Network Solution

In: Computers and Technology

Submitted By d1foreal
Words 878
Pages 4
Introduction
This is an individual project. Each student must complete a Case Study that provides the requirements analysis and a proposed solution for converged network solution. The target audience will be the organization’s Chief Information Officer (CIO). The Case Study deliverable is an MS Word document.

The completed Case Study deliverable is due by 11:59 PM Eastern Time on the due date shown in the Course Schedule. See the Additional Information section of the syllabus for the penalty for late or missed assignments and projects.

The Case Study is valued at 12% of the course grade.

Case Study
Company Overview
Catacomb, Inc. is a global logistics provider that offers fully integrated freight and supply chain services through managed warehousing and domestic and international freight forwarding. Services range from door-to-door domestic and international delivery services to total supply chain management. With branches across the United States and Europe and partners worldwide, Catacomb continues to expand, and it has experienced rapid growth through acquisitions.

Note: The term supply chain refers to all the elements involved in bringing an organization's products from the raw-goods stage to the customer.

The Association for Operations Management (APICS) dictionary ((http://www.apics.org/Resources/APICSDictionary.htm) defines “supply chain management (SCM)” as the design, planning, execution, control, and monitoring of supply chain activities with the objective of creating net value, building a competitive infrastructure, leveraging worldwide logistics, synchronizing supply with demand and measuring performance globally.

The Business Challenge
Catacomb is competing in an environment where freight transport is as much about keeping customers informed as it is about on-time delivery. The company has adopted web-based technologies…...

Similar Documents

Network Solutions

...IT 331-CNS Capstone Network Solutions LLC 6/22/2012 Network Solutions IT Staff * Victor Santiago - Network, Systems Manager Job Description: Managers of information technology provide leadership, team management and stewardship for an organization's IT-enabled business systems, solutions and processes. They manage the technology portfolio, which typically includes personal computers, mainframes, servers, data storage, networks, middleware, Internet services and other IT systems that comprise the core infrastructure. Managers of information technology are dynamic, engaging and personable technologists, and provide leadership during projects ranging from large, strategic initiatives to small systems upgrades. * Jason Rush - Project Manager, Network Analyst Job Description: IT managers these types of managers are accountable for making certain an application, computer hardware product or service remains on target throughout the development process and delivery stages. They may have oversight of computer programmers, IT professionals, and system administrators. They have to also provide effective leadership and marketing communications expertise. A project manager job description can be defined as anyone that is given the responsibility of taking a project from start to finish and completing all the objectives along the way. At the same time maintaining control over what is said to be the three most important components of any job, Time, Cost, and Quality. More......

Words: 800 - Pages: 4

Network

...Assignment 2: Network Topology Design You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no off-site disaster recovery services or servers. The network design remains a non-redundant, flat topology. Your assignment must consider the three-layer hierarchical model. You are free to make supported assumptions of the applications and services that this organization uses. Write a one (1) page paper in which you: 1. Depict a network topology graphical model of the initial environment of 10 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 2. Depict a network topology graphical model of the current 100 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 3. Depict a network topology graphical model for future growth to 200 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length. 4. Create a two-paragraph executive summary. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times......

Words: 378 - Pages: 2

Case Study 1-2 Performance Management at Network Solution, Inc.

...Performance Management Case Study 1-2 Case Study 2 Performance Management at Network Solutions, Inc 1. Overall, what is the overlap between Network Solutions’ system and ideal system? a. Some of the solutions that overlap between Network Solutions’ and ideal system are that, Network Solutions’ created their PM to align directly with employee’s goals and the company. Another addition is that Network Solutions’ wants to standardize the system completely throughout the entire company. Network solutions’ also implemented two way communications which allows employees to add their own input which creates openness in the work place. The development programs incorporated are also created to enhance employees’ performance. In addition to the developmental programs Network Solutions’ also included the rating system of 1,2,3 that allows mangers to rate employees from one the highest, to three the lowest. Lastly I found that Network Solutions’ PM and the ideal system had the overlapping similarity of consistency year round. 2. What are the features of the system implemented at Network Solutions that correspond to the features of the ideal characteristics? Which of the ideal characteristics are missing? For which of the ideal characteristics do we need additional information to evaluate whether they are part of the system at Network Solutions? a. The features that I have found that correspond with the ideal system are strategic congruence, validity, identification of......

