Network Diagram Example

In: Computers and Technology

Submitted By taddo
Words 275
Pages 2
The attached sample is a basic network for a small office. This network will allow access to the internet and the server could house an intranet or extranet. A cable internet connection will allow for high speed internet access. In addition to the basic network, wireless LANs could be added and a mobile Wi-Fi network. An internet service provider will allow access for Wireless LANs and the Mobile Wi-Fi.

Workstations/PC Wired LANs : office computers connected to one another and other devices within a 500 meter radius. They can be computers connected in the same building or buildings close by. Workstations may be specialized for graphic design, 3-D design or CAD. As the company grows they could add WANs to reach further distances.

Server: Determines who gets what. It stores data, serves up web pages controls the operating system. An example of server software would be Microsoft Windows. It could also serve applications for users on an intranet. For example a company website for employees or portal that houses company information and resources.

Switch : Are similar to hubs connecting network components but they can filter more data to a specified location.

Router: Helps to communicate with the internet making sure data gets to the correct address.

Firewall: Prevents unauthorized users from accessing personal networks. It makes sure users have authorized access to use the network.

Internet: Communication system linking millions of people and networks from all over the world. An ISP will allow for permanent connection to the internet.

Laudon, K., & Laudon, J. (2014). Essentials of management information systems: Managing the digital firm (13th ed.). Upper Saddle River, NJ: Prentice…...

Similar Documents

Network Diagram

...1.1 Permits Approved Milestone Date: Fri 2/1/13 ID: 2 Check desktop PC's Start: Fri 2/1/13 ID: 5 Finish: Fri 2/1/13 Dur: 3 hrs Res: Systems Analyst FS Check gaming consoles Start: Fri 2/1/13 ID: 6 Finish: Fri 2/1/13 Dur: 2 hrs Res: Systems Analyst Check printers FS Start: Fri 2/1/13 ID: 7 Finish: Fri 2/1/13 Dur: 2 hrs Res: Systems Analyst Test shop Laptops/Handhelds FS Start: Fri 2/1/13 ID: 9 FS Finish: Fri 2/1/13 Dur: 1 hr Res: Systems Analyst Run CAT‐5/6 Cables Milestone Date: Sat 2/2/13 ID: 12 Install cable sheathing FS Start: Wed 2/27/13ID: 13 Finish: Thu 2/28/13Dur: 2 days Res: Wiring Contractor CAT‐5/6 connections FS Start: Fri 3/1/13 ID: 14 Finish: Fri 3/1/13 Dur: 1 day Res: Wiring Contractor Connect 40 desktops FS Start: Mon 3/4/13 ID: 16 Finish: Tue 3/5/13 Dur: 2 days Res: Network Technician | Connect 5 printersStart: Wed 3/6/13 ID: 17Finish: Wed 3/6/13 Dur: 1 dayRes: Network Technician | | | | | | Connect 5 printersStart: Wed 3/6/13 ID: 17Finish: Wed 3/6/13 Dur: 1 dayRes: Network Technician | | | | | FS 6 gaming consoles FS Start: Thu 3/7/13 ID: 18 Finish: Thu 3/7/13 Dur: 1 day Res: Network Technician Connect T‐3...

Words: 800 - Pages: 4


...In automated accounting systems, information technology (IT) serves as a platform on which other system components rely. The purpose of this chapter is to discuss IT subjects in detail—especially as they relate to AISs. Because most students in AIS courses have already taken a survey computer class, the discussions here are brief. This chapter may nonetheless serve as a review of computer hardware and software concepts or as a study of how IT helps organizations accomplish strategic accounting goals. It is helpful to view an accounting information system as a set of five interacting components: (1) hardware, (2) software, (3) data, (4) people, and (5) procedures. Computer hardware is probably the most tangible element in this set, but ‘‘hardware’’ is only one piece of the pie—and not necessarily the most important piece. For example, most organizations spend more money on people (in wages and salaries) than on computer hardware and software combined. Similarly, computer hardware must work together with the other system components to accomplish data processing tasks. Without computer software, for example, the hardware would stand idle. Without data to process, both the hardware and the software would be useless. Without procedures, accounting data could not be gathered accurately or distributed properly. And finally, without people, it is doubtful that the rest of the system could operate for long or be of much use. What all this means is that ‘‘information......

