Premium Essay

Network Diagram Example

In:

Submitted By taddo
Words 275
Pages 2
The attached sample is a basic network for a small office. This network will allow access to the internet and the server could house an intranet or extranet. A cable internet connection will allow for high speed internet access. In addition to the basic network, wireless LANs could be added and a mobile Wi-Fi network. An internet service provider will allow access for Wireless LANs and the Mobile Wi-Fi.

Workstations/PC Wired LANs : office computers connected to one another and other devices within a 500 meter radius. They can be computers connected in the same building or buildings close by. Workstations may be specialized for graphic design, 3-D design or CAD. As the company grows they could add WANs to reach further distances.

Server: Determines who gets what. It stores data, serves up web pages controls the operating system. An example of server software would be Microsoft Windows. It could also serve applications for users on an intranet. For example a company website for employees or portal that houses company information and resources.

Switch : Are similar to hubs connecting network components but they can filter more data to a specified location.

Router: Helps to communicate with the internet making sure data gets to the correct address.

Firewall: Prevents unauthorized users from accessing personal networks. It makes sure users have authorized access to use the network.

Internet: Communication system linking millions of people and networks from all over the world. An ISP will allow for permanent connection to the internet.

References
Laudon, K., & Laudon, J. (2014). Essentials of management information systems: Managing the digital firm (13th ed.). Upper Saddle River, NJ: Prentice

Similar Documents

Free Essay

Quality Managemet

...them. 1. Affinity Diagram * An affinity diagram is a brainstorming tool. It functions by drawing connections between a variety of ideas and information. By illustrating theses connections it is possible to understand how they are related. Organizing Ideas Into Common Themes 2. In most projects, brainstorming is a common tool used to gather issues. As a mechanism for allowing a group of individuals to get ideas and issues on the table brainstorming is hard to beat – however all too often such sessions generate large quantities of issues and these can become complex toreview and difficult to interpret – it can also be challenging to highlight particular trends that the gathered issues may portray, finally following thebrainstorming session, themes and thoughts may be forgotten. 3. There are however a variety of methods available to analyze and group the outputs of such team meetings, in order that gathered ideas can be efficiently utilized. Of these methods, Affinity diagrams represents an excellent tool to both group ideas in a logical way and capture themes that have developed during the brainstorming. 4. Created in the 1960’s by Jiro Kawakita, Affinity diagrams allows large numbers of ideas to be sorted into groups for review and analysis. These, simple to produce, diagrams are particularly useful with large group where ideas which are generated at a fast pace require to be organized. 5. The process for producing the Affinity diagram...

Words: 2258 - Pages: 10

Free Essay

Netw410 Week 1 Lab

...installed on my computer so I used the desktop application. Question 3 (3 points) What version of Visio did you use for this lab? As previously stated I have Visio installed on my computer, it’s Visio Professional 2013. Question 4 (3 points) What file extension does your version of Visio use? Does Visio support other extensions? My version of Visio saves in .vsdx file format. Question 5 (6 points: 3 points for each screenshot and comment) Use this website (http://www.ratemynetworkdiagram.com/index.php?z=1) to find a diagram that you think has good points. Paste a screen shot of the diagram in your lab report and explain why you think it is good. (3 points) You must include a detailed explanation to get credit for this portion of the question. Professor, the link you provided in this lab is not working so I went and found a diagram on my own from http://creately.com/diagram/example/g6lp80gw1/Basic+Network+Diagram. I chose this diagram as a good example despite that it’s very basic because...

