Free Essay

Cis-175 Assignment

In: Computers and Technology

Submitted By celtickaran
Words 1581
Pages 7
Network Design Consultation

Terrence Clap


Karan Malik March 13 , 2013

Network Design Consultation

Network diagrams are schematic displays of project schedule activities and the interdependencies between these activities. When developed properly, this graphical view of a project’s activities conveys critical schedule characteristics required to effectively analyze and adjust schedules – thus resulting in accurate and feasible schedules. This document addresses what should be considered in the development of a network diagram, how network diagrams are created, and how they may be analyzed to identify necessary corrective actions and ensure optimal schedule definition.
Development stage – initial development
Function of routers

The routers in the network provide a gateway between the networks. Router 1 will provide a gateway to the Internet, Router 2 will provide a gateway between the workgroup networks; file server web server and the Isolation LAN, which will connect the administration network and the isolation LAN. The routers will select the best path using a metric which can be calculated on Hop count, bandwidth, delay, reliability and Load. The metric hop count is used by OSPF (Open Shortest Path First) and RIP (Router Information Protocol), hop count is the number of routers the packet has to cross between source and destination. EIGRP (Enhanced Interior Gateway Routing Protocol) uses bandwidth and delay as default metrics but can also be configure to include bandwidth and reliability in this calculation which is a much more precise metric than Hop count. The routers are locatedin the core layer of the network and provide a gateway to the WAN.
Application of routing protocols
Function of routing protocols
The routing protocol main functions are:
• Discovers directly connected neighbors
• Propagates routing information/ advertising known routes
• Update routing table
• Prevention of routing loops
The router establishes a connection between neighboring routers and then begins exchanging routing updates about each routers directly connected networks. The router updates all new information into its own routing table. Some protocols send routing updates when a specific timer elapses, or when a topology change occurs. Topology changes include:
• Failure of a link
• Introduction of a new link
• Router malfunction or failing
• Link configuration change
The updates that are sent can include the complete routing tables. EIGRP sends bounded updates which are non-periodic and are only sent to router that require that information which will have less impact on the performance of the network.
Top of Form
Developing security strategies that can protect all parts of a complicated network while having a limited effect on ease of use and performance is one of the most important and difficult tasks related to network design. Security design is challenged by the complexity and porous nature of modern networks that include public servers for electronic commerce, extranet connections for business partners, and remote-access services for users reaching the network from any ware, customer sites, hotel rooms, Internet cafes, and so on. To help you handle the difficulties inherent in designing network security for complex networks, this will help teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products (Dean, 2010).

The goal is to help you work with your network design customers in the development of effective security strategies, and to help you select the right techniques to implement the strategies. The describes steps for developing a security strategy and covers some basic security principles. The presents a modular approaches to security design that will let you apply layered solutions that protect a network in many ways. The final sections methods for securing the components of a typical home network that are most at risk, including Internet connections, remote-access networks, network and user services, and wireless networks.
Network design should be a complete process that matches the customers’ needs to available technology to deliver a system that will maximize an organization’s success.
• In the LAN area it is more than just buying a few devices.
• In the WAN area it is more than just calling the phone company.
• A focus is placed on understanding data flow, data types, and processes that access or change the data.

However a focus is placed on understanding the location and needs of user communities that access or change data and processes. Therefore, several techniques and models can be used to characterize the system, new user requirements, and a structure for the future system. Moreover, a logical model is developed before the physical model. * • The logical model represents the basic building blocks, divided by function, and the structure of the system. * • The physical model represents devices and specific technologies and implementations.

Below will show a top down design steps, then following that you will see the layout of design. This will show how the physical layout will be placed after the completion. * Firewall * DSL Router * Workgroup switch * Switch * Wireless router * PC1 * PC2 * Printer * File server * Web server * Laptop 1 * Laptop 2
The cost for materials and instillations are as follow: Please note owner will provide 2 PC’s, 2 Laptops and a printer. * DSL router $286.03 * Wireless router $90.00 * (2) Switches $235.98 * File server $887.99 * Web server $779.99 * Miscellaneous $500.00 * Labor $500.00 * Total $3279.99

Basic network architectures have also changed very little in Ethernet LAN design. I will provide four main choices: point-to-point (P2P), hub (or star), ring and mesh. The point-to-point and the more traditional hub network architectures remain the simplest to set up and manage, but both present single points of failure that must be factored into network resiliency and redundancy considerations. The ring architecture is slightly older and the wiring can be cumbersome to set up, but ring characteristics offer redundancy that is desirable for many organizations. With the client approval I may consider the mesh architecture for larger clients with the most stringent redundancy requirements and self-healing capabilities, but mesh is also the most complex to set up and manage.