Words: 306 - Pages: 2

Network Diagram

...Request for Proposal The first change I would make would be to delete the router going from the firewall to the phone network. I then would separate the phones from the computers. I would put all of the phones and the phone network on VLAN 10. I moved all of the computers that were originally on VLAN 1 & 10 with the phones to VLAN 8. I would then delete the switch linking all of the servers. After that, I want to create a protected network for the application server and the accounting server from the firewall. I then would move the protected network servers to VLAN 4. I would then create another link from the firewall to go to a DMZ containing the Email Server and the Web Server. The DMZ would be moved from VLAN 1 to VLAN 6. The last thing I would do would be to move the wireless access point from VLAN 1 to VLAN 2. By separating everything on the network into different VLANs, I feel it will increase security as well as decrease congestion through the VLANs. Since the VLAN separates portions of the network into mini networks, if an attacker was able to get access to the system, they would only be able to see a small portion of the network instead of everything that is on it. By placing the servers with the most important data (the database and accounting servers) in a protected network, it creates an extra level of security. The last major vulnerability that I discovered is that all of the data is in one place, in the server room. If......

Words: 369 - Pages: 2


... sentences through any capable media. But, for deaf and mute people couldn’t communicate normally because their disability. This disability makes them being separated form normal people around as a social being. There’s so many other options to help them like hire a translator or buy translator device, but both of them cost too expensive like cyberglove from Virtual Technologies Company for US$ 10.000. So I made a sign language device to translate their sign language movements into text by using some sensors and algorithm that a lot cheaper than Cyberglove. 2. Algorithm and Hardware 2.1 Artificial Neural Network Backpropagation Many hundreds of Neural Network types have been proposed over the years. In fact, because Neural Nets are so widely studied (for example, by Computer Scientists, Electronic Engineers, Biologists and Psychologists), they are given many different names. You’ll see them referred to as Artificial Neural Networks (ANNs), Connectionism or Connectionist Models, Multi-layer Perceptron (MLPs) and Parallel Distributed Processing (PDP). However, despite all the different terms and different types, there are a small group of “classic” networks which are widely used and on which many others are based. These are: Back Propagation, Hopfield Networks, Competitive Networks and networks using Spiky Neurons. There are many variations even on these themes. We’ll consider these networks in this and the following chapters, starting with Back Propagation. Most people would......

Words: 1254 - Pages: 6


... Noise Margins 6/12 For example: V+ V+ vI1 vO1 =vI2 vO2 output of that inverter is therefore vO 1 = VOL . Thus, the input Say that the input to the first digital inverter is v I 1 = V + . The to the second inverter is likewise equal to VOL (i.e., vI 2 = vO 2 = VOL ). V+ V+ vI1 =V+ vO1 =vI2 =VOL vO2 be a problem—after all, isn’t VOL much lower than VIL?? Q: So? This doesn’t seem to Jim Stiles The Univ. of Kansas Dept. of EECS 11/5/2004 Noise Margins 7/12 A: True enough! The input vI2=VOL is typically well below the maximum acceptable value VIL. In fact, we have a specific name for the difference between VIL and VOL—we call this value Noise Margin (NM): NML = VIL − VOL Volts ⎤ ⎡ ⎣ ⎦ The noise margin essentially tells us how close we are to the ambiguous transition region for a typical case where v I =VOL . Of course, we do not wish to be close to this transition region at all, so ideally this noise margin is very large! Now, consider the alternate case where vI1 =0.0 V. The output of the first inverter is therefore vO 1 = VOH . Thus, the input to the second inverter is likewise equal to VOH (i.e., v I 2 = vO 2 = VOH ). V+ V+ vI1 =0.0 vO1 =vI2 =VOH vO2 be a problem—after all, isn’t VOH much larger than VIH?? Q: This still doesn’t seem to Jim Stiles The Univ. of Kansas Dept. of EECS 11/5/2004 Noise Margins 8/12 A: Again, this is true enough! The input vI2=VOH is typically...

Words: 1599 - Pages: 7


... teaching staff not only how to cook the best food but teaching them to be attentive, polite and communicable. Your staff should be well known for its kindness, competence and virtuosity. Target: We want to say that, technology of patisserie work and most up-to-date equipment allows you to organize outlet and to offer your high-qualitative products not only in stationary conditions but also in the places where demand for the product is high and conditions for snack bars are low: § In museums and exhibitions; § In hotels and business centers; § In airports and railroad stations; § In supermarkets and molls; § Everywhere, where you can find empty 10-12 square feet and electricity. We want to offer you to orient your supply to those places. Media: Actually we are not yet ready with TV commercial but want to offer nice print advertisement. Here we designed motto and slogan for you patisseries. Even in such conditions we keep: § our special features, which are unrepeatable design comfortable and kind atmosphere; § motto: “Cleanness, Honesty and Professionalism!” § slogan: “…We offer comfort in the city…” Support: Of course the best method to boost sales and attract more customers, the method, which can be run simultaneously, is offering discounts and gifts. For example you can offer free croissant to every sandwich meal or give free mint chewing gum after the meal. Discount on complex meals such as business lunch is...

