...IT245-1202A-01 : Introduction to Network Management Network Configuration Candice Robinson 04/23/2012 Table of Contents Target Organization………………………………………………………………….…3 Network Architecture…………………………………………………………………..4 Network Model……………………………………………………………………………….5 Network Security……………………………………………………………………………...6 Network Protocols…………………………………………………………………………….7 Network Management………………………………………………………………………...8 References……………………………………………………………………………………..9 Target Organization Name of Business: CR Media Locations: Fayetteville, NC; Greensboro, NC and New Port News, NC and a website. Number of employees: 22 Business History: CR Media is a business that provides rentals of video games and movies. The business came to life in December of 2011 and is in the process of becoming established. Movies and Games can be rented via the internet and mailed to the home address in addition to visiting a physical location in the above mentioned cites. Network Architecture The network architecture that will be used for the organization will be the client/server network. A client/server network would be more suitable because this is a business that is growing thus it will be easier to make changes and additions to the network. A WLAN Star Topology is going to be used because it will be cost effective and will allow room for future growth. The client/server network will be composed of Windows 2000 File Server, Exchange Server and Firewall Server. We plan to...
Words: 407 - Pages: 2
...Introduction to Network Management Phase 5: Network Security & Network Management Network User Guide Final Version Gabriel B. Del Fierro IT245-1304B, Introduction to Network Management Instructor: Brian Rodgers December 23, 2013 Executive Summary The purpose of this user guide is to familiarize you the Casa Del Fierro organization, what their needs are within this Network Organization. Contained in the following pages will provide you with all of the pertinent information that you will need in order to provide the highest quality of service and care. “An ounce of prevention is better than a pound of cure” – B. Franklin. Table of Contents IT245-1303B-01 Network Project Plan Executive Summary 1 Table of Contents 2 Section 1: Introduction of the Organization and its Requirements 4 Section 2: Network Architecture Design 6 Section 3: Network Model or Stack to be Used 8 Section 4: Network Protocols 15 Section 5: Network Security 19 Section 6: Network Management 22 References 24 Section 1: The Organization & It’s Network Requirements The Casa Del Fierro is a small organization with a total of two main users with a few friends and family that comes to visit on holidays. Although this network is set up in a comfortable home, individual needs may vary. The internet is used on a daily basis, Streaming Movies along with music, Online School, Social Media, Games, Online Banking and accessing medical care records. The devices to be networked...
Words: 5562 - Pages: 23
...IT245 IP5 Introduction to Network Management Individual Project Carol McClellan February 10, 2014 Contents Identifying the Network 4 The Company Considered 4 The Networks Considered 4 Servers Applied 4 Roles of Network managers 4 Diagramming the Network 5 Legend for the Diagram 5 Diagram 6 Network Models 7 The Seven Layers of the OSI Model 7 Physical Layer 7 Data Link Layer 7 Network Layer 7 Transport Layer 7 Session Layer 8 Presentation Layer 8 Application Layer 8 FCAPS 9 Fault Management 9 Configuration Management 9 Accounting 10 Performance 10 Security 10 Protocols and Agents 12 Transport Layer 12 Application Layer 12 Presentation Layer 13 Session Layer 13 Network Layer 13 Data Link Layer 14 Physical Layer 14 Network Security 15 Network Management2 16 FOOTNOTES 18 Identifying the Network The Company Considered I have decided to use Walmart for my individual project. It is an international company with 11,137 retail units in twenty-seven countries on five continents. It employs over two million people around the world. The Networks Considered There are numerous networks that would be needed for an international company such as this. In addition to the ones used nationally, there would be others in relation to language and monetary differences and shipping differences. There would also be a more extensive requirement as far as tariffs and taxes. Some of the national ones would be taking...
Words: 5551 - Pages: 23
...Intro Intro Swot BalancedScorecard Conclusion Corporate finance 2 Ngoc-Viet Vo Binh-Duong Doan Yuming Hao Huili Liu Noelia Martin Plaza Khurram Shahzad © 2010 - GMP IAE LYON 3 Intro Intro Swot BalancedScorecard Conclusion Plan Intro Swot Scorecard Conclusion Plus Introduction SWOT Analysis Balanced Scorecard Strategies & Indicators GMP Corporate Finance Plus Conclusion 2 Intro Intro Swot BalancedScorecard Conclusion introduction 3 Intro Intro Swot BalancedScorecard Conclusion Introduction Intro Swot Scorecard Conclusion Plus GMP Corporate Finance Plus Google is a global technology leader focused on improving the ways people connect with information. Incorporated in California in September 1998 and reincorporated in Delaware in August 2003. Headquarters are located at 1600 Amphitheatre Parkway, Mountain View, California 94043 4 Intro Intro Swot BalancedScorecard Conclusion Introduction Intro Swot Scorecard Conclusion Plus Mission: Google’s mission is to organize the world’s information and make it universally accessible and useful GMP Corporate Finance Plus Major Products: Google Web Search with Advanced Search Functionality Web Page Translation—supports 41 languages Integrated Tools—such as a spell checker, a calculator, a dictionary and currency and measurement converters Google image and book search Google Scholar Google Finance Google webmaster...
