Free Essay

Implementation and Analysis of a Wide Area Network

In:

Submitted By adebayoi
Words 1948
Pages 8
IMPLEMENTATION AND ANALYSIS OF A
WIDE AREA NETWOK

(A FEASIBILITY REPORT)

BY
ISAIAH ADEBAYO
STUDENT’S NAME

WITH
3121658
STUDENT’S NUMBER
COMPUTER SYSTEMS AND NETWORKING ENGINEERING (CSN)-FULL TIME

SUBMITTED TO: DR VINCENT SIYAU (SUPERVISOR)

TABLE OF CONTENTS
CHAPTER ONE
1.0 AIM.............................................................................................................................Page 3
1.1 OBJECTIVES.............................................................................................................Page 3
1.2 INTRODUCTION......................................................................................................Page 4
1.3 EQUIPMENTS USED............................................................................................... Page 4
CHAPTER TWO
2.0 METHODS AND PROCEDURES............................................................................Page 5
2.1 PRESENT NETWORK OVERVIEW........................................................................Page 5
2.2 MAIN OFFICE NETWORK......................................................................................Page 7
2.3 SUBNET OFFICE NETWORK.................................................................................Page 7
2.4 BUSY NETWORK SCENARIO...............................................................................Page 7
CHAPTHER THREE
3.0 PROPOSED NETWORK SCENARIO......................................................................Page 9
3.1 TECHNICAL ANALYSIS.........................................................................................Page 9
3.2 DISCUSSIONS.........................................................................................................Page 13
3.3 ESTIMATED COST.................................................................................................Page 13
CHAPTHER FOUR
4.0 CONCLUSION.........................................................................................................Page 14
4.1 RECOMMENDATION.............................................................................................Page14

ABSTRACT
Optimal networks don’t just happen. They require proper planning and execution while considering a variety of factors. Some of these factors are highlighted in this report. Network congestion is a major challenge in growing organisations. Some of its underlying causes have been analysed as well.
There are various factors responsible for creating optimal networks. One of which is ensuring that there are multiple servers dedicated to each application on the network. In the fictional scenario described in this report page response time for services such on Database query, email, web and HTTP applications have been analysed.

1.0 AIM
To show how network performance is affected by background traffic in a Wide Area Network
1.1 OBJECTIVES
To Design a fictional WAN and show its implementation
To show network performance without background traffic
To show network performance with background traffic
To compare the existing average throughput and response time for Data Base Query, HTTP, Email and FTP
To draw conclusions based on the results generated
1.2 INTRODUCTION
The utilization of a network is usually dependent on the background traffic and the number of active users. This report seeks to investigate the effect of background traffic on a Wide Area Network with regard to network related protocols.
Analysing network protocols and services requires subjecting the target system to realistic Internet conditions. It is expected that competing background traffic will influence service and protocol behavior. It is the goal of this study to investigate and study the extent of such instances.

A device load is usually defined as a percentage of total capacity on a server, LAN or other nodes. The background utilization specifies the load as a percentage of the total utilization on that node. Usually a baseline load is a static throughput on a link, node or connection. One of the key elements is to generate the realistic background traffic to stimulate the load in network caused by various traffic sources. The consideration of background traffic gives more accurate features of the actual load in the network [1].

It has been observed that a number of research works have been done in different environments with statistically defined constant execution time of each individual service and CPU utilization of LAN devices. [1]

This study investigates the impact of background traffic on certain protocols in a wide area network using an OPNET simulator considering various scenarios.

