Free Essay

Defining and Building Networks

In: Computers and Technology

Submitted By subera
Words 1066
Pages 5
Colorado Technical University

IT326-1404-A-01: Network Infrastructure Administration

P1-IP1 – Defining and Building Networks
AWEGXE EYWVWQ
Assignment Due Date: 10/13/2014

Table of Contents
Target Organization 3
Proposed Network Solution 6
Network Design 7
Installation and Configuration 8
Maintenance and Troubleshooting 9
Remote Access 10
Network Pro Prep Toolkit 11
References 12

Target Organization New York based DAR Information Systems Inc. (DAR InfoSyS) is a worldwide initiative offering a leading-edge collaborative suite of custom-built virtual training videos. DAR InfoSyS produces, markets, and supports training videos for organizations of all sizes, brick and mortar, and virtual. DAR InfoSyS’ scalable offerings have been attributed to new customer acquisition, value-added products, and impeccable customer care for all of our clients. DAR Information Systems Inc. is the superlative solution for today’s converged communications, information, and entertainment services providers. Having solicited and won our most prominent client, Verizon Communications Inc., a U.S. technology leader in multi-media services, broadband, wireless, and wireline communications to government, consumer, business, and wholesale customers. Having cumulative assets of approximately $275 billion, and over 177,000 full-time permanent and part-time employees, Verizon is currently seeking to expand its customer base throughout the mid-western United States in direct competition with Google and other noteworthy competitors. The targeted installation will have an initial overall impact on 20,000 employees – including roughly 10,000 field technicians and 13 national call centers that house up to 600 employees in Verizon leased or owned facilities and that are located throughout the U.S, in NY, NJ, CT, MA, RI, PA, DE, MD, VA, DC, FL, TX, and CA., respectively. International vendor centers not slated for this system deployment are located in India, Costa Rica, and Mexico, (Verizon, 2014).
In alignment with their present marketing strategy, business needs and development, the organization has provided DAR InfoSyS with a request to revamp their existing training methodologies and accompanying materials intended for their current and prospective employees across all lines of business. Among the list of design requests include a secure, attractive, interactive, user-centric interface – with powerful networked features that make virtual training comparable to actually performing a live task on a job site, while being guided by familiar subject matter experts on their desktops. In response to Verizon Communications requirements, DAR InfoSyS will custom design secure, informative, feature rich and interactive videos that will permit employees to perform virtually any technical aspect of their job by viewing from an extensive library of 90 second videos. Capabilities are expanded through the support and accessibility of multiple desktop/laptop platforms and Smart TV’s (for the call-center and middle management employee), as well as the various types of mobile devices currently in the marketplace (intended for the field technician), (CITATION). Significant features consist of quick access how-to videos, often featuring a recognizable trainer that has the ability to convey important information in a clear, optimistic, and concise manner. Within specified limits, call-center employees can quickly access videos from their desktop that will provide specific information to assist customers placed on a brief hold – 90 seconds. On mobile devices such as tablets and smartphones supplied to field technicians for customer support, brief and specific information can be provided about how to perform and complete tasks while working with routers, set-top boxes, hubs, drop terminals, and multi-dwelling unit equipment. Personal video libraries can be created for most accessed videos. Printing is also available to create local files, wirelessly, or directly connected to a printer. Cutting-edge technology is engaged through the best in internet security and backup services and utilities; allowing employees and network designers the capacity to securely and discreetly archive terabytes of data to the cloud instantaneously. Personal video libraries can be created for most accessed videos. Printing is also available to create local files, wirelessly, or directly connected to a printer. Cutting-edge technology is engaged through the best in internet security and backup services and utilities; allowing employees and network designers the capacity to securely and discreetly archive terabytes of data to the cloud instantaneously. Accessed via a Single Sign-On application and viewed through a web browser – the video training application and library is hosted on multiple web servers located throughout the U.S. and backed up to the cloud - where the training videos can be accessed by each employee that has an account and provides the correct credentials.
In order to use the Active Directory Service (which is how the user accounts will be created), running under the network operating system (NOS) platform of Microsoft Windows Server –the network administrator configures it during installation and will include DHCP (Dynamic Host Configuration Protocol), to manage the IP addresses on the network that will be using the primary protocol TCP/IP (Transmission Control Protocol/Internet Protocol). Active Directory depends on DNS (Domain Name Service) for IP address name resolution which makes it possible for friendlier names to be used. IGMP (Internet Group Messaging Protocol) for multi-cast streaming video will be implemented. WINS (Windows Internet Name Service) is used for NetBIOS name resolution and remote access and routing components, and is particularly important for VPN (Virtual Private Network) clients that will be accessing the network,. Through a series of routers that will implement, manage, and operate cohesively - IP Routing will determine the route the data travels across dissimilar networks to communicate from the source to the target device. Microsoft Certificate Services is an identity and access control security technology that affords tailored services for generating and managing public key certificates used in software security systems that utilize public key technologies, (Citation). DAR Information Systems is certain that these attractive, empowering features are assured to enhance employee’s confidence, work performance and technical proficiency by swiftly resolving issues. By providing well produced training videos, personnel are offered the ability to opportunely increase sales by strengthening their product knowledge, and minimizing stress while engaging customers and on the go. Maintenance that includes, adding, deleting, tracking, and modifying databases – are all functions of DAR InfoSyS – while expanding Verizon Communication Inc.’s customer base and growing revenue. Proposed Network Solution
TBD

