Free Essay

Ntc 362 Week 2

In: Computers and Technology

Submitted By twotwisted
Words 1997
Pages 8
Riordan Network Design Project
NTC/362
November, 2013

Riordan Network Design Project Riordan Manufacturing is a plastics manufacturing company that produces products such as beverage containers, custom plastic parts and plastic fans. Riordan was created in 1991 and was founded by Dr. Riordan. Riordan currently has a location in Hangzhou China and is moving that location to Shanghai China. This document will outline the network design, Project timeline, design approach, detailed design, current network topology, new network topology, security and plans for starting up new location and decommissioning the old location. Network Design Project Timeline Assignment | Timeline | Design Approach | Phase 1-Four Weeks | Detailed Design | Phase 1-Four Weeks | Current Network and Establishing New Network | Phase 2 6 weeks | Security Considerations | Phase 2 6 weeks | Decommissioning Old Facility | Phase 3 4 weeks | Old Equipment | Phase 3 4 weeks | Old and New Employees | Phase 3 4 weeks |

Design Approach and Rationale
Riordan Manufacturing is currently seeking to move the current location from Hangzhou China to Shanghai China. In order to successfully move the entire location to its new location we will setup the new location and get it up and running before we shut down the current location. In doing so we will need to purchase new hardware and software for the new location and also setup a new firewall for the new location. The good thing about purchasing new hardware is that we can upgrade the hardware and software as needed. The benefits in setting up the new location while the current location is still up and running is that we will not require any downtime for users and we can also ensure the new location is up and running successfully before shutting down the old location. For shutting down the old facility we will need to disconnect all equipment and either move it to the new location or consider selling the equipment that is no longer needed. All information on each user’s computer should be backed up to the company drive to ensure no information is lost during the move.
Detailed Design
In order to keep both facilities running in parallel the central server and backup sever will be located offsite from each building. This will allow us to have both facilities connecting to the server without having it moved or interrupted. In the network design we will use for the two locations will include routers that will connect the internet that has to go through the firewall for protection that will connect to the central server. Then the central server will connect to each individual location. Each location will be connected via a LAN and both locations will be connected through the company WAN. When the central server is connecting to the individual locations it will also pass through another firewall for protection. We will also put in place an offsite backup or better referred to as a remote backup. The back will run daily and will store the data as needed. The automated backup will save the company time and money in the long run. The backup will also provide security when creating backups with encrypting the data. With this design approach we can successfully setup the new location and have both the current and new location running simultaneously as planned until we retire the old location.
Current Network Topology
Current network design that Riordan is using is a LAN design. The server and backup server all located outside of the building location. The internet provider connects to the router and firewall directing the connection to the servers which then connects to the company LAN. Using a LAN is good for Riordan right now because it’s one office building and LANs are typically used for a group of computers in close proximity to each other and are good for sharing resources like files, printer and other applications (Mitchell, 2013). Riordan also currently uses a ring topology that is common for LAN networks. Riordan choose to use a ring topology for its current location because it’s a well-organized topology, it also allows for each computer to have equal access to all resources and it has good performance.