Words: 1119 - Pages: 5
...and file systems. • Use of the Solaris Management Console. SYS-ED/COMPUTER EDUCATION TECHNIQUES, INC. (Solaris – System Admin: Intro - 6.5) Ch 2: Page i Solaris System Administration: Introduction 1 Operating System Concepts Operating System: Definition An operating system is the set of programs that controls a computer. The core of the operating system is the kernel. The kernel is a control program that functions in privileged state that allows all hardware instructions to be executed. It reacts to interrupts from external devices and to service requests and traps from processes. The kernel creates and terminates processes and responds to requests for service. Operating systems are resource managers. The main resource is computer hardware in the form of processors, storage, input/output devices, communication devices, and data. Operating system functions include: • Implementing the user interface. • Sharing hardware among users. • Allowing users to share data among themselves. • Preventing users from interfering with one another. • Scheduling resources among users. • Facilitating input/output. • Recovering from errors. • Accounting for resource usage. • Facilitating parallel operations. • Organizing data for secure and rapid access. • Handling network communications. Processes run applications, which are linked together with libraries that perform standard services. The kernel supports...
Words: 2421 - Pages: 10
...790 4121 Lec 3 – Performance + Pipeline Review Electrical Engineering and Computer Sciences El t i l E i i dC t S i University of California, Berkeley http://www.eecs.berkeley.edu/~pattrsn http://www‐inst.eecs.berkeley.edu/~cs252 David Patterson Review from last lecture • Tracking and extrapolating technology part of architect’s responsibility • Expect Bandwidth in disks DRAM network and Expect Bandwidth in disks, DRAM, network, and processors to improve by at least as much as the square of the improvement in Latency • Quantify Cost (vs. Price) – IC ≈ f(Area2) + Learning curve, volume, commodity, margins Outline • • • • • • • • Review MIPS – An ISA for Pipelining 5 stage pipelining 5 t i li i Structural and Data Hazards Forwarding Branch Schemes Exceptions and Interrupts Conclusion • Quantify dynamic and static power Quantify dynamic and static power – Capacitance x Voltage2 x frequency, Energy vs. power • Quantify dependability – Reliability (MTTF vs. FIT), Availability (MTTF/(MTTF+MTTR) 3/28/2008 CS252-s06, Lec 02-intro 3 3/28/2008 CS252-s06, Lec 02-intro 4 1 IS2202 Computer Systems Architecture Lecture review pipeline and memory hierarchy MIPS ‐‐ A "Typical" RISC ISA • • • • 32‐bit fixed format instruction (3 formats) ( p ) 32 32‐bit GPR (R0 contains zero, DP take pair) 3‐address, reg‐reg arithmetic instruction Single address mode for load/store: base + displacement – no indirection 31 Example: MIPS (‐ MIPS) Register-Register ...
Words: 635 - Pages: 3
...http://www.cnnchile.com/noticia/2013/11/21/coca-cola-life-la-nueva-version-de-la-bebida-creada-en-chile-y-argentina# ---intro https://www.marketingweek.com/2014/09/04/coca-cola-defends-life-as-marketing-push-kicks-off/ --intro http://www.coca-cola.co.uk/newsroom/press-releases/coca-cola-life-marketing-campaign/ ---intro http://www.dailymail.co.uk/news/article-2811978/Introducing-GREEN-Coke-exclusive-taste-Coca-Cola-Life-soft-drink-35-cent-sugar-revolutionise-beverage-industry.html ---encoding http://refrigerators.reviewed.com/news/coca-cola-tests-out-a-new-unified-look-for-cans --encoding http://www.cuckoodesign.com/blog/2014/07/coca-cola-launch-new-product-green-packaging/ ----encoding http://www.thebrandingjournal.com/2014/06/coca-cola-launches-coca-cola-life-drink-natural-sweeteners-fewer-calories/ ---receiver https://www.cokecce.com/news-and-events/news/coca-cola-enterprises-announces-the-launch-of-coca-cola-life -35-55 https://www.boston.com/news/business/2014/06/17/is-the-new-coca-cola-life-healthier-than-regular-coke-and-will-it-come-to-the-us age 35-55 https://www.marketingmag.com.au/news-c/pepsi-next-coca-cola-life-green-cola-wars/ --receiver aged 30-40 http://www.thewire.com/business/2014/06/coca-cola-life-isnt-actually-good-for-you/372962/ ---decoding the green colour meaning http://www.theguardian.com/media-network/media-network-blog/2014/sep/11/coca-cola-life-brands-obesity ---noise http://www.campaignlive.co.uk/article/1315388/coca-cola-life-p...
