Free Essay

It 241 Week 9 Final Project

In:

Submitted By bouie2435
Words 1528
Pages 7
Associate Program Material
Appendix J

Wireless Network Plan

Use the following outline to create your wireless network plan. Fill in each section of the plan as required.

Deployment Scenario

The best deployment scenario for this particular situation would be the infrastructure setup. This type of networking would allow the system to utilize both the wireless and wired components. This would also enable the network to utilize the WLAN for the majority of its networking needs, while still having the capability to merge a LAN into this WLAN design if needed.

Deployment Scenario Rationale

I went with the infrastructure networking mode due to the physical limitations within the Customer Service Call Center’s floor design. The Call Centers floor plan would allow the wireless access points to communicate with other wireless access points that are out of wireless coverage reach. For areas that are not considered mobile or require a higher level of security, the use of a wired connection can be used; while still allowing the wireless portion of the network to connect to the wired segment. What this means is, it provides a way for the wireless access points to communicate with the rest of the network, which is vital for connecting multiple wireless access points, as well as connecting a WLAN to a LAN if needed or requested.

Hardware Components

• Component Name: Access Point

o Rationale for using component: The use of five wireless access points are needed, so wireless coverage can be at an acceptable level throughout all areas of the floor plan.

o Rough cost estimate: The cost of a wireless access point would be around $180.00 each, which would total about $1,080.00 (6 access points) to supply wireless coverage throughout the floor plan.

• Component Name: Switch

o Rationale for using component: The implementation of a switch is needed to enable each wireless access point to be connected physically by a networking cable, which allows the wireless network to connect to the internet or other LAN based elements.

o Rough cost estimate: The average cost of a switch is around $85.00.

• Component Name: Network Cable

o Rationale for using component: This component is needed to connect the access points to the switch, since the wireless access points are unable to communicate to a wired network without the appropriate networking cables.

o Rough cost estimate: The networking cable needed to connect each wireless access point to the router would be less than 1000 ft. However, the CAT-6 networking cable needed can be purchased on a 1000 ft role for only $188.00, which would provide some extra cabling for future expansions or additional wiring needs.

IEEE Wireless Network Type

Apex Designs has identified that an 802.11n LAN will be implemented.

Access Point Management

Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location rather than to be configured separately for each access point.

Location of Wireless Devices
Network Performance Impediment Report (overview of floor plan and possible impediments)
The Customer Service Call Center floor plan is has a few obstacles to consider, before implementing a wireless network. The floor plan is broken into two sectors, which is due to the metal filing cabinet located in the center of the floor plan. As a result, this makes it difficult to utilize a single access point to cover both sides of this obstacle. Furthermore, the incorporation of the glass windows, as well as the solid wall structure located next to the conference room would restrict the travel of network’s wireless signals. Even though the cubicles located on both sides of the filing cabinet, as well as the cooking equipment located in the break room are also considered a problem, they only present a low signal blocking challenge, since the cubicle walls’ effect on the wireless signal is limited and the break room is away from the wireless network’s main-point-of-concern. However, the solid wall structure and the metal filing cabinet are both considered high-risk factors, because they require additional networking components to create a working wireless network.
Summary list of possible impediments to wireless performance

• Glass windows (Low) • Electrical equipment in break room (Low) • The walls and cubicles (Low) • Metal filing cabinet (High) • Solid wall structure (High)

Locations of wireless devices are depicted in Appendix I

Wireless Security Policy

List of Security Protections

• Address Filtering • Shared Key Authentication • Disable SSID Broadcasting • Enable WEP or utilize WPA encryption if possible, and utilize network monitoring tools.

Summary of Protections

1. Address Filtering: I chose address filtering, because this feature is designed to prevent unauthorized devices from connecting to the wireless network, which is based on each device’s MAC address. By doing this, only the internal computers that are on the WLAN’s approved MAC list would be able to connect to the wireless network. In-other-words, this tool is useful for preventing outside attempts to the WLAN by restricting their access from the beginning. Even though it may be difficult to manage the approved MAC address list on a large sized network, the overall benefit of using this feature would be substantial enough to employ, since the additional time to maintain the approved MAC IDs could be limited by restricting the use of outside devices from being added, which would essentially limit all computer use to only company owned devices.

2. Shared Key Authorization: This security feature was chosen to provide the WLAN with an additional level of security in an attempt to counter a potential security breach. By employing the Shared Key Authentication protocol, the network would send the user a challenge text in, which the user would be required to respond with the correct answer, before being accepted onto the network. By controlling each computer’s Mac address, as well as requiring each user to undergo the Shared Key Authentication process, the overall level of network security would become stronger, which is due to the dual protection techniques that are being used.

3. Disable SSID Broadcasting: By disabling the SSID broadcast feature on the WLAN, the possibility of someone outside the company gaining the WLAN’s device information would be reduced, since the information would not be openly transmitted for someone to discover. As a result, this would prevent a potential security breach, since one could easily gain access to a wireless device by having the unit’s SSID due to the information that is included within this type of data communication. In-other-words, the less information that is offered about the wireless network, the better-off the WLAN would be, since the more system characteristics that are being presented to an intruder would only assist him or her in an attack.

4. Enable WEP or utilize WPA encryption if possible, and utilize network monitoring tools: In regards to this security selection, the use of WPA or WPA2 should be used instead of WEP or Shared Key Authentication if it is available, since this wireless network protection is more secure than its previous counterparts. However, the equipment being used on the wireless network would have to be compliant to do so. Nevertheless, if this is not available for use, the incorporation of a network monitoring program should be performed, which would allow the network to be monitored for security weaknesses, as well as allow one to be alerted about a potential network attack.

Possible Network Vulnerabilities

1. Address Filtering: It is difficult to manage large numbers of MAC addresses, MAC address can be accessed in plain text, and an intruder can falsify the MAC address on his or her device to gain access to the network.

2. Shared Key Authentication: An intruder could break the default key by using a dictionary attack, stealing the challenge text, or by encrypting the text through a mathematical system.

3. Disabling the SSID broadcast: This feature should be disabled, because if it is not the SSID could be obtained by stealing it or by viewing it in plain text that would enable one to use the brute force attack to gain access to the network.

4. Enable WEP or utilize WPA encryption if possible, and utilize network monitoring tools: The use of WEP can be problematic due to the intruder’s ability to break the key code, which could be caused by a weak WEP key, by viewing the key in plain text due to a collision, or caused by the weak key generating capabilities of the RC4 generating platform.

References:

ADVANTECH. (2013). 5-Port Network Switch. Retrieved from https://gridconnect.com/5-port-industrial-switch.html?gdftrk=gdfV25227_a_7c1592_a_7c6907_a_7c218&utm_source=google&utm_medium=CPC&utm_term={keyword}&utm_campaign=%2FUI%2FProduct+Listing+Ads+General+All&mm_campaign=477cea803cb14c83d8a99b6c7d0cd349&keyword={keyword}&mkwid={ifsearch:s}{ifcontent:c}t3X4DDFr_d{device}|pcrid|18638691793&gclid=CPW2sdW74LkCFcg1QgodwRUA8w Cisco-Linksys. (2013). Access Points. Retrieved from http://www.amazon.com/Cisco-Linksys-WAP54G-Wireless-G-Access-Point/dp/B00007KDVJ CablewholeSale. (2013). 1000 Foot Cat. 6 Cables. Retrieved from
http://www.cablewholesale.com/products/network-phone/cat-6-cable-bulk/product-10x8-622nh.php?utm_source=GoogleShopping&utm_medium=organic&zmam=54972865&zmas=1&zmac=1&zmap=10X8-622NH&gclid=CIu_vue84LkCFUFxQgodNnAA3g

Similar Documents

Free Essay

Jose

........................................... 3 BUSINESS: ALIMENTOS CÁRNICOS DE PANAMÁ S.A. ....................................................... 3 Processed Meat Business within Grupo Nutresa ......................................................................... 3 Alimentos Cárnicos de Panamá S.A. .......................................................................................... 3 Goals: Process Optimization ....................................................................................................... 4 PROJECT OBJECTIVES ................................................................................................................... 4 General Objectives: ......................................................................................................................... 4 Specific Objectives: ........................................................................................................................ 4 PROJECT JUSTIFICATION .............................................................................................................. 5 PROCESS ANALYSIS ....................................................................................................................... 5 ACTUAL FLOWCHART OF COOKED HAM PRODUCTION PROCESS...

Words: 6953 - Pages: 28

Free Essay

C Programming

...Welcome to CS 241 Systems Programming at Illinois Robin Kravets Copyright ©: University of Illinois CS 241 Staff 1 The Team  Robin Kravets    TAs   Office: 3114 SC rhk@illinois.edu Wade Fagen, Farhana Ashraf, Hilfi Alkaff and Mainak Ghosh Discussion Sections   8 sessions (Thursdays 9, 10, 11, 12, 1, 2, 3, 4) All sections in SC 0220 Copyright ©: University of Illinois CS 241 Staff 2 News and Email  Announcements and discussions: Piazza  http://www.piazza.com/illinois/cs241     All class questions This is your one-stop help-line! Will get answer < 24 hours e-mail   cs241help-fa12@cs.illinois.edu Personal questions not postable on the news group Copyright ©: University of Illinois CS 241 Staff 3 The Textbook  Introduction to Systems Concepts and Systems Programming      University of Illinois Custom Edition Copyright © 2007 Pearson Custom Publishing ISBN 0-536-48928-9 Taken from:    Operating Systems: Internals and Design Principles, Fifth Edition, by William Stallings UNIX™ Systems Programming: Communication, Concurrency, and Threads, by Kay A. Robbins and Steven Robbins Computer Systems: A Programmer's Perspective, by Randal E. Bryant and David R. O'Hallaron Copyright ©: University of Illinois CS 241 Staff 4 Your CS 241 “Mission”  Come to class     Read textbook    20% 7:00 – 9:00 PM October 15th Final  3% 47% Longer MPs are worth a little more Midterm   Reading assignments posted on webpage Homework...

Words: 1748 - Pages: 7

Premium Essay

Sci 241 Syllabus

...Bolding Syllabus 1 SCI/241 Version 6: 6.18.2012 – 8.19.2012 Course Design Guide College of Natural Sciences SCI/241 Version 6 The Science of Nutrition Copyright © 2012, 2009, 2008, 2007, 2006 by University of Phoenix. All rights reserved. Course Description This course introduces students to the world of human nutrition. Students examine the components included in a healthy, balanced diet, and develop strategies to meet their changing nutritional needs throughout the various stages of life. Specific topics for the course include: the digestion process, functions and health benefits of specific nutrients, weight management and fitness, and the effects of nutritional deficiencies. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • • University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Grosvenor, M. B., & Smolin, L. A. (2006). Nutrition: Everyday choices. Hoboken, NJ: John Wiley & Sons. All electronic materials are available on the student website. Please make...

Words: 5616 - Pages: 23

Free Essay

Devry Engl 216 Complete Lourse-Latest 2015 December

...Devry ENGL 216 Complete Lourse-Latest 2015 December (All Discussions All Homework And Complete Course Project) IF You Want To Purchase A+ Work then Click The Link Below For Instant Down Load http://www.hwspeed.com/Devry-ENGL-216-Complete-Lourse-Latest-2015-December-111325874.htm?categoryId=-1 IF You Face Any Problem Then E Mail Us At JOHNMATE1122@GMAIL.COM Question week 1 Technical Communication at Work (graded) As you read Chapter 1, you will learn that communication skills are critical in the workplace and that technical writing is used in virtually every work environment. For this discussion, locate a technical document from your workplace or from home or the Internet, preferably one that might be found in your career field. Note that Figure 1-1 (page 4) provides a list of technical communication examples. Using the five goals and features of technical communication listed in the textbook (page 4), describe how the document addresses these characteristics. Then, discuss whether or not you feel the document is successful in its overall goal. Provide examples from the document to illustrate. If possible, share the document by posting a link or a PDF of the sample used. Audience Culture and Analysis (graded) As our text states, “one cardinal rule governs all on-the-job writing: Write for your reader, not for yourself” (page 41). This requires a solid audience analysis. As part of this analysis, you must also consider the audience's cultural...

Words: 3667 - Pages: 15

Premium Essay

Self-Study Report

...ABET Self-Study Report for the COMPUTER ENGINEERING PROGRAM at QASSIM PRIVATE COLLEGES BURIDAH, SAUDI ARABIA First of June 2015 Table of Contents Introduction 3 Requirements and Preparation 3 Supplemental Materials 4 Submission and Distribution of Self-Study Report 4 Confidentiality 5 Template 5 BACKGROUND INFORMATION 7 GENERAL CRITERIA 9 CRITERION 1. STUDENTS 9 CRITERION 2. PROGRAM EDUCATIONAL OBJECTIVES 11 CRITERION 3. STUDENT OUTCOMES 12 CRITERION 4. CONTINUOUS IMPROVEMENT 13 CRITERION 5. CURRICULUM 15 CRITERION 6. FACULTY 17 CRITERION 7. FACILITIES 20 CRITERION 8. INSTITUTIONAL SUPPORT 22 PROGRAM CRITERIA 23 Appendix A – Course Syllabi 24 Appendix B – Faculty Vitae 25 Appendix C – Equipment 26 Appendix D – Institutional Summary 27 Signature...

Words: 10169 - Pages: 41

Free Essay

Homework 1

...! ! ! ! ! ! ! ! ! Company!Profile! • Industry:!Medical!Device!Industry! • Core!Products:!Vascular,!Urology,! Oncology,!Surgical!Specialty! • Core!Value:!Quality,!Integrity,!Service,! and!Innovation! • Market!Share:!6.1%! Stock!Price!Performance! • Current!Price!(May!10,!2013):104.61! • 52!Week!Price!Range:!108.31!–!93.68! 130! 120! 110! 100! 90! 80! Profitability! Profit!Margin!(ttm):! 16.24%! Operating!Margin!(ttm):! 26.37%! Return!on!Asset!(ttm):! 12.18%! Return!on!Equity!(ttm):! 25.57%! Current!Ratio:!4.32! Debt!to!Equity:!74.19! P!/E!Ratio:!18.53! Highlight!Financials! Management! Effectiveness! Liquidity!and! Leveraging! Market!Ratio! DCR! S&P500! EV/EBITDA:!12.6! ! ! Undervalued! Share!Price! Advanced! Technology!! Attractive! New! Products! Significant! Market! Share! ! ! Trading(Comparable BCR Enterprise!Value!/!LTM!Rev Enterprise!Value!/!LTM!EBITDA 3.0x 10.1x! BSX 2.15x 9.48x! BDX 2.67X 9.9X! TMO 2.88x 13.76x! Transaction(Comparable((Medical(Device(Industry Date!Range! Total!Number!of!Deal! Total!Transaction!Value! Median!EV/EBITDA EBITDA!range 5/11/2012!–!5/11/2013 217 $8.51!Billion 12.78x 0.0x!–!64.34x COMPARABLES!VALUATION! •  Trading!Comparable:!13x! •  Implied!EV:!!$11.55!Billion! •  Implied!Share!Price:!137.17! •  Premium:!31.13%! ! ! DCF(ANALYSIS With( Synergies( Without( Synergies( LBO(ANALYSIS PE(Firms(–(( General PE(Firms(O( Professional !!Enterprise!Value! $!11.57!Billion...

Words: 4550 - Pages: 19

Premium Essay

Anything Relevant

...ASSUMPTION UNIVERSITY MARTIN de TOURS SCHOOL OF MANAGEMENT AND ECONOMICS DEPARTMENT OF MARKETING COURSE SYLLABUS SEMESTER 2/2015 |MARTIN de TOURS SCHOOL OF MANAGEMENT AND ECONOMICS’ VISION | |Leading International Business School in ASEAN Region | |MARTIN de TOURS SCHOOL OF MANAGEMENT AND ECONOMICS’ MISSION | |Shaping Graduates toward Global Business Excellence | |ASSUMPTION UNIVERSITY’S UNIQUENESS | |An International Catholic University | |IDENTITY OF AU STUDENTS | |Ethics, English Proficiency, Entrepreneurial Spirit | |COURSE ORGANIZATION ...

Words: 4075 - Pages: 17

Premium Essay

Student Handbook

...Berkeley Master of Engineering Program Student Handbook 2014-2015 edited 6/17/14 ld 1 Table of Contents MASTER OF ENGINEERING PROGRAM CONTACT INFORMATION ........................................................ 4   FUNG INSTITUTE FACULTY & STAFF .......................................................................................................................... 4   DEPARTMENT STAFF .................................................................................................................................................. 5   ADDITIONAL RESOURCES CONTACT INFORMATION ................................................................................ 6   MASTER OF ENGINEERING HONOR CODE ..................................................................................................... 7   ACADEMIC INTEGRITY................................................................................................................................................ 7   ACADEMIC AFFAIRS ............................................................................................................................................. 10   THE ACADEMIC PROGRAM ....................................................................................................................................... 10   ADVANCEMENT TO CANDIDACY .............................................................................................................................. 10   REGISTRATION...

Words: 9633 - Pages: 39

Free Essay

Irb Application

...February 3, 2005 | 2. Name of Principal Investigator (PI) ______________________________________________ Name of Faculty Advisor (FA), if PI is a student__Dr. Les Brinson _________________________________ Telephone Number (PI): 919*530*4526_ Mailing Address (PI): PO Box 19408 Durham, NC 27707 Telephone Number (FA):919*530*5166 Mailing Address(FA): Taylor Ed. Rm 217A Durham, NC 27707 3. PROJECT TITLE: ____________Organizational Communication and Its Relationship With Job Performance and Job Satisfaction _________ 4. PROJECT TYPE: __N__ (Select one: N = New; AR = Annual Renewal; PC = Protocol Change) This is a : _SP__ (Select one: SP = SPECIFIC PROJECT or GP = GRANT PROJECT PROPOSAL) If Grant Project Proposal, list agency and address to which project is being submitted: __________________________________________________________________________________________ ____________________________________________________________________ 5. This project relates to previous Request # ____________________, approved on 6. PI/FA Recommendation (If the PI is a student, the FA must also sign this sheet): [ ] Exempt from further IRB Review, see Exempt Paragraph # ___________ [ ] Full Review Signature (PI)...

Words: 3623 - Pages: 15

Premium Essay

Syllabus Sci/241

...|[pic] |Syllabus | | |College of Natural Sciences | | |SCI/241 Version 6 | | |Nutrition | Copyright © 2012, 2009, 2008, 2007, 2006 by University of Phoenix. All rights reserved. Course Description This course introduces students to the world of human nutrition. Students examine the components included in a healthy, balanced diet and develop strategies to meet their changing nutritional needs throughout the various stages of life. Specific topics for the course include the digestion process, functions and health benefits of specific nutrients, weight management and fitness, and the effects of nutritional deficiencies. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies...

Words: 2886 - Pages: 12

Premium Essay

Assessment Task 1

...School/Portfolio: | The Business School | Course Code/ID: | BUMGT5921 | Course Title: | Organizations: Behaviour, Structure, Processes | Teaching Location: | Melbourne Institute of Technology | Program(s): | Master of Business Administration | Coordinator: | Dr Syed Uddin | Level: | Introductory | Semester: | 2/2013 | Prerequisite(s): | Nil | Corequisite(s): | Nil | Exclusion(s): | Nil | Credit Points/Progress Units: | 15 | ASCED Code: | 080307 | Adopted Reference Style APA 1 COURSE ORGANISATION: 1.1 Student Responsibility It is the responsibility of every student to be aware of the requirements for this course, and understand the specific details included in this document. For full details of programs and school procedures, please refer to the University of Ballarat handbook (http://www.ballarat.edu.au/future-students/handbook ) and The Business School Programs Handbooks available at http://www.ballarat.edu.au/business/handbooks Students should be aware of the content of the handbooks, particularly: * * Special Consideration process and forms * Assignment Coversheet * Submission of tasks and assignments * Grading codes * Appeal process * Unsatisfactory progress - Early Intervention * Appeal process * Unsatisfactory progress - Early Intervention * Grading codes 1.2 Staff The most appropriate contact is your teacher. If necessary they will contact the Course Coordinator at...

Words: 4040 - Pages: 17

Free Essay

Tturkeyy

...Huston Smith The World’s Religions (WR) Assorted authors Pdf files and website links (Optional: Stephen Bodian Meditation for Dummies 3rd ed., but other editions will work January 13 Introduction to Course 15 The Four Goals; The Vedas and Upanishads: WR 12-26; Zaehner, Upanishads pdfs 20 Brahman, Atman, Maya, & Mystical Experiences/ NDEs: BG 22-30; Merell-Wolff, Berman (to p.42), Schmicker (to p.199) pdfs (H1) 22 Advaita Vedanta and Non-Locality: Shankara, Schmicker (on ESP, from p. 74), Targ pdfs 27 The Gita: Caste, Dharma: BG 13-22; BG 71-92B; WR 50-59 29 Dharma and Karma: BG 31-36; