Free Essay

Cmit

In:

Submitted By harlem123
Words 2809
Pages 12
Extending the NATO Architecture
Framework to Support Service
Oriented Architectures

Mr J Keefe – NATO AF Overview
Dr I Bailey – SOA Views
23 May 2006

NATO NEC and the Decision Loop
Understand Faster and better
Cognitive
Domain

Knowledge
Superiority
Orient

Information
Domain

Decide Better and faster
Decision
Superiority
Decide

Network
Enabled
Information
Effects
Capability
Observe
Act
Superiority
Superiority

Physical
Domain

See first, more

Act decisively

NATO NEC will enable us to operate more effectively in the future strategic environment through the more efficient sharing and exploitation of information within the Alliance and with our coalition partners

This will lead to better situational awareness across the board, facilitating improved decision-making, and bringing to bear the right military capabilities at the right time to achieve the desired military effect.

Key Issues
Clarity of vision
Roadmap for change

Dealing with complexity
Legacy Environments – ‘stove-piped’ solutions
Multiple Agencies
New Technologies – SOA
Information Assurance

Multiple Customers
Operators
Operational planners
Acquisition community
Developers

Framework and Methodology
NAF

Reality: Complexity of Defence Applications
Reality: Complexity of Defence Applications inhibit agility inhibit agility
Mainframe
PC/NT apps
Unix apps
3rd Party Interface
AIS Reports

Depository
Banks

Vendor Setup

Budget
Analysis Tool

AIS Calendar

Vendor
Maintenance

Insertions
Orders

Due Dates
General
Maintenance

Broadcast
Filter

Stores & Mrkts

Process Servers
(Imaging)

Printer
Maintenance

NEW Soundscan
NPD Group
AIG Warranty Guard

Mesa Data

S20-Sales
Polling

Printer PO

I13- Auto
Replenishment

I06 - Customer
Order

S01 - Sales
Corrections

I17 Customer Perceived
In-Stock

UAR - Universal Account
Reconciliation

Sterling VAN
Mailbox (Value)

Roadshow

I15 Hand Scan
Apps

I06 Warehouse
Management

Print Costing
Invoice App

E13
E3 Interface

Fringe PO

Smart Plus
M03 - Millennium 3.0

Smart Plus
Launcher

S04 - Sales Posting
S07 - Cell
Phones

P16 - Tally Sheet

I03 Return to
Vendor

D01 Post Load
Billing

M02 - Millennium

S06 - Credit App

Equifax

Stock Options
P15 EES Employee
Change Notice

L02-Resource
Scheduling
(Campbell)

A04 - Cust
Refund Chks

Resumix

AAS

P01Employee
Masterfile
P09 - P17
Cyborg

Frick
Co

CTS
ACH

L01-Promo
Analysis

1

E01-EDI

P14 On-line New
Hire Entry

Cobra

S09 - Digital
Satellite
System

I12 Entertainment
Software

V02-Price
Marketing
Support

CTO2.Bestbuy. com I10 Cycle Physical
Inventory

I04 Home
Deliveries

Washington,
RGIS,
Ntl Bus Systems

S11 - ISP
Tracking

There has not been a holistic approach that provides a means by which programmes can improve this this situation
V04-Sign
System

Prodigy

Banks - ACH and Pos to
Pay

U18 - CTO

I02 Transfers

POS

Plan Administrators
(401K, PCS, Life,
Unicare, Solomon
Smith Barney)

B01 - Stock
Status

Spec Source
SKU Tracking

Intercept

E02-Employee
Purchase

S08 - Vertex
Sales
Tax

I11 Price
Testing

I09 Cycle Counts

Spec
Source

Scorecard - HR

I01 PO
Receiving

V03- Mkt
Reactions
P09
Bonus/HR

S03-Polling

Best Efforts of Cooperation
K02
Customer Repair
Tracking

ASIS
I18
SKU Rep

I55 SKU
Information

Store
Monitor

ELT
PowerSuite

SKU Selection
Tool

Arthur Planning

I35 Early Warning
System

I07 Purchase
Order

Ad Expense

G02 - General
Ledger

Store
Scorecard

Sign
System

Texlon 3.5






SKU
Performance

L60 MDF
Coop

I05
Inventory Info

V01-Price Management
System

I35 - CEI

Rebate
Transfer

Supplier
Compliance

S02 Layaways

NPD,
SoundScan

X92-X96
Host to AS400
Communication

many completely different systems the systems are defined and developed with limited co-operation the systems co-operation is defined for each system two systems co-operate only if they are built for it
NARM

U16-Texlon

I14 Count Corrections

CopyWriter's
Workspace

Store Budget
Reporting

Valley Media

B02 Merchandise
Analysis

BMP - Bus performance Mngt

EDI
Coordinator

Merch Mngr Approval
Batch Forcasting
Ad Measurement
AIMS Admin

AIMS

Journal Entry Tool Kit

A05 - AP

Cellular
Rollover

AIMS
Reporting

Ad
Launcher

S05 - House
Charges

Optika

PSP

C02 - Capital
Projects

Data Warehouse
(Interfaces to and from the
Data Warehouse are not displayed on this diagram)

