Free Essay

Lan Consultation

In:

Submitted By dragunlord
Words 1841
Pages 8
LAN Consulting Plan
IT/240
February 26, 2012
James (Garrett) Miller

LAN Consulting Plan

Data Assurance:
1. Backup system:
a. Type?
Backup of data will be done with the Norton 360 version 6.0 antivirus protection suite provided backup utility, Symantec Backup Exec. There are two types of backup for this network. The first is a digital tape drive backup that is located on site for intermediate recovery based on the disaster conditions. The second backup is a mirror backup on a bank of servers at an external site to ensure the security of the data in the case of total disaster of the network site.
b. Backup Schedule?
The backup schedule will be determined by the importance of the information. Business critical information will be backed up at the completion of the task. A scheduled mirror backup will be done daily during the off business hours. c. Backup Data Storage plan?
The first backed up data will be stored on an independent server drive using RAID at the main site location for ease of access in the case of an independent component failure. The second backup will be also use RAID and be stored at a different graphical location than the network.

Data Integrity:
1. Antivirus system:
a. Type? Norton 360 version 6.0 antivirus program is installed at each geographical location including the offsite backup of the network. This security protection will provide virus protection, spyware protection, and scan incoming and outgoing e-mail.
b. Scan Schedule?
The anti-virus software will be scheduled to scan incoming and outgoing e-mail messages. It will also scan packet files as they are received. The program will be scheduled to scan the whole system every night when the business operations have ended for the day.
c. Quick reaction plan for system(s) infection?
The protection program will be directed to attempt to repair any infections found as a first resort. If the infection is not repairable by the system it is then directed to a quarantine file for further review by the IT technician(s). As a last resort to protect the system the program will be directed to remove the infected items from the system.
Data Reliability:
1. Disaster Recovery Plan:
a. Site location? The offsite recovery backup data is located at a remote company location (NAS) designed especially to house the backup data servers of the company. It is designed this way to keep the information safe in case of a geological network failure.
b. Data/Systems replication plan?

i. Systems:
1. …The network data is copied from the main data storage located at the Central Office to the external backup location using Veritas Replicator. This program is additional security software from Symantec that coincides with the virus package.
2. …The Operating Software, Windows 7 premium, the development software, and all other business related applications have been copied to disk. One copy is located at the central office for intermediate recovery needs. The other copy is located at the backup site.
3. The employees use a thin client platform that retrieves the information from a central server. On hand replacement servers will initiate the repair of the network in a timely manner.
4. Repair tactics or replacement thin client system components, to include monitors, hardware, and printers to recover the critical business functions will be available at the remote location. …
5. The routers necessary for the fast recovery of the business operations will be available at the remote location for quick replacement.
6. The switches that are critical for the fast recovery of the network will be available and located at the backup site.…
c. Full site recovery schedule?
The full site recovery schedule will begin with identifying the disaster and will focus on the recovery of the critical business systems that are needed immediately to ensure business continuity. Once the business is running the focus will be on restoring and recovering the business essential and secondary aspects of the network. i. Services Recovery Priority: 1. Business Critical systems?
The business critical systems include a power supply, the primary database located in the Central office, the critical presentation servers and databases located at the central office. A goal time to recovery these systems is within 36 hours. 2. Business Essential systems?
The business essential systems include any remaining presentation servers and application servers necessary for the continuity of the business practices. Must be restored starting at 36 hours and within 5 days.

3. Secondary systems?
The secondary business systems include any repairs or replacement of hardware and replacing of cords, cables, misc. Can be restored in as little as 5 days, but may take longer.

2. System Redundancy protection:

a. Fault-Tolerance systems?
The fault tolerance is provided with the use of the RAID technology which provides redundancy and speeds up data transfer. b. Load balanced systems?

The load balancing on the network will be accomplished using routers, such as the Linksys WRT54GL to forward data packets between the computers in the network, and also provide redundancy. c. Clustered services?
Clustering services will be used to provide redundancy by connecting two or more computers together to act as one computer. Load balancing clusters are used to distribute client connections over multiple servers.