Words: 281 - Pages: 2

Network Homework Solution

...复习题: 4.答:不同意。如课本中所述,所有的通信会话都有客户端和服务器端。在P2P文件共享应用中,接收文件的一方是客户端,发送文件的一方是接收端。 5.答:目的主机的IP地址和目的端口号。 9.答:SSL运行在应用层。SSL socket从应用层获取未加密的数据,加密后,传递给TCP socket。如果应用程序的开发者想要用SSL来强化UDP,他必须把SSL代码包含到应用程序中。 12.答:当用户第一次访问网站时,网站返回一个cookie号。cookie号存储在用户的主机上,由浏览器管理。在每一次后续的访问(或购物)时,浏览器将cookie号发回站点。因此站点知道这个用户(更准确的说,是这个浏览器)在访问站点。 16.答:报文通过从Alice的主机发送到邮件服务器,使用HTTP协议。Alice的邮件服务器将报文发送到Bob的邮件服务器,使用SMTP协议。Bob将报文从他的邮件服务器传输到他的主机,使用POP3协议。 17. [pic] Figure: A sample mail message header Received:该首部表示SMTP服务器发送和接受邮件报文的序列号,包含各自的时间戳。 这个例子中有4个“Received:”首部。这意味着这和邮件报文在到达接受者的邮箱之前经过了5个不同的SMTP服务器。 ● 第四个“Received:”首部表示邮件报文从发送者的SMTP服务器流向传输服务器链中的第二个SMTP服务器。发送者的SMTP服务器的地址是65.55.135.123,第二个SMTP服务器是by 130fd.bay130.hotmail.msn.com。 ● 第三个“Received:”首部表示邮件报文从服务器链中的第二个SMTP邮件服务器流向第三个SMTP服务器,然后继续。 ● 最后,第一个“Received:”首部表示邮件报文从服务器链中的第四个SMTP服务器流向最后一个SMTP服务器(例如,接受者的邮件服务器)。 Message-id: 报文的编号是BAY130- F26D9E35BF59E0D18A819AFB9310@phx.gbl (by by130fd.bay130.hotmail.msn.com)。Message-id是一个在报文创建时,由邮件系统分配的独一无二的字符串。 From: 表示邮件发送者的email地址。在上面的例子中,发送者是prithuladhungel@hotmail.com To: 表示邮件接受者的email地址。在上面的例子中,接受者是prithula@yahoo.com Subject: 表示邮件的标题(如果发送者指定)。在上面的例子中,发送者指定的标题是“Test mail” Date: 发送者发送邮件时的日期和时间。在这个例子中,发送者发送邮件的日期是19th May 2007,时间是23:52:36 GMT。 Mime-version: 邮件使用的MIME版本。在这个例子中是1.0。 Content-type: 在邮件报文主体的内容的类型。在这个例子中,是“text/html”。 Return-Path: 指定当邮件接受者想回复发送者时,回复邮件的发送地址。也被发送者的邮件服务器用来在发送错误时,返回不可发送的邮件报文。在这个例子中,返回路径是prithuladhungel@hotmail.com。 习题: 1. a) F b) T c) F d)......

Words: 270 - Pages: 2

Simulations in Wireless Sensor and Ad Hoc Networks: Matching and Advancing Models, Metrics, and Solutions

...TOPICS IN AD HOC AND SENSOR NETWORKS Simulations in Wireless Sensor and Ad Hoc Networks: Matching and Advancing Models, Metrics, and Solutions Ivan Stojmenovic, University of Birmingham and University of Ottawa ABSTRACT The objective of this article is to give advice for carrying out a proper and effective simulation activity for protocol design. It challenges some of the existing criticisms of simulation practices that emphasized validation aspects. This article advocates the use of simple models, matching assumptions and metrics in the problem statement and simulation to provide a basic “proof of concept,” and comparison with truly competing solutions, which is possible only after a thorough and critical literature review. Then the complexity of the models can be increased (one parameter at a time), revising the algorithms themselves by adapting them to new assumptions, metrics, and the corresponding simulation environment. Selected independent variables should explain performance under a wide range of scenarios. unclear which protocol will perform well under a wide range of scenarios. It is our view that each article should be judged on its overall contribution, including the assumptions used, theory developed, new algorithms introduced, protocol details, simulation results, and relevance to an ultimate goal of staying on a path toward creating applications. We begin with a literature review of existing criticism for simulation practices, and then discuss what......