US Bank Recon
File

Connect 3

ICMS Credit

SiteSeer

In-Home
Repair

Warranty
Billing
System

OTHER APPS - PC
AP - Collections/Credit
TM - Credit Card DB

F06 - Fixed
Assets

Star Repair

Connect 3
PDF Transfe

Connect 3
Reports

Cash Over/
Short

Cash Receipts/Credit

Misc Accounting/Finance Apps - PC/NT
COBA
(Corp office Budget Assistant)
PCBS(Profit Center Budget System)
Merchandising Budget

INVENTORY CONTROL APPS - PC
Code Alarm
Debit Receivings
Devo Sales
Display Inventory
In Home
Junkouts
Merchandise Withdrawal
Promo Credits
RTV Accrual
Shrink
AP Research - Inv Cntrl
AP Research-Addl Rpts
Book to Perpetual Inventory
Close Out Reporting
Computer Intelligence Data
Count Corrections
Cross Ref for VCB Dnlds
Damage Write Off
Debit Receivings
DFI Vendor Database
Display Inventory Reconcile
Display Inventory Reporting

INVENTORY CONTROL APPS - PC
DPI/CPI
IC Batching
Inventory Adj/Count Correct
Inventory Control Reports
Inventory Levels
Inventory Roll
Merchandise Withdrawal
Open Receivings
PI Count Results
PI Time Results from Inv
Price Protection
Sales Flash Reporting
Shrink Reporting
SKU Gross Margin
SKU Shrink Level Detail
USM
VCB Downloads

ACCTS REC APPS - PC
990COR
Bad Debt
Beneficial Fees
Beneficial Reconcile
JEAXF
JEBFA
JEBKA
JEDVA
JESOA
JEVSA
JEVSF
NSF
TeleCredit Fees

Prepared by Michelle Mills

How We Describe Our Architecture Now

No Common Definitions
No Common Descriptions

How Can We Compare
Requirements

Must Compare ‘Like’ Things

Using common well-defined pieces,
Across requirements

Increasing Complexity

Situation Context

Life has become too complicated for ad-hoc acquisition
Projects and programmes now link and overlap – pan-defence
Multiple operational, technical and service boundaries emerging, which must be managed coherently
Overlapping functionality in subsystems,

NATO Network Enabled Capability is a key element to meet this changing need
“NNEC is the linking of sensors, decision makers and weapon systems so that information can be translated into synchronised and overwhelming military effect at optimum tempo”

Enables us to federate systems, sensors, effectors and hence improve military effectiveness
We need a more structured approach to manage the complexity whilst balancing all appropriate user perspectives Proven Structured Approach

DoDAF–DoD Architectural Framework
Proven way of delivering high complexity capability
8 years proven structured approach
Numerous other nations adopting similar approaches
Applied to the Enterprise across: Proven Structured Approach

MOD Architectural Framework

MOD Architectural Framework – modelling using six
View sets
MODAF is largely based on best practice – DoDAF
It has been tailored to UK MOD processes and lifecycles It takes a pragmatic approach
Model all appropriate views
Only model what is needed (based upon a core mandated set) Enhancements include Views that support capability management and acquisition programmes
Other nations watching with interest – some are adopting it for their use

MOD ARCHITECTURAL
FRAMEWORK
Inputs:

Cap Audit
Legacy
Systems
Standards
Prog Plans

Inform

Inform

Inform

Inform

Inform

Strategic View
Enterprise
Architecting

Doctrine
& SAGs

Outputs:

Operational View

Optimise
Capability
Phasing
Provides
Operational
Concepts

Technical View

Defines System
Components &
Key Interface
Points
Structures the
Mandated
Standards

Acquisition View

Provides the
Route map

System View

Improved Policy
Coherent Effects
System of Systems
Standards and
Principles
NEC Roadmap
Context