WAN Infrastructure:
1. Circuits Type/Provider:
a. New Mexico?
The circuit from the central office to the New Mexico location is a T1 dedicated connection provided by Comcast Business Class internet service.
b. California?
The circuit from the Central office to the California location is a T1 dedicated connection provided by Comcast Business Class internet service. d. Central Office?
The circuit from the gateway to the Central office is a T3 dedicated connection provided by Comcast Business Class internet services e. Internet?
The circuit from the internet to the gateway of the network is a T3 dedicated connection provided by Comcast Business Class internet services.
2. WAN Topology?
The WAN topology of the network including the central office, the New Mexico location, and the California location is Star topology. Each location is connected to the next with a dedicated T1 connection. 4. Circuit failure/outage plan?
The use of ring topology in the network will provide each node another avenue of communication if there should be a failure. 5. Firewall/IDS implementation?
The firewall and Intrusion Detection system will be scheduled through and maintained by the Norton 360 version 6.0 security suites.
5. DMZ services:
a. ….one implementation for a DMZ zone in the network is the use of a mail server. This will allow communication between the inside network and the outside network.
b. …. A second implementation for a DMZ zone is the use of a web server. This will allow the customers to access the information and services provided by the company.
c. … A third implementation for a DMZ zone is a fall over firewall that will allow communication from the outside network to the inside network with predetermined restrictions.
6. Remote Access services?
Remote access services will be provided with the use of the Symantec pcAnywhere 12.5 software which will allow remote access of computers efficiently, manage help desk issues quickly, and connections to remote devices simple and secure. 7. WAN Monitoring/Management tools?

WAN monitoring and management will be controlled by the System and Network Monitor (SNM) application, which is a tool that monitors, graphs and alerts on computing devices and services.

LAN Infrastructure: 1. Router(s)? The routers used in the network are Cisco ISR G2 modules which contain media service engines to deliver rich media capabilities and enhanced EtherSwitches that offer industry leading layer 2 and layer3 switching. 2. Switches?
The switches used in the network are Cisco Nexus 3000 series that offer low latency in high frequency areas and increased application performance through wire rate layer 3 switching. 3. Patch Panel?
The patch panel is a Cisco Catalyst Inline Patch Panel. This device enables inline power for Cisco multiservice enabled catalyst switches. 4. Labs; Model Office, Development, Training?
Training will be provided for all employees on a regular monthly schedule to introduce and provide instruction on new components in the network infrastructure. 5. Building Cabling?
The cables to supply internet to the network is shielded twisted twisted-pair coaxial cable. The cables that connect the components of the network are category 5 stranded cables with RJ-45 round wire connections. 6. LAN Infrastructure Monitoring/Management tools?
The monitoring and management tools for the LAN Infrastructure will be the installed Network and System Monitor application. This application will monitor, graph, and provide alerts on computing devices and services within the LAN.
Systems Architecture: 1. Email Services?
The email service of the company Widget’s World will be provided by Google Business e-mail through an independent e-mail server on the network site which will also act a DMZ location. 2. Internet/Intranet/Extranet Services?
The internet service is supplied by Comcast business class internet services, the intranet is supplied and controlled by an intranet data center located within the network. The extranet service is provided by using a secure link (tunnel) across the internet and used in a (VPN). 3. OS Platform Server/Client?
The Operating System platform is Microsoft and the client service datacenter for this company is Microsoft Server 2008 R2. 4. User Security/Access management platform?
The security in this company is controlled by the use of a user- level security platform. This security platform ensures the security of the company data by only allowing pre-designated users with the appropriate passwords into specify information. 5. Naming Resolution services?
The naming resolution services in the Widget’s World network is the process of caching URL’s that had previously been performed lookups for DNS. 6. Client Application delivery model?
The model used for client application delivery is Citirx XenApp. This application is a thin client product that is used to allow users to connect to the companies applications. 7. Specialized company applications?
Specialized applications of this company would include specialized design and personalization concepts and tools that focus on the development of widgets.
HelpDesk services: 1. Trouble Ticket management system/process?
The trouble ticket management system will consist of a database that records all data that consists of trouble in the network. These data are managed by the business logic layer of an application. 2. Employee training processes?
The employee training processes will consist of regular employee training schedule to keep the employees up-to-date on changing processes, procedures, software, and hardware that is implemented into the business. 3. Employee technology usage policies?
The company will have written policies describing the ways the technology available in the network will be used by the employees.