Words: 4845 - Pages: 20

Network

...Box 112, Ashaiman-GhanaEmail : slychurchill@yahoo.com fwuashie@ug.edu.gh Nationality  : GhanaianDate of Birth: 22nd June, 1981 | | ------------------------------------------------- Profile I am industrious, goal-oriented, focused and ambitious person with Computer Hardware & Networking, and Microsoft Certified System Engineering background. I have a dedicated insight into the needs and views of others, and the ability to identify issues or crisis areas and form inventive information technology solutions. My areas of strength include; Networking and System Administration/Security Objectives I aspire to become a Network Systems Security Analyst and Database Administrator and to work in a demanding, competitive, fulfilling and an exciting environment to bring out the best in me. ------------------------------------------------- Education And Professional Qualification Certification Status | Credential | Certification / Version | | Date Achieved | | Ubiquiti airMAX & Unifi Wi-Fi Training | airMAX Certified & Unifi Wi-Fi | | April 12, 2013 | | Modules: * Understanding Wireless Communication * Active Server Pages * Link Planning and ManagementMicrosoft Certified Technology Specialist | Administrator. * Ubiquiti Protocols......

Words: 774 - Pages: 4

Network

...Network Attached Device Network-attached storage (NAS) is a dedicated hard disk storage device that is set up with its own network address and provides file-based data storage services to other devices on the network. It is attached to a local area network and assigned an IP address, allowing both application programming and files to be served faster because they are not competing for processor resources. NAS devices are usually configured with a web browser and do not have a keyboard or display. Consists of hard disk storage, including multi-disk RAID systems and can usually handle a number of network protocols, including Microsoft's Internetwork Packet Exchange and NetBEUI, Novell's Netware Internetwork Packet Exchange, and Sun Microsystems' Network File System. (Rouse, 2013) NAS devices speed is typically one gigabit Ethernet connection but this can be changed to multiple gigabit, 10 gigabit, fiber optic by adding a pci-e network card(s). Older parts can be used which may be limited to 10/100 megabit. If you need an exact answer for speed, simply look at the wiki on gigabit. The capacity range varies, people have built 40 TB (terabyte) machines and other just have 2TB. With port replication and add on hard drive controller cards there is hardly a limit on size. A board with 6 SATA ports can be replicated (1 to 5 port) allowing for 30 drives to be attached, if 3TB drives were used in raid 50 that would be 72TB of storage. As far as fault tolerance, raid 50...

Words: 703 - Pages: 3

Creatimg a Network Solution

...Create a Network Solution Name: Course: Tutor: Date: Create a Network Solution. Many methods of using computer networks for data storage have come up in recent years. The most common and popular approach which I personally prefer is the network attached storage (NAS).NAS allows businesses more affordably that before to store and retrieve large amounts of data. Most businesses do not consider the future expansion of their companies when creating their network solutions and end up exhausting their network resources. The increase in the data capacities of the electronic components used in today business world has led to the demand for a more convenient storage type. The ability to use a file server to store files has led to companies deploying large centralized NFS servers which are accessed by thousands of clients. Central file servers are seen as the basic solution to demands put forward. A file server is in basic terms a workstation or a personal computer hardware running on a network operating system (NOS).The NOS in this case boasts file sharing capabilities. The hard drives installed in the computers are used to provide the required storage space ranging from gigabytes to terabytes of memory space depending on the size of business. Many business owners are not justified by the use of a fully general-purpose computer as a server for simple storage services. This factor brought to the development of the network attached storage (NAS). NAS creates a system...