New network Topology
When designing the new network topology its best that we go in the direction of a hybrid topology. A hybrid topology is best used for a WAN because we can mold it to what we want depending on the needs for Riordan. We are also going in this direction because with the new location we will be connecting both LANS in each location with a WAN. As stated before the current topology used is a ring topology. So currently Riordan uses a ring topology and we know that it is reliable so we will combine the ring topology with star topology because it has a high tolerance capability creating a hybrid start-ring topology for Riordan ("Hybrid Topology : Advantages And Disadvantages Of Hybrid Topology ", n.d).
Security
Riordan currently uses a LAN network which has LAN manager. Riordan also has a firewall in place that helps protect against attacks from hackers, viruses and worms. Riordan also backs up its data on a daily basis to protect its data and stores it offsite. On top of the electronic threats there can also be physical threats like electrical threats in the system, natural disasters, hardware threats and also maintenance threats. According to "Network Security Threats" (2011), "equipment security is also important. Ways to help enhance equipment security is implementing electronic access control and also training security personal to monitor security cameras with automatic log recordings.” Providing the company with security policies and procedures helps to educate employees so they are aware of potential security threats and how to avoid them.
Hiring New Employees & Transferring Current Employees While the Shanghai China location is being setup we will start to move forward with hiring new employees. We will hire enough employees to run both locations as needed. We will provide enough time for new employees to go through an orientation and also training. Once the Shanghai location is up and running the new employees will be ready to begin. The employees in the Hangzhou location will continue to operate as normal as the Shanghai employees test and eliminate any issues in the new location. The Shanghai location will continue run and work though any issues for the first two weeks. At the end of the first two weeks management will evaluate how the organization is running and will decide if at that time the Hangzhou location will start to decommission. Current employees at the Hangzhou location will have the option to transfer to the Shanghai location.
Decommissioning old facility
Once the new location is up and running and has been successfully tested to ensure all connections and hardware/software are functioning as they should we will start to move forward with decommissioning the Hangzhou China location. Employees who have chosen to relocate will be moved to the Shanghai location. No equipment will be moved, however new upgraded equipment for those employees will be purchased. Once all employees are moved the equipment will be removed. The only equipment that will need to be removed will be physical equipment in the building. We will no longer need the desktops, switches or wires. All of this equipment will be packed and sold. The LAN and firewall used for this location will also no longer be needed. However we will still keep the current location as designed with the central server and backup server outside of the current location. This keeps it easier to function in case Riordan plans to expand in the future.
Conclusion
Riordan now has a project timeline they can follow and also adjust as the project begins and timelines may change after beginning the design phase. Riordan can review their options and the network design to see if they feel this fits their needs. Recommendations are listed for the new network design, design approach, a summary of the current network topology, the recommended new network topology, security awareness and lastly recommendations for decommissioning the old location and implementing the new location.