References:

http://www.cisco.com/en/US/products/sw/netmgtsw/index.html Retrieved from http://www.cisco.com

http://www.symantec.com/products/allproducts.jsp Retrieved from http://www.symantec.com

http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html#nmp Retrieved from www.slac.stanford.edu

http://www.ehow.com/info_8478654_comparison-between-internet-intranet- extranet.html Retrieved from http://www.ehow.com

Similar Documents

Premium Essay

Responding

...you: 1. Prepare an opening statement that specifies your organization’s capabilities to manage a deployment of this size.  2. Graphically depict and effectively promote your company’s structured development and services using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 3. Explain what the client can expect from your services. Our organization is a small sized network consulting company that specializes in LAN configuration, Inter-LAN routing designing, topology designs, and VLAN configurations.   Our quality team of experts are all CCIE qualified in all the services we can provide for the merger of the two networks.   Many of our consultants are highly rated in the industry.   The following is a partial listing of some of the previous work that we have performed for a variety of enterprises.   We can provide references upon your request.       • We have designed a hierarchical LAN topology.       • For a private network we designed their address scheme.       • We provided additional network security by configuring port security on switches.       • We...

Words: 383 - Pages: 2

Free Essay

Wireless

...Introduction We have been hired to deploy a wireless network for Citizens First National Bank. We are going to design, test and deploy this network. Banks have been slow to adapt this technology because if the high security standards they must follow. Since security has been improved and the benefits are so great more and more companies are starting to deploy wireless networks. It the next couple pages I will go through the scope of the project along with the goals and requirements. There are some initial testing that we have to get down and setup so auditors will be able to test before we can deploy to all branches. By using auditors it helps protect the bank with a paper trail incase an incident ever happened. This would show that we have followed all requirements and made every possible attempt to protect our customers and employees. We will have 60 days to setup and test before we have to purchase equipment. This should provide plenty of time to get a location up and running and have their auditors in to do testing. After initial testing we will then put a plan in place to bring all branches online one at a time while sticking to the budget. Scope and Goals Scope The major driving force of this project is to add a wireless infrastructure to the entire bank that would allow seamless use between all branches, while maintaining the high security standards that the FCC requires to help protect the customers and employees of the bank. The details of the...

Words: 786 - Pages: 4

Premium Essay

Quality Web Design

...utilize a Microsoft Visual Studio Team Foundation Service (TFS) server to manage their content and the progress of the project. “Team Foundation is a set of tools and technologies that enable a team to collaborate and coordinate their efforts on building a product or completing a project. Team Foundation enhances team communication, tracks work status, supports team roles, enacts the team process, and integrates team tools.” (Microsoft.com (2011) Team Foundation Overview) In addition to the Team Foundation, they also utilize Visual Studio to code, and build the websites. These resources are accesses through different methods. Those methods include WAN connection, VPN connection through a remote office, and through the corporate office via LAN. They also have other services such as Outlook Web Access for E-mail that is accessed via the methods mentioned above. They have also created security control measures that are published through the corporate security manual. Two Security Vulnerabilities Software Vulnerability The main vulnerability I see on the software side would be protecting their Server. Since Quality Web Design utilizes the access to their servers via remote connection and wireless access, these servers can become victims of Man-in-the-Middle...

Words: 927 - Pages: 4

Free Essay

It 241 Appendix a

...Associate Program Material Appendix A Final Project Overview and Timeline Final Project Overview In the final project, you assume the role of a wireless network consultant working for a company called Apex Designs. You must present Apex Designs with a plan that outlines how you intend to design their wireless network. The plan must be based on the recommended steps for designing a WLAN, outlined in the following bulleted list. In addition to the design of the network, Apex Designs has asked that you provide a basic wireless security policy. To that end, your plan must consist of the following elements: • Deployment scenario • IEEE wireless network type • Access point management • Location of wireless devices • Wireless security policy Final Project Timeline Budget your time wisely and work on your project throughout the course. Some of the discussion questions, CheckPoints, and assignments in the course will assist you in creating your final project. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to complete your project successfully. □ Suggested in Week One: Read the Final Project Overview and Timeline in Appendix A. Review Appendix I and Appendix J. □ Suggested in Week Three: Begin to identify the hardware components that your network may use based on the list of components compiled in the Wireless Network Components assignment. You will not be able to finalize this list...