Managing Complexity

Abstracting Real World Problems

Abstracting real world problems…

…enables structured analysis
Command Battlespace Management
Decision Support
Information Management &
Effects
Acquisition
1. Targeting:
1. Operational Planning:
Targeting:
1. Information Management
Epoch 1 (Now - 2008)
CAPABILITY FUNCTION
Epoch 2 (2004-2007)
Epoch 3 (2006-2011)
Target selection
• Initiation
• Information Analysis
COMMAND BATTLESPACE MANAGEMENT
Target List management
• Mission Analysis
• Information Fusion
Decision
Attack Guidance Matrix Support
• CCIR & planning
• Information Quality
BMETS/JOCS/GP3(HQ ARRC
BMETS/JOCS/BSAM/GP3(HQ
ComBAT/GP3 (HQ ARRC
Targeting Situational Awareness
Cycle:
guidance
Assurance
• Detect only)/RNCSS ARRC only)/RNCSS/HVM SIFF only)/JOCS/RNCSS/HVM SIFF/GBA
• Estimate
• Information Dissemination
• Recognise
2. STAR
- COA
JOCS/ComBAT/GP3 (HQ ARRC only
CCIRM
JOCS (IPM only)/GP3(HQ ARRC only)
• Identify
- Wargaming
• STAR Asset
JOCS/ComBAT/GP3 (HQ ARRC only
Op Planning
JOCS (IPM only)/GP3(HQ ARRC only)
• Track
• Decision
Management/Tasking:
Interop
JOCS/G2 BISA/GP3 (HQ ARRC only
Intelligence
JOCS (IPM only)/GP3(HQ ARRC only)
• Decide
• CONOPS
− STAR asset status
Interoperability
• Engage monitoring • SoM
MIDB, LOCE
• Assess
− Mission planning
• Assemble/review Plan
Joint Strategic Intelligence
LOCE
MIDB/LOCE
Intelweb
− Mission control
• Orders
Operational Intelligence
INT-C
INTELWEB?
2. Operational Analysis
− Sensor cueing
Lychgate
JCS Log JCS Log
Joint Logisitcs
3. Mission Rehearsal
CRONOS (IPM only)
Bi-SCAIS
NATO C2 & Int
NIUTS/NSWAN
FOCSLE
4. Situational Awareness:
Management:
• STAR Product Management:
CWAN (IPM only?)
NATO Comms
• Physical Env
− Product analysis
CWAN
US-GCCS (IPM only)
Allied Interoperability
MIP Messaging/US-GCCS
• Mission Env
− Collation and fusion
GCCS,
RNCSS/LPD(R)/T22/T23/T42/CVS RNCSS/LPD(R)/T22/T23/T42/CVS/T45
Maritime
• Blue Env
− Product Dissemination
GRIFFIN
• Red Env
JFAC (IPM only)
Air C2/Coord
RAFCCIS/JFAC
NIDTS• White Env
Functional Planning Support
NSWAN
PJHQ
• APNLRS
AP3/QP24
Log C4I?/G1 BISA?
CSS
AP3
• CID
DII(F)
Medical
SGIS
5. Intelligence:
• CCIRM
NBC BISA/BATES
NBC BISA
NBC
BRACIS/BATESBRACIS NT
• Int Direction
GBAD
AD BriC
IGBAD IOC
ADCIS
DII(F)
• Collection mgt
Fire Support
FCA
BATES
FCBISA/IFPA
JTFHQ
• Collation mgt
GCCS,
WAH-64 GSS
AM BISA?
Aviation C2
GRIFFIN
• All-source fusion
ACCESS
Aviation Logistics Support
ACCESS
• Dissemination
ASH
MAKEFAST/EOD BISA Intelweb
Engineer/EOD
6. Functional Planning
2. Plan Engagement:
Engagement:
Support:
Comms Management
BCMS/CORMORANT CMS
FALCON CMS/BCMS/CORMORANT
• Effects selection
• Arty Fire planning
• Resource allocation
ATacCS
IS Management
II IOC/II FOC
DBL II FOC
Intelweb
• Engr Obs planning
• Synchronisation Interoperability
• Engr Sp planning
Comp
ACCS LOC1
NATO AD
DII(F)
Cmds
3. Conduct Engagement:
Engagement:
• EOD planning
Allied Fire Support
AFATDS
AFATDS II
• Decision
• AD planning
IS INFRASTRUCTURE GCCS
• Fires/Mission
• EW planning
Control
• Air planning
JOCS/E-IARRCIS/RNCSS
JOCS/E-IARRCIS MLI/RNCSS
JTF/ARRC IS
JOCS/E-IARRCIS MLI/RNCSS
• BDA IS
• Avn planning
MIDB
DBL II IOC/DBL II FOC/BOWMAN FO
ATacCS
Fmn
BOWMAN IOC/ATacCS/II EOC
• Reporting IS
• CIS planning
ATacCS
BG & below
Platform BISA IOC/FOC/BGTI
NIDTS• Info ops planning
CASH (SLI/RLI)/EMS
In barracks IS
DII
NSWAN
• Log planning
UNICOM/EMS
Unit IS
DII
• Sup
Individual IS
BOWMAN PUDT, BRAD
FIST/BOWMAN PUDT, BRAD
• ES
• Tpt
• Med
• Personnel planning
Information and Communications Infrastructure

EPOCH 2 - CBM & CBM(Land) Increments 1 through 4 (2004 - 2007) Epoch 1

Effectors

Decision Suppor t, Functional Support & Effects

Epoch 2

STAR

Comms

JOCS, JC2SS(C),
JT OC IOC, JCS Log,
RN CSS, RAFCCIS

J
O
C
S
N
I
M
R
O
D

JOCS, JC2SS(C),
JTOC IOC, JCS
Log, RN CSS

?

T ACISYS 2

L/Log/SF CC
JOCS, JC2SS(C),
JT OC IOC, JCS Log

MCC
RN CSS,
JC2SS(C),
JT OC IOC,

ACC
NICC, NIRS, JPC,
RAF CCIS,
JC2SS(C), JTOC
IOC, NBC BISA

I n f r a s t r u c t u r e R
A
P
T
O
R

M
R
A
4
E
3
D

TACISYS 2

O

Infrastructure

C
O
R
M
O
R
A
N
T

F
A

E
I

Managing Complexity

User Focused Views

• Structured Views provide user focus
• Views encompass different user perspectives:







Strategic View (StV)
Operational View (OV)
Systems View (SV)
Technical View (TV)
Acquisition View (AcV)
All views (AV)
OV-1
Overview

OV-2
Organisations

OV-5
Processes

Managing Complexity

Common Language

Using the same building blocks to build disparate architectures MODAF

Enterprise
Arch.
MODAF
Meta Model
(M3)

