Premium Essay

Networking Project - Severs

In: Computers and Technology

Submitted By jnn122
Words 870
Pages 4
AT&T Corporation

AT&T AT&T is one of the most popular companies that provide variety of services; voice, data, and communications and is the largest provider for mobile telephony and fixed telephony. There is a main server called the proxy server which AT&T uses, which acts as a server and a client in making request on behalf of other clients, it can provide routing and can enforce policy. The proxy server is an application layer service that routes SIP request and replies; it hides the identities of endpoint and it may be redundant because its functions overlap with those of the firewall proxy service. Proxy servers are rarely implemented in SIP networks because of the cost, delay, delay variation, and complexity they add to the service. The next server would be a redirect server; which makes mobile and nomadic users reachable as well as users who have new phone numbers it is a part of the availability service as well as geographic location services provided by the location server. The type of switches this company uses is the Cisco switches they are used to create a network by connecting and controlling all of your organizations computers, printers, and servers and it can also increase efficiency, productivity, and allow your devices to talk to one another through information sharing and resource allocation.
Cisco offers two types of network switches: * Cisco unmanaged switches, which are found in home networks work right out of the box and are not designed to be configured but, they have less capacity than managed switches. * Cisco managed switches are great for small business uses and they are configurable which allows them to offer much greater flexibility and networking capacity. * Cisco managed switches can be monitored and adjusted either on-site or remotely. * All Cisco switches offer high-performance, reliability, and security no

Similar Documents

Free Essay

Project Management

...Ngonidzashe Utete. The organisation will use Power Tel as the service provider. It is a new business so it doesn’t have a location as yet. However, its proposed location is the Kadoma CBD. The project requires a loan of US$5000. The purpose of the loan is to acquire the following equipment and other costs: US$ 6 Computers 1800 Furniture 1000 Cables 80 Ethernet switch 50 Software 400 Modem 50 Licence 310 Generator 200 Networking costs 100 Internet subscription (2 months) 100 Rent (2months) 200 Labour (2months) 300 Electricity (2 months) 100 5 computers will be used as clients and one as the sever. OPPERATION OF THE BUSINESS The business in an internet café. It provides all sorts of internet facilities, that is browsing, chatting, downloading etc. Customers can use gadgets such as webcams and headphones for use in the café. The vision is to provide the fastest and most reliable internet in the city. 5 computers will be used as clients and one as the sever. The internet café software will, on the sever computer, produce tickets with passwords written on them. The customer will then use this password to log on to the internet which will automatically start the timer upon logging in. The sever will be able to monitor all activities through the software giving it the overall control of the whole system. We the time is up, the software will automatically disable use of that computer...

Words: 710 - Pages: 3

Premium Essay

Idjgvjhgfjhgj

...Projects with Abstracts 1.)Flexible Deterministic Packet Marking:An IP Traceback System to Find The Real Source of Attacks Abstract: DDOS has been major security threat for web based application. It allows attacker to use multiple computers situated far away from each other to attack on single victim computer. It not only affects the services given by the application but makes it hard to stop the DOS attack. Our project concept is to implement a practical IP traceback system that will track the DOS packets to its original source. To achieve this we use Flexible Deterministic Packet Marking (FDPM). FDPM provides a defense system with the ability to find out the real sources of attacking packets that traverse through the network. While a number of other traceback schemes exist, FDPM provides innovative features to trace the source of IP packets and can obtain better tracing capability than others. We are going to simulate FDPM system in NS2 which is network simulation software and study its various advantages and disadvantages as well as its application. 2.) Virtual Router Introduction Computers are the integral part of our life. One can not think of his/her life without the help of computers. Computer network has been playing important role in bringing the world closer due to its functionalities. Routers are the heart of computer network. Virtual Router is an attempt to automate all the functionalities of the physical router...