1.3 EQUIPMENTS USED
The following materials were used in the simulation of this network. Cisco Layer three Routers 10 BaseT_LAN Ethernet 16_Switch 100 Base T Link cable PPP_DS1 Link cable PPP_DS 3Link cable Workstations or personal PCs Ethernet servers

2.0 PRESENT NETWORK SCENARIO
The Design of the present fictional network was done within a simulated scenario using OPNET IT Guru Academic Edition version 9.1.
2.1 NETWORK OVERVIEW
The present network under study consists of five subnets located in Dublin, Glasgow, Manchester, Birmingham and London respectively (as shown in Fig 2.1 below). Fig 2.1 An overview of the Network
The Application and Profile Configurations are placed into the grid and their attributes are configured and set up (as shown in the Fig 2.2 and Fig 2.3 below). Fig 2.2 Profile Configuration set up Fig 2.3 Application Configuration set up Each subnet apart from the London office is made up of 10BaseT_LAN connected to one Cisco 4500 layer three Router via a 10Base T cable. (as shown in Fig 2.4 below) Fig 2.4 illustrating the set up in each subnet
For the LAN in each office subnet, the number of workstations was set to 100, and the four rows for the applications supported profiles were each configured (as shown in Fig 2.5). Fig 2.5 LAN supported Profiles settings set up

2.2 MAIN OFFICE NEWTORK
Four Ethernet servers are placed in the London office which serves as the Headquarters of the fictional company. Each of these servers are connected to an Ethernet 16 switch and the switch connected to a Cisco 4500 Router using a 100Base T cable (as shown in Fig 2.6 below). Fig 2.6 London Office Network
Here the Data Base server also serves as the main server that supports all the other applications namely: Email, FTP and web applications. This is grossly inadequate and would cause poor network performance due to network congestion.

2.3 OFFICE SUBNET NETWORK
The PPP_DS1 link is used to connect between the neighbouring subnet offices in the base line scenario. But the PPS_DS1

3.0 PROPOSED NETWORK SCENARIO In proposing a new network there are a number of issues to consider. These include 1. Estimated growth of the network over a given period of time
Networks must be designed to accommodate growth in such a way that upgrades can be easily done within the shortest possible period. It is therefore necessary to project the expected network growth as this would affect how soon the present scenario becomes obsolete 2. Estimated network traffic load
It is also important to determine the network traffic before embarking on the design of any network. Heavy networks require very reliable and robust network infrastructure than networks with less traffic 3. Estimated cost of maintenance
Cost is an important factor to bear in mind while designing a network. Trade off between cost and performance is a variable every network designer must bear in mind
Bearing these factors in mind the major change is made in the main office where Four Ethernet servers are placed in the London office which serves as the Headquarters of the fictional company as against the existing scenario where one server is made to support all the applications under analysis. Each of these servers are connected to an Ethernet 16 switch and the switch connected to a Cisco 4500 Router using a 100Base T cable (as shown in Fig 2.6 below).

Fig 3:1 Proposed network overview
An upgrade of WAN links will be considered as well as in the new network. Due to economic considerations, the choice of prospective WAN links may be restricted to DS3/T3 (45 Mbps) or equivalent lines as against the DS1/T1 lines used in the present network.
For testing network performance of both scenarios simultaneously statistics have been ran. The Data base query, Email download, FTP download and HTTP page response times are the chosen statistics for this study.

3.1 RESULTS ANALYSIS
The results generated after simulation was run are shown below. The response time average for DB query, Email, FTP and HTTP is illustrated in the graphs below for the network with and without background traffic Fig 3.3 DB Query time average graph Fig 3.4 Email time average graph Fig 3.5 FTP time average graph Fig 3.5 HTTP time average graph
From the above graphs we see that there is significant difference in the response time for each of the investigated protocols. From this result it is observed that the there is a clear difference between the proposed network and the present network arrangement.
The page responses time in all applications are greatly minimized because of the fact that each server is dedicated to a particular application as against the previous network where all applications share the same server. This is not good enough. This shows that the present network needs to be upgraded for better performance
3.2 NETWORK UTILIZATION USING DS 1 LINK The graph and table below shows the point to point utilization of the network using DS 1 link.