References
Hybrid Topology : Advantages and Disadvantages of Hybrid Topology . (n.d). Retrieved from http://www.ianswer4u.com/2012/05/hybrid-topology-advantages-and.html#axzz2jiHwVSRr
Mitchell, B. (2013). LAN - Local Area Network. Retrieved from http://compnetworking.about.com/cs/lanvlanwan/g/bldef_lan.htm
Network security: LAN Manager authentication level. (2013). Retrieved from http://technet.microsoft.com/en-us/library/jj852207.aspx
Network Security Threats. (2011). Retrieved from http://network-communications.blogspot.com/2011/04/network-security-threats.html

Student/Group Name(s) Course | Date Assignment | Content/Development (30 points total) Subject Matter (15 Points):Key elements of your choice of one the following service requests below. Write a cumulative 10- to 12-page paper incorporating your prior work. Solve the design problems of your Virtual Organization. Illustrate all network design using Microsoft® Visio® or Toolwire®. Address the following in your paper:  Include a final network design. Include a timeline for the project. Explain the design approach and rationale. Analyze the detailed design. Prove that the design meets the data rate requirements. Analyze the existing security situation in the organization. Identify the predominant electronic and physical threats to communications networks. Explain the importance of explicit enterprise security policies and procedures. Describe potential threat detection and protection techniques. Explain the importance of explicit enterprise security policies and procedures. Describe how firewalls mitigate some network attack scenarios. Describe common security concerns inherent to wired, wireless, and mobile networking. Design a security hardware and software environment that will protect the organization. Format your paper consistent with APA guidelines.Displays an understanding of relevant theory Major points supported by specific details/examples Research is adequate/timely Writer has gone beyond textbook for resources | Your paper covered all the key elements I was looking again for this final project. Your design was right on and your detail design was an appropriate to scale with the company you chose. Your security analysis along with choice of hardware and software is a match with the design I was hoping to see. I appreciate the detail you shared with me. Good job. 15 points | Higher-Order Thinking (15 Points): * Writer compares/contrasts/integrates theory/subject matter with work environment/experience * At an appropriate level, the writer analyzes and synthesizes theory/practice to develop new ideas and ways of conceptualizing and performing | Your paper was written with a higher order of thinking and had the appropriate level of writing for this class. 15 points | Organization (20 Points total) * The introduction provides a sufficient background on the topic and previews major points * Central theme/purpose is immediately clear * Structure is clear, logical, and easy to follow * Subsequent sections develop/support the central theme * Conclusion/recommendations follow logically from the body of the paper | Your introduction was good. You had a central theme and your paper structure was clear and easy to read. Your conclusion finalized the paper well. 20 points | Style/Mechanics (50 Points total) Format—20 Points * Citations/reference page follow guidelines * Properly setup according to APA guidelines * Properly cites ideas/info from other sources * Paper is laid out effectively--uses, heading and other reader-friendly tools * Paper is neat/shows attention to detailGrammar/Punctuation/Spelling—15 Points * Rules of grammar, usage, punctuation are followed * Spelling is correctReadability/Style—15 Points * Sentences are complete, clear, and concise * Sentences are well-constructed with consistently strong, varied structure * Transitions between sentences/paragraphs/sections help maintain the flow of thought * Words used are precise and unambiguous * The tone is appropriate to the audience, content, and assignment | Your format was setup properly and met all the expectation I was looking for this week. 20 points Your grammar and punctuation were right on track. You had no spelling errors. 15 points Your paper was readable / enjoyable. I appreciate your writing style. 15 points | Comments / Grade You did a good job this week. See further comments above. Your grade is 100. |

Similar Documents

Free Essay

Ntc 362 Entire Course

...NTC 362 Entire Course To Purchase this Tutorial Copy And Paste Below Link In Your Browser http://www.homeworkwarehouse.com/downloads/category/ntc-362/ For Any Information or Any Class Which you Did not find on Our Website, Just Hit US Email On below address Visit : www.homeworkwarehouse.com Email Us : Homeworkwarehouse@gmail.com NTC 362 Entire Course NTC 362 Week 1 DQ 1 NTC 362 Week 1 DQ 2 NTC 362 Week 1 Individual Assignment Telecommunications Evolution Timeline NTC 362 Week 2 DQ 1 NTC 362 Week 2 DQ 2 NTC 362 Week 2 DQ 3 NTC 362 Week 2 Integrative Network Design Project Part 1 NTC 362 Week 2 LT Assignment Analog and Digital Comparison Paper NTC 362 Week 3 DQ 1 NTC 362 Week 3 DQ 2 NTC 362 Week 3 DQ 3 NTC 362 Week 3 Integrative Network Design Project Part 2 NTC 362 Week 3 LT Assignment Protocol Paper NTC 362 Week 4 Assignment Hardware and Software Paper NTC 362 Week 4 DQ 1 NTC 362 Week 4 DQ 2 NTC 362 Week 4 DQ 3 NTC 362 Week 4 Integrative Network Design Project, Part 3 NTC 362 Week 5 Assignment- WLAN Network NTC 362 Week 5 Assignment- WLAN Network NTC 362 Week 5 DQ 1 NTC 362 Week 5 DQ 2 NTC 362 Week 5 DQ 3 NTC 362 Week 5 Integrative Network Design Network (INDP) NTC 362 Entire Course To Purchase this Tutorial Copy And Paste Below Link In Your Browser http://www.homeworkwarehouse.com/downloads/category/ntc-362/ For Any Information or Any Class Which you Did not find on Our Website, Just Hit US Email On below address Visit :......