Words: 1214 - Pages: 5

Free Essay

Internship Report at Ministry of Local Government, Uganda

...CHAPTER ONE BACKGROUND OF MINISTRY OF LOCAL GOVERNMENT The system of Local Government (LG) in Uganda is established under the 1995 constitution and enacted through the Local Government Act (LGA) cap 243 Laws of Uganda 2000. Local Government Financial and Accounting Regulations, issued under the LGA, prescribe the accountability measures for compliance by LGs. The goal of the decentralization policy is to facilitate economic growth and development by devolving powers, functions, responsibilities and resources to Local Governments (LGs) in order to promote high quality and reliable basic public services on a sustainable basis. The decentralization policy aims to: • Transfer power, functions, responsibilities and resources to LGs to ease the work load of the officers at the center • Bring political and administrative decision making and control over resources allocation and service provision to the point of delivery to enhance effectiveness, promote a sense of ownership and improve accountability; • Enable Local Government officers develop the prerequisite capacity to develop organizational structures tailored to local circumstance; • Enhance financial accountability by establishing a clear linkage between the provision of services; and • Improve the LG’s capacity to plan, finance and deliver public services to its residents.  To guide LG’s in fulfilling the mandate , Government has enacted laws and developed regulations, operations, operational manual...

Words: 3387 - Pages: 14

Free Essay

Pm593

...Virtualization Project Jonathan Sullivan DeVry University’s Keller Graduate School of Management Project Cost & Schedule Control Professor Tony Kapsak March 30, 2014 Contents Refresh Telecom PBX Virtualization Project 3 Executive Summary 3 Project Scope Statement 3 Description 3 Acceptance Criteria 4 Deliverables 4 Exclusions 4 Constraints 5 Assumptions 5 Technical Requirements 5 Work Breakdown Structure (WBS) 5 Cost Estimates 6 Cost Assumptions 7   Refresh Telecom PBX Virtualization Project Executive Summary This project is expected to take six months to complete with an estimated budget of $500,000. Upon completion the consolidated virtual environment will save an estimated $2,900 in monthly operational costs. The virtual environment will allow for a scalability of up to 24 additional virtual PBX servers (total capacity: 32 virtual machines) with no additional hardware costs needed. Valuable datacenter rack space will be conserved through the consolidation. Project Scope Statement Description The PBX Virtualization project will involve taking eight physical in production PBX (Private Branch Exchange) servers and putting them into a redundant virtual environment. The virtual environment will consist of four physical nodes and two redundant iSCSI SAN’s (Storage Servers) each holding a capacity of seven terabytes. The virtual environment will be powered by VMWare’s virtualization software. Acceptance Criteria The project will be...

Words: 821 - Pages: 4

Premium Essay

No Paper

...QUALIFICATIONS * Comptia A+ 801 Certified * Comptia Security + Certified * Currently training for the following certifications: CompTIA A+, Microsoft Technology Associate (MTA): Networking Fundamentals; and Cisco CCENT (all expected by July 2015). * 7+ years of experience in challenging customer service and sales environments * Recognized by current and previous employers for communication and problem solving skills with internal and external customers. * Function as a team player, as well as demonstrate a proven ability to work well independently TECHNICAL SKILLS Service Desk support for major healthcare facilities, Windows Server 2008 and 2012 R2 - planning, deploying, configuring and maintaining AD infrastructure, environment and objects |Client computer support and domain integration | TCP/IP, DHCP, WINS, RRAS, IPSEC, Computer Troubleshooting, Cabling | Cisco 2811 router, Cisco 2960 and 3550 switches, basics in Cisco IOS 12.4, RIPv2, EIGRP, OSPF, network tools including Wireshark, and network cabling. TECHNICAL TRAINING Centriq Training Center, Leawood, KS Nov 2014 – July 2015 IT Administrator Program * Technical Competencies: * Installing, configuring, managing, and maintaining hardware. * Windows Sever 2008/2012 R2 and Windows 7 configuration. * TCP/IP suite with an emphasis in subnetting and DHCP. * Name Resolution in a domain and standalone environment; Emphasis DNS (FQDN)...