Network Design
TBD

Installation and Configuration
TBD

Maintenance and Troubleshooting
TBD

Remote Access
TBD

Network Pro Prep Toolkit
TBD

References

Verizon Communications, (2014). Who We Are and What We Do. Retrieved from http://www.verizon.com/about/our-company/history-timeline/

Similar Documents

Premium Essay

Planning a Network

...planning or designing a computer network. Such factors include meeting the needs of the business, traffic and bandwidth requirements, budget considerations, scalability, etc. "Scalability refers to the extent of network growth that should be supported. For corporate network, scalability is a major consideration. Provision must be made to add users, applications, additional sites, and external network connections" (TutorialsWeb). It is important to have a system or methodology to follow to ensure you account for the necessary and critical aspects of the design process that will provide the best possible network solution for your company. The first step is considering the needs of the business. This is accomplished by understanding what the company does, how they currently function and operate to generate revenue, as well as having a good understanding of the company's business model. Once you have a good understanding of the company's business requirements, you can then determine specific design requirements. The second step then is defining the technical requirements of the network based on the information gathered from assessing the needs of the business. In this step of the planning process, technical considerations such as performance requirements, availability, scalability, standards compatibility, and rapid deployment are evaluated (Hummel). Only when these first two steps are followed in this order will you succeed in designing a network that best suits the customer and...

Words: 669 - Pages: 3

Free Essay

Paper

...A NPSTC Public Safety Communications Report The National Public Safety Telecommunications Council is a federation of organizations whose mission is to improve public safety communications and interoperability through collaborative leadership. Defining Public Safety Grade Systems and Facilities Final Report 5/22/2014 Support to NPSTC provided by the U.S. Department of Homeland Security's Science and Technology Directorate, Office for Interoperability and Compatibility (OIC), and the National Protection and Programs Directorate, Office of Emergency Communications (OEC). Points of view or opinions expressed are those of the originators and do not necessarily represent the official position or policies of the U.S. Department of Homeland Security. American Association of State Highway and Transportation Officials | American Radio Relay League | Association of Fish and Wildlife Agencies | Association of Public Safety Communications Officials | Forestry Conservation Communications Association | International Association of Chiefs of Police | International Association of Emergency Managers | International Association of Fire Chiefs | International Municipal Signal Association | National Association of State Chief Information Officers | National Association of State Emergency Medical Services Officials | National Association of State Foresters | National Association of State Technology Directors | National Emergency Number Association | National Sheriffs’ Association 8191 Southpark...

Words: 44798 - Pages: 180

Free Essay

Nt1210 Midterm Review

...NT1210 Introduction to Networking Unit 1: Mid-Term Mid Term Review 1 Nibble, Byte, Word, Double Word Nibble, Byte, Word, Double Word Figure 1-2 2 Kilobyte, Megabyte, Gigabyte, Terabyte Size (2N Bytes) Term Size (Bytes) Kilobyte Megabyte Gigabyte Terabyte 1024 1,048,576 1,073,741,824 1,099,511,627,776 Kilobyte, Megabyte, Gigabyte, Terabyte 210 220 230 240 Rounded by Size (Bytes) 1,000 1,000,000 1,000,000,000 1,000,000,000,000 Table 1-1 3 Random Access Memory (RAM) Physically exists as set of microchips installed on plastic card (memory module) Central Processing Unit (CPU) uses RAM like people g ( ) p p use notepad Stores binary value so can use it later Can read data from RAM to recall value stored earlier CPU sends electrical signal over bus (electrical pathway) to communicate with RAM 4 Random Access Memory (RAM) (cont.) RAM uses address for each unique memory location where byte can be stored To write to RAM: CPU sends signal to RAM over the bus g to write (store) value into byte of RAM Address in RAM Value to be written To read from RAM: CPU uses similar process (see example in Figure 1-3 on next slide) 5 CPU Reads Byte 4 from RAM The CPU uses the same bus to read the current value of a byte in RAM as it does to send a message to RAM. The read request lists the address of the particular byte, asking for its value. RAM returns the binary value stored at that address. CPU Reads Byte 4 from RAM 6 Figure 1-3 Writing Individual Bits in Byte 4 of RAM...