Object
Taxonomy

Managing Complexity

Common Language

Bringing together systems, organisations and processes
Re-using architectural components

NAF rev 3 SOA Views
Ian Bailey

Cornwell Management Consulting

NATO Architecture Framework
Revision 3 of NAF is currently being developed Based on UK’s MODAF framework (which is based on USA’s DoDAF)
Will be the key enabler for NATO Network
Enabled Capability (NNEC)

Extends MODAF in two key areas:
Service-Oriented Architectures (the subject of this presentation)
Bandwidth and frequency – additions to the systems views to enable better optimal use of communication resources

SOA in NATO
NATO has no forces of its own – military force is provided by the member nations
Need to understand what capabilities each nation can bring to a given operation
Need to coordinate those capabilities to achieve optimal military effect

Services will play a key role
Each nation’s capabilities will be modelled as services
Capability will be achieved by orchestration of those services i.e. services will be available to operations planners, and used
i.e. services will be available to operations planners, and used as and when required as and when required

Need for architecture
To specify the services themselves
To specify the services themselves
To specify how services can be combined and chained to
To specify how services can be combined and chained to achieve capability // deliver an effect for a given operation or achieve capability deliver an effect for a given operation or scenario scenario

Capability Wrapped as Services operation service provision

Portable Land Ops Control
Portable Land Ops Control

Armoured Forward Observeration
Armoured Forward Observeration

Portable HQ

Skynet Downlink

Bowman

Warrior

Common Operating
Picture

Targeting
BISA

Ops Controller

Bowman

Forward
Observation
Officer

Targeting
BISA

NATO Service Concept
Not just web services not just electronic services for that matter

Anything that delivers a specified outcome can be packaged as a service
The same service specification can be met by more than on provider (essential for re-use)
Service definitions specify the interfaces provided by the service, and which interfaces the service requires Allows services to be “chained” on the fly

Services may or may not have a physical effect

provided interfaces physical effect (if any) functionality required interfaces Services & Architecture
To make best use of the available services, planning is required
The planners need a clear and concise way to:
Understand what services are available and what level of service is provided
Understand what the services do and how they interact
Understand what interfaces (information) the services provide Define how the services are put together to achieve the intent Enterprise Architecture is seen as key to this, hence the NATO Architecture Framework defines a set of views for architecting services

Overview of NAF SOA Views
NSOAV-1 – Service Taxonomy hierarchy of services service attributes & policies (constraints)

NSOAV-2 – Service Specification interfaces, operations, messages, parameters

NSOAV-3 – Service Composition services composed of other services

NSOAV-4 – Service Orchestration how services support operational activities

NSOAV-5 – Service Behaviour functions (activity models), state machines, interactions NSV-13 – Service Provision which combinations of systems & people
(capability configurations) provide services

NSOAV-1 Service Taxonomy

NATO Standard Service
-availability : percentage

Value Added Service

Storage Service

Core Enterprise Service

Application Service

Infrastructure Service

Warfighting Service
{availability > 95}

Collaboration Service

SituationInfoConsolidator

SituationPicture

SituationInfoStorage

NSOAV-2 Service Specification
Service
Situation
Information
Consolidator

Interface
Situation
Information
Submission

I/O

Datatypes
Geographic
Location
Resource,
Geographic
Location, Track

requestPictureForArea

Geographic
Location, Situation
Picture

requestLocationOfResource

I

setAreaOfInterest

submitLocationOfResource

Situation
Information
Request

I

Operation

Resource,
Geographic
Location

Store

SituationInfo
Package

O

retrieveInformation

Geographic
Location, Time,
SituationInfo
Package

Store

I

storeInformation

SituationInfo
Package

Retrieve

Situation Picture

storeInformation

Retrieve

Situation
Information
Storage

O

I

retrieveInformation

Geographic
Location, Time,
SituationInfo
Package



NSOAV-3 Service Composition

«Service»
SituationPictureManager

EA 5.0 Unregistered Trial Version
«Service»

«Service»

EA 5.0 Unregistered Trial VersionSituationInfoStorage

SituationInfoConsolidator

EA 5.0 Unregistered Trial Version

NSOAV-4 Service Orchestration

Forward Observation Node locate target

analyse target

submit target report TargetTracking

ImageAnalysis

IntelGateway

NSOAV-5 Service Behaviour
(interactions)
(interactions)

TargetTracking

ImageAnalysis

IntelGateway
Observation Request

Target Image
Target Report

NSOAV-5 Service Behaviour
(functions)
(functions)

TargetTracking

ImageAnalysis

IntelGateway

Scan Location

Identify
Friend or Foe

Fire Decision
Support

TrackTarget

Generate Image

NSOAV-5 Service Behaviour
(state machines)
(state machines)

Image Processing
Raw
Image (TIFF)

RectifyImage
{duration < 10000}
Rectified
Image (TIFF)

Threshold Analysis
Enhancement
{duration < 5000}

Enhanced
Image (TIFF)

Pixel Classification
Enhancement
{duration < 3000}
Processed
Image (TIFF)

NSV-13 Service Provision
«CapabilityConfiguration»
Close Quarters Target Tracking

«Organization»
SF Team
«System»

«System»

Integrated
Target
Designator

SF Comms

TargetTracking
«CapabilityConfiguration»
Unmanned Aerial Target Tracking
«PhysicalAsset»
UAV
«System»
IR Targeting