Words: 845 - Pages: 4


...Unit4 Assignment 1: Enhance an Existing IT Security Policy Framework 1.0 Purpose The purpose of this policy is to define standards for connecting to Richman Investments’ network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc. 2.0 Scope This policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments-owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to: frame relay, DSL, ISDN, SSH, VPN, dial-in modems, and cable modems, etc. 3.0 Policy 3.1 General 1. It is the responsibility of Richman Investments employees, contractors, vendors and agents with remote access privileges to Richman Investments' corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman Investments. 2. General access to the Internet for recreational...

Words: 739 - Pages: 3


... very close in meaning and repetition from the contextual and composition component to the process component (Robbins, S. P., & Judge, T. A. (2011), This was difficult for me to understand at first and then it all came together for me. The strategies for resolving a conflict, which can be either functional or dysfunctional, within the organization will depend upon the employees chosen to achieve the goal. I also learned that conflict should not be left to “simmer” but must be taken care of immediately. In my position there was an employee that didn’t like anyone who had their own opinion, we all met with her separately and quashed the conflict which was dysfunctional. Chelsea Ybarbo – Team Reflection This week I was most comfortable with the discussion on groups. I was comfortable with this because I am able to identify with groups more so than teams. In my everyday life, me and other parents go out for coffee some mornings after taking the kids to school, this would be an example of an informal group, (Robbins & Judge, 2011). Also in my work experience we mostly work in groups and not teams. I feel we should be working as a team since the goal is to provide support to our customers, but each individual is working towards a different goal. Sonja L Shirley – Team Reflection In Week three, we discussed a lot about the difference between teams and groups, but in speaking of teams and groups, we also referred to the most important part of......

Words: 627 - Pages: 3


...First, an issue must be relevant in order to even consider choosing an OD Practitioner. For example, I knew of an organization that experienced high volume of ambulatory care during work hours and observed excessive sick leave on the books. Verifying these issues through data or employees input is important because it determines the primary areas of concentration for the OD Practitioner. During a town hall this issue was brought to management and resulted in an external OD Practitioner that specialized in health care/nutrition on site for one year. Although the data collected by the organization may be a starting point for the OD Practitioner, they themselves may request additional data. OD Practitioners often examine company records and interview a few key members to gain an introductory understanding of the organization, its context, and the nature of the presenting problem (Cummings & Worley, 2009, pg. 76). After data verification, the process of choosing whether to select an external or internal OD Practitioner begins. There are several criteria’s that are important when evaluating an organization, whether internal/external. For example, expectations, time, resources, and guidelines are critical areas that must be understood between both parties to ensure a smooth process. The customer expects an OD Practitioner to have some history of the organization so they are aware of the culture. Additionally, the skills and background of the OD Practitioner are a...

Words: 481 - Pages: 2

Ecd Diagram

... Example Case to 3NF Tables Purpose The COIS20025 textbook and assignments have numerous exercises that require you to take a given case and generate a data design for the case. The data design will typically consist of an ERD, 3NF table designs including keys (obviously) and sample data. The purpose of this document is to give an example of how to do this. It walks you through the process of completing this task. Preparation This document draws on "Developing Entity Relationship Diagrams (ERDs)" available from the Assignment 2, Resources page. You should become familiar with that resource before going any further. The Case This document will use the same case as used in the "Developing Entity Relationship Diagrams (ERDs)" document. It is included below. A company has several departments. Each department has a supervisor and at least one employee. Employees must be assigned to at least one, but possibly more departments. At least one employee is assigned to a project, but an employee may be on vacation and not assigned to any projects. The important data fields are the names of the departments, projects, supervisors and employees, as well as the supervisor and employee number and a unique project number. You are required to: 1. Create an ERD with cardinality notation. 2. Create 3NF table designs. 3. For each of the entities identified, design tables and identify the possible candidate keys, the primary key, a probable foreign key, and potential...

Words: 1207 - Pages: 5


... computer. The advantage of the PBS is that it requires a concentration on ends rather than means and it can be somewhat easier to apply in the early stages of planning where the actual work is unclear but the required deliverables are better understood. In addition, once the individual products have been identified, it is possible to create for them product descriptions that provide, as it were, specifications of work for the individuals or teams tasked with their development. Q4 4 What do you understand by the term dependency? How can project dependencies be represented for planning purposes? Dependency occurs when, for example, task or deliverable ‘A’ must be completed before task or deliverable ‘B can be started. In a complex project, the analysis of dependencies helps to identify streams of work that can be performed in parallel, thus shortening the overall duration of the project. The normal way that dependencies are represented is on a dependency diagram, also known as a network diagram or a PERT chart. Microsoft® Project also shows dependencies on the bar/Gantt chart by vertical connections between task bars but this can get somewhat confusing on a large or complex project. Q5 Define the terms “product” and “work package” and explain how these are related to each other. A product is an individual deliverable from a project and it may also form a work package if it is assigned on its own to an individual or team. More commonly, though, a group of...

