Premium Essay

Quantity of Connectivity Equipment

In:

Submitted By fubard101
Words 1605
Pages 7
Abstract The expansion of the organization has allowed the IT department to design a network that will allow each office to share the same Internet Domain Name while still being located in separate offices. The organization currently own 25 servers and they expect to have to purchase up to thirty more to accommodate the new branch office. The design will allow for providing service to 5000 users with the thought of future growth being applied to the new network design. It has been suggested that certain resources are to be centralized which would help to reduce costs. With all of this in mind, the team came up with the necessary design while trying to keep costs down to a minimum.

Quantity of Connectivity Equipment In order to successfully link all of the new branches there will be several connectivity devices that are required. The design for the organization will need to include seven new branch offices in five states; each branch office will consist of five floors each. This expansion of the company will require the company to purchase several new hardware connectivity devices in order to ensure that the expansion is successful. In order to do this I would recommend that each branch is equipped with five switches, one for each floor. This will require thirty-five switches total for all of the branches. Each floor will be set up as a small network with permissions to connect to each of the other floors in the branch. In addition to the switches, each branch in the organization will need to have their own router. The individual branches will need their own router in order to connect to the other branches and HQ (Head Quarters). Each floor of the branches should also be pre-wired with an estimated two hundred and fifty category six UTP (unshielded twisted pair) cables, this will allow for each desk to accommodate a computer and

Similar Documents

Free Essay

Communication in Verbal and Non Verbal

...[pic] ADVANCED SYSTEK PVT. LIMITED. 299/300, GIDC,BEHIND NOVINO BATTERY, MAKARPURA, BARODA – 390010,INDIA.   SITE ACCEPTANCE TEST FOR ELECTRONIC FLOW METER – IOCL ITARSI CUSTOMER: INDIAN OIL CORPORATION LIMITED, MPSO END USER: INDIAN OIL CORPORATION LIMITED, ITARSI PURCHASE ORDER: 23375955 DATED 10th MAY 2011 Doc No.: IOCL/ITARSI/ASPL/9472/SAT/REV 01 |REVISION |DATE |PREPARED BY |CHECKED BY |APPROVED BY |REMARKS | |SIGNATURE | | | | | | |CONTENTS SHEET | |SL. NO. |DESCRIPTION |PAGE NOS. | | |INTRODUCTION |2 – 5 | | |SYSTEM CHECKS |6 - 7 | | |LOADING OPERATION |8 - 10 | | |Local Loading Interruption...

Words: 995 - Pages: 4

Premium Essay

Computing Trends - Networking Proposal for Rubha Reidh

...Bed and breakfast building to include the private rooms, common area and lounge 17 Phase II: Extending to cover the lighthouse and associated surrounding area 18 Budget 18 Phase I Deployment 18 Phase II Deployment 19 References 21 Abstract The aim of the Rubha Reidh internet project is to construct a robust computer network to encompass the whole lighthouse area using a high speed and reliable internet connection. This has been determined as mesh networking technology. This network will deliver access to email, Web pages, and internet resources for users in the lighthouse area, using both laptops and desktops, as well as mobile devices with connectivity capability. By leveraging the usage of robust and inexpensive wireless network technology, this plan will substantially decrease expenditures for ensuring internet connectivity for the whole lighthouse area, as well as allow better elasticity in planning and expansion. Rubha Reidh is an automated lighthouse that is located in the Scottish remote western coast. Its remoteness stems from the fact that its nearest neighbour is Melvaig (an Inn and campsite) while the nearest business centre with the semblance of a shop is located 20 kilometres away, at Gairlock. It also acts as a bed and breakfast that offers guesthouse holiday services for visitors. Despite its claim to modern convenience away from civilisation, the lighthouse does not provide its guests with internet access. This is a significant negative point against the...