Words: 465 - Pages: 2

Free Essay

Homework Lance Online Homework Help

...http://homeworklance.com/downloads/acc-206-entire-course/ http://homeworklance.com/downloads/acc-310-entire-course-week-1-5-latest/ http://homeworklance.com/downloads/acc-340-complete-course-material-wk-1-5-a/ http://homeworklance.com/downloads/acc-400-entire-course-final-exam-guide/ http://homeworklance.com/downloads/acc-407-entire-course-advance-accounting/ http://homeworklance.com/downloads/acc-423-entire-course/ http://homeworklance.com/downloads/acc-455-entire-course-asolution/ http://homeworklance.com/downloads/acc-556-entire-course-forensic-accounting/ http://homeworklance.com/downloads/acc-556-entire-course-forensic-accounting-2/ http://homeworklance.com/downloads/acc-557-complete-course-material/ http://homeworklance.com/downloads/acc-557-full-course-new-updated-2014/ http://homeworklance.com/downloads/acc-561-complete-course-material/ http://homeworklance.com/downloads/acct-212-financial-accounting-complete-course/ http://homeworklance.com/downloads/acct-504-accounting-finance-managerial-use-analysis/ http://homeworklance.com/downloads/acct-505-managerial-accounting-entire-course/ http://homeworklance.com/downloads/ajs-532-entire-course-week-1-6-complete-course/ http://homeworklance.com/downloads/ajs-582-entire-course/ http://homeworklance.com/downloads/bcom-275-complete-course-material/ http://homeworklance.com/downloads/beh-225-entire-course-weeks-dqs-assignments/ http://homeworklance.com/downloads/bis-155-complete-course-material/ http://homew......

Words: 1331 - Pages: 6

Free Essay

Homework Lance

...http://homeworklance.com/downloads/acc-206-entire-course/ http://homeworklance.com/downloads/acc-310-entire-course-week-1-5-latest/ http://homeworklance.com/downloads/acc-340-complete-course-material-wk-1-5-a/ http://homeworklance.com/downloads/acc-400-entire-course-final-exam-guide/ http://homeworklance.com/downloads/acc-407-entire-course-advance-accounting/ http://homeworklance.com/downloads/acc-423-entire-course/ http://homeworklance.com/downloads/acc-455-entire-course-asolution/ http://homeworklance.com/downloads/acc-556-entire-course-forensic-accounting/ http://homeworklance.com/downloads/acc-556-entire-course-forensic-accounting-2/ http://homeworklance.com/downloads/acc-557-complete-course-material/ http://homeworklance.com/downloads/acc-557-full-course-new-updated-2014/ http://homeworklance.com/downloads/acc-561-complete-course-material/ http://homeworklance.com/downloads/acct-212-financial-accounting-complete-course/ http://homeworklance.com/downloads/acct-504-accounting-finance-managerial-use-analysis/ http://homeworklance.com/downloads/acct-505-managerial-accounting-entire-course/ http://homeworklance.com/downloads/ajs-532-entire-course-week-1-6-complete-course/ http://homeworklance.com/downloads/ajs-582-entire-course/ http://homeworklance.com/downloads/bcom-275-complete-course-material/ http://homeworklance.com/downloads/beh-225-entire-course-weeks-dqs-assignments/ http://homeworklance.com/downloads/bis-155-complete-course-material/ http://homew......

Words: 1331 - Pages: 6

Free Essay

Kulder

...KFF Week 3 Pt 2 Sean Rachubka NTC/362 KFF Week 3 Pt 2 When it comes to communications between devices, there is a requirement in which the devices will agree on the format of the data being used. Communications protocols must adhere to the following; the rate of transmission either in baud or bps. The transmission is to be synchronous or asynchronous. Also, the data is to be transmitted in half-duplex or full-duplex mode. Baud transmission is the number of signaling elements that occur each second. At slower speeds, only 1 bit of information is encoded in each electrical change. When saying 1500 baud, it means that 1500 bits are transmitted each second, this is also shown as 1500bps. Communication protocols can also describe the syntax, semantics, and synchronization of analog and digital communications. Communications protocols are implemented in hardware and software. There are thousands of communications protocols that are used everywhere in analog and digital communications. Computer networks cannot exist without them. With KFF, being that the Home Office or Headquarters is located in La Jolla, there is a T3 dedicated line that connects HQ with Del Mar and Encinitas locations. These lines are usually rented at a monthly or yearly rate to connect geographically separate offices for private voice and or data networking. It is also very costly averaging over $3000 USD per month, so most don’t lease these lines. They are also reserved circuits that operate over either......