Words: 446 - Pages: 2

Free Essay

Ilab 5

...installs Chanalyzer on your computer 2. Capture1.wsr: First, capture file for analysis 3. Capture2.wsr: Second, capture file for analysis 4. Capture3.wsr: Third, wireless capture file for analysis 5. Capture4.wsr: Fourth, wireless capture file for analysis 3. Install the Chanalyzer spectrum analysis program by double-clicking on the Chanalyzer_Installer.3.4.msi file. 4. Start the Chanalyzer. Once the Chanalyzer is running, open the first capture file, Capture1.wsr, and let the recording run for a few minutes. Using this capture, answer the following questions in your lab report. Question 1: Are any channels being used that overlap other channels? Question 2: If you had to install a new wireless LAN, what channel would you use? 5. Close Capture1.wsr and open the file Capture2.wsr. Let the recording run for a few minutes. Using this...

Words: 855 - Pages: 4

Premium Essay

It320

...1. What risk exposure are you subjecting your Microsoft Windows systems to by opening up ports on your internal firewall? Buy opening ports in your firewall it is allowing people access to you network and if anybody that trys to get in figures out the port they can potentially gain access to your system. 2. Using the VM’s on your student workstation, how can you test if your Windows internal firewall is configured properly? By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. Name at least three significant risks of logging in to access points in airports, hotels and other public places. Explain. E-commerce involves the passing of sensitive information, like credit card numbers or bank account numbers, over the Internet, and the risk of losing the privacy of this information is high in public places. Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption, such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. Evil twin hotspot: These are hot spots set up by a hacker and made available to the public. Unknowing users who connect to the Internet using these access points are then exposing their sensitive information to the hacker. To avoid being tricked by this set up, check to see if the login to a WiFi hotspot is SSL encrypted, and look for a valid security certificate...

Words: 300 - Pages: 2

Premium Essay

802.11ac Migration Guide

...Aruba Migration Guide 802.11AC MIGRATION GUIDE 802.11ac Aruba Migration Guide Table of Contents Introduction 802.11AC basics Why 802.11ac? 802.11ac technology overview Backward compatibility RF spectrum Multistation MAC throughput > 1 Gbps 256 QAM Wider channels More spatial streams Downlink multi-user MIMO Pros of 802.11ac Cons of 802.11ac Strategy and planning for 802.11ac migration Site planning basics Planning process Minimum requirements and actions to implement 802.11ac Aruba recommendations for 802.11ac migration General Capacity RF planning Installation Wireless RF coverage considerations and questionnaire Summary 3 3 3 4 4 4 5 5 5 5 6 6 6 6 6 6 7 8 8 8 8 8 9 10 Aruba Networks, Inc. 2 802.11ac Aruba Migration Guide Introduction Wi-Fi has become such an amazingly successful technology because it has continuously advanced while remaining backwards compatible. The current state-of-the-art Wi-Fi is known as Wi-Fi CERTIFIED n or 802.11n. 802.11n has become popular because it improves performance. As 802.11n has become a standard interface on PCs, tablets and smartphones, the applications used by these devices have continued to progress. Mobile technology has encountered the next frontier – video. Whether delivering YouTube to smartphones or moving HDTV signals around the office or home, video has become a significant driver of network traffic, chiefly because it requires one or two orders of magnitude more bandwidth than other IP services. Now...

Words: 3787 - Pages: 16

Premium Essay

Wirless Security

...Wireless Security and Monitoring for the Home Network Raymond Turner Version 1.4b GIAC GSEC Practical Assignment August 21, 2003 Abstract Marketing trends estimate that by the end of 2006, 21 million homes will have implemented a Local Area Network (LAN), and of those 21 million homes 65% will use wireless solutions. [1] The rapidly decreasing cost for wireless devices and the proliferation of wireless solutions provided by the major Internet Service Providers seems to clearly support these growth estimates. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Home wireless users and security professionals the world over are conceptually trying to solve similar problems. They both need to find a way to provide a secure working environment. There are two distinct approaches to this security dilemma, security prevention, and security detection. An example of security prevention would be a firewall device that restricts specific traffic or ports to or from specific hosts. Although this provides protection against unauthorized traffic, it has no means for determining if an attack is being attempted via an authorized port. An example of security detection would be an IDS (Intrusion Detection System) device that contains a signature to identify a specific attack via authorized or unauthorized ports. [2] Security professionals often have the technology and resources to develop security solutions based on prevention, detection, or a combination of the two. However, home...