«System»
Target
Tracking

Services are provided by configurations of people, platforms and systems

Model Driven
NAF, like MODAF is underpinned by a formal metamodel
In many ways, the meta-model is more important than the views
Adherence to architecture framework views tends to discourage architectural coherence and encourage production of “paper” deliverables
The idea with MODAF and NAF is to publish the views from an underlying architectural model
Enables automated analysis of architectural data

Extends the UML 2.0 meta-model to facilitate vendor take-up and use of XMI 2.1 interchange format Meta model can be seen at www.modaf.com/m3

Simplified Meta Model for SOA
3 - Operational::OperationalActivity

ServicePolicy

aims to achieve

using

ServiceInterface

2 - Strategic::Effect

supports

provides

ServiceNeedline constrained by

uses

from

to

Service has delivered by

of decomposes ServiceAttribute

2 - Strategic::CapabilityConfiguration achieves 3 - Operational::
OrganisationalResource
uses

ServiceLevel

behaviour

decomposes

4 - Systems::System

hosted on

decomposes

deployed to

ServiceInteractionSpecification
ServiceFunction

4 - Systems::PhysicalAsset

ServiceStateMachine

Actual Meta Model Excerpt (NSOAV-1)
«metaclass»
Kernel::
Generalization

«metaclass»
StructuredClasses::Class
+

isSubstitutable:

«extends»
«extends»
Service

ServiceGeneralisation

{redefines specific}

{redefines general}
1
{redefines constrainedElement}
+constrainedService

«metaclass»
Kernel::
Constraint

ServicePolicy
* +serviceAttributes
{redefines ownedAttribute}

«extends»

ServiceAttribute

«metaclass»
Kernel::Property

«extends»
+
+
+

isDerived: = false isDerivedUnion: = false isReadOnly: = false

Summary
NATO is maturing the UK MODAF for its purposes adding additional views as needed esp to cover SOA
It will be predicated on an agreed metamodel Questions

Similar Documents

Premium Essay

Cmit

...How to Build a Custom PC Jinbin Zhu University of Maryland University College Table of Contents Introductions 3 Hardware Components for PC 4 Preparations Before Installation 5 Step One: Mount the Motherboard 5 Step Two: Install the Processor 6 Step Three: Install CPU Fan 7 Step Four: Installing PCI/ Graphics Card ………………………………………………………………………………………………8 Step Five: Installing Hard Drive and DVD Drive…………………………………………………………………………………….8 Step Six: Install Power Supply……………………………………………………………………………………………………………..9 Step Seven: Connecting all the cables…………………………………………………………………………………………………..10 Step Eight: Connect all the external cables…………………………………………………………………………………………..12 Step Nine: Set Up Bios and Install Windows 7 Operating System…………………………………………………………13 Post Installation……………………………………………………………………………………………………………………………………17   Abstract This paper will cover all the steps to properly build a custom computer from scratch. After following this guide, the readers should be able to install the windows operating system, set up critical key features within the operating system, as well as knowing all the key components of a desktop computer as well as their functions. On top of learning how to install the hardware and software components, we will cover some safety protocols that will ensure the project is successful. Introductions: Building your own pc is one of the best ways to get the most out of your money. This method allows the consumers...

Words: 5272 - Pages: 22

Premium Essay

Part2 Cmit 350

...CMIT 350 WAN and SOHO Skills Implementation UMUC Winter 2015 Springfield Site Configuration: Required Implementation: Device hostnames, banners, secured passwords and spanning tree protocol. * Device Configurations: Implement device hostnames to match the xACME educational topology labels. Provide a template and sample configuration for the MOTD banner and login banner (wording and implementation) for one of the switches. Keep this generic, as it will be implemented on all switches in the xACME educational topology. Lastly, include the configuration steps for implementing device passwords on both console port (out-of-band communications) and VTY (Telnet/in-band communications). All passwords should be encrypted. Required Implementation: Configure all devices hostnames as per the xACME topology Configure encrypted passwords (console and Telnet ports) on all devices Configure MOTD and Login banner for one of the switches Create Server VLANS, Faculty VLANS, Instructional VLANS and Administrative VLANs on all switches Assign ports to VLANs on all switches Assign mode of access of VLANS Configure trunks between switches Make Switch1 as primary root bridge for all VLANs Configure security to protect from bogus BPDUs Configure Hostname: 1. Enable 2. Router# configure terminal 3. Router(config)#hostname (SpringfieldSw1, SpringfieldSw2, SpringfieldSw3, SpringfieldSw4) 4. End 5. Copy run start Creating Passwords: 1. Conf t 2...