Words: 1235 - Pages: 5

Premium Essay

Packet Filtering Firewall Essay

...connection tracking is made. Whereas, stateful packet filtering is where information about previous passed packets is remembered and keeps track of the state of the network connection. These two types of filtering will be based on your network either small or large one. Networking is an essential element in everyday life, but owning to some of the threats discussed, networking is not so much secured. Our aim is to cater for the security aspect of networking and thus based on these we are searching for a mechanism and designing a Packet Filtering System in Linux. Linux is an open source having a wider range set of tools than Windows. 1.1 Problem Specification Safety measures are important inside every network, normally we make use of firewall to block sites which are harmful and not in use. Firewall in windows does not provide enough solutions to develop our own firewall but, using Linux we have the facilities to build it as it offers set of tools which allows the user to manage and manipulate packet transmission. Therefore, in order to provide more security on the network, an application will be implemented where the user will be able to set the firewalls' rules. 1.2 Aims and Objectives The aim of this project is to develop a packet filtering firewall where rules can be set to block sites which are not secure and also not useful. Other aims are to enable network address and port translation and other packet mangling. The objectives are to build an internet firewall based on stateless...

Words: 2254 - Pages: 10

Free Essay

Project

...You have founded your own networking company. You have been asked to submit a proposal for a new network at RobCo Industries. They have asked you to help design, specify and install a network at their facility. Use the knowledge and skills covered in this class to help you with this project. Should you need any information not covered in this document (such as if the offices have baseboards, etc.), please feel free to ask the instructor. RobCo is located in the Port Huron Industrial Park on 16th Street. They are a small company with about 75 employees. Their main product is the patented "Propeller Beanie". They manufacture this item at the Port Huron facility. Currently they have only a few PC's installed, but their technology plan envisions that most employees will work with PC's in the future and that everyone will communicate via an intranet.  In essence, your group will create a "case study"... Each week, we will be focusing on a different aspect of the project. The Total budget for this project is $25,000. Week 1 - Physical Plant The exterior dimensions of the building are 120' x 60' the exterior walls are poured concrete, while the interior walls are typical commercial metal stud framing. The building is single story, and is on a slab foundation. There is no sub-floor or basement. The manufacturing facility and the warehouse both have an open 12' ceiling. The office areas have an 8' dropped ceiling. You can estimate the interior dimensions of the...

Words: 2355 - Pages: 10

Premium Essay

Patton-Fuller Community Hospital Network Project

...Patton-Fuller Community Hospital Network Project Harold Copeland CMGT/554 11/11/13 Dean Mcintyre Company Overview Patton-Fuller Community Hospital is a community hospital that provides healthcare services designed to meet the needs of patients at every stage of life. The hospital was originally founded in 1975. Patton-Fuller Community Hospital has been an important part of the community since its opening. Patton-Fuller Community Hospital is located on the corner of 61st. Street and Jump Street (Patton-Fuller Community Hospital, 2013). Patton-Fuller Community Hospital has provided quality healthcare services for the entire family since its opening while keeping its patients information and data secure even in this current digital age. Patton-Fuller’s IT departments strives to provide the healthcare facility with the most stable, secure, and fast network possible. Data Transmission Patton-Fuller’s I.T. data center consist of a HIS system computer, a Windows Exchange Server, an Internet Server, data center workstations and a RAS Server. The hospital HIS computer system is composed of an IBM Series 29EC mainframe. This mainframe is currently utilizing Linux for its operating system. The IBM 29EC mainframe contains 18 processors and 32 gigabytes of memory. This system is using Advanced Encryption Standard (AES) for its security. The IBM 29EC is connected to a 10 Terabyte network attached storage (NAS) by a 4 gigabyte fiber link (Patton-Fuller Community Hospital...

Words: 1504 - Pages: 7

Free Essay

Cisco Systems Architecture

...(Nolan, 2005, p.4). However, after costly repairs and creating a brand new IT platform architecture, Cisco was able to recover and continued to move forward. Cisco immediately began expanding by acquiring smaller entities which expanded the company’s market share. In 1998, Cisco successfully reach the coveted $100 billion landmark. Over the next two years, Cisco continued to expand and “acquired more than 20 companies, including wireless network equipment maker Aironet. With a market capitalization exceeding $500 billion, Cisco enjoyed a turn as the world’s most valuable company in 2000” (Hoover, 2012, p.1.) Cisco’s product’s mix includes; security systems, IP telephony equipment, Internet conferencing systems, set-top boxes, optical networking components and network services (Hoover, 2012, p.2). Presently, Cisco operates in a broad target market. The company targets enterprise and service providers, small businesses, and homes (Cisco website, 2012). With annual reported revenue of over $43 billion in 2011 and over seventy...

Words: 2344 - Pages: 10

Premium Essay

Project Management

...------------------------------------------------- project manageme Task 1: 1.1: Principles of Project Management: 1. Identify Goal/Tasks – Evaluate the project as a whole and break it down into smaller, manageable steps to ensure thorough completion. Identify what the key tasks are and prioritise them into a logical sequence. 2. Identify Key Stakeholders – Based on key tasks of the project, group tasks into categories. Link the categories to stakeholders with key skills and experience in their particular field of expertise e.g. IT staff will specialise in IT related tasks, Finance department will specialise in overseeing financial tasks. 3. Agree Deadlines – Based on identification of key tasks and integration of stakeholders to project tasks, layout a timeline of when the project starts and when it can be completed as efficiently as possible. Delays in completion can cause a project to go over budget and create negative customer relations. Overview: These three principles will create a clear objective of the project, outline the following tasks required to complete it, the stakeholders responsible for each task and the timeframe allocated to execute the project as fast and efficiently as possible. 1.2: Three Benefits of Project Management: 1. Efficiency in Delivering Services – This will stem from project coordination and organisation. The more concise your project is, it will deliver clarity and efficiency to tasks and allow you to avoid problems and troubleshooting...

Words: 2645 - Pages: 11

Premium Essay

Final Paper

...INDP Wide area network , Antivirus software , Firewall (computing) By trizey Oct 13, 2014 3651 Words 43 Views PAGE 14 OF 15 Running Head: INTEGRATIVE NETWORK DESIGN PROJECT 1 15 INTEGRATIVE NETWORK DESIGN PROJECT Integrative Network Design Project: Riordan Manufacturing May 26, 2014 Abstract Riordan Manufacturing is a plastic manufacturer providing services globally. Our product services include plastic beverage bottles, plastic fan components and custom plastic developments. The company consists of 3 production plants: Pontiac, Michigan, Albany, Georgia, and Hangzhou, China. Corporate headquarters and the research and development department are located in San Jose, California. Riordan is currently expanding and growing capabilities, to include upgrades in telecommunication systems for faster information travel amongst the 4 locations. Specifically, our location in Hangzhou, China is in dire need of upgrades. We've decided to relocate the entire Hangzhou location to a new facility in Shanghai, China. There are many factors and recommendations to consider as well as a chance to take advantage of implementing newer technology. The following project plan will outline the steps necessary to accommodate the telecommunication system transfer. Integrative Network Design Project Project plan The Information Technology Department has been tasked to plan, prepare and execute an entire network breakdown from Riordan Manufacturing's Hangzhou, China production...

Words: 3887 - Pages: 16

Premium Essay

Bsa 375 - Response to Service Request

...Kudler Fine Foods Service Request University of Phoenix -- BSA/375 Fundamental of Business Systems Development -- January 18, 2010 Objective Generate additional sales from current customers through purchase incentive offers. Program Overview Current customers will be offered incentives based on purchase history. Incentives will include free trials of new products not previously purchased, Gift Baskets to be delivered to friends and family to generate new business and Various awards such as Airline Tickets and Hotel Vouchers. Customer order history will be tracked and valued according to product rating and time of purchase. Points will be awarded based on amount and frequency of purchase. Points will be redeemed via the Kudler Website. Kudler currently operates in three separate store locations. Purchases from stores will be recorded to a central database and integrated with the website. Customers will be able to purchase products from any of the three locations and from the website. Points will be assessed for all purchases and presented to the customers account. Customers will view account status via the website and redeem points by choosing awards via the web site. Program Goals * Increase sales * Create customer loyalty * Monitor buyers purchases * See what is important to the customer Supporting Measures for Success * Increase sales A company can increase sales by offering consumers customer specific pricing, where...