Words: 838 - Pages: 4

Premium Essay

Lans and Wans

...INDP-week 4 Erin Estes NTC/362 Keshia Green 11/26/2012 Local Area and Wide Area networks are essential to connecting Kudler Fine Foods together. As are the hardware and software needed to create and secure the networks. Each location will be set up with its own Wireless local area connection and they will all utilize the Internet to provide a Wide Area connection for the company as a whole. LAN, WAN and Wireless technologies Local Area Networks, or LANs, are a grouping of computers networked together in a generally small geographic area. LAN technology refers to the hardware and software used to create a local area network. The most common wired methods are Ethernet and Token Ring, and WLAN technologies using IEEE 802.11. WAN or Wide Area Network technologies include ATM. TCP/IP, and Frame Relay to connect and transfer data across large distances. Using a cable such as an Ethernet cable computers on a LAN are required to share the network when passing data packets back and forth. Before sending data across the network each computer checks the line for other transmissions. If the line is clear the computer sends the data, if not the computer waits. This method is called CSMA/CD. Wireless LANs or WLANs use RF signals to transmit data across the network. Every computer on a wireless local area network share the same frequency and take turns sending data just like using a cable. Wireless LANs use CSMA/CA to check for an open line of communication to it......

Words: 1327 - Pages: 6

Free Essay

Ntc360 Summary

...Syllabus College of Information Systems & Technology NTC/362 Version 1 Fundamentals of Networking Copyright © 2013 by University of Phoenix. All rights reserved. Course Description This course provides a foundation in the basic telecommunications and networking technologies fundamental to the industry and to the broad field of telecommunications. Analog, digital, and radio frequency technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: · University policies: You must be logged into the student website to view this document. · Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Goleniewski, L. (2007). Telecommunications essentials. (2nd ed.) Boston, MA: Pearson. Panko, R. R., & Panko, J. L. (2011). Business data networks and telecommunication (8th ed.) Upper Saddle River, NJ: Prentice Hall All electronic......

Words: 2225 - Pages: 9

Free Essay

Ntc 362 Individual Final Assignment

...Week 5 Individual Final Assignment Galo Figueroa NTC / 362 October 26th, 2017 Eric Winch Week 5 Individual Final Assignment I will begin by explaining the network’s current characteristics and components. KFF is comprised of three geographic locations in San Diego County, California. Their home office is located in La Jolla. The two other locations are in Del Mar and Encinitas. They have an OC 1 SONET using a T3 dedicated line connecting all three stores. This requires a fiber optic physical connection between stores since a T3 is equivalent to 28 T1 lines. This dedicated network is leased from the ISP and is guaranteed a continuous uninterrupted connection. This type of connection allows for a total of about 44736 Kbps and has 672 channels. KFF is using a 25Mbps connection to the internet. All three KFF locations are using a linear bus topology using 100base T Ethernet, which means that Ethernet is used and allows for data transfer rates of up to 100Mbps. The file server, workstations and all equipment previously mentioned are connected to a linear cable. This type of LAN network has disadvantages that outweigh the advantages. One major disadvantage is that the entire network is disabled if there is a break in the main cable, and locating the break can prove to be difficult. Another disadvantage is that the more devices are added, the less efficient it becomes. This outdated design broadcasts data which uses up important bandwidth that can be used for better......

Words: 1984 - Pages: 8

Premium Essay

Syllabus

...|[pic] |Course Syllabus | | |College of Information Systems & Technology | | |NTC/362 Version 1 | | |Fundamentals of Networking | Copyright © 2013 by University of Phoenix. All rights reserved. Course Description This course provides a foundation in the basic telecommunications and networking technologies fundamental to the industry and to the broad field of telecommunications. Analog, digital, and radio frequency technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies......