Words: 6220 - Pages: 25

Free Essay

Fair and Responsible Use of Wireless Lan Technology

...Issue Specific Security Policy Title: Fair and Responsible Use of Wireless LAN Technology Classification: Internal Use Only Statement of Policy This policy addresses fair and responsible use of Acme’s wireless local area network (WLAN) technologies. This includes but is not limited to hardware, software and protocols associated with WLANs. It is intended for authorized users within the Acme enterprise. Authorized users are defined as anyone who has been granted approval to access Acme information and information systems. This includes employees and contingent workers. Authorized users are expected to understand and comply with the contents of this document. Appropriate Use Laptop users are permitted, with prior management approval, to use Acme’s internal WLAN solution. The WLAN should be used only when a wired network solution in unavailable or inappropriate for a particular situation. To ensure appropriate protection of privacy, all wireless transmissions will be secured utilizing strong mutual authentication and encryption. When establishing a connection to a public hotspot or WLAN within your home, a VPN connection must be established and used in conjunction with an Acme approved personal firewall solution. Only Acme approved WLAN technologies are permitted within the enterprise. Use of non-standard hardware, software and protocols is strictly prohibited. Systems Management It is the responsibility of the Network Administrator, for Acme’s WLAN, to...

Words: 472 - Pages: 2

Free Essay

Case Project 2-3 Netw390

...Vendor | Model | standard | Bands | Encryption Type | Power over Ethernet | WAN Speed | Cost | Netgear | WNDAP330 | 802.11a/b/g/n | Dual 2.4,5GHZ | WEP, WPA, WPA2 | Yes | 10/100/1000BaseT | $329.99 | Linksys | WAP610N | 802.11a/b/g/n | Dual 2.4,5GHZ | WEP, WPA, WPA2 | No | 10/100BaseT | $86.00 | D-Link | DAP-1522 | 802.11a/b/g/n | 2.4 OR 5 GHz | WPA, WPA2, WPA2 Enterprise | Yes | 100/1000 BaseT | $389.99 | Apple | AirPort | 802.11a/b/g/n | Dual 2.4, 5 GHz | Wep, WPA, WPA2 | No | 100/1000 BaseT | $179.00 | TRENDnet | TEW-637AP | 802.11b/g/n | 2.4 | WEP, WPA, WPA2 | NO | 10/100 BaseT | $63.99 | Motorola | AP-5131 | 802.11a/b/g | 2.4 | WPA, WPA2 | No | 10/100 BaseT | $265.00 | Belkin | | 802.11b/g | 2.4 GHz | WEP, WPA, WPA2 | | 10/100 BaseT | $37.00 | For home use I would pick the Linksys. The reason for this is because of the dual band feature. It is always nice to have a wireless access point that can work on both frequencies to support both your old and new wireless equipment. Also with most networking equipment is is always good to go with a company you trust. For the SOHO application I would use the Netgear. This is primary because it is built for commercial use. It supports POE so you can connect a Cat5 from your switch to it and not worry about finding a plugin to power it. Also this access point supports VPN’s and allows the setup of multiple SSID’s to separate out your user. In a business function this is very useful. As the access point I...

Words: 340 - Pages: 2

Premium Essay

Tjx Companies

...TJX companies are known to have a firewall system that does not block any activity that is suspicious on its own networks. Those data encryption that’s used to secure the wireless network at the TJX store outdated. Several of the home wireless networks are secured by using WPA or WPA2. This technology is a lot more complicated to crack. TJX were still using outdated WEP encryption. TJX locations each were lacking those firewalls and data encryption protocols. The company saved the debit and credit card which is also a violation of all card data security standard. The standard was created to reduce any debit and credit card data stored in the merchant systems. Lack of compliance wasn’t intended but the legacy software did not meet the current security standards. The TJX used several available tools to prevent, and limit the impact. Antivirus and the proper firewall software is installed on each machine and is attached to the network should be in place. Security of the wireless networks should have been created to prevent any possible hacks into the system. Data encryption and appropriately secure those passwords to prevent the attack. When there is lack of proper security the TJX companies will have to pay about 11 billion dollar. The banks that provided the cards that were stolen were forced to spend 300 million dollars to replace those stolen cards which are very expensive all because of card information being stolen. TJX responsibility was to make sure that each of the...