Words: 11596 - Pages: 47

Premium Essay

Ocean Paper

...Defining an Industry: What is the size and scope of the Australian Building and Construction Industry? By Gerard de Valence DEFINING AN INDUSTRY: WHAT IS THE SIZE AND SCOPE OF THE AUSTRALIAN BUILDING AND CONSTRUCTION INDUSTRY? Gerard de Valence Construction Economics, Faculty of Design, Architecture and Building, University of Technology, Sydney, Australia Introduction The traditional structure-conductperformance approach to industry economics originated in the US in the 1930s with the work of Mason (1939) and Bain (1959). This is now the standard framework for analysing the dynamics of an industry. However, the size and scope of the Australian construction industry at the turn of the millennium may be better understood using an alternative model that highlights the diversity of the industry and the range of actors involved. Industry analysis has traditionally focused on groups of firms with similar characteristics in their production processes, goods or services produced, and markets served in the wider economy. The distinction has been between firms and industries, and the analysis has emphasised the importance of economies of scale and scope (Sutton 1991) or organisational structure (Williamson 1979). One major difficulty in the standard structure-conduct-performance approach has been the definition of industries within the theoretical criteria of product homogeneity. Further, some analysts see the construction industry as a manufacturing system, similar to the automotive...

Words: 6294 - Pages: 26

Premium Essay

White Paper

...An ISS White Paper Security Strategy Development Building an Information Security Management Program 6303 Barfield Road • Atlanta, GA 30328 Tel: 404.236.2600 • Fax: 404.236.2626 Security Strategy Development Information Security Management A sound information security management program involves more than a few strategically placed firewalls. These safeguards, while important, are only truly effective as part of an overall information security management system. The integration of existing security technologies and processes into a cohesive framework for security management will ultimately reduce inefficiencies and redundancy and ensure the manageability of those solutions. A comprehensive security program should contain the proper balance between people, processes and technology to effectively manage risk with minimal impact on normal business operations. In order to build an appropriate information security program, an organization should assess and define their specific security requirements, design a solution that meets those unique requirements, deploy the necessary policies, technology and procedures, and continuously maintain, adapt and improve that solution. An organization’s overall security strategy will provide a framework for defining those elements necessary in building and maintaining a sound security management program. Strategic planning can take many forms, but the end result should yield a documented approach for achieving goals set within the...

Words: 1442 - Pages: 6

Free Essay

Income Statement

...7. How do local area networks (LANs) differ from metropolitan area network (MAN)? A local area network (LAN) is a group of microcomputers located in the same general area. It covers a clearly defined small area, such as an office, home network ,one floor or work area, a single building, or a group of buildings. While a metropolitan area network (MAN) connects LANs and BNs located in different areas to each other and to WANs. MANs typically span between three and 30 miles. For example a large university may have a network so large that it may be classified as a MAN. The MAN network usually exist to provide connectivity to local ISPs, cable tv, or large corporations but will not extend beyond the boundaries of a town, city, or metropolitan area.Thus, a MAN lets two remote nodes communicate as if they were part of the same local area network. A MAN usually consists of a number of interconnected LANs and WANs. [Dennis, A. & Fitzgerald, J. (2009), p.31. Business data communication and networking. Wiley] Also LAN are usually connected by Ethernet cables,have high speed connections and relatively inexpensive while MAN are often interconnected wirelessly using microwave radio links or fiber-optics and provide moderately fast transmission rates but can prove costly to install (very expensive). 14. Explain how a message is transmitted from one computer to another using layers? In a network of computers each computer connected must have a unique IP address. IP: 1.2.3.4 ...

Words: 730 - Pages: 3

Premium Essay

Cmgt

...marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human Resources Team and Management team, for perspective departments. The company works primarily through a LAN/WAN set up, and work is performed primarily over the web. CPO must keep personal information safe, as they are trusted by each customer. CPO must also keep the information held within the facility and network safe, belonging to their employees. The Human Resource Team and Management...

