Free Essay

Effects of Routing on Current Communication Methods

In:

Submitted By gmarin1
Words 276
Pages 2
As the IT consultant it is my responsibility to introduce the Johnson Company marketing department to the 21st Century. The advertisement methods the company currently use, although effective in the pass are now old and obsolete. Here are some of my recommendations to reach new costumers.
Social Media:
Creating a Company Web page, Facebook page, and a Twitter accounts is the fastest way to reach millions of potential new costumers. The exposure is not only local but also international, opening the doors to a whole new market. The company web page will be interactive and will show all our products with precise detail, specifications, pictures and videos. All of these will be available in different languages. We will give the client the opportunity to familiarize himself with the product; in that way they can see if it meets their needs. If they find the product they need they can place an order online at any time, they don’t have to wait until the morning to call and order which by the way will be phase out a month after the web page is up.
Provide a method so they can ask questions and leave comments if needed. A database that keeps track of costumers, orders, and inventory will be created. No more handwritten orders.
A company representative will call existing costumers informing them about the new web page. We will provide assistance with the transition to the new system if needed.
At last, a newsletter will be created to inform all of your clients, and subscribers of any new product, updates, recall, technical tips, or any news related that could impact their companies or products.

Similar Documents

Premium Essay

Effects of Routing on Current Communication Methods Used by Organizations

...Effects of Routing on Current Communication Methods Used by Organizations Communicating to the consumer is the key element in a successful business. Due to a fast paced world there are modernized techniques that all companies need to adapt and implement when it comes to marketing. There is several ways a company can reach out to their clients. A company must dedicate their time to keep their presence known to the public. In order for Johnson and Company to stay competitive and market to their clients and prospects, there are suggestions I have to help make this happen. First, the phones systems need to be updated from an analog system to a Voice Over IP (VOIP) system. One of the main advantages of VOIP is receiving and taking calls away from the office, if you have an internet connection. Another advantage to a digital phone system is clear and crisp sound creating a better experience for the caller. With VOIP you can set up phone conferences allowing you to see and hear the client or vendor. An after-hours machine can be utilized to provide information on the company and its products, website information, and any other details you want your customer to know about. (Zultys n.d.) Another upgrade that would need to take place is the way the customer orders are handled. A POS system is a way to analyze data sales, maintain a sales history, and improve accuracy by integrating bar-codes and having the ability to take credit card transactions. (Point of Sale System n...

Words: 856 - Pages: 4

Free Essay

: Effects of Routing on Current Communication Methods Used by Organizations

... The Johnson Company is a small business that provides networking components and services. They are in need of new methods of communication for reaching out to new customers, standing out from other businesses, meeting existing customer needs, and keeping customers informed of news and updates. The Johnson Company still uses analog phone lines and still takes customer orders by hand. Their only current method of advertising is an ad in the yellow pages. They have reached out to our IT consulting firm to help them update their current business processes and communications Setting up an intranet site is one of the best ways for small businesses to keep all their workers in the loop and communicate new information. The Johnson Company can also use Microsoft SharePoint application and services to set up internal websites designed for specific projects. Providing customers with a website capable of taking online orders while advertising online as well would give the customers ease of access and efficiency. Project managers can also use these specialized websites to share documents and information, and this can help the projects run more smoothly and effectively. Email is one of the most widely used forms of technological business communication. Instant messaging services such as Skype and Go To Meeting are very up and coming and can provide better communications even more than email. Online advertising, forums, blogs, as well as some possible radio ads may also increase clientele...

Words: 352 - Pages: 2

Premium Essay

Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations

...Requirements documents provided below must be printed and distributed to students for guidance on completing the discussions and assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations Learning Objectives and Outcomes * Explore the effects of routing on current communication methods used by organizations. Assignment Requirements The Johnson Company provides networking components and services. It sounds simple, but management knows it takes a lot of planning to get it right. Retail product and service businesses operate in a crowded market. There is intense competition for customers. Today's businesses have found that the pursuit and retention of customers is the primary goal and Johnson is concerned that their methods are too antiquated to keep them competitive. Currently, Johnson used analog phone lines and takes all customer orders by...

Words: 3601 - Pages: 15

Free Essay

Bgp Securiy Issues and Solutions

...A REPORT ON CURRENT BGP PROBLEMS AND SUGGESTED SOLUTIONS CS526- Assignment# 4 Amit Jhamb & Bhavani Prasad University of Missouri- Kansas City BGP Overview The Border Gateway Protocol (BGP) is an exterior gateway protocol (EGP) also known as inter-Autonomous System routing protocol. The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASs) that reachability information traverses. This information is sufficient to construct a graph of AS connectivity from which routing loops may be pruned and some policy decisions at the AS level may be enforced. BGP-4 provides a new set of mechanisms for supporting classless interdomain routing. These mechanisms include support for advertising an IP prefix and eliminate the concept of network "class" within BGP. BGP-4 also introduces mechanisms, which allow aggregation of routes, including aggregation of AS paths. BGP also performs interdomain routing in TCP/IP networks. Problems in BGP I-BGP Scaling Problem: All BGP speakers within a single AS must be fully meshed so that any external routing information must be re-distributed to all other routers within that AS. This "full mesh" requirement clearly does not scale when there are a large number of IBGP speakers as is common in many of todays internet networks. For n BGP speakers within an...

Words: 2770 - Pages: 12

Free Essay

Simulations in Wireless Sensor and Ad Hoc Networks: Matching and Advancing Models, Metrics, and Solutions

...TOPICS IN AD HOC AND SENSOR NETWORKS Simulations in Wireless Sensor and Ad Hoc Networks: Matching and Advancing Models, Metrics, and Solutions Ivan Stojmenovic, University of Birmingham and University of Ottawa ABSTRACT The objective of this article is to give advice for carrying out a proper and effective simulation activity for protocol design. It challenges some of the existing criticisms of simulation practices that emphasized validation aspects. This article advocates the use of simple models, matching assumptions and metrics in the problem statement and simulation to provide a basic “proof of concept,” and comparison with truly competing solutions, which is possible only after a thorough and critical literature review. Then the complexity of the models can be increased (one parameter at a time), revising the algorithms themselves by adapting them to new assumptions, metrics, and the corresponding simulation environment. Selected independent variables should explain performance under a wide range of scenarios. unclear which protocol will perform well under a wide range of scenarios. It is our view that each article should be judged on its overall contribution, including the assumptions used, theory developed, new algorithms introduced, protocol details, simulation results, and relevance to an ultimate goal of staying on a path toward creating applications. We begin with a literature review of existing criticism for simulation practices, and then discuss what we...

Words: 4845 - Pages: 20

Free Essay

Title Paper

...for OLSR Routing Protocol in MANET Kirti Aniruddha Adoni1 and Radhika D. Joshi2 1 Modern College of Engineering, Shivaji Nagar, University of Pune, , India akirti2008@gmail.com, k_adoni@rediffmail.com 2 College of Engineering, University of Pune, India rdj.extc@coep.ac.in ABSTRACT Mobile Adhoc Network (MANET) eliminates the complexity associated with an infrastructure networks. Wireless devices are allowed to communicate on the fly for applications. It does not rely on base station to coordinate the flow of the nodes in the network. This paper introduces an algorithm of multipath OLSR (Optimized Link State Routing) for energy optimization of the nodes in the network. It is concluded that this solution improves the number of nodes alive by about 10 to 25% by always choosing energy optimized paths in the network with some increase in normalized routing overheads. KEYWORDS OLSR, multipath, Energy Optimization, Nodes Alive, Overheads 1. INTRODUCTION A Mobile Adhoc NETwork (MANET) is a multi-hop, distributed and self configuration network[1].The communication between two distant nodes is through the number of intermediate nodes which relays the information from one point to another. As nodes can move randomly within the network, routing packets between any pair of nodes become a challenging task. A route that is believed to be optimal for energy utilization at certain time might not be optimal at all, few moments later.[4] Traditional proactive routing protocols[3...

Words: 3772 - Pages: 16

Premium Essay

Advantages of Cisco

...Advantages of Cisco Cisco ISN components are deployed at the edge of big organizationsr IP network, and enable big organizations to provide local IVR and queuing corporate services without consuming expensive bandwidth on the core IP backbone Alternatively, the ISN routes and transfers the call through the IP network, in effect turning the IP network into a giant user-controlled switch.More Efficient Call Routing and Transfers: When a call has finished receiving IVR/queuing treatment on the ISN, the call is routed to its destination without needing a bridge inside the ISN As a result a lesser number of ports are required on the ISN than on some other IVR systems As an Open, Future-Proof Architecture, the ISN performs in an open environment using common Internet technologies and methods. Scalability and Operational Simplicity: The Cisco ISN solution can be customized to solve big organizationsr communication requirements. ISN servers can easily be added to big organizationsr existing infrastructure if the communication needs of the business are growing. The ISN`s technology also simplifies operational management. It fits Big organizationsr Communication needs as the Cisco ISN has the ability to operate in a pure IP environment and it can also be integrated with big organizationsr existing telephony infrastructure through the use of voice-over-IP (VoIP) gateways. New Corporate services, New Opportunities: The ISN is based on Voice XML (VXML) technology, which is currently...