Fig 3.6 Utilization graph of background traffic using DS 1 Link

Tab 3.1 Table showing average utilization from point to point
From the above graph and table it is observed that the network utilization is very high at about 96% on the average indicating that the network is overloaded. This would cause serious network congestion and delay. Hence the network performance needs to be improved.
3.3 NETWORK UTILIZATION USING DS 3 LINK
To achieve a better network performance I have created a third scenario from the busy network but changed the DS1 link between the subnets to DS 3 link. The graph and table below shows point to point utilization under this scenario

Fig 3.7 utilization graph of background traffic using DS 3 Link

Tab 3.2 Table showing utilization from point to point
From the set of graphs obtained from results generated while analysing the response times for the busy network using DS 1 Link and DS 3 Link interchangeably, a drastic drop in the average utilization of the subnets within the network was observed. The utilization dropped from an average of 96% to below 2% after the DS1 Link was changed.
The results generated from the scenarios above show that the DS1 link performs poorly across all traffic service types once there is background traffic. However, with the DS3 Link, there is very high possibility for network optimization. The DS1 WAN link has a data rate of 1.544Mbps which is far less than that of the DS 3 WAN link which has a date rate of 44.736 Mbps.

Although the DS3 links are far more expensive than the DS1 lines, they are very suitable in building networks with very heavy traffic. However there needs to be a trade off between cost and network performance. The priority of the client would determine which factor is considered above the other.

Disaster Recovery Services Pricing | Service | 3 Year Total Cost | 5 Year Total Cost | Project Management and Implementation Consultation, IBM–P-Series, VMware Servers (5 servers), Windows Servers (158 servers), Testing (10 days year1, 5 days subsequent years, Comms Services – 2 x dedicated 10Mb, Comms Services – Internet ATOT/ATOD up to 10Mb, Security Services, Core Infrastructure Services, Work Area positions for technicians | £126,017 | £297,031 |
Fig 3.8 Costing example for the proposed network
The table above shows a quotation for WAN implementation given by by Sunguard.

4.0 CONCLUSION
The experimental results demonstrated that the channel bandwidth utilization has much effect on the Quality of Service of background traffic. In addition, heavy background traffic highly affects the Quality of Service due to the network congestion caused by very high throughputs and network delays.

4.1 RECOMMENDATION
For optimal network performance and high quality of service it is important that the network administrator has a proper understanding of the underlying factors that affect the network performance. From the report we can deduce that when the background load is too much for the available bandwidth the network utilization becomes very high which invariably slows down the network speed and performance.

REFERENCES
[1] Sang-Soo Yeo et al. (2012) “Computer Science and its Applications”
-------------------------------------------------
Top of Form |
Bottom of Form “IT Guru Academic Edition 9.1”, OPNET Technologies Inc. http://www.opnet.com/university_program/teaching_with_opnet/textbooks_and_materials/index.html Ya Bao “IP Based Communication Networks” Lab Report Manual, LSBU

Similar Documents

Premium Essay

Contract Management Course Project 3

...resume, technical capabilities and pricing information. Copyright © 1998 by Ann Poe Future Tek, Inc. has been in the Information Technology for a total of 11 years. During those years we’ve dealt mainly with the integration of new information technology systems into Financial based institutions. We are looking to not only expand our services to other industries outside of banking. After reviewing the bid solicitation information provided, we believe that we will make a good candidate for this opportunity. If awarded this contract, Future Tek, Inc.’s is able to provide all information technology related services that are needed for this project. These include but are not limited to Computer Systems Security Analysis, Computer Systems Analysis, Desktop Support, Help Desk Support, IT Operations...

Words: 2807 - Pages: 12

Premium Essay

Bs It Capstone

... Capstone Project Name: | Managed Service Provider Migration | Student Name: | xxxxxxx | Degree Program: | Bachelor of Science IT, Network Emphasis | Student Mentor Name: | xxxxxxxx | Table of Contents Capstone Introduction 1 Review of Other Work 3 Project Rationale 8 Systems Analysis and Methodology 10 Goals and Objectives 14 Project Deliverables 16 Project Plan and Timelines 21 Project Development 22 Accomplishments 26 Conclusion 26 References 28 Appendix: 29 Capstone Introduction With the rising costs of running a business and the goals to increase profits, organizations are constantly looking at ways to reduce operating expenses. In the technology realm of an organization, reduction of costs can be achieved by streamlining processes and automation. Another option that can be explored within organizations to reduce costs is the outsourcing of their technology departments to a manage service provider. Organizations are looking into options to utilize technology to reduce costs by migrating their technology to a 3rd party to managed their infrastructure. Concordia is mid-sized bank based out of California that has a wide area network consisting of 125 branch offices spread out through California and the surrounding states. Concordia has implemented a project to get out of the information technology area so that they can focus on their core principles of the banking industry. Concordia preferred to leave the technical part of their infrastructure...