The preferred approach is to provision separate VLAN segments on the existing branch switch platform for energy management. A single branch router can provide both the WAN access to the branch from the enterprise campus network, as well as the VPN access from the MSP network (with appropriate software image and licensing). In cases where an IPSec VPN provides the enterprise WAN connectivity, an additional VPN tunnel can be provisioned to the MSP network (Network Design Considerations for Cisco Mediator Deployments, 2012). In the case where private enterprise WAN connectivity is provisioned, a separate Internet connection could be provisioned on the branch router. The Firewall feature set would be used to provide access control between the energy management systems VLANs and the rest of the network, including the MSP network. If a higher level of isolation is desired, IPSec VPN tunnels can be provisioned internally within the enterprise network (for example, between the Network Operations Center (NOC) and the branch router). Comparatively, this design option results in lower hardware and ongoing maintenance costs, but the management and reoccurring costs of an additional VPN connection for each branch location may prohibit the scaling of this implementation (Network Design Considerations for Cisco Mediator Deployments, 2012).

The goal of quality of service (QoS) is to provide more efficient and predictable network service by providing dedicated bandwidth, controlled jitter and latency, and improved loss characteristics. QoS achieves these goals by providing tools for managing network congestion, shaping network traffic, using expensive wide-area links more efficiently, and setting traffic policies across the network. QoS prioritizes voice, data, and web traffic to ensure that mission-critical applications get the service they require.

In terms of overall operational management of the network service, it is noted that the quality of the service is related to both the capability to carry the end user traffic without significant degradation of end to end performance and without high variability in end to end performance, and the financial capability of the network service provider to fund the acquisition of transmission and switching infrastructure to match the demand levels (Huson, 1994). However, It is noted that such considerations impact directly on network

funding models, where there is a requirement to ensure that additional demand levels is accompanied by additional financial capability to delay resources to match the demand level.
Moreover, It is not proposed to describe various financial structures for network services within the scope of this document, other than to note that the financial structure must match both the requirements of the service itself to scale the resource investment to match demand levels, and match, to some extent, the expectations of the client base. It must be noted that this is an area where there is considerable diversity in the current Internet environment, and there is no commonly agreed business model at this stage. The basic pricing mechanism is that pricing should reflect the requirement of the service provider to meet the costs associated with the service. The precise nature of these costs and how they are derived from the underlying resource costs area areas yet to be well understood across the Internet community.


Dean, T. (2010). CIS175: Network+ guide to networks: 2009 custom edition (5th ed.).
Boston: Course Technology, Cengage Learning.

Huson, G. (1994). The Architecture and Design of the Network. The Operational Environment.
Retrieved from

Network Design Considerations for Cisco Mediator Deployments. (2012). Retrieved from

Similar Documents

Premium Essay

Cis 175 Assignment 1

...Strayer University Week 10 Assignment 3: Business Intelligence and Data Warehouses CIS175008VA016-1154-001 Intro to Networking Professor Obi Ndubuisi June 14, 2015   For the company DesignIT, I would use a LAN type of network (for local-area network). This networks several computers, a mail (exchange) server, a database server and a file share server in one building and interconnects with each switch or backbone. I chose this for this small space because it is less than 100 square feet and is all within a single dwelling. This way the employees can all share their resources with one another, an intranet, database and printers. This network only needs a single modem with wireless capabilities and an optional access point located at the opposite end. I would recommend the wireless access-point to serve the conference room in case the client wants to set up teleconferences. We can even create an interface that when their computer finds the wireless network, a page would come up asking for their employee ID and password. This would also provide access for vendors and customers so they can have temporary access in order to have access to their files on Cloud or DropBox in order to contribute to DesignIT during their visit. Most businesses have these similar services and use ring topology or mesh topology. With ring topology there is an extra layer created, if one device fails you can pin-point the failure but the entire network would go down.  DesignIT would only......