Words: 333 - Pages: 2
...OF PHOENIX IT/244 INTRO TO IT SECURITY Instructor’s Name: JAMES SERSHEN Date: 04/18/2012 1. Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 1.1. Company overview As relates to your selected scenario, give a brief 100- to 200-word overview of the company. The Company I have chosen is, The Bloom Design Group. The Bloom Design Groups mission is to provide online interior design services to its customers. The company offers their customers interior design services. What sets this company apart from others is that they have a website that allows customers a chance to design and decorate their rooms to their liking in a virtual environment before spending their money. The option provided for their customers is a virtual decorating tool. With this tool customers can play around with various color schemes for each room’s floor and ceilings, as well as customizing furniture as well. Then employees are able to access the corporate network through a VPN collection to access their client files, in order to place electronic orders for the design materials and furniture. 1.2. Security policy overview Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why. Program-Framework security policy is the best overall for this type of company. As The Bloom Design Groups network stands right now it...
Words: 924 - Pages: 4
...Scientific Article 1 Intro to Psychology Risk-takers are smarter according to new study In a recent study using functional magnetic resonance imaging (fMRI), images taken of the brains of young men revealed major differences in what is called “white matter” between two separate groups of participants. The University of Turku in Finland under the direction of SINTEF claims young men that make quick decisions in risky situations have a highly developed neural network and are “smarter” than low risktakers. First each participant was given a personality test to assess the risk-taking propensity and susceptibility to peer influence. By doing this the researcher was able to separate the 17 right-handed, 18-19 year old males into two groups, high and low risk takers. The two groups reported to the Department of Radiology of the Turku University Hospital for two practice sessions. During the sessions they were shows a driving game with sets of 20 stop-light intersections. They learned how to play the game and then reported back for four testing sessions in an MRI scanner. The first two sessions were performed under a non-competition social setting and the last two sessions by surprise were under social pressure of a peer competition situation. Measurements were taken of the participants at each moment that decisionmaking took place wether to stop at the yellow light or try and make it through. Results showed that high risk-takers didn't hesitate for long before they...
Words: 599 - Pages: 3
...Information Security Policy Gennie Diamond Axia College of University of Phoenix IT/244 – Intro to IT Security October 10, 2010 Executive Summary The goals of this information security policy will be to state the principles and guidelines for protecting the confidentiality, integrity, and availability of sensitive information and resources for XYZ Energy. This policy will set forth requirements for securing the network’s confidential information and data communications infrastructure, in addition to defining detailed policies in the areas of physical security, access control, and network security. Assumptions of the security plan defines physical security at each site for the environment around the network including entry control at each facility, the need and responsibilities of security staff, and issues around security in common areas. Information system security defines workplace protection and guidelines for storage, protection, and maintenance of hardware and network equipment. Access control policies address user enrollment and all network access privileges, along with identification and authentication process policies. Finally, network policies are defined for granting and managing network access while still protecting sensitive company data. Project constraints can include, but are not limited to, availability of resources needed to provide appropriate security for each defined security goal; time restraints for meeting these goals;...
Words: 1790 - Pages: 8
...1.1 (Intro.) CS-M74 Software Product Development (2003-4) 1.2 (Intro.) Roger D Stein BSc PhD MBCS CEng CITP R.D.Stein@swansea.ac.uk Room 302, Faraday Tower 1.3 (Intro.) CS-M74 Pre-requisites • CS-M01 Distributed Programming in Java 1.4 (Intro.) Assessment Report 10% Linux / C 10% Group Project 20% Project Specification 30% Written Examination (May/June) 30% Lectures approx. 20 in total ((plus tutorials)) TB1 Tues. 9.00 Far-L ? Andy Gimblett (3 Linux + 6 C) [with CS-244] Wed. 11.00 Glyn-A ? Roger Stein (start on 5 November) TB2 Lectures Linux /C 9 Introduction 1 Ethics 1 Legal Issues 1 Project Management 2 (Group Project 2) Software Engineering 4 1.4 (Intro.) Books B. Ayres, The Essence of Professional Issues in Computing, Prentice-Hall, 1999 S Baase, A Gift of Fire, 2nd ed., Prentice-Hall, 2003 B. Hughes and M. Cotterell, Software Project Management, 3rd ed., McGraw-Hill, 2002 R. Pressman, Software Engineering: A Practitioner’s Approach, 5th ed., McGraw-Hill, 2000 I. Summerville, Software Engineering, 6th ed., Addison-Wesley, 2001 1.5 (Intro.) Why Software Engineering? “Engineering … to define rudely but not inaptly, is the art of doing that well with one dollar, which any bungler can do with two after a fashion” - Arthur Mellen Wellington, The Economic Theory...