Words: 3539 - Pages: 15

Premium Essay

Cmit Final Project

...CMIT376 FINAL PROJECT (250 points) You are the network administrator for City Power & Light. CP&L has five different locations named Central, Northwest, Northeast, Southwest, and Southeast. The Central location has 500 client computers and two network servers. The Northwest and Northeast locations have approximately 75 client computers and one server computer each. The Southwest and Southeast locations have 100 client computers and one network server each. The diagram below illustrates the company’s network infrastructure. Each server is on a separate IPv4 subnet, using non-MS routers to provide access to other internal locations. Subnetting Table (using a subnet mask of 255.255.255.0) 10.18.1.0 – Central Location – 250 users and server S1 10.18.2.0 – Central Location – 250 users and server S2 10.18.3.0 – Northwest Location – 75 users and server S3 10.18.4.0 – Northeast Location – 75 users and server S4 10.18.5.0 – Southwest Location – 100 users and server S5 10.18.6.0 – Southeast Location – 100 users and server S6 [pic] All servers are Domain Controllers in the City Power & Light domain (called CPANDL.AD). The servers run Microsoft Windows Server 2008, Enterprise Edition. All client computers run Windows XP, Vista SP1, or Windows 7. City Power & Light also has a website maintained by their ISP called CPANDL.COM (http://www.cpandl.com). Andy Ruth, director of CP&L, asked you to design a networking infrastructure for the company. The requirements are: ...

Words: 626 - Pages: 3

Premium Essay

Cmit 495 Implementation Plan

...World-Wide Trading Company: Project Implementation Plan Group 3 Kristine Bird (AD Forest Domain OU, Groups and GPO Implementation) Ryan Bonisch (Contact list and LAN Implementation Tasks) Anthony Campo (Configuration of Routers, Switches, and VLANs) Gerald Casanada (Voice VLAN, Wireless, DHCP and DNS) Jennifer Coleman (AD Implementation and Tasks lists for AD Policies) Billie Jo Derouin (Security Implementation) Raymond Mack (Security Technology and Timeline) University of Maryland University College CMIT 495 Professor Sam Musa February 28, 2016 Table of Contents Introduction 2 Purpose 3 Implementation Requirements 3 Project Contact List 3 Tool List 3 Equipment Installation Plan 5 Project TimeLine 6 Lan Implementation task 7 Security Implementation task 11 Configuration Routers 41 Switches 46 VLAN Configurations 49 Voice VLAN and Wireless 51 DHCP and DNS 54 Active Directory Implementation Task 56 Active Directory Policies 58 AD Forest Domain OU formation/AD Group Formation/AD GPO Implementation 68 Security Technologies 88 Introduction The implementation of the WWTC is crucial to keep the business functioning and growing. To ensure that new office installation goes smooth group 3 will create a functional implementation plan from the design we proposed to WWTC over the last 7 weeks. Purpose The purpose of this plan is to provide a step by step guide on the network designed proposed...

Words: 13687 - Pages: 55

Free Essay

Cmit 321 Final Exam

...CMIT 321 Final Exam Click Link Below To Buy: http://hwaid.com/shop/cmit-321-final-exam/ Written 2016 Attempt Score: 121 / 125 - 96.8 % Final Exam Question 1 1 / 1 point __________ is the exploitation of an organization's telephone, dial, and private branch exchange (PBX) system to infiltrate the internal network in order to abuse computing resources. a. War driving b. Line dialing c. PBX driving d. War dialing View Feedback Question 2 1 / 1 point __________ cryptography is the most common method on the Internet for authenticating a message sender or encrypting a message. a. Symmetric b. Hash-based c. Private-key d. Public-key View Feedback Question 3 1 / 1 point __________ is a lightweight Knoppix version cut to 50 MB for a business-card-sized CD. a. Gnoppix b. GeeXboX c. Morphix d. Damn Small Linux View Feedback Question 4 1 / 1 point The __________ utility tests the integrity of an ODBC data source. a. odbcping b. ASPRunner c. FlexTracer d. DbEncrypt View Feedback Question 5 1 / 1 point In the TCP/IP stack, the __________ layer is where applications and protocols, such as HTTP and Telnet, operate. a. Internet b. network c. transport d. application View Feedback Question 6 1 / 1 point Attackers can use a simple test to find out if an application is vulnerable to an OLE DB error. They can fill in the username and password...

Words: 4865 - Pages: 20

Premium Essay

Cmit 350 Final Project

...WAN Implementation with SOHO Skills Configuration Prepared for: University of Maryland University College Prepared by: Nathan Poole Table of Contents I. Springfield Site Device and STP Configurations II. Worchester Site Subnetting Configurations III. Boston Site Routing Protocol, Route Summarization and Topology Improvements IV. Sacramento Site VLAN, Routing on a Stick (ROS) and DHCP Implementation V. Los Angeles Site Management Technologies VI. xACME WAN - WAN Implementation and Secure Communications VII. Bibliography WAN Implementation with SOHO Skills Configuration I. Springfield Site Device and STP Configurations Problem Statement: The device hostnames on each switch are generic and default. They do not match the network topology device hostnames as delivered with the network architecture. Each switch and router must have the correct hostname configured per device. Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#Hostname SpringfieldSwitch1 SpringfieldSwitch1(config)# Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#Hostname SpringfieldSwitch2 SpringfieldSwitch2(config)# Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#Hostname SpringfieldSwitch3 SpringfieldSwitch3(config)# Switch>en Switch#config t Enter configuration commands, one per line. End with CNTL/Z...