Words: 2878 - Pages: 12

Free Essay

Cis 175 Assignment 2, Building a Prior Success

...Adding Servers 2 The client/server network that you have now converted over to will benefit from Windows Server; I suggest either the 2003 or 2008 version. Windows Server 2003 is older but is still very reliable for the following reasons; “easy to deploy/manage/ and use, secure connected infrastructure, enterprise-class reliability/availability/scalability/ and performance, lower TCO through consolidation and the latest technology, create dynamic intranet and internet web sites, fastest development with integrated application server, work smarter by turning your file server into a powerful collaboration server, automate operations with script-based and policy-based management tools, increase document protection and availability via intelligent file storage, easy to find/share/ and reuse XML web services” (Microsoft Product Information, 2013). Windows Server 2003 is still great and used today but, 2008 is and newer version with added enhancements to its’ older 2003 version. Its’ enhances are “security, reliability, support for remote clients, and performance” (Dean, 2010). Windows 2008 offers a few different editions and I think the standard edition is all you need because it will allow for the data sharing your business needs and it will support your remote services. To incorporate your new servers into your network we have to” determine your networks IP addressing method, verify the hardware requirements, verify that your software is up-to-date, add...

Words: 864 - Pages: 4

Free Essay

Cis 175 Complete Course Cis175 Complete Course

...CIS 175 Complete Course CIS175 Complete Course Click below link for Answer Discussions CIS 175 Week 1 Discussion "Topologies"  Please respond to the following: Per the text, network topologies are defined both physically and logically. Suppose you had to implement either a full-mesh topology or start topology network on a university campus that has ten (10) buildings. Determine the topology that would you select. Provide two (2) reasons for your choice.    Imagine that you work for a small company with one hundred (100) computers that are not on a network. Your boss comes to you for advice on whether he should implement either a peer-to-peer or client / server network. Recommend one (1) solution for your boss. Justify your recommendation with at least three (3) advantages that your choice would afford over the network that you did not choose. Click below link for Answer CIS 175 Week 2 Discussion "Working with the OSI Model"  Please respond to the following: Industry professionals use mnemonics in order to remember the layers of the OSI model. The most popular mnemonic is "Please Do Not Throw Sausage Pizza Away," with each capital letter representing the word of the OSI, i.e., Please (Physical), Do (Data Link) and so on. Create your own unique sentence that would help you to remember the OSI model. Provide a......

Words: 6200 - Pages: 25

Premium Essay

Building on Prior Success

...Building on Prior Success (Assignment 2) Michael Davis CIS 175 August 25, 2013 Professor Emelda Ntinglet-Davis Building on Prior Success After talking with the President of Ocper, Inc., we are to select the peer to peer networking system. The peer to peer networking system should be able to support the company’s new requirements. Peer to peer will allow the additional four servers and also allow the employees the capability to share files. The main objective that peer to peer will meet is helping the company save money with a minimum cost. We a couple of ways to incorporating the four new servers to best accomplish the overall intent of the President. The first option is to place two servers at the main building and the other two servers in another location. Second option is to place three servers at the local building and have one large server at the backup location. Option number one sounds good but will not allow the speed that a company needs and wants. Another major factor with option one is the amount of data that can be stored will be least and that may cause a bigger expenses later. Options two will allow the speed and storage space that every company wants. Have the three servers on site and the large server at another location as a backup will accomplish all the company needs. This options will as allow upgrades at a lower cost if we get the right size larger server. Having three servers on site will allow employees to share multiple files at......