Words: 8397 - Pages: 34

Premium Essay

School Netwok

...SECTION 1 - WIDE AREA NETWORK The Washington School District Wide Area Network (WAN) will connect all school and administrative offices with the district office for the purpose of delivering data. The WAN will be based on a two-layer hierarchical model. Three (3) regional Hubs will be established at the District Office/Data Center, Service Center and Shaw Butte Elementary School for the purpose of forming a fast WAN core network. School locations will be connected into the WAN core Hub locations based on proximity to the Hub. TCP/IP and Novell IPX will be the only networking protocols that will be acceptable to traverse the district WAN. All other protocols will be filtered at the individual school sites using access routers. High-end, powerful routers will also be installed at each WAN core location. Access to the Internet or any other outside network connections will be provided through the District Office/Data Center through a Frame Relay WAN link. For security purposes, no other connections will be permitted. SECTION 2 - LOCAL AREA NETWORK & WIRING SCHEME Two Local Area Network (LAN) segments will be implemented in each school and the District Office. The transport speeds will be Ethernet 10BASE-T, 100BASE-TX, and 100BASE-FX. Horizontal cabling shall be Category 5 Unshielded Twisted Pair (CAT5 UTP) and will have the capacity (be tested) to accommodate 100 Mbps. Vertical (Backbone) cabling shall be CAT5 UTP or fiber optic multi-mode cable. The cabling infrastructure...

Words: 1723 - Pages: 7

Premium Essay

Final Paper

...Riordan INDP Wide area network , Antivirus software , Firewall (computing) By trizey Oct 13, 2014 3651 Words 43 Views PAGE 14 OF 15 Running Head: INTEGRATIVE NETWORK DESIGN PROJECT 1 15 INTEGRATIVE NETWORK DESIGN PROJECT Integrative Network Design Project: Riordan Manufacturing May 26, 2014 Abstract Riordan Manufacturing is a plastic manufacturer providing services globally. Our product services include plastic beverage bottles, plastic fan components and custom plastic developments. The company consists of 3 production plants: Pontiac, Michigan, Albany, Georgia, and Hangzhou, China. Corporate headquarters and the research and development department are located in San Jose, California. Riordan is currently expanding and growing capabilities, to include upgrades in telecommunication systems for faster information travel amongst the 4 locations. Specifically, our location in Hangzhou, China is in dire need of upgrades. We've decided to relocate the entire Hangzhou location to a new facility in Shanghai, China. There are many factors and recommendations to consider as well as a chance to take advantage of implementing newer technology. The following project plan will outline the steps necessary to accommodate the telecommunication system transfer. Integrative Network Design Project Project plan The Information Technology Department has been tasked to plan, prepare and execute an entire network breakdown from Riordan Manufacturing's Hangzhou, China...

Words: 3887 - Pages: 16

Premium Essay

Notes for Management Information System

...Current Sales: $147,000 Units = 147 Data Processing Data Processing $35,000 12 Units $12,000 J. Jones Western Region $100,000 100 Units 35 Units $35,000 12 Units $12,000 J. Jones Western Region $100,000 100 Units 35 Units 2. Management information systems: Def 1: Information system at the management level of an organization that serves the functions of planning, controlling, and decision making by providing routine summary and exception reports. Def 2: MIS provide information in the form of pre-specified reports and displays to support business decision making. Examples: sales analysis, production performance and cost trend reporting systems. Objectives: * Routine information for routine decisions * Operational efficiency * Use transaction data as main input * Databases integrate MIS in different functional areas. 3. Describe three levels of information in managerial level Management Support Systems provide information and support needed for effective decision making by managers Major categories are: i) Management Information System ii) Decision Support Systems iii) Executive Information System 4. What are the various trends in the evolution of the MIS concept? * MIS: Many companies are now using their computers to provide information for decision making; that is, they are using a management information...