Words: 4859 - Pages: 20

Premium Essay

Marketing

...Is Pros Ltd Your Connectivity Provider PROPOSAL For DEDICATED (Full Duplex) BROADBAND INTERNET PREPARED BY Md.Jashim Uddin Khan Sr.Executive Marketing & Sales. Is Pros Ltd. Cell : 01613257754 E-mail : jashimuddin@ispros.com.bd 41/1 Kazinazrul Islam Ave.Karwanbazar Dhaka-1215. Your Connectivity Provider Dear Sir, Greetings from IS Pros Ltd – the leading Broadband Internet Service Provider in Bangladesh We have Submarine Cable connected Fiber Optic Network throughout the Dhaka City. Cutting Edge – Why Is Pros? 1. Our backbone networks & POPs are connected by Underground Fiber through Nationwide Telecommunication Transmission Network (NTTN). 2. NO COMPROMISE regarding commitment of Bandwidth – to be provided at actual. 3. We ensure you DEDICATED Bandwidth. 4. Unlimited Net surfing for 24 hours – no download limitations. 5. Quick customer support – response time less than one hour. 6. Experienced & professional Customer Care Department. 7. 24/7 Help Desk – 10.00am to 9.00pm customer-end support. 8. We have standby Generator at all the 12 POPs throughout the Dhaka City, so your Connectivity will be uninterrupted. 9. We will provide MRTG. 10. We maintain quality but we are competitive in terms of price. 11. We care you to collect your monthly bill by our Billing Department. 12. IS Pros Ltd is running its 8th consecutive successful years, it’s Management have been involved in this field for the last 12 years. 13. IS Pros Ltd is leading within the top 5...

Words: 1562 - Pages: 7

Premium Essay

Business Continuity Planning

...“Recovery Time Objective.” Resource Required to Support Recovery Strategies Recovery of a critical or time-sensitive process requires resources. The Business Continuity Resource Requirements worksheet should be completed by business function and process managers. Completed worksheets are used to determine the resource requirements for recovery strategies. Following an incident that disrupts business operations, resources will be needed to carry out recovery strategies and to restore normal business operations. Resources can come from within the business or be provided by third parties. Resources include: • Employees • Office space, furniture and equipment • Technology (computers, peripherals, communication equipment, software and data) • Vital records (electronic and hard copy) • Production facilities, machinery and equipment...

Words: 1185 - Pages: 5

Premium Essay

Building an Access Control System

...in-text citations and a work cited section for the references used in your proposals. EVERYTHING SUBMITTED SHOULD DIRECTLY RELATE TO THE PRESENTED CASE STUDY AND NO COPYRIGHT MATERIAL! The recommended order to accomplish this proposal is as follows: Week 2 • LAN and WAN requirements – explain the LAN and WAN infrastructure of the doctor’s office network • Wiring – type of wire, length, cost, outside contractor, etc • Network Diagrams – current network infrastructure and proposed network • Network Hardware – routers, switches, racks, PC, etc. This is initial compiled list • Connectivity LAN-to-LAN – How each LAN is connected to other LANs • Network Services – DNS, DHCP, WINS, VPN, etc. All Microsoft network services. • Replications – Active Directory Replication, DNS Replication, etc. • Section 1 of business case Provide a breakdown of all hardware, software and communication equipment needed for the...

Words: 1078 - Pages: 5

Premium Essay

Project Management Techniques

...|MBA (PROJECT MANAGEMENT) | | | | | | | | | Project Management Techniques Prepared by: Ikechukwu Ihemelandu Date: April 25th, 2011 | | Word Count - 4258 Question 1. Project Background The MTN Nigeria Multi-Protocol Label Switching (MPLS) Network is an important initiative in MTN Nigeria network today. It was built to deliver multimedia voice, video and data in prioritized QoS classes. Currently the capacity in place today in all the switch sites is 1G from the Provider edge routers (PE) to the Provider core (P) router...

Words: 3270 - Pages: 14

Free Essay

Capstone Final Documentation

...CNS Capstone A COMPREHENSIVE NETWORK DEVELOPMENT PROJECT SUBMITTED TO THE IT / COMPUTER NETWORKS SYSTEMS PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE ASSOCIATE DEGREE By Instructor – Roman Danyew Table of Contents Introduction to Cornerstone Communications………………………….................. 3 STAR MEDICAL’s Proposal Overview ……………………………….................. 4 Executive Summary………………………………………………………………... 6 Assumptions and Constraints………………………………………………………. 7 Deliverables………………………………………………………………………... 8 Project Details Implementation and Timeline……………………………………………… 9 Network Topology........................................................................................ 11 IP Schema…………………………………………………………………. 16 Security…………………………………………………………………….. 17 Active Directory Structure…………………………………………………………. 18 Active Directory and Exchange……………………………………………………..19 Website hosting and developing…………………………………………………… 20 Maintenance and Training Plan …………………………………………………….22 Risk Analysis………………………………………………………………………. 23 Backup Plan…………………………………………………………………………24 Cost Analysis………………………………………………………………………. 25 Appendix…………………………………………………………………………… 26 Appendix A: Cost Analysis…………………………………………………27 Appendix B: Hardware…………………………………………………….. 29 Introduction to Cornerstone Cornerstone Communications has been providing networking and data communications...