Words: 2455 - Pages: 10

Premium Essay

Week 3 Team

...Week 3 Team Assignment NTC/362 November 24, 2014 OSI Model The Open Systems Interconnection (OSI) has been a reference for model network protocols since the mid-1990s. The OSI is formally known as the Open Systems Interconnection (OSI) model ISO/IEC 7498-1. The International Organization for Standardization (ISO), is a global standards-settings group that is comprised of members from various national standards groups. International Electrotechnical Commission (IEC) is another global standards-settings group; however, it focuses on electrical, electronic, and related technologies. (Foundational Focus: OSI Model-Breaking Down the Seven Layers, 2013) The OSI model is comprised of seven layers, with layer one positioned at the bottom of the layer stack and layer seven at the top. The layers have assigned names as well as number references. Layer 7, the application layer, is the interface between the protocol stack and application software. The software might be client or utilities or server services. It is the ability of software to communicate with the standardized interface of application layer protocols that makes network communications possible. Layer 6, the presentation layer, establishes the context between disparate application layer protocols. Effectively, the presentation layer adjusts syntax, semantics, data types, data formats, etc. This layer ensures that data sent by the application is compatible with the lower layers of network communication and that......

Words: 2317 - Pages: 10

Premium Essay

Integrative Network Design

...Integrative Network Design NTC/362 Integrative Network Design Project Kudler Fine Foods is one of the biggest and fastest growing food companies in the Unites States. Because of this fast expansion there are expected and often increased goals that must be done in order to keep all parts of the company working as they should. One of these areas that must be kept up to date and secured at all times is its integrated network. Again because of the company’s recent growth there will be challenges that will happen especially with the network so a good integrative network design must be developed in order to continue this positive trend both in present and in the future. Kudler Fine Foods is taking the next step to upgrade the existing infrastructure with new wireless technology which will provide a better communication link for not only all of the stores, but for all of the employees as well. Kudler Fine Foods wants to implement a new network design that will connect their three locations that is spreaded out across the U.S. With the new systems and servers the ability to maximize the company’s profits will increase overnight. This new inventory system will allow the stores POS systems to alert the warehouses to ship more products when they are running low automatically. This will eliminate the need of wasted man hours checking the stock. Using a Wide Area Network (WAN) would be the best choice for connecting the three locations together. They also want to implement a...

Words: 3955 - Pages: 16

Premium Essay

Sdlc

...KFF Network Design NTC/362 – Fundamentals of Networking Tom Krawczyk September 12, 2015 Primer Information technology is an essential part of many businesses today, and this is evident in the ways many companies are increasingly relying on their computers to optimize their businesses. It is also not uncommon for businesses of distinct sizes to utilize multiple computers in their offices, with these computers interconnected through networks to allow information sharing between computers. Computer networking is even more required in businesses with multiple offices, and these locations could sometimes cut across different geographical boundaries. Kudler Fine Foods (KFF) epitomizes such business concerns that optimize its with computer networking. The company, located in San Diego, was founded in June 18, 1998, and it is a local specialty food store with three locations within the USA. However, the organization has evolved since its formation and seems to have outgrown its present network infrastructure. As such, to successfully compete in ever challenging business climate, KFF requires enterprise upgrade, and the goals of proposed network are modern technologies for data collection, information protection, and enterprise communication coupled with optimal data speeds and network access. This upgrade will not only enable transform KFF into a 21st century organization, but it will also enhance its productivity and giving......