Words: 826 - Pages: 4

Premium Essay

Proj586 Ev

...Here is a worked example and process for constructing a network diagram: Using this example: Activity Duration (days) Predecessor(s) A 5 --- B 2 --- C 4 A D 6 B E 3 C, D F 1 D Follow this sequence: 1. Construct the Network diagram. 2. Check the network diagram. 3. Add durations to the activities. 4. Identify all paths through the network. 5. Identify the critical path (CP) and scheduled duration. 6. Calculate slack times (float) for each activity. 1. Construct the Network diagram. Using the AIB method: Draw a box on the left labeled "Start" Add boxes to the right of this box for activities with no predecessors, in the example A, and B. Connect these boxes to the box labeled start, but not to each other! I always start with box A at the top, and others in sequence underneath, vertically. Add arrows to the end of the lines where they connect to the activity (A and B) boxes. (This is important for step 4). Draw a box to the right of activity A for any activities which list A as a predecessor. (C in our example). Connect this box to activity A, don't forget the arrow! Draw a box to the right of activity B for any activities which list B as a predecessor. (D in our example). Connect this box to activity B, don't...

Words: 1106 - Pages: 5

Premium Essay

Miss

...Brandon C. Foltz, M.Ed. 6/26/2012 OPERATIONS MANAGEMENT NETWORK DIAGRAMS: CRITICAL PATH ANALYSIS USING FORWARD AND BACKWARD PASSES B r a n d o n C . Fo l t z , M . E d . B r a n d o n C . Fo l t z , M . E d . education / training & development / business / tech / math / opinion http://bcfoltz.com/blog Twitter: @BCFoltz YouTube: BCFoltz education / training & development / business / tech / math / opinion http://bcfoltz.com/blog Twitter: @BCFoltz YouTube: BCFoltz MILWAUKEE PAPER EXAMPLE MILWAUKEE PAPER NETWORK WITH TIME Installing a complex air filtration system in a paper manufacturing plant Activity Description Immediate Predecessor(s) Time to Complete (weeks) A Build internal components ─ 2 B Modify roof and floor ─ 3 C Construct collection stack A 2 D Pour concrete and install frame A,B 4 E Build high-temperature burner C 4 F Install pollution control system C 3 G Install air pollution device D,E 5 H Inspect and test F,G 2 TOTAL TIME 25 http://bcfoltz.com/blog 1 Brandon C. Foltz, M.Ed. 6/26/2012 CRITICAL PATH ANALYSIS CRITICAL PATH NODES When can we expect our project to be done? Which (if any) activities can be delayed without delaying the overall project?  To conduct CPA, we need to find two starting times and two ending times for each activity     Earliest Start (ES) - earliest start time given predecessor activities Earliest Finish (EF) - earliest possible completion time Latest Start (LS) – latest start time...

Words: 564 - Pages: 3

Premium Essay

Business Case

...Business Case THE A-TEAM IIS Network & Communications Infrastructure Plan March 30, 2015 NETW 490 – Senior Project Prof. Nabeel Baig The A-Team Members: Michael Watson Jose Gutierrez Jr. Cory Brown Dean Bennett March 30, 2015 NETW 490 – Senior Project Prof. Nabeel Baig The A-Team Members: Michael Watson Jose Gutierrez Jr. Cory Brown Dean Bennett | Table of Contents | | | Executive Summary 2 Project Overview 3 1.1 Project Overview 3 1.2 Project Description 3 1.3 Alternatives Considered 3 1.4 Recommended Solution 3 1.5 Risks 3 Project Description 4 2.1 Project Background and Opportunity 4 2.2 Business Needs 4 2.3 Project Objectives 4 2.4 Organizational Benefits 15 2.5 Project Scope 5 2.6 Out of Scope 5 Alternatives and Cost/Benefit Analysis 6 3.1 [Possible Solution 1] 7 3.2 [Possible Solution 2] 7 3.3 [Possible Solution 3] 7 3.4 Comparison 7 3.5 Recommended Alternative 7 Project Risk Assessment 8 REFERENCES 9 Executive Summary | | IIS Network & Communications Infrastructure Design Plan IIS prides itself as an industry leader with product lines such as the revolutionary “” Thinking Navigator, which is a first of its kind to integrate GIS and real-time satellite imagery data with proprietary software algorithms. IIS is currently comprised of two division; Consumer and Military Defense Divisions with Corporate headquarters in Dallas and branch offices in Fairfax, Shanghai and London. The Military...