Words: 3498 - Pages: 14
...Administration système et sécurité sous LINUX La configuration de base du réseaux Enseignant: Arafet BOUSSAID arafet.boussaid@gmail.com 1 Service intro Prot ocol e http Port RFC Client Serveur Couche 3 TCP, UDP (httpdata) TCP Web 80 / 443 2616 Firefox, opera, chrom, Apache, IIS, Lighthttpd VSftpd, Role FTP, Filezilla server Postfix-dovecot eXchange, Lotus Domino BIND, Role DNS Vlc-server Transfert de fichier ftp 20 / 989 21 /990 959 FileZilla FlashFXP CuteFTP Messagerie Smtp 25 Pop 110 / 995 Imap 143 / 993 Resolution de nom streaming DNS 53 2821 Outlook, Thenderbird, Evolution 1034 Resolver TCP TCP UDP c/s TCP s/s UDP Rtp rtcp rtsp 5004, 5005 Vlc 2 Service intro à Admin distance Proto Port cole telnet Ssh 23 22 RFC 854 Client Serveur Telnetd openSSH Couche 3 TCP Cmd Shell linux 4253 Putty WinSCP 2131 système Auto Dhcp configuratio n IP Contrôleur de domaine Surveillanc e réseaux Ldap 67 Role dhcp Dhcpd OpenLdap, ActiveDiractory UDP 389 2251 Client/ serveur messgerie, OS client 2573 Nagios Cacti Zabbix système Tcp/udp Snmp 161 Snmp 162 -trap Agent SNMP Tcp/udp Synchronis ation du temps Ntp 123 NTPd UDP 3 /etc/services intro Description : Les candidats doivent être capables d'examiner, de changer et de vérifier les paramètres de configuration de la pile TCP/IP côté client Termes, fichiers et utilitaires utilisés : – /etc/hostname...
Words: 1178 - Pages: 5
...Amazon has created and implemented a sound strategy that should help to keep them in the forefront of the global internet market. The services Amazon has added so far include Simple Storage Service (S3), which allows businesses to store data and applications on Amazon disk drives, Amazon charges 15 cents per gigabyte per month. Elastic Compute Cloud (EC2) is a service in which Amazon rents out processing power starting at 10 cents per hour. Some businesses use both of these services together saving the companies both money and time. The third service Amazon has added is called Mechanical Turk, this service combines processing power with networks of people who are paid to recognize inappropriate content in images or transcribing audio. Companies post work to Mechanical Turk and pay for this service and Amazon gets a 10 percent commission (Intro to Information Systems). Each of these new services has the same potential data management issues. Data management issues could include corrupted files infecting the entire...
Words: 593 - Pages: 3
...Intro (3x): Em D G Verse 1: Em D G Let love explode and bring the dead to life Am Em C A love so bold to see a revolution somehow Em D G Em D G Let love explode and bring the dead to life Am Em C A love so bold to see a revolution somehow Prechorus: D Em Now I'm lost in Your freedom D Em C And this world I'll overcome Chorus: D* My God's not dead, He's surely alive Em He's living on the inside roaring like a lion D God's not dead, He's surely alive Em C He's living on the inside roaring like a lion Em D He's roaring, He's roaring G He's roaring like a lion! Verse 2: G Let hope arise and make the darkness hide Am G ...
Words: 599 - Pages: 3
...samenvatting_introduction_to_international_business.pdf Samenvatting Introduction to International Business Rijksuniversiteit Groningen | International Business | Introduction to International Business Verspreiden niet toegestaan | Gedownload door: Dorien De Vries | ID: 118424 INTRO TO IB KEY WORDS AND CONCEPTS Conceptual Foundations of International Business Strategy 1. Internationally transferable FSAs . Tacit knowledge = personal knowledge MNE’s heritage=key routines developed by the firm since its inception. 4 archetypes of administrative heritage: • Centralized exporter=only exporting the standardized product, no activity in host country. • International projector=FSAs from home country copied, no development of new ones. • International coordinator=different parts of the production process in different countries. • Multi-centered MNE=does everything(produce, sell, etc.) in the host country. 2. Non-transferable or location bound FSAs. 4 types of non-transferable FSAs: • Stand-alone resources=linked to location advantages. Such as certain immobile markets. • Other resources=such as local marketing knowledge, don’t have same value abroad. • Local best practices=routines which are highly effective at home, not the same abroad. • Recombination capabilities=taking FSAs/products from home and adapt it to host country. 3. Location advantages. !Strengths of a location, useable for all the firm’s operations in that location. !The reason why an MNE should go there. Foreign...
Words: 2493 - Pages: 10