Words: 4257 - Pages: 18

Premium Essay

Kudler Fine Foods Network Design Project

...INDP Final Kudler Fine Foods Network Design Project NTC 362 March 17, 2014 Introduction This paper will present the Final Integrative Network Design outlining the cumulative plan that Kudler Fine Foods has accepted and agreed on for implementation of the following: Final Network Design The integrative network design project for Kudler Fine Foods will include Transmission Control Protocol/ Internet Protocol (TCP/IP) will be used as a means of communication within a private network or the internet for Kudler Fine Foods network devices. Hypertext Transfer Protocol (HTTP) is used for transfer of multimedia files, video, sound, and text over the internet. Kudler Fine Foods will implement File Transfer Protocol (FTP) to download files, transfer files, delete files, copy and rename files from the internet as needed. Mesh Protocol will be used to connect all devices such as printers, computers, and scanners on the network. In a true mesh topology every node has a connection to every other node in the network ("Common Physical Network Topologies ", 2014).   The network will consist of a hardware firewall blocking unwanted access from outside of the location. The next step is to set up a hub or switch that will connect all of the stores terminals. All of these terminals such as registers and remote locations such as warehouse will be hardwired with twisted pair CAT 5 Ethernet cable. The server will be located in a room in each store with the hub or switch. A wireless...

Words: 4817 - Pages: 20

Premium Essay

Indp Final

...Del Mar store, and the Encinitas store on their network that are interconnected on a WAN through a T3 line. The La Jolla stores network is built around a 100baseT environment the main server is an IBM blade server system C3000 that uses UNIX, and backed up with a10TB NAS, and 5KVA APD UPS that provides power backup. This server runs the corporate SAP ERP SW, the network services, e-mail, storage control, printer/file services, and the Internet. The retail store uses NCR Real POS 82XRT POS terminals and systems. At this time they have 19 Dell Vostro computers that share 3 HP networked printers these components are used by corporate management and other admin personnel. The communication that comes in or out of the La Jolla store runs through 2 cisco routers, and firewalls they help to provide an inter-store dedicated network and a separate 25Mbps link to the Ethernet. This location also has 19 VOIP phones. Del Mar and Encinitas Store Networks both are basically the same as the La Jolla store the only differences are they both have 6 Dell Vostro computers with 1 HP laser jet multifunction networked printer, and 6 VOIP phones per store (Apollo Group, Inc., 2013). These networks allow the sharing of resources and make it cheaper to set up the network and save on costs. The networked computers can share centralized key computer programs such as inventory spreadsheets, or a customer’s information this allows users to have the same program so he or she can work on the......

Words: 4397 - Pages: 18

Premium Essay

Kff Pr

...Del Mar store, and the Encinitas store on their network that are interconnected on a WAN through a T3 line. The La Jolla stores network is built around a 100baseT environment the main server is an IBM blade server system C3000 that uses UNIX, and backed up with a10TB NAS, and 5KVA APD UPS that provides power backup. This server runs the corporate SAP ERP SW, the network services, e-mail, storage control, printer/file services, and the Internet. The retail store uses NCR Real POS 82XRT POS terminals and systems. At this time they have 19 Dell Vostro computers that share 3 HP networked printers these components are used by corporate management and other admin personnel. The communication that comes in or out of the La Jolla store runs through 2 cisco routers, and firewalls they help to provide an inter-store dedicated network and a separate 25Mbps link to the Ethernet. This location also has 19 VOIP phones. Del Mar and Encinitas Store Networks both are basically the same as the La Jolla store the only differences are they both have 6 Dell Vostro computers with 1 HP laser jet multifunction networked printer, and 6 VOIP phones per store (Apollo Group, Inc., 2013). These networks allow the sharing of resources and make it cheaper to set up the network and save on costs. The networked computers can share centralized key computer programs such as inventory spreadsheets, or a customer’s information this allows users to have the same program...

Words: 4396 - Pages: 18

Premium Essay

Future Combat Systems Command and Control

...concerning distribution of reports to: U.S. Army Research Institute for the Behavioral and Social Sciences, Attn: DAPE-ARI-PO, 5001 Eisenhower Ave., Alexandria, VA 22304-4841. FINAL DISPOSITION: This Research Report may be destroyed when it is no longer needed. Please do not return it to the U.S. Army Research Institute for the Behavioral and Social Sciences. NOTE: The findings in this Research Report are not to be construed as an official Department of the Army position, unless so designated by other authorized documents. |REPORT DOCUMENTATION PAGE | |1. REPORT DATE (dd-mm-yy) |2. REPORT TYPE |3. DATES COVERED (from. . . to) | |February 2004 |Final...

Words: 28401 - Pages: 114