Words: 4121 - Pages: 17

Free Essay

Sample Exam

...SAMPLE EXAMINATION The purpose of the following sample examination is to provide an example of what is provided on exam day by ASQ, complete with the same instructions that are provided on exam day. The test questions that appear in this sample examination are retired from the CSSBB pool and have appeared in past CSSBB examinations. Since they are now available to the public, they will NOT appear in future SSBB examinations. This sample examination WILL NOT be allowed into the exam room. Appendix A contains the answers to the sample test questions. ASQ will not provide scoring and analysis for this sample examination. Remember: These test questions will not appear on future examinations so your performance on this sample examination may not reflect how you perform on the formal examination. A self-appraisal of how well you know the content for the specific areas of the body of knowledge (BOK) can be completed by using the worksheet in Appendix B. On page 2 of the instructions, it states “There are 150 questions on this 4-hour examination.” Please note that this sample exam only contains 75 questions. If you have any questions regarding this sample examination, please email cert@asq.org © 2009 ASQ ASQ grants permission for individuals to use this sample examination as a means to prepare for the formal examination. This examination may be printed, reproduced and used for non-commercial, personal or educational purposes only, provided that (i) the examination is not modified...

Words: 4541 - Pages: 19

Premium Essay

Issc342

...Running head: Cyber Security Securing Networks Wagner, Juan ISSC342 ABSTRACT As our dependency on technology grows so does the need to protect the data contained in them. We live in a world where digital imaginary data has become just as important if not more than actual physical work these machines perform. One of the biggest jobs for any respectable firm is the ability to protect its information from the unrelenting attacks by hackers, insiders, social engineers and software exploits. this is an on going struggle that will never end. The reality is there is no way to fully and completely protect a network. The second best thing we can do as IT professionals is ensure protocols that have resulted in having a more secure network are being met. Since most of the errors in the world are human errors we must take extra consideration when securing a network. Computers don't make mistakes only people make mistakes. Finally as professionals we must do our job in researching new exploits, tools and reasons why someone would want to perform a cyber attack on said company. INTRODUCTION In the IT world knowledge is power, and there is much to be learned if a corporation is to be able to perform at an AAA level. There are many things that can go wrong in regards to intellectual property. Some of those things are certificates, classification of data, and how computing devices are used. In conjunction with the material professionals also should be actively researching...

Words: 1917 - Pages: 8

Free Essay

System Fail

...important to a customer and designer of said system. Failures in a system can create catastrophic events that are costly in both monetary and emotional aspects. Faults within a system can be different in nature and can continue to wreak havoc on the system or to do nothing in some cases. Failures in distributed and centralized system can be specific in nature; however a generalized topic can describe the majority of these failures across the system. There are four types of failures in distributed systems that can affect functionality; but two of these four specific failures that can affect centralized systems as well. The general failures include: halting type failures, byzantine style failures, omission failures, and failures related to network issues. While all of these are important some of them affect a system more violently than others. The first types of failures to discuss are halting failures. These types of failures can be frustrating in nature since they affect most of the system and do not allow the operator to really investigate without rebooting the entire system. These failures essentially freeze the system without allowing any action to alleviate the issue. There can be many reasons for a halting failure such as hardware or software malfunctions, memory problems, or even viruses. Many of these problems can be solved by updating your system, acquiring memory that can create room to do some of the system work, or installing antivirus or spyware software that can...

Words: 850 - Pages: 4

Free Essay

The Utilization of Semantic Network Strategy in Reading Comprehension and Vocabulary Enhancement