Words: 15945 - Pages: 64


... area of control stretched from South America to North America. The goal of the Spanish was to identify and obtain the valuable resources with which trade could be performed, along with establishing new colonies in the New World to continue expanding the Spanish influence. Unlike the English, the Spanish practiced Catholicism, which lead to a push for the Spanish to convert as many people within their colonies as possible. Evolution of Colonization Although many countries attempted the colonization of the Americas, the methods used changed as time passed. Initially, the explorers and conquerors of the New World investigated the islands and landed closest to Central America. Many Natives were captured, and resources obtained to provide the home countries as payment and example of the value to be found in the new world. Later, once more funding and attention were provided to the Americas, more resources were provided, allowing for small forts and areas to be established, enabling areas to be conquered and owned. The forts developed further, allowing the Europeans to develop small colonies. The development resulted in ordinary people being brought to the new lands, changing the purpose of the property from finding only wealth to developing trading and extended reaches of the kingdoms that controlled them. In the previous paragraphs, information regarding the exploration and colonization of the Americas was provided. Details regarding the early Natives that inhabited......

Words: 1485 - Pages: 6

Context Diagram

...1. They are balanced. On both the Context Diagram and the Level-0 there are 2 inflows to the system from the source customer (purchases and coupons) and three outflows (reports, tailored promotions and coupons) from the system to the sink Customer 2. Decompose each of the core processes in PE Figure 6-2 and draw a new DFD for each core precesses. • Customer makes purchases through the company with or without a coupon > that then is fed to the customer database which sends promotions to the tailored customer • The Marketing Database will also send promotions to target specific tailored customers as well • The customer activity report that is generated based on the consumer’s activities generates the coupons that is send to the customer • The product database then feeds information to generate reports of consumer behavior and also send the consumers coupons based on their trend buys 3. Has the team overlooked any core processes in the same system that should be in PE Table 6-1 and PE Figure 6-2? What would they be? Add them to PE Table 6-1 and Figure 6-2. # 5. Why is it important for the team to create DFDs if they are not going to write the actual system code themselves? It is important for the team to create DFD’s because if will for them to think about the system and how the process works, such as the sources of data, how the data is used, and the information the process generate. It forces the team to know the process, which is truly essential when it......

Words: 274 - Pages: 2


... employees at all levels, and accumulating and sharing internal knowledge,” as well as “challenging the status quo and enabling creativity” (Dess, Lumpkin, Eisner, & McNamara, 2014, pg. 360). P&G has been successful in implementing a learning organization through it is focus on developing and maintaining human capital, and creating an organization that values people, including its own employees, and the consumers of their products. This focus on people allows for greater innovation and development. Along with that, P&G also focuses greatly on their consumers by creating products that fit the needs of their consumers in different countries, especially in developing countries. An example of this is occurred when Procter & Gamble focused greatly on the needs of consumers in Vietnam. The company looked for ways to “tailor their product designs, packaging, and promotion efforts to meet the conditions” of the Vietnamese markets (Dess, Lumpkin, Eisner, & McNamara, 2014, pg. 231). Not only did they change their products to appeal to Vietnamese consumers, they also “established a charitable unit that brings needed health, educational, and community services to poor regions” ((Dess, Lumpkin, Eisner, & McNamara, 2014, pg. 231). As mentioned previously, P&G strives to be environmentally sustainable through their long-term goal of replacing petroleum with more sustainable sources. The company uses their innovation to look for sustainable sources to......

Words: 4807 - Pages: 20


... investigation. Now, this course trains its participants what moral investigation is all about. We do so, for example, by questioning whether such decisions or the expected outcome of such decisions may contribute to something as an increased income for some parties involves, or to our common good, or to the durability or continuity of the organization as such, or some other goal or objective. A good objective does not justify always an act, moral philosophers say since Antiquity. Organizations as context The study area 'ethics in the context of business organizations' is a very broad area. It considers the moral dimension of general economic problems, the moral issues of the business world and its corporate actors, and moral problems of people working in organizations. Most productive activities and service activities that are being channelled through markets are being provided for by organizations. With other words, products and services are being offered to us through organizations. There are many business-to-business transactions before such products or services reach the consumer finally. By and large, all students already did study the field of organizations, the effects of organizations on other organizations or on the people involved, and the working of organizations from an economic perspective, from a psychological perspective, a juridical perspective or a sociological perspective. This course tries to develop an ethical perspective on said behaviour. Now,......

Words: 6750 - Pages: 27