Words: 1467 - Pages: 6

Networks

...Case: You are appointed as a technical expert to implement a network system for a small size maritime supplyrepresentative company with four users. The company provides supply services to Maritime shipping companies through a worldwide network of suppliers. Its owner is a maritime business expert who doesnot know much about the use of computer systems to support her business. Therefore, she has decidedto employ you as a consultant on a short term basis to set-up appropriate systems in a network. She hasheard about various technologies and the efficiency achieved by computer systems and would welcomeadvice on the acquisition of hardware, software and network items to augment her existing systems inorder to meet the company’s growing needs. The company has a budget of £100,000 for this project. The company currently consists of the following departments (all located in the same open space office): The sales Manager who is responsible for dealing with Maritime companies. She is assisted by asales assistant, equipped with a laptop but with no ability to access the web. This department iscurrently the only one with a connection to the Internet and with access to the company’s commonemail.  The General Manager who is responsible for the general operation of the company. She tradeswith suppliers all over the world in order to ensure the best prices of goods for the company’sMaritime shipping clients. For client communication, she uses plain telephone services and a faxmachine....

Words: 545 - Pages: 3

The Bead Bars Network Solution

...The Bead Bars Network Solution The Bead Bar business is an arts and crafts oriented company which specialized in allowing customers to create their own bead jewelry. The company was founded by Meredith S. in 1998 and her first bead bar studio was opened in New Canaan, Connecticut. Today, the company consist of two studios in New York City, one in Long Island, one in Washington, D.C., and on in Boston, Massachusetts. There are five franchises in Kansas City, Missouri; Chicago, Illinois; Los Angeles, California; Seattle, Washington; and Miami, Florida. The Bead Bar on Board is a portable Bead Bar designed for cruise ships, the portable bar can be placed on deck or in a lounge for the cruise members to create their own bead jewelry. Now, the Bead Bar became so popular that it outgrew its paper-based system and is in need of an upgrade to a more effective technology system. The old file cabinet and orders on paper are just not efficient enough to compete with today’s technology advancements. Today’s information technology systems have the ability to globalize and reach customers all over the world, which are of benefit for the Bead Bar to reach more customers and make more sales. Upgrading to an information technology system will also solve most of the problems which comes with a paper-based system such as lost orders, invoicing errors as well as delays in order fulfillments. The company’s background and information technology needs The company information......

Words: 1438 - Pages: 6

Network+ 5 Chapter 9 Solutions

...What is the function of a redirector? To determine whether a request is meant for the client CPU or the server What are the three tiers in a 3-tier architecture? Client, middleware, server If Alex’s user account belongs to the Teachers group on a Windows Server 2008 network, and the Teachers group has read and execute permissions for the Lessons folder, what can Alex do with documents in the Lessons folder? Open an existing document. Suppose you own a computer that contains a 1 GHz processor, 512 MB of RAM, and an 8 GB hard drive. If you wanted to install Windows Server 2008 on this computer, what is the minimum hardware upgrade you must perform, if any? Increase the hard drive space to 10 GB. You have created a printer object for a new HP LaserJet in your Windows Server 2008 Active Directory. Before users can print to this printer, what else must you create in Active Directory? a. A printer share What is the purpose of a container in an LDAP-compatible NOS directory? To organize similar objects for easier management What is the relationship between threads and multiprocessing? Processes are made of threads; threads within a process can be handled by different processors to improve server performance. When a server’s RAM is fully utilized, where can the NOS store unused information blocks? In a page file on its hard drive What primary advantage does Windows Server 2008 gain by assigning each operation its own 32- or 64-bit memory area? a. Multiple......

