wireless Networking Concept. NetworkWorld: Cisco Press.

Richard,A, S, Ph.D, CISSP, PE. (2002). Wireless LAN Risks andVulnerabilities. InformationSystem Audit and Control Foundation.

MurugiahS, Karen S, (2012) Special Publication 800-153: Guidelines forSecuring Wireless Local Area Networks (WLANs). NationalInstitute of Standards and Technology.

Hamid,A, R. (2003). Wireless LAN: Security Issues and Solutions. SANSInstitute.

Telecentre,International Telecommunication Union. (2011). Basics of ComputerNetworking: Local Area Network (LAN). EM Troubleshooting 4.0.

Lesson2: Network Configuration. Retrieved February 28, 2015, from

Mitchell,B. Help for Wired and Wireless Home Computer Networks. RetrievedFebruary 28, 2015, from

Mitchell,B. Wireless vs. Wired LANs – Building the Right Home Network.Retrieved February 28, 2015, from

Dr.Wibowo. (2005). Wired and Wireless Networks: Wireless NetworkSecurity. IFMG250.