Words: 7795 - Pages: 32

Free Essay

Networking

...conveying data, visual and audio activities of conveying information. Besides, audio connectivity, it also includes internet, forms of telephony and wireless equipment. Telecommunication network serve to provide efficient transmittance of data from original point to destination point, for example, a telephone call. Usually, the process that allows users to act together in a real time manner takes place within seconds. Public switched telephone network, internet and private computer networks are common forms of telecommunicating network. These are used in voice and visual communications and in businesses. A telecommunicating network is made up of terminals, computers, links, equipment and software of telecommunication. These are important in accessing the network, channeling transmitted information and regulating conveyance of messages over networks. Telecommunication network can be set up as wide area network which allows for reliable and controlled transmission of information between nodes that are geographically distant. This network model is used by most businesses across the world. Local area network provides more secure same information as in a wide area network on a small geographical area. It provides capabilities of phones, data and internet within a near geographical location. Virtual private networks make panoptic use of the internet in maintaining and creating connectivity. To ensure that it is secure, communications are encrypted. The scope of telecommunicating...

Words: 1248 - Pages: 5

Premium Essay

Windsor Valley Roll

...Contents Vision Statement 1 Project requirements 1 Project management tools and techniques. 1 Project management Plan 2 A. Project Overview 2 i. Purpose, Scope and Objectives 2 ii. Assumptions, Constraints and Risks 2 iii. Project Deliverables 3 iv. Schedule and Budget Summary 3 v. Evolution of the Plan 4 vi. Definitions and Acronyms 4 B. Project Organisation 4 i. External interfaces 4 ii. Internal structure 4 iii. Role and responsibilities 5 C. Project Management Process Plans 6 i. Project Initiation 6 ii. Project Planning 7 iii. Project Execution 8 iv. Project Monitoring & Control 11 V. Project Closure 16 D. Project-Specific Process Plans 17 i. Project Specific Processes 17 ii. Method, Tools and Techniques 17 iii. Infrastructure 17 iv. Project and Work Product Acceptance against quality control metrics 17 E. Project-Supporting Process Plans 17 i. Configuration Management 17 ii. Verification and Validation 17 iii. Documentation 17 iv. Work Product Quality Assurance 17 v. Project Reviews and Audits 17 vi. Problem Resolution 17 vii. Subcontractor Management 17 F. Additional Plans 17 i. Conflict Resolution 17 g. Project Plan Sign Off 18 Project budget layout on a spreadsheet 19 Support and Maintenance Plan 19 Lessons learned Report 20 Reference 20 Vision Statement • Continually strive to strengthen and improve the positive impact of students and community: transforming their lives, as well as our own, through our work • Become known nationally as an institution...

Words: 3860 - Pages: 16

Premium Essay

The Toy Factory Network Design

...Executive Summary The Toy Company has requested an upgrade of their network system. The current system has over ten old Windows 95 Operating System desktops with MS Office 95 products. The office employees use the network to send e-mail, access the Internet, make the payroll, accounting, scheduling receiving and delivering, invoicing, human resources tasks, and an outdated inventory System. The manufacturing side of the operation has a legacy network managing a classic robotics system. Every part of this system is obsolete, and the vendors went out of business, eliminating the possibility of support. The only IT person at the manufacturing facility may be an expert on keeping this old system running, but they do not have any experience with new technology. Needless to say, the system is slow and when a problem arise the downtime can go on for hours and sometimes even days at a time. The Toy Factory management wants to address these issues through an upgrade to their system, but they are also looking to positively affect productivity and improve security of the network overall. The proposed network will require significant changes to The Toy Factory's systems. The current hardware is in dire need of an upgrade, which will be implemented with the new physical network architecture. The implementation of this new architecture will provide higher speeds, reliability, and easier maintenance of network (Dennis, 2009). The upgraded hardware will come with better software that will...

Words: 3448 - Pages: 14

Premium Essay

Mpsez Report

...Report on MPSEZ Visit By Saleem Ali IPR Course, Quarter 1 Dr. Preeta Vyas September, 29, 2011. Introduction Mundra Port first commenced operations in 1998 with one berth. Today MPSEZ (Mundra Port and special economic zone) is the largest and one of the most efficient private ports in India. The major contributing factors to the astounding success of Mundra Port are as follows: 1. Ready Availability of Cargo: The primary purpose of any port is to facilitate the smooth movement of cargo and related ships. In fact one of the parameters for measuring the efficiency of a port is to measure the time as to how fast a particular cargo/commodity is moved to/from the port. The faster the movement the more efficient is the port. As Adani Group was already in trading business and thus had ample cargo waiting for efficient movement so the port so constructed was bound to succeed. The existing port facilities were poor and inadequate at that time and hence the trading business of Adani group was suffering due to lack of such port. 2. Strategic Location: Mundra Port is strategically located in Northern Gulf of Kutch and provides a convenient international trade gateway to Europe, Africa, America and the Middle East. It also has a large land area available for development, part of which is now the Mundra SEZ which proposes to attract port-led industrial development. Thus though initially the scope of port was just a captive jetty for Adani Group, but there was...