Words: 4587 - Pages: 19

Premium Essay

Application of Mis on Statistical Analysis

...investigate existing literature about hardware and software solutions to problems. 5. Know the components and functions of computer systems, both hardware and software. 6. Become familiar with the advances in networking, data communications and the Internet and how they affect the way business is conducted. 7. Identify which information technology tools are used to solve various business problems. 8. Develop proficiency solving business problems using modern productivity tools (e.g., spreadsheet, database) or creating custom programs.   MIS 301: Statistical Analysis for Business At the end of this course students should be able to: 1. Use data from a sample to make inferences about a population. 2. Apply probability theory in decision making situations. 3. Formulate hypotheses for decision making and research. 4. Analyze data using appropriate statistical techniques. 5. Interpret the results of statistical analysis. 6. Present statistical results using graphics, text, and the spoken word. MIS 302: Introduction to Operations Management At the end of this course students should be able to: 1. Define the role of operations and supply chain in an organization and its interactions with business functions such as accounting, finance, and marketing. 2. Develop the basic business and operations strategies...

Words: 3623 - Pages: 15

Premium Essay

Bsa375

...Manufacturing SR-rm-004 Riordan Manufacturing Human Resources Information System By: Adrian O. University of Phoenix February 22, 2010 Abstract To identify, analyze and propose Riordan Manufacturing Human Resources (HR) Systems. In order for Riordan Manufacturing to be competitive in today’s market, it is necessary for the system to be updated. Utilizing a system development life-cycle (SDLC) methodology to analyze and create a project plan to update Riordan’s HR system. Following SDLCs structure and its categorizations, the five phases will be covered in this paper and they are the following: project planning, analysis, design, implementation, and support (Burd, et al, 2004). In addition, this paper will also tackle the different types of information gathering that is best for the success of the project. According to Burd, S.D, et al (Systems Analysis and Design in a Changing World, 2004), there are several methods of information gathering and most widely used, and they are the following: Review existing reports, forms, and procedure descriptions; Conduct interviews and discussions with users; Observe and document business processes; Build prototypes; Distribute and collect questionnaires; Conduct joint application development (JAD) sessions; Research vendor solutions. Company Background Founded by a professor of Chemistry in the year 1991, Dr. Riordan’s company initially a research and development and licensing of its existing patents, obtained a venture capital in...

Words: 3386 - Pages: 14

Premium Essay

Network Security

...this exploitation, companies subject themselves to lawsuits from their own customers. These companies often are ignorant of the simple fact that they have been exploited until customers report the issues to these companies and corporations. Many times, more than thirty days goes by before someone alerts the company of a possible security breech. Cost of an electronic exploit can be greater than a million dollars per incident as reported by the FBI. This information is found in the FBI’s (Federal Bureau of Investigation) report of cyber threats in the United States. In order to help counterbalance this, smaller to midsized companies could spend less than $5,000 to harden their systems and operating systems to put a statefull firewall in place. As stated in this paper, these companies often lack the resources, materials and funds to do so. With the FBI report showing reported incidents, there are thousands of incidents that go unreported. Often these incidents are yet to be discovered. With this number of small to mid-size corporations ignoring or slowly implementing security measures, more and more electronic computer crimes are beginning to take place throughout the U.S. With extortion now moving into the digital age, many corporations do not report intrusions to law enforcement in order to avoid negative publicity. Reports of an intrusion could directly have a negative effect on the company’s sales and position in a global competitive market. Approximately 35% of...