Words: 563 - Pages: 3

Premium Essay

Building on Prior Success

...Building on Prior Success By: Jessica Spiegel CIS 175- Intro to Networking Instructor: Ashiq Waheed May 29, 2012 I would have to say I would encourage the President to go ahead with the original set-up that I had suggested. That would be a client/server-based network. The advantage of a client/client/server-based network is that the data files that will be used by all of the users are stored on the one server. Which gives you a central point to setup permissions on the data files, and it will give a central point from which to back up all the data in case data loss should occur. I would recommend they switch to a twisted pair wiring because there are several advantages for the use of twisted pair cabling. It is very flexible to make it very easy to work with. It is also less expensive than coax cable. The reason why twisted pair cable has become so popular is because networking protocols and standards were designed to support twisted pair wiring. There are a few disadvantages such as the casing; the sheath around the twisted pair networking cabling that is relatively thin. It doesn’t have a second insulator like coax and it is a bit more susceptible to electromagnetic interference, and twisted pair is a bit more susceptible to eavesdropping. A virtual private network (VPN) is a private network that interconnects remote (and often geographically separate) networks through primarily public communication infrastructures such as the Internet. VPNs provide security......

Words: 511 - Pages: 3

Premium Essay

Building on Prior Success

...Assignment 2: Building on Prior Success Prof. Anthony Stevens CIS 175 – Introduction to Networking May 26, 2012 A nеtwоrk operating system (NOS) is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. The primary reason for using networks is to enable clients to communicate and share resources efficiently. Most networks rely on server that exceeds the minimum hardware requirements suggested by the software vendor. To determine the optimal hardware for your servers, be sure to ask the following questions: • What kinds of applications will run on the server? • How many clients will connect to the server? • How much storage space will each user need? • How much downtime, if any, is acceptable? • What can the organization afford? Out of these questions the first one is the most important. For example, use can purchase an inexpensive, low-end server that runs Linux adequately and suffices for resource sharing and simple application services. However, to perform more advanced functions and run resources-intensive applications on your network, you would need to invest in a server that has significantly more processing power and memory. Every application comes with different processor, RAM, and storage requirements. Explain what network operating system you would......

Words: 711 - Pages: 3

Premium Essay


...WEEK 8, ASSIGNMENT 2Ireti Kayode Strayer University | | CIS 175 Dr. William McConnell12/03/2013 | | | | | Ocper, Inc. Server Proposal Given Ocper, Inc.’s expanding network scenario there is a clear need to maximize the available resources between employees then it is appropriate to add additional servers to facilitate the sharing of files as well as the configuration of remote access services to allow for remote and secure working. In order to complement the existing network scenario this proposal is based around the configuration and deployment of Microsoft Windows Server 2012 as the network operating system. This is a stable and secure server environment which will allow the designated services to be configured and will equally allow for scalability while at the same time decreasing the overall maintenance and administration to support the network and associated servers. Given the size of the current organization and the IT systems at present, Windows Server 2012 Standard edition would be the most appropriate version for deployment as this will also keep the up-front costs down to a minimum – there is no requirement for the Enterprise Edition whose features will not be required in this implementation. One of the critical roles for the new server implementations will be that of a File Server capability – this can be easily configured within the Ocper, Inc. network through a Static IP address being assigned to this machine and then......

Words: 630 - Pages: 3

Premium Essay

Math Student

...Outline  Global Company Profile: Tupperware  What is Forecasting?   Forecasting Time Horizons The Influence of Product Life Cycle  Types of Forecasts  The Strategic Importance of Forecasting    Human Resources Capacity Supply-Chain Management  Seven Steps in the Forecasting System 4-2 Outline - Continued  Forecasting Approaches   Overview of Qualitative Methods Overview of Quantitative Methods  Time-Series Forecasting         Decomposition of Time Series Naïve Approach Moving Averages Exponential Smoothing Exponential Smoothing with Trend Adjustment Trend Projections Seasonal Variations in Data Cyclic Variations in Data 4-3 Outline - Continued Associative Forecasting Methods: Regression and Correlation Analysis Using Regression Analysis to Forecast  Standard Error of the Estimate  Correlation Coefficients for Regression Lines  Multiple-Regression Analysis  Monitoring and Controlling Forecasts Adaptive Smoothing  Focus Forecasting  Forecasting in the Service Sector 4-4 Learning Objectives When you complete this chapter, you should be able to : Identify or Define: Forecasting  Types of forecasts  Time horizons  Approaches to forecasts  4-5 Learning Objectives - continued When you complete this chapter, you should be able to : Describe or Explain: Moving averages  Exponential smoothing  Trend projections  Regression and correlation......