Words: 2940 - Pages: 12

Premium Essay

Computing

...spending his money. Processing speed: Computing forced the activities to be done very quickly in order to success. As example transaction of confirming a room booking in hotel should be done very fast, because many transactions to reserve rooms in this hotel can be done in parallel so if confirming the room does not done quickly others may take the room. Performance of storing a huge amount of data: computing made it possible to store a big amount of data in acceptable time, because all this available data that we are accessing should be stored. As example, each company now has a database that stores a huge amount of data and this database should have a high performance in order to store and retrieve data in acceptable time. Connectivity: connectivity can be connecting people or devices. Using Bluetooth to connect devices and exchanges data for example, or using internet to connect people via chat,...

Words: 1712 - Pages: 7

Premium Essay

Rfp for New Phone System

...RFP for Phone System ABCD PVT. LTD. TELECOMMUNICATIONS SYSTEM Introduction ABCD Pvt. Ltd. requires an integrated voice connectivity solution for their Thapathali branch. This is a request for proposal to provide the equipment and services outlined in Section II - System Requirements. ABCD Pvt. Ltd. of Thapathali will award this contract on a competitive basis. Instructions for Completing the Proposal The proposal needs to answer all questions listed in Part I - Project Description. Be as brief and accurate as possible. Submit three copies of your proposal. Proposal Deadline All proposals must be hand delivered no later than 5:00 PM, Wednesday, MMMM DD YYYY Submit your proposal to ABCD Pvt. Ltd. at the following address: ABCD Pvt. Ltd. Street Address City, Anchal Attn.: xxxxxxxxxxx (999) 999-9999 Or Mail an e-copy to info@abcd.com.np Project Evaluation Each submittal will be evaluated on a competitive basis against other proposals submitted by other interested applicants. Meetings between the vendor and ABCD Pvt. Ltd. to review the proposals will be scheduled and confirmed by xxxxxxxxxxxxxx. Proposal Schedule The schedule for the Telecommunications System Projects is as follows: MMMM DD, YYYY Request for Proposal faxed to vendors MMMM DD, YYYY Proposals Due MMMM DD, YYYY Project Evaluation Period by ABCD Pvt. Ltd. MMMM DD, YYYY Meetings with Vendors to Review Proposal MMMM DD, YYYY ABCD Pvt...

Words: 1894 - Pages: 8

Premium Essay

Iloveyouni

...advanced mathematical algorithms or logic to perform optimization or simulation on finite capacity scheduling, sourcing, capital planning, resource planning, forecasting, demand management, and others. These techniques simultaneously consider a range of constraints and business rules to provide real-time planning and scheduling, decision support, available-to-promise, and capable-to-promise capabilities. APS often generates and evaluates multiple scenarios. Management then selects one scenario to use as the “official plan”. The five main components of APS systems are (1) demand planning, (2) production planning, (3) production scheduling, (4) distribution planning, and (5) transportation planning. | Allocation | 1) The classification of quantities of items that have been assigned to...

Words: 4256 - Pages: 18

Premium Essay

Risk Assessment

...Global Finance, Inc. (GFI) is a financial company that runs in several countries including Canada, the US, and Mexico. GFI, majors in financial management, money investments, loan applications approval and wholesale loan processing. The company success has seen it become a public traded company in the NYSE. With over one thousand employees, GFI has experienced rapid growth through a well-defined strategy that made use of technological innovation and automation of their systems. However, as GFI experienced a steady growth in its financial operation, a significant security risk lack within its network. GFI relies on its application servers; the Oracle database and the email system that are the backbone of the GFI financial operations. The financial and cash flow system of the company solely depends on the network, any network breakdown, and system failure would be catastrophic for the business and its clients. The recent multiple cyber attacks on the GFIs network and the 2012 Oracle server attack that left the company integrity, confidentiality and availability venerable for several days. Although the servers were restored, the damage was extensive and lead GFI to pay for clients damages in their loss of data confidentiality. Another attack left the entire GIF network down that lead to losses in revenues and intangible customer confidence to the tunes of over a million US dollars. Risk Assessment Purpose The aim of this risk assessment is to evaluate the details of GFI network...

Words: 2661 - Pages: 11