Words: 2166 - Pages: 9

Premium Essay

Patton-Fuller

...Hospital is the first hospital, dedicated at the hospital is to provide a variety of programs that will support and maintain the best health and welfare of the local community populations” (University of Phoenix, 2012). Duvv Enterprises is the IT solution for WAN/WLAN integration needs. For Patton-Fuller Community Hospital, we will address the existing network architecture of the hospital: Patton-Fuller utilizes a “high-end Local Area Network (LAN) (based on 1000Base-T using CAT 6 cable) that links all of its Systems Applications and Products (SAP) and terminals to workstations over a small geographic area. Duvv Enterprises will also touch basis with the implementation of a complete WLAN networking environment that calls also for the installation of Voice-Over-Internet-Protocol (VOIP), and the design of a high-speed Wide Area Network (WAN) that will enable Packet Filters (PF), or firewalls to connects three other hospitals with Patton-Fuller. Lastly, Duvv Enterprises will implement the following three processes: the first process will identify the hardware and software needed to secure Patton-Fuller’s choice of networks against all electronic threats. The second process will distinguish...

Words: 2183 - Pages: 9

Free Essay

It 242 Week 4 Vlan

...VLAN Student Name IT 242 January 30, 2011 VLAN Virtual Local Area Network (VLAN) is one of the latest network technologies that has been created in the past several years. The technology for VLAN is growing rapidly as well as the costs of the equipment used to implement the secure network that is often considered expensive. Virtual Local Area Networks were born out of the need for a cost effective network that did not compromise the need for high security and performance so the VLAN met all the requirements for the special network (Regan, 2004). The VLAN offers a great deal of functionality for any network as it was created to separated the network into separate broadcast while still allowing each network to still function in the different locations. An example of this process is if a business has different departments such as Operations, Sales, and Human Resources. The VLANs are implements specifically for each department making it an individual network within the business. When implementing a VLAN, it is important to know that to create the VLAN there is a need for layer 2 switch. One common misconception regarding VLANs is that there is a need to install separate software in order to implement the VLAN within the network. The fact is VLANs need special hardware that is built into the switch, which implements a separate network of the main network. Depending on what the network’s security policies and infrastructure, VLANs assignment can be implemented using one...

Words: 688 - Pages: 3

Free Essay

Senior Information Scientist

...CURRICULUM VITAE BIO DATA SURNAME: TUHAME OTHER NAME: CYRIL SEX: MALE DATE OF BIRTH: 13th JUNE, 1975 NATIONALITY: UGANDAN CONTACT ADDRESS: P.O BOX 1 MBARARA TEL: 0772-669383/0701-036245 E-MAIL: cyriltuhame@gmail.com PERSONAL PROFILE ✓ A well-organized and highly self-motivated person with an affinity for teamwork. With due respect to learning from any one, sharing my discoveries with others and able to work with minimum supervision. ✓ Enjoy learning from others as well sharing my knowledge with others. ✓ God fearing. EDUCATIONAL BACKGROUND: i am Currently a student of Eastern and southern africa management institute (ESAMI)undertaking an Executive MBA programme YEAR SCHOOL/ INSTITUTION AWARD 2003 – 2006 Makerere University Bachelor of Science in Computer Science Degree 2003 – 2006 Makerere University Cisco Certified Networking Academy (CCNA1 – CCNA4) 1997 – 1999 Makerere University Business School Uganda Diploma in Business Studies (UDBS) 1995 – 1997 Old Kampala Senior Secondary School Uganda Advanced Certificate Of Education (UACE) 1991 - 1994 Nyakishojwa Senior Secondary School Uganda Certificate Of Education (UCE) 1984 - 1990 Nyakishojwa Primary School Primary Leaving Examinations (PLE) COMPUTER SKILLS: • Website...

Words: 759 - Pages: 4

Premium Essay

It190

...IT190-02 Key Assignment Tarris Walls CTUO IT190-2 Introduction to IT Professor Vandercreek June 22, 2015 Table of Contents Section 1: Information Systems Overview 3 Section 2: Information Systems Concepts 6 Section 3: Business Information Systems 9 Section 4: System Development 12 Section 5: Information Systems and Society 13 References 14 Section 1: Information Systems Overview The organization I would like to use in this project, is my own organization. Currently my organization is a tier 2 wireless service provide, serving the Mississippi, Memphis, and Sun Coast’s markets. Along with wireless voice and data services, my organization also provides fiber to home services, which include data, voice, and video services and business class services throughout the markets in operates in. In addition to the above services, my organization also just completed construction on the regions first Tier3 Plus data center, opening its portfolio up to a number of hosted solutions. A service provider like the organization I work for has to take a unique approach in the selection of its information systems (IS). Because my organizations operations span from customer facing store fronts, to large data center operations, the selection of a single information processing solution is almost impossible. We utilize many different information processing solutions often tied into each other, and dependent on each other to accomplish my organizations goals. We currently...