Words: 1199 - Pages: 5

Premium Essay

Internet vs Tv Advertising

...AND TV ADVERTISEMENT IN BUILDING STRONG BRANDS" WHAT IS A BRAND? According to Rita Clifton, CEO of Interbrand Newell and Sorrell - a leading specialist brand consultancy firm - a brand is: "A mixture of tangible and intangible attributes, symbolized in a trademark, which, if properly managed, creates influence and generates value" This definition truly captures the essence of a brand, and highlights the importance of brand management. Branding is about creating 'value', both for customers, and for the company. This value stems from the products and services that companies create and bring to the market, but extends further to encompass added values derived from factors such as the brand-customer relationship, the brand's emotional benefits and its self-expressive benefits. Other common descriptions of a brand include - a 'relationship', a 'reputation', a 'set of expectations', and a 'promise'. It is a company's promise to consistently deliver a specific set of features, benefits, and services to customers. Brands are richly endowed entities. They start life as ideas, making their way into planning and strategy documents, yet ultimately reside as consumer perceptions. For some companies, brands are their most valuable asset. The space a brand occupies inside a customer's head can create a 'mental' patent, which grows out of the cumulative memory and the experiences customers have of products or services. As such, brand-building is about creating value...

Words: 2427 - Pages: 10

Premium Essay

Philips Case Summary

...end-user insights. Philips began its new journey with exploration. First, a vision team of four individuals was created with the goal of bringing inspirational ideas from the outside in. Second, they piloted a project for car headlights that combined the Dialogue Decision Process (DDP) and a design process based on socio-cultural insights. Third, Philips established the New Business Creation (NBC) group whose role was to challenge by asking simple questions and illicit “out of the box” development. Philips’ exploratory projects led to the inception of the “Think the Lighting Future” (TTLF) project by the end of 2001. Along with a list of intangible goals, the TTLF was tasked with clarifying alternative scope definitions, defining two to three NBC projects, and defining a knowledge sharing process. From the onset, TTLF benefited from having the full support of senior management and pulling together a diverse team from all Lighting business groups. The use of cross-functional multidisciplinary teams and having top management support from concept through launch is key in successfully developing new products (Bessant & Tidd, 2011, p. 378-379). TTLF facilitated communication and set the project up as an extended DDP around the innovation dimensions of People,...

Words: 851 - Pages: 4

Free Essay

Lego Group - Building Strategy

...toys. 1.2.2 Demographics In developed countries, aging population coupled with lowering birth rates are the primary driving forces for industry players going forward. I believe that this should provide implications on the future directions that LEGO should take. 1.2 External Environment – SWOT Analysis 1.3.3 Strengths and Opportunities The LEGO brand itself is entrenched deeply within the building toys industry. This strength is especially valuable to certain sub-industries under the broader toys industry such as infants’ toys and serious gaming. LEGO is also a trusted brand in education and with parents. LEGO can leverage on this strong brand name to perhaps explore opportunities in non-traditional markets such as the silver industry. LEGO, being an established brand that the older generations are familiar with, can expand into these industries. In addition, the trend towards more playtimes spent on computer games opens up the digital market for LEGO as well. The culture of innovation and LEGO’s unique product offering – providing building blocks for players to create and invent is a valuable and complex strength embedded in its organizational culture that can be used to reliably gain a foothold in the digital games market. 1.3.4 Weaknesses and Threats The consolidation of licenses under Disney, coupled with LEGO’s reliance on...

Words: 1550 - Pages: 7

Premium Essay

Project Management-Ccs Project Plan

...Introduction The company CCS Logistics recently completed a project at their Maydon Wharf Cold Storage (MWCS) branch. In this assignment I have commented on the fundamentals of the project The Company is a division of Commercial Cold storages which is a division of the Oceana Group of companies. The core business of Commercial Cold storage is the handling and storage of frozen goods. The company has a total of twelve branches across South Africa and Namibia making them the largest cold storage group in Africa. The MWCS branch however only handles seasonal fruit at chilled temperatures of 4.5dgrees and higher. The fruit being citrus which is seasonal between April to September .The branch has no other business for the”off-season”and hence stands vacant whilst the companies sister branch-Bayhead Cold Storage(BHCS) handles the frozen products throughout the year. The MWCS has a capacity of 5000 pallet spaces for citrus whilst the BHCS has capacity of 15 000 pallet spaces for frozen products. The BHCS store currently cannot meet the customer demands with the store reaching full capacity from end October till February every year. The company has no option but to turn clients away during this period. All this whilst the MWCS facility stands empty as it cannot accommodate the frozen products. The project involved converting the MWCS branch into a dual purpose facility to handle both the frozen products during their off season and to revert to handling of chilled products during...