Words: 636 - Pages: 3

Network

...Network Design Following the acquisition of new premises comprising a two-story office in Adeplhi, Maryland this provides UMUC with the ability to revise and improve their network topology accordingly and ensure that not only is connectivity provided in a consistent fashion but also to provide the required security for information accordingly. One of the fundamental requirements is to ensure that data is segregated in terms of staff and students so this will require the creation of dedicated subnets accordingly to follow through and implement the solution, while there is also a requirement to provide wireless connectivity for students in the lobby area. Given that there is a specific opportunity to develop a comprehensive infrastructure it is important that the fundamental basis in terms of cabling is of a sufficiently high quality to support current and future operational requirements. Due to the size of the building there would be limitations if using Cat 5 based Ethernet cables for example and so therefore there should be a requirement to utilize Cat 6 based Ethernet as this will support a maximum cable length in excess of 300 ft without there being any connectivity or performance issues (Mitchell, 2014). Each of the two floors will have a designated server room that is designed to provide a central point of connectivity for all locations on that floor, and each of the rooms on the first and second floor will require a certain number of data ports based on their expected......

Words: 1451 - Pages: 6

Building a Network Solution for a Car Dealer

...built facility in a suburb town of Washington, D.C.. You are retained as a consultant by AOC dealership to design a network solution for their new location. The new facility is assumed to be wired with UTP and fiber, with outlets in specific locations. The basic network is to be a LAN that serves desktop computers in the general manager’s office, in the salesmen’s area, and the showroom area; mobile devices (laptops, smartphones, tablets, etc.); and various accessories (printers, etc.). A major component of the network is a file server (for storing the sale contracts, and other files). Of primary importance is the Internet access solution (e.g., leased lines, Cable, DSL, broadband wireless, fiber to the home, satellite). Other components (such as web server, and database server) may be added for completeness (to earn extra credit). Design a network solution, considering the following: •Type and topology of LAN •LAN cabling •Storage file server: data back-up/archiving, file consistency, file access logs, and data recovery •Internet access method (assume maximum availability of solutions) •Security (all pertinent issues) •Any other specific issues, such as web and database servers (for extra credit) Your deliverable is a Word document of 4-6 pages (not including the title page and the reference page). It's required to include in the report a diagram of your network solution, and a table of the components (hardware and software) proposed. References must be listed and cited in......

Words: 262 - Pages: 2

Network Solution

...Network Infrastructure Proposal Per the request of (CUSTOMER) I have written the following proposal in order to clearly depict the benefits and steps required to install a computer networking infrastructure within the hospitals main building. Summary of requirement Fifty new workstations have recently been delivered to the IT staff for new employees. The (CUSTOMER) staff continues to grow at a phenomenal rate, and now needs a common storage area for sensitive patient information, and administrative data. Instant access to critical or time sensitive information is vital to operations. Searching through various local directories, on fifty plus different machines to locate one file is no longer acceptable. Security, data integrity, and administrative control all must be considered with any solution that is implemented. Project Analysis The scope of this project will be: To install infrastructure, plenum grade Multimode fiber optic cabling (MMF), plenum grade Category six copper cabling (Cat6), and wireless access points (WAP) throughout the main building in order to build a Windows Active Directory domain. We will then network all consumable resources, storage shares, and printers together, then control access with role-based access permissions. User groups will consist of Admin (IT), HR, Staff, and Medical according to (CUSTOMER)'s internal employee divisions, users will be dropped into appropriate group(s). Proposed Solution Aside from purchasing cabling and......

Words: 909 - Pages: 4

Network Solution

...Network solutions are continuously evolving in a changing economy. The five industries that were researched are banking, retail, judicial, law enforce, and military. The investigation included but not limited to be the history of the different networks, current network solutions, and than the future challenges of each varied business. The banking industry has evolved greatly due to the continuous improvement in technology and network solutions. The first bank in the United States of America was established by Congress in 1791 called the Bank of the United States. The first network innovation breakthrough that is a precursor to online banking was the invention of the telegraph. The telegraph was invented in 1844 by Samuel Morse which for the first time it allowed mankind the convenience and comfort of communication. For the first time it allowed banks to communicate across great distances in a qualified short period of time. The next great leap forward in network solutions in the banking industry occurred in the late 20th century. The wide distribution of automated teller machines (ATMs) by the mid-1980s gave customers 24-hour access to cash and account information. On-line banking through the Internet and banking through automated phone systems now allow for electronic payment of bills, money transfers, and loan applications without entering a bank branch. The current network of the banking industry has made it possible to deliver services throughout the......

Words: 715 - Pages: 3