Words: 3232 - Pages: 13

Free Essay

The United Energy Smart Meter Project

...The United Energy Smart Meter Project At the request of the Victorian Government United Energy is currently engaging in “best efforts” to replace the analogue meters on its network with smart meters. Smart meters are an advanced energy meter that measures the energy consumption of a consumer (Depuru, Wang and Devabhaktuni 2011), they allow for demand response energy distribution based on on-peak and off-peak consumption. The benefits of Smart meters are well recognised by many counties with world-wide deployment of digital meters expected to reach 212 million units by 2014, perceived benefits include; energy efficiency, environmental benefits, more consumer choice, better services and greater market competition. (Gerwen, Jaarsma & Wilhite R 2009, Filippini, Hrovatin & Zoric 2004, Victorian Auditor General 2009) About United Energy United Energy is an energy distributor responsible for the infrastructure required to distribute energy from the power station to the consumer. There are currently 16 major distribution networks in Australia with each energy distributor maintaining a monopoly over its designated area. (AEC 2009) Energy distributors own, operate and maintain the network of infrastructure that transports electricity from the generator to the consumer. They do not work directly with the consumer and instead work with energy retailers who are responsible for managing the relationship with the consumer. Energy retailers will bulk purchase energy from an energy...

Words: 3368 - Pages: 14

Free Essay

Network Proposal

...Table of Contents SECTION I: CONSULTANT …………………………..............................................2-5 SECTION II: OUR UNDERSTANDING OF ABC REQUIREMENTS…………….5 SECTION III: OUR PROPOSAL……………………………………………………..6-16 SECTION IV: PROJECT RESOURCE……………………………………………..….17-18 Reference………………………………………………………………………………… I.0. Introduction BLM COMMUNICATIONS Your Ref… Our Ref: ABC/14/9 26 September 2014 Information Technology/ Systems Engineer ABC, Department of ICT Address: Dear Sir/Madam, RE: PROPOSAL FOR NETWORKING AND CYBER-PHYSICAL SYTEMS SAFETY Proposal on enterprise-wide solution for networking topology, network devices, IP infrastructure, and network security innovative safety procedures and measures for implementation to provide safer environments for networking and electronic document management software. We look forward for your favorable consideration. Sincerely, Name, LEAD CONSULTANT 1. Business Questionnaire |Company Registration No. 490998 | |PIN Number P051564540Q | |VAT Number 0497534P ...

Words: 2114 - Pages: 9

Premium Essay

Information Systems Study for Bandon Group Inc

...Student's Name: Xianwei Meng Date: 26/8/2011 Module title: Enterprise Resource Planning Words: 5023 Information Systems Study For Bandon Group Inc. 1. Introductions Bandon Group is a family owned distributor of office equipment. It is famous for its good customer service, technical support, and innovative products, and excellent in providing products with quality and services at cost-effective price. The Group now has four divisions, and they decentralize to meet the different needs of their local markets. Corporate headquarters handles the central administrations and information systems support. The primary objective of Bandon Group is to generate 10% profit for the reinvestment. They hope to establish excellent sales organization and professional service organization. To achieve these goals, Bandon Group has taken many measures. As to the information systems, they have administrative information systems, most of which are generic, and in which the meter click billing software unique for industries. However, the legacy system can not satisfy its growth and expansion now. Their director of information technology has searched for commercial off-the shelf package to support the administrative information system, and selected OMD. The OMD system supports meter-based billing, and has Web-based interface. However, it is not built with relational database, which makes the ad hoc difficult. Sales tools of Bandon Group such as sales prospecting still...

Words: 5108 - Pages: 21