Words: 1180 - Pages: 5

Premium Essay

Differentiate

...sectors), to maintain their competitive edge and to pursue ‘continued learning’. This may include both formal education and job-specific training and development, re-training and upskilling. The Higher Education and Training Awarding Council describes learning as ‘a process by which a sustainable change in a learner’s knowledge, skill or competence occurs as a result of experience (of phenomena)’ (HETAC, 2009). The phenomena could include such things as lectures, lecture notes, power point presentations, and graphics etc. (CMIT, 2015). It is argued that passive observation of such ‘phenomena’ does not necessarily constitute learning, as it is possible to sit through an entire lecture that includes, handouts, visuals and up front lecturing and learn nothing. In order to effectively learn, a learner must ‘through a process involving linking, modifying existing knowledge and with skill and competency…construct a ‘cognitive’ representation from the phenomena’ (CMIT, 2015, p.5). O’Carroll (2012) further develops this idea by suggesting that learning occurs when there is a permanent change in behaviour as a result of the phenomena. For the purposes of this assignment it is necessary to firstly have a basic understanding of some learning principles and theories, before trying to differentiate between the concepts of learning, training and development and education. In 1975, David Kolb, identified what he called experiential learning. He proposed that all effective learning is achieved...

Words: 997 - Pages: 4

Premium Essay

Final Paper

...CMIT 350 WAN and SOHO Skills Implementation Use this document as a guide for formatting and organizing your CMIT 350 Skills Implementation challenge. Title Page Professionalism will be key to your success and advancement in your academic and professional career. Use the title page to identify relevant information such as your name, the course, professor, and submission/completion date. Document Index/Contents Organization will allow your document to be divided into key areas of consideration and allows an overall structure to be placed over the submission. Sample text: I. Site “XXXXXXXX” Challenges and Implementation II. Site “XXXXXXXX” Challenges and Implementation III. Site “XXXXXXXX” Challenges and Implementation IV. Bibliography Site “XXXXXXXXXX” Challenge and Implementation (Provide a section for each site, as suggested in your table of contents.) Site Details and Challenges (Summary) Here, you will simply summarize the site requirements and/or challenges you are attempting to overcome. You will not need to implement solutions or discuss your approach at this point. This information is provided to you and can simply be organized and restated as you understand it. Think of this area as what needs to be corrected. Suggested length would be one or two paragraphs. Sample text: As described in the scenario, the xUMUC site was developed without any VLAN structure, and administrators have found the need to isolate broadcast traffic from a layer-2 perspective. Site...

Words: 663 - Pages: 3

Free Essay

Learning from the Titanic

...Learning from the Titanic Post-Mortem Hailmar Suranthe de Silva Overview • Snapshot • Understand what went wrong • Blame-game and performance evaluation • Factors during voyage • Learning from History • How it relates to the IT field Snapshot of circumstance... • Business case • • • • Safety and Luxury through new technology Unparalled Customer Experience 6 year construction and 2 year breakeven. 75% of revenue from first class – reflects in space allocation: 60% for 905 first-class and 7% for 1134 third-class Lavish attention and money substituted processes Marketing drive: ‘unsinkable ship’ Traditional safety (life-boats) given low priority Project Manager (Captain Smith) didn’t trust new methodologies (ice bucket test) • Implied non-functional requirements due to perception/assumptions • • • • • Over-confidence • Old School • Political Influence • • Project Sponsor (Bruce Ismay) High Expectations set – arrive a day early Snapshot of what happened... • Business and Economic pressures • • • • • • • Under-prepared (lack of equipment) and untrained crew – 83 of 900 were mariners Under-quality material substituted Untested processes/methods Traditional safety methods (life-boats) given low priority Safety: only mitigation by technology and no contingency/worst-case (life-boats) Testing: was maiden voyage Prove Titanic is the best ship even when grounded (Fatal) • Over-confidence • Decisions based on aesthetics and luxury compromised individual...

Words: 903 - Pages: 4

Premium Essay

Hcs 440 Week 2 Learning Team Literature Search

...This document MGT 350 Week 2 Learning Team Case Analysis Project Plan Critical Thinking Strategies in Decision Making contains a solution on following task: "Decisions in Paradise Case Analysis Project Plan. Submit the following: 1) Summary of Case 2) Company selected 3) Action Plan, e.g. who and how will this paper be researched and written. UMUC CMIT 425 Security Policy Project Using the GDI Case Study, complete the Security Policy Document. Provide a seven- to ten-page analysis summarizing the security policy to the executive management team of GDI. The summary should effectively describe the security policy in a manner that will allow the Senior Management to understand the organizational security requirements and make the appropriate decisions to enforce. Guidelines · Using the GDI Case Study, create the security policy document. · The security policy document must be 7 to 10 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects. · At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References." · Appropriate citations are required. See the syllabus regarding plagiarism policies. · This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity. · The paper is due during...

Words: 362 - Pages: 2

Free Essay

Cmit350

...CMIT 350 WAN and SOHO Skills Implementation Prepared for: University of Maryland University College CMIT 250 Prepared by: Devin Manning I. Site “Los Angeles” Challenge and Implementation The site administrator has requested that the site establishes remote IOS storage, remote management of switches, ACL list implementation, and a network time protocol for devices as described in the site specific portion of the scenario. II. Site Solutions and Technologies * The recommended course of action for the request of a remote IOS storage capability at the site would be to establish a remote access server using a HTTP/ HTTPS protocol as opposed to the SSH option mainly because of the security and control over things such as the internet connection to the routers from not only the user database, but the source addresses as well in regards to their perspectives. This particular protocol also requires the timing information to be in setup and in place which would complement the network time protocol solution that has been requested by the site. For this request, I would use the SonicWall software in order to setup up this capability along with the SonicWall UTM appliance that is provided by the company. * In order to address the remote management of the switches request, it would require a console cable and a server that has an available console port such as the Cisco Nexus 2228TP GE Fabric Extender expansion module which is one of the easier servers to use that...