Words: 674 - Pages: 3

Free Essay

Self Navigating Bot

...B080270EC Under the guidance of Dr. S. M. SAMEER Submitted in Partial Fulfillment of the Requirements for the degree of Bachelor of Technology In ELECTRONICS AND COMMUNICATION ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING NATIONAL INSTITUTE OF TECHNOLOGY CALICUT Kerala, India April 2012 NATIONAL INSTITUTE OF TECHNOLOGY CALICUT DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING CERTIFICATE This is to certify that this report titled SELF NAVIGATING AUTONOMOUS BOT is a bona fide record of the major-project done by Arjun Surendran Deepak Venga Nandu Raj Priyanka G Das Sanjay George B080001EC B080027EC B080585EC B080312EC B080270EC In partial fulfillment of the requirements for the award of Degree of Bachelor of Technology in Electronics and Communication Engineering from National Institute of Technology, Calicut. Dr. S. M. Sameer (Project Advisor) Assistant Professor Dr. P S Sathidevi Professor & Head April 2012 NIT Calicut i ACKNOWLEDGEMENT We would like to thank Dr. S. M. Sameer, Assistant Professor, Department of Electronics and Communication Engineering for his guidance and inspiration in helping us complete this project. We are also grateful to Dr. P S Sathidevi, Professor and Head, Department of Electronics and Communication Engineering, for providing us with this opportunity to work on our project and also for permitting access to the required facilities. We would also like to thank the lab...

Words: 13508 - Pages: 55

Free Essay

Routing Approaches of Delay Tolerant Networks

...©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 17 Routing Approaches in Delay Tolerant Networks: A Survey R. J. D'Souza National Institute of Technology Karnataka, Surathkal, India Johny Jose National Institute of Technology Karnataka, Surathkal, India ABSTRACT Delay Tolerant Networks (DTNs) have evolved from Mobile Ad Hoc Networks (MANET). It is a network, where contemporaneous connectivity among all nodes doesn’t exist. This leads to the problem of how to route a packet from one node to another, in such a network. This problem becomes more complex, when the node mobility also is considered. The researchers have attempted to address this issue for over a decade. They have found that communication is possible in such a challenged network. The design of routing protocol for such networks is an important issue. This work surveys the literature and classifies the various routing approaches. discontinuity in the network. There are also methods that have employed additional mobile nodes, to provide better message delivery. Researchers are even exploring how the social interaction of humans can be utilized for routing in a DTN. This survey has made an extensive study of the various routing strategies taken by the researchers in the past few years. We have classified them based on the type of knowledge used for routing. 2. FLOODING BASED APPROACHES Knowledge about the network helps in deciding the best next hop. It can happen that the...

Words: 6818 - Pages: 28

Free Essay

Simulation and Research on Data Fusion Algorithm of the Wireless Sensor Network Based on Ns2

...selforganization wireless communication network through multi-hop relay. Thus it authentically achieves the purpose of ‘monitor anywhere and anytime’. The basic function of sensor network is gathering and sending back the information of the monitoring areas which the relevant sensor nodes are set in. But the sensor network node resources are very limited, which mainly embodies in battery capacity, processing ability, storage capacity, communication bandwidth and so on. Because of the limited monitoring range and reliability of each sensor, we have to make the monitoring areas of the sensor nodes overlapped when they are placed in order to enhance the robustness and accuracy of the information gathered by the entire network. In this case, certain redundancy in the gathered data will be inevitable. On the way of sending monitoring data by multi-hop relay to the sink nodes (or base stations) which are responsible to gather the data. It is necessary to reduce the redundant information by fusion processing. Data fusion is generally defined as a process that lots of data gathered from multiple sources or information are processed and combined in order to achieve more efficient data and ones that can better meet the requirements of the users. In most applications of wireless sensor network, sometimes we only concern about the monitoring results rather than gathering a lot of original data. Data fusion technology is an efficient method...