Words: 2444 - Pages: 10

Free Essay

Small Business Network Plan

...m Small Business Network Plan Gareth McCartney CIS – 175: Introduction to Networking Assignment 6 August 29th 2010 When designing and building a small business network we must consider the fact that small businesses generally lack the support associated with corporate IT offices. Therefore small business networks should ideally be straightforward and easy to manage. Since the needs of organizations vary, complications will always arise if we attempt to use a generic plan. The main principle we should use in creating this plan is to “follow the simplest approach to achieve the desired result” (Breeding, 2010). Our goal is the create the best possible network with the greatest functionality while maintaining the lowest possible cost. Typically a small business network would consist of around twenty four computers, possibly two servers, a network printer and access to other networks and/or the internet. However for this paper we will limit this network to two workstations one quality printer Internet access multiple email addresses. In most situations, the available finances to connect machines together to share files, printers and internet is limited. Therefore we should consider the cost of acquiring and setting up network adapters, hubs and other network devices such as gateways. An important factor that should be considered is the available options for connecting to the internet. Most areas of the United States have access to......

Words: 1308 - Pages: 6

Premium Essay

Information Systems Supporting Business Processes

...Information Systems supporting Business Processes Unit Code: CIS 13 Assignment 1 – Part B Executive Summary The ANZ Bank has an organisational structure which is divided into geographic location. The focus of this report is on the Australian Division and The Retail Distribution Functional Area. All functional areas within any business are support by a number of business processes. One business process which supports ANZ’s Retail Distribution functional area is Retail Lending. This particular business process plays a big part in creating revenue and ensuring that any risks in lending are kept to a minimum. Management and sales staff within Retail Lending use two types of Information Systems (IS), Hogan and Seibel Customer Relationship Management (CRM). It is these IS which allow ANZ to create their revenue and ensure the appropriate risk assessment is being use. Information Systems are used in all types on businesses globally; they add value to the organisation and also to the customers. Table of Contents Executive Summary 2 1. Introduction 4 2. Retail Distribution – Functional Area 4 2.1. Business Process 4 3. Customer Information System – CSC HOGAN Systems 5 3.1. Supporting Business Process 5 3.2. Value Add 5 3.3. Inputs, Outputs and Feedback 5 3.4. Requirements 5 4. Customer Relationship Management System - SEIBEL 5 4...

Words: 1928 - Pages: 8

Premium Essay


...实用审计英语词汇 1 ability to perform the work 能力履行工作 2 acceptance procedures 承兑程序过程 3 accountability 经管责任,问责性 4 accounting estimate 会计估计 5 accounts receivable listing 应收帐款挂牌 6 accounts receivable 应收账款 7 accruals listing 应计项目挂牌 8 accruals 应计项目 9 accuracy 准确性 10 adverse opinion 否定意见 11 aged analysis 年老的分析(法,学)研究 12 agents 代理人 13 agreed-upon procedures 约定审查业务 14 analysis of errors 错误的分析(法,学)研究 15 anomalous error 反常的错误 16 appointment ethics 任命伦理学 17 appointment 任命 18 associated firms 联合的坚挺 19 association of chartered certified accounts(ACCA) 特计的证(经执业的结社 (ACCA) 20 assurance engagement 保证债务 21 assurance 保证 22 audit 审计,审核,核数 23 audit acceptance 审计承兑 24 audit approach 审计靠近 25 audit committee 审计委员会,审计小组 26 ahudit engagement 审计业务约定书 27 audit evaluation 审计评价 28 audit evidence 审计证据 29 audit plan 审计计划 30 audit program 审计程序 31 audit report as a means of communication 审计报告如一个通讯方法 32 audit report 审计报告 33 audit risk 审计风险 34 audit sampling 审计抽样 35 audit staffing 审计工作人员 36 audit timing 审计定时 37 audit trail 审计线索 38 auditing standards 审计准则 39 auditors duty of......

Words: 2307 - Pages: 10

Premium Essay


...OFFICIAL CATALOG This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from......