Words: 289 - Pages: 2

Free Essay

It241

...used to do the heavy lifting of any network needs. Also this allows an integration of a LAN to be merged openly with the layout of the WLAN when or if necessary. Deployment Scenario Rationale While taking in the consideration of limitations on the physical side. The floor plan inside the Call Center allows WAP to be covered and access the other ones that maybe outside one another. In any area that won’t be high regard for security or even be mobile wire can be used for connections this way the wireless can still connect and the two can communicate. Hardware Components • Component Name: AP o Rationale for using component: to provide coverage wirelessly through out the entire are to be covered. o Rough cost estimate: around $100.00 and above depending on what is to be used • Component Name: switch o Rationale for using component: allows all AP’s to be connected o Rough cost estimate: $50.00 and up • Component Name: Cables o Rationale for using component: restrict access to what is not need to have and to gain access to network. o Rough cost estimate: $5.00 and up depending on length and so on. Insert bullets for additional components IEEE Wireless Network Type Apex Designs has identified that an 802.11n LAN will be implemented. Access Point Management Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location...

Words: 334 - Pages: 2

Premium Essay

Project

...WIRELESS LOCAL AREA NETWORK IMPLEMENTATION SECURITY AND SUPPORT SUBPROJECT Stephen F. Delahunty Project Management in the Technological Environment Scope Definition Plan Wireless Local Area Network Installation Project This document serves to provide a scope definition for the Security and Support subproject of the corporate wireless local area network installation project initiative. It is a functional document to be used by the project team and stakeholders as a central point of reference for this subproject. Security and Support Scope Definition Subproject Justification The business need for this subproject is the constraint to ensure compliance with corporate and industry security standards in order to protect the firm’s information systems and data. If security issues are not addressed there is a potential for a loss of data or access to corporate systems from unauthorized outside parties. Without proper security procedures the firm could increase vulnerability in terms of information technology and proprietary data. Any network-related project such as this wireless network installation must adhere to current corporate security policy and this subproject meets that goal. An additional requirement of this subproject is to facilitate a smooth transition to a pilot program and full implementation. The subproject team will also serve as security subject matter experts for other subproject teams in this overall initiative. ...

Words: 674 - Pages: 3

Premium Essay

Essay

...Files on all personnel Purpose: The purpose of this policy is to set forth a standard for which personnel files are kept and recorded. Scope: All employees, contractors, consultants, temporary and other workers at GDI. Policy: All personnel working for or having access to GDI servers or the network shall have a file maintained for them in HR containing at a minimum Name, Social Security Number, Phone Number, Supervisor’s Phone Number, Security Level Clearance, Length of Employment and Systems that person can access. Physical access list Purpose: The purpose of this list is to establish an access list for persons who have direct physical access to the server control room. Scope: All employees, contractors, consultants, temporary and other workers at GDI. Policy: Only persons who are on the Physical Access list shall have access to the servers control room and the servers themselves. These people are Security of server room Purpose: The purpose of this policy is to implement a set of securities in order to further safeguard the server room from unauthorized access. Scope: All employees, contractors, consultants, temporary and other workers at GDI. Policy: This policy is to set forth a new manner in which the Server Room is secured. The Server Room shall have a keypad on all access points. This keypad will require a different code form every person who has access to the room. It shall also retain a file in which all persons who enter the server room is recorded...

Words: 699 - Pages: 3

Premium Essay

Wireless Technologies Proposal

...12 Wireless Technologies Proposal Learning Team B Jessica L Jones, Christina Valdez, Kathy Moles, & Steven Goodwin Table of Contents * Page 2 * Table of Contents * Page 3 * The problem * The proposed changes * The pros and cons of proposed changes * Page 4 * Justification of decision * Page 5 * The risks involved * The costs * Conclusion * Page 6 * References Wireless Technologies Proposal To: President of Party Plates From: Sales Department of Party Plates Date: February 6, 2012 Subject: Wireless Technologies Proposal The problem: Party Plates currently uses a wired local area network to access the Internet. This requires each desktop and laptop computers be connected to the network via Ethernet cables. Party Plates supplies certain employees with company financed mobile phones. However, the current phones have minimal functions. The proposed changes: An upgrade to a wireless local area network (WLAN) would offer Party Plates several benefits. Providing smart phones instead of current phones to the employees would also be valuable. With smart phones the employees would have several functions at their disposal that would make them more efficient. The pros and cons of proposed changes: Incorporating wireless technologies into any business has advantages and disadvantages. For Party Plates, the wireless technologies that the sales department would like to incorporate are mobile...

Words: 888 - Pages: 4