...Chapter I THE PROBLEM AND ITS BACKGROUND Introduction Sentences cannot be form without using the phrases, and you cannot see phrases without involving different vocabulary word and for you to know older students must be skilled at reading to learn; but it is also true that they never finished learning to read. Do students really understand what they are reading? Do they retain the words in the given reading material? Learning and discovering come up with reading and understanding, and understanding goes with identifying and familiarizing the meaning of each word in a produced sensible context. Based on the statistics, the literacy rate in the Philippines as of 2005 has risen from 72% to 90% in the last 30 years. The 2005 Functional Literacy, Education, and Mass Media Survey conducted by the National Statistics Office (NSO) resulted 48.4 million or 84% of the estimated 57.6 million Filipinos who are 10 to 64 years old are said to be "functionally" literate (TODAY newspaper, 2005). It was defined by the NSO that functionally literate means a high level of literacy which includes reading, writing, numerical and comprehension skills. While on the other hand, the 2009 National Achievement Tests (NAT) results revealed a rise in Mean Percentage Score (MPS) of only 66.33% from 54.66% in 2006, which equates to an improvement of 11.67% (Philippine Daily Inquirer, 2010). In addition to that, the Department of Education reported that almost two-thirds of the country’s high schools...

Words: 1177 - Pages: 5

Free Essay

Networking

...Case: You are appointed as a technical expert to implement a network system for a small size maritime supplyrepresentative company with four users. The company provides supply services to Maritime shipping companies through a worldwide network of suppliers. Its owner is a maritime business expert who doesnot know much about the use of computer systems to support her business. Therefore, she has decidedto employ you as a consultant on a short term basis to set-up appropriate systems in a network. She hasheard about various technologies and the efficiency achieved by computer systems and would welcomeadvice on the acquisition of hardware, software and network items to augment her existing systems inorder to meet the company’s growing needs. The company has a budget of £100,000 for this project. The company currently consists of the following departments (all located in the same open space office): The sales Manager who is responsible for dealing with Maritime companies. She is assisted by asales assistant, equipped with a laptop but with no ability to access the web. This department iscurrently the only one with a connection to the Internet and with access to the company’s commonemail.  The General Manager who is responsible for the general operation of the company. She tradeswith suppliers all over the world in order to ensure the best prices of goods for the company’sMaritime shipping clients. For client communication, she uses plain telephone services and a faxmachine....

Words: 545 - Pages: 3

Premium Essay

How Does Information System Work

...How Does Information Systems Support Business Processes CIS/207 May 1, 2012 How Does Information Systems Support Business Processes Information systems is a integrated set of components for collecting, storing and processing data ad for delivering information, knowledge, and digital products. Businesses reley on information systems to carry out and manage their operations, interact with their customers and suppliers, and compete in the marketplace (Zwass, 2012). Most business organizations are becoming more and more dependent on information systems to manage and maintain their internal organization infracstructures. It is necessity to maintain up-to-date, complete and accurate information to stay competitive in the changing world. Organizations utilize many types of information systems to assist in their daily operations. Some typical functional systems within an organization are human resources, accounting and finance, sales and marketing, operations, and manufacturing. Within these functions information systems play a various roles, such as in human resources, information system duties may include recruiting and training while in operations some duties may include order management and customer service. In other words business processesses are the ways in which organizations perform different tasks. Therefore it is very important to analyze business processes in order to determine how the information system can support that process. ...

Words: 895 - Pages: 4

Free Essay

The Objective of This Project Is to Develop a Research Paper on an Area of Emerging Technology

...The objective of this project is to develop a research paper on an area of emerging technology Click Link Below To Buy: http://hwcampus.com/shop/objective-project-develop/ The objective of this project is to develop a research paper on an area of emerging technology. Approach the project as if you were recommending technology implementation initiatives to your corporation's technology planning committee. The analysis will have two sections. First, examine the view that suggests that the technology you choose is a good emerging technology. Then, discuss the implications for stakeholders (implications for the corporation, such as cost/benefit analysis); integration considerations; the impact on the company's employees; and operational concerns (i.e., increased productivity/efficiency, short-term challenges versus long-term benefits) for management, technical staff, nontechnical staff, the company's customers and clients, and other business partners of your selected corporation. Second, contrast and compare the benefits of the emerging technology you chose with past successful or unsuccessful telecommunications technologies you have in place. To what extent should the corporation change its technology foundation? Include current information on how the technology works. If you believe this is the best choice for the corporation, provide your rationale. Please examine and discuss each element of this objective. The analysis (your final paper) will have at least six sections...