Words: 149595 - Pages: 599

Premium Essay

Aau Catalog

...ALLIED AMERICAN UNIVERSITY Personalized. Flexible. Dedicated. Online Programs – Individual Support – Open Enrollment – Ease of Transfer Credits UNIVERSITY CATALOG 2013 Seventh Edition 22952 Alcalde Drive, Laguna Hills, CA 92653 Phone: (888) 384-0849 ∼ Fax: (949) 707-2978 7:00 A.M. – 5:00 P.M. (Monday – Friday) Email: Website: KEY STAFF AND FACULTY Charlotte Hislop, Ph.D. Candidate, President/CEO Bonny Nickle, Ed.D., Provost Eric Sharkey, M.Ed., Director of Education Bill Luton, Ph.D., Director of Assessment and Dean of Business Carlo Tannoury, Ph.D. Candidate, Dean of Computer Information Systems Patricia Drown, Ph.D., Dean of Criminal Justice and General Studies C.J. Bishop, M.B.A., Institutional Research Frank Vazquez, Operations Director Parrish Nicholls, J.D., Director of Compliance Lindsay Oglesby, Admissions Director Abby Dolan, B.A., Registrar Sasha Heard, M.B.A., Student Services Manager Barbara Jobin, B.S.B.A., Career Center Manager Hugo Aguilar, B.A., Chief Financial Officer Richard Madrigal, B.A., Financial Aid Officer As a prospective student at Allied American University, you are encouraged to review this catalog prior to signing an enrollment agreement. You are also encouraged to review the student performance fact sheet which must be provided to you prior to signing an enrollment agreement. This catalog is not a contract between the student, AAU, or any party or parties. Reasonable effort was made at the time this......

Words: 52297 - Pages: 210

Free Essay

Cultural Assignment

...Cultural Awareness Assignment: Part 1 Part A Cost of Living Living in Australia, students have many choices to choose from when it comes to their accommodations. With each choice the price varies: * Hostels and Guesthouses - $80 to $135 per week * Shared Rental - $70 to $250 per week * On campus - $80 to $250 per week * Homestay - $110 to $270 per week * Rental - $100 to $400 per week * Boarding schools - $10,000 to $20,000 a year There are many other living expenses that should be considered when living abroad such as food costs, transportation, etc. Based on each individual the amounts may differ. Here are the approximate prices: * Groceries and eating out - $80 to $200 per week * Gas, electricity - $60 to $100 per week * Phone and Internet - $20 to $50 per week * Public transport - $10 to $50 per week * Car (after purchase) - $150 to $250 per week * Entertainment - $50 to $100 per week As the Department of Immigration and Citizenship demands you to receive a student visa in order to study in Australia, for one individual it costs about $18,610 Australian dollars. Communication Generally you should stand about an arm’s-length away when speaking to someone face to face but the distance will likely be less when standing side by side. Eye contact is generally considered important when expressing sincerity, although Aboriginal Australians are less comfortable......

Words: 4495 - Pages: 18

Free Essay

Cultural Assignment

...Cultural Awareness Assignment: Part 1 Part A Cost of Living Living in Australia, students have many choices to choose from when it comes to their accommodations. With each choice the price varies: * Hostels and Guesthouses - $80 to $135 per week * Shared Rental - $70 to $250 per week * On campus - $80 to $250 per week * Homestay - $110 to $270 per week * Rental - $100 to $400 per week * Boarding schools - $10,000 to $20,000 a year There are many other living expenses that should be considered when living abroad such as food costs, transportation, etc. Based on each individual the amounts may differ. Here are the approximate prices: * Groceries and eating out - $80 to $200 per week * Gas, electricity - $60 to $100 per week * Phone and Internet - $20 to $50 per week * Public transport - $10 to $50 per week * Car (after purchase) - $150 to $250 per week * Entertainment - $50 to $100 per week As the Department of Immigration and Citizenship demands you to receive a student visa in order to study in Australia, for one individual it costs about $18,610 Australian dollars. Communication Generally you should stand about an arm’s-length away when speaking to someone face to face but the distance will likely be less when standing side by side. Eye contact is generally considered important when expressing sincerity, although Aboriginal Australians are less comfortable......

Words: 4494 - Pages: 18