Words: 3532 - Pages: 15

Premium Essay

Ccna

...Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives:    103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach OSI Model Facts The OSI model classifies and organizes the tasks that hosts perform to prepare data for transport across the network. You should be familiar with the OSI model because it is the most widely used method for understanding and talking about network communications. However, remember that it is only a theoretical model that defines standards for programmers and network...

Words: 73801 - Pages: 296

Free Essay

System Engineerring Roles in Software Enginerring

...Lovely professional university term paper topic-system engineerring roles in software enginerring cap 590 rollno.46 section-1101 reg no-11001009 submitted to-pawan sir submitted by-jaspreet singh TABLE OF CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one...

Words: 2390 - Pages: 10

Premium Essay

Ip Spoof

...On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 6 IP source address spoofing has plagued the Internet for many years. Attackers spoof source addresses to mount attacks and redirect blame. Researchers have proposed many mechanisms to defend against spoofing, with varying levels of success. With the defense mechanisms available today, where do we stand? How do the various defense mechanisms compare? This article first looks into the current state of IP spoofing, then thoroughly surveys the current state of IP spoofing defense. It evaluates data from the Spoofer Project, and describes and analyzes host-based defense methods, router-based defense methods, and their combinations. It further analyzes what obstacles stand in the way of deploying those modern solutions and what areas require further research. Categories and Subject Descriptors: C.2.0 [Computer-Communication Networks]: General— Security and protection General Terms: Performance, Security Additional Key Words and Phrases: IP spoofing, spoofing defense, spoofing packet, packet filtering ACM Reference Format: Ehrenkranz, T. and Li, J. 2009. On the state of IP spoofing defense. ACM Trans. Internet Technol. 9, 2, Article 6 (May 2009), 29 pages. DOI = 10.1145/1516539.1516541 http://doi.acm.org/10.1145/1516539.1516541 1. INTRODUCTION In today’s Internet, attackers can forge the source address of IP packets to both maintain their anonymity and redirect the blame for attacks. When attackers inject...

Words: 14721 - Pages: 59

Premium Essay

Communication Barriers of Gp

...1.2 OBJECTIVES 1.2.1 General Objective: The primary objective of this project is to enable to learn about organizational behavior, in practice, and to use the knowledge to offer some evaluation of these activities. The main objective of the research is the communication barrier and its practices in Grameen Phone. 1.2.2 Project Objective: * To give detailed information about the Communication barrier; * To focus on the major activities of the Communication barrier practice in its department; * To show how these activities supports the organization overall strategy, and * how it is linked to other activities within the organization * To focus on the nature of, and triggers for, any changes in the activities over time; * To know the manager’s perception of the overall effectiveness of the activities; and * To focus on the extent and nature of any formal evaluation of the activity’s effectiveness. 1.3 METHODOLOGY 1.3.1 Primary Data: As it is a project work in a group we collect the data in a group. We use two method to collecting the data for our research purpose. We use quantitative (e.g. survey) and qualitative (e.g. face-to-face interviews; focus groups; site visits) Case studies both ways for our data collection. 1.3.2 Secondary Data: * Information was also taken from books and journals and also from Internet 1.4 LIMITATIONS 1.4.1 Lack of desire to serve the actual information: The major...

Words: 2854 - Pages: 12

Premium Essay

Introduction to Data Communication

...Introduction to Data Communication As the world of data communication and networking is changing a transformation of the marketing world is a challenge to stay connected with real world through devices in real time such as mobile phone, tablets, computers and laptops. The modern day marketing have to combine the creative side of discipline and this could be a huge challenge. Three areas of the changing transformation within the market of data communication are by speed, relevance and the reaches within campaigns which has increased greatly through different ways in which people may access the media, like through Facebook, YouTube, cell phones and computers. The changing system bring about a particular tool or system and for any brand of systems to work together in the networking world and brand teams of technologizes be placed to implement new systems. One such resource is “Organizational Challenges to the Adoption of the Internet” gives important update of the changes within the networking community. (www.ncbi.nlm.nih.gov). Current trends that affect the data communication are market trends in which these they show opportunities on how to grow business successfully and take advantages of the many positive changes and guard against the negative ones. While the market trend does effectively also inform it also save organizations from reacting to late when it comes to surprises that may occur while keeping ahead of the many competitors when developing business growth...

Words: 661 - Pages: 3