Words: 775 - Pages: 4

Free Essay

Networks

...Case: You are appointed as a technical expert to implement a network system for a small size maritime supplyrepresentative company with four users. The company provides supply services to Maritime shipping companies through a worldwide network of suppliers. Its owner is a maritime business expert who doesnot know much about the use of computer systems to support her business. Therefore, she has decidedto employ you as a consultant on a short term basis to set-up appropriate systems in a network. She hasheard about various technologies and the efficiency achieved by computer systems and would welcomeadvice on the acquisition of hardware, software and network items to augment her existing systems inorder to meet the company’s growing needs. The company has a budget of £100,000 for this project. The company currently consists of the following departments (all located in the same open space office): The sales Manager who is responsible for dealing with Maritime companies. She is assisted by asales assistant, equipped with a laptop but with no ability to access the web. This department iscurrently the only one with a connection to the Internet and with access to the company’s commonemail.  The General Manager who is responsible for the general operation of the company. She tradeswith suppliers all over the world in order to ensure the best prices of goods for the company’sMaritime shipping clients. For client communication, she uses plain telephone services and a faxmachine....

Words: 545 - Pages: 3

Free Essay

Today

...SUBDOMAIN 426.1 - NETWORK SECURITY   Competencies: 426.1.1: Advanced Network Overview - The graduate compares and contrasts the common types of network topologies, network protocols, and network infrastructure components and their functions and identifies their strengths and weaknesses. 426.1.4: Establishing Physical Security - The graduate identifies and evaluates the appropriate security practices that are necessary to support physical security site operations. 426.1.5: Preventing Network Attacks - The graduate defines and evaluates different types of network security threats and selects appropriate countermeasures or controls to protect against them. 426.1.6: Intrusion Detection Systems (IDS) - The graduate analyzes network auditing tools related to intrusion detection. Introduction:   Myrtle & Associates and Bellview Law Group are two medium-sized law firms specializing in personal injury cases. The law firms have had a cooperative working relationship for the past 20 years. Recently, the firms have decided to consolidate and merge into one larger firm with a new name: MAB Law Firm. The challenge will be to integrate the computer systems from both firms into one large network. The two law firms are located across town from each other. The integration effort should be designed to combine the firms into a single logical site.   Myrtle & Associates has three servers that were recently upgraded to Windows Server 2008. One of them functions as a domain controller,...

Words: 575 - Pages: 3

Premium Essay

Management

...PERT/CPM Problems 1. For the following data, draw the network diagram, and then crash the activities to find the time-cost trade-off points that the company should want to consider. Start with the plan that has the longest duration. Activity Preceding Activity Time(weeks) Normal Program 2 5 2 4 3 3 Crash Program 2 3 1 2 2 3 Cost ($000s) Normal Program 5 11 7 8 9 9 Crash Program 5 21 16 22 18 9 A B C D E F A A B, C B D, E 2. Draw the network diagram for the following problem and indicate a sequence of plans that the company should want to consider in making a time-cost tradeoff. The company is not interested in reducing the project duration below 29 days. Start with the plan that has the longest duration. Activity Preceding Activity Time(days) Regular Program 10 14 8 7 5 10 9 11 Crash Program 9 11 7 2 3 7 9 9 Cost ($) Regular Program 5,000 3,500 4,000 2,100 2,500 2,250 5,000 3,850 Crash Program 5,200 3,950 4,100 3,600 3,000 3,750 5,000 5,250 A B C D E F G H A A B B C D, E I G, H 5 3 2,375 3,575 3. For the following data, draw the network diagram, and then crash the activities to find the time-cost trade-off points that the company should want to consider. Start with the plan that has the longest duration. Activity Preceding Activity Time(weeks) Normal Program 2 3 2 4 4 3 5 2 Crash Program 1 1 1 3 2 2 3 1 Cost ($) Normal Program 20,000 20,700 29,000 25,000 26,100 47,000 55,000 57,000 29,000 29,500 79,000...

Words: 436 - Pages: 2