Words: 1625 - Pages: 7

Premium Essay

Team Management

...Organizing for the Airbus A3XX The market for commercial aircraft larger than the Boeing 747-400 is driven by the growth of the airline market generally, flight congestion at major airports, increased cost pressure on airlines, and demand for more environmentally-friendly aircraft. Many of these factors presuppose improved technology, superior design, new manufacturing processes and better supplier collaboration. To minimize weight and fuel costs, for example, the A3XX will incorporate a range of advanced materials such as carbon fiber reinforced plastics and a new aluminum and fiberglass laminate called "Glare." The design and implementation of such advanced materials necessitates close coordination with a wider range of suppliers. It also means that some elements will have to be outsourced to suppliers that possess deep expertise in particular areas and requires creative thinking on the part of such suppliers about how the expertise of secondary suppliers might be exploited to meet specifications and requirements. The wiring of the new aircraft will also be quite complex, consisting of nearly 100,000 wires bundled into 530km of cables held by 40,000 connectors. The design of the aircraft necessitates a switch from copper to aluminum wiring, the latter requiring a larger bend radius that could make it more difficult to maneuver around corners within an aircraft and could entail rerouting of some harnesses. Manufacturing and design of the A3XX will be spread across 85 countries...

Words: 528 - Pages: 3

Free Essay

Drroberr

...ENTRY STRATEGY INTO VIETNAMESE ENVIRONMENTAL MARKET A CASE STUDY OF ALTECH ENVIRONMENT PTE LTD by Dang Tran Bao Hanh A research study submitted in partial fulfillment of the requirements for the degree of Master in Business Administration Examination Committee Dr. Do Ba Khang (Chairman) Dr. Fredric W. Swierczek Dr. Lalit M Johri Nationality Vietnamese Previous degree Graduate Diploma in Business Administration SAV Program Scholarship Donor Government of Switzerland/ Swiss Agency for Development and Cooperation (SAV program) Asian Institute of Technology School of Management Bangkok, Thailand April, 2000 Acknowledgment It is a rare pleasure for me to express my profound gratitude and thanks to Dr. Do Ba Khang, advisor to this research, for his valuable guidance, explicit direction, and encouragement throughout this research. I also want to give my sincere thanks to Dr. Fred and Dr. Johri for serving as members of the examination committee together with their constructive and useful advice. My acknowledgements are due to Swiss - AIT - Vietnam Management Development Program and Swiss Government who gave me a great chance to participate in MBA study by providing financial support. My special thanks also go to the management of Altech Pte Ltd Company, especially Mr. Goh Boh Chung, for providing me helpful information and giving...

Words: 22837 - Pages: 92

Free Essay

How to Build a Pc

...CMIT 202 PC Build Project Customer Request for a PC Scenario You work at a small computer shop and have received a request from a customer for a brand new PC. The customer has an older computer that no longer meets the customer’s desires, and he wants to replace it. The new computer must be built from the ground up (no pre-built computers from an online company) and meet all of the customer requirements, as detailed below. * Form Factor * The customer has small children who may accidentally damage a smaller form factor. * The customer has heard about Carpal Tunnel Syndrome and wants to have a system that minimizes this. * The customer would like a high resolution screen but since he doesn’t have 20/20 vision anymore, he doesn’t want to have things appear small on the screen. * Entertainment * The customer wants to be able to watch and record television on their computer. * The customer wants to be able to watch DVD and Blu-Ray movies on the computer. * The customer wants to be able to scan, upload, edit, and print photographs and videos. * The customer already has a digital camera available to him and would like to be able to easily transfer photos from the memory card of his camera to his computer (his camera is using SDHC card) * The customer has family on the opposite coast and wants to be able to have video chats with them regularly. * The customer would like to have two monitors because that’s...

Words: 708 - Pages: 3

Premium Essay

Windows Network Proposal

...CMIT 370 - Windows Network Proposal ----: You have been hired by Shiv LLC as an Information Technology consultant to develop a technology proposal. Shiv LLC manufactures and distributes solar panel for the consumer market. Your job is to submit a proposal that meets their criteria. Current Implementation/Concerns: The company will have 3 locations (Los Angeles, Dallas, and Houston) but are planning to grow rapidly due to high demand in solar panels. Main staff will be at Dallas and Houston offices. Data security is priority since patent and trademarks are at stake. Los Angeles sales personnel will need secure remote access to Houston office. The WAN connectivity is in place and it is not an issue. There is ample bandwidth in place. Feel free to make other assumptions but they need to be noted in the paper. Topic to Cover Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information. Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used for all aspects of the solution. The topics include: -Active Directory: What forest/domain model should Shiv LLC implement? What is the domain name? Where should the domain controllers be place? Should RODC be part of the consideration? FSMO Roles placement Plan for AD backup and recovery -Group Policy: Is Group Policy needed...

Words: 547 - Pages: 3