Words: 1589 - Pages: 7

Free Essay

Ntc 362 Week 2

...Riordan Network Design Project NTC/362 November, 2013 Riordan Network Design Project Riordan Manufacturing is a plastics manufacturing company that produces products such as beverage containers, custom plastic parts and plastic fans. Riordan was created in 1991 and was founded by Dr. Riordan. Riordan currently has a location in Hangzhou China and is moving that location to Shanghai China. This document will outline the network design, Project timeline, design approach, detailed design, current network topology, new network topology, security and plans for starting up new location and decommissioning the old location. Network Design Project Timeline Assignment | Timeline | Design Approach | Phase 1-Four Weeks | Detailed Design | Phase 1-Four Weeks | Current Network and Establishing New Network | Phase 2 6 weeks | Security Considerations | Phase 2 6 weeks | Decommissioning Old Facility | Phase 3 4 weeks | Old Equipment | Phase 3 4 weeks | Old and New Employees | Phase 3 4 weeks | Design Approach and Rationale Riordan Manufacturing is currently seeking to move the current location from Hangzhou China to Shanghai China. In order to successfully move the entire location to its new location we will setup the new location and get it up and running before we shut down the current location. In doing so we will need to purchase new hardware and software for the new location and also setup a new firewall...

Words: 1997 - Pages: 8

Premium Essay

Dcsc

...advices from the beginning of the assignment. . Executive Summary Report contains a detail analysis on e-strategy plan for an organization and DFCC bank is chosen to analyze on business factors that underpin the e-strategy and developing a plan. Report comprises with; SWOT Analysis, Porter’s Generic strategies. Analysis on e-strategy plan, benefits, technical infrastructure required, alignment process with corporate strategy, discussion on processes to monitor the implementation process and challenges are included the report. E-strategy integrates all business functions easing and enhancing its flexibility to provide exceptional customer service through technologically advance devices, and networking as it will reduce manual errors, time-lapses and workload significantly. Important in achieving organizational goals and objectives in the competitive global market through the speedy, efficient and excellent quality service it could provide to the customers. 24/7 availability, attractive online offers, secured and easy payment methods, quick access to all the products and services definitely helps to reach beyond local customer base. Preparation of a proper implementation schedule is vital for the e-strategy success. Target Market selection, value analysis, selecting the most appropriate e-commerce platform and monitoring process ensures the sustainability and success of the plan. Maintaining long-term relationships with the key parties...

Words: 3012 - Pages: 13

Premium Essay

Hvfgfgh

...ASSIGNMENT # 1: DATA COMMUNICATION AND SOCKET PROGRAMMING MARIA SALEEM BAHRIA UNIVERSITY KARACHI CAMPUS BSE 5B (35925) DEPARTMENT: SOFTWARE ENGINEERING mariasaleem42@gmail.com I. INRODUCTION Data communication is used to transfer data form one device to others. While socket programming is about that a pc is attached to a socket in a port and it is then connected to other socket to deliver data into that. I.I IMPORTANCE OF DATA COMMUNICATION: The crucial innovation of the data phase is interchanges. Information interchanges and systems administration is a really worldwide zone of learning, equally on the grounds that the innovation empowers worldwide correspondence, and on the grounds that new advances and requests regularly rise up out of an assortment of nations and extent quickly all over the globe. Information correspondence is broadcast of advanced information over correspondence frameworks. It takes the goal of transferring any archives and files at most elevated velocities plus least cost. The data needs to stay imparted quickly and well-timely. Since industry prerequisites develop to encounter innovative, rising trade chances, the instruments compulsory have the capacity to quickly adjust in what way the data is found, collected, and exhibited. I.2 OSI MODEL: Seven layered OSI model was invented by ISO (International standard organizations) for providing benefit to merchants and system overseers in a manner these know how to pick up a superior comprehension by what method...

Words: 2562 - Pages: 11