Words: 7043 - Pages: 29

Premium Essay

Cmgt-400 Security Policy Importance

...Maintaining Information Security CMGT-400 Assurance and Security 5-25-2013 Maintaining Information Security Maintaining the security of information couldn’t have been said any clearer than by Lindsey Walker of InfoSec Island, when in 2010 she wrote an article about sensitive information becoming breached. She said “Preventing information security breaches needs to become a main priority for any company when handling both customer and company information”. Sharing information has become much easier than in previous years, from the widespread mainstream use of USB thumb drives or the constant urge to share some secret news or research on Twitter and other social media. The need for a company to constantly review and update their information security policy periodically has never been greater than now. Security Policy An Information security policy should be written in a way that defines how digital information should be protected and accessed by all company employees. Most information that is used to define the Information Security Policy can be gathered by first running a risk analysis report. These reports look at your business model and create a data structure that can be used to inform a company about where their greatest risks are within the company and around the entire work place. Certain “must-have” check boxes for items that should be included in an information security policy are Acceptable Use Policy, Wireless Policy, Email Policy, and Encryption Policy. These...

Words: 1928 - Pages: 8

Premium Essay

Your Personal Integrity

...align with your moral vision? How does your Wisdom Tradition influence your moral code? * MORAL FITNESS: What practices constitute your moral fitness regimen? How do you use these practices to cultivate personal character and integrity? How do these practices align with and reinforce your moral vision and code. How does your Wisdom Tradition influence your moral code? * DEFINING MOMENT: What moral challenge has been a key defining moment for you? How has this challenge tested, clarified, and defined your character and values. If you could, how would you rewrite the script for this event in your life? Why? How does your Wisdom Tradition influence your moral understanding of this challenge? YOUR FUTURE AS A BUSINESS LEADER: Drawing from the wisdom of your moral compass, how do you envision the role of human values in your future as a business leader? * SOCIAL CONSCIENCE: What challenges and opportunities do you envision for yourself in building a social network of shared values? * CONSCIENTIOUS LEADERSHIP: What challenges and opportunities do you envision for yourself in building business cultures of shared responsibility and accountability? * CONSCIENCIOUS COMMERCE: What challenges and opportunities do you envision for yourself in...

Words: 328 - Pages: 2

Premium Essay

Networking Summary

...Title: Developing a Strong Professional Network Author: Penn State Alumni Association https://www.mne.psu.edu/PSNES/Networking.pdf The article brings the concept of networking to our attention. Actually, it represents one of the most effective strategic tools aimed to enhance one’s career. The article is divided into four major parts. Indeed, it starts by defining the concept of networking. Then, it points out some major reasons making the networking a vital process for anybody’s career growth and personal benefit. Afterwards, it gives advice related to whom you should network with. Finally, it talks about how to expand one’s network and explore new opportunities. Actually, networking is nothing more than building mutual relationships with different persons, in order to share with them their career information and experience. Then, you should stay in touch with them in order to strengthen the connection. However, networking doesn’t mean a collection of business cards to be used for job solicitation, nor a referral process to HR managers. Rather, it consists of building new acquaintances allowing you to have an information exchange. In the second part of the article, some reasons preventing people from networking are explained. For instance, it mentions the previous prejudices which consider networking as a means of taking advantage of others. Moreover, people might think that networking makes them feel uncomfortable due to the difficulties they encounter when trying...

Words: 647 - Pages: 3

Free Essay

Engineer

...Secondary Data Center (220 Cabinets) and Disaster Recovery Site (88 Cabinets) * Preparation of the technical studies on the urbanization and the network cabling for the new data centers according to the ANSI/TIA-942 standard. * Design of the network architectures "Cloud Ready" and drafting of the technical specifications for the solution to be deployed, according to the reference model "Cisco Virtualized Multi-Tenant Data Center" (VMDC 2.2). * Data Center Interconnect design for virtualization needs, geoclustering and Disaster Recovery * Primary Data Center Network Infrastructure Project Manager (92 Cabinets) * Network cabling and urbanization design * Design and deployment of the network infrastructure following the business requirements in term of Colocation and Hosting and according to the Multi-Tenant consumption model. * Deployment of new technologies for the unified network and virtualization (FCoE VDC, VPC,VSAN…). * Procurement and following the infrastructure deployment of the computing, the storage environment and the virtualization solutions via VMware and Hyper V. * "Hosted Exchange" Project Manager * Validation of the HLD and the LLD and following the deployment and the test of the solution. * Definition and deployment of the solution for high availability, load balancing and network security as validated by Cisco and Microsoft. * Study of some Data Center Infrastructure Management solutions (DCIM), selection and deployment...

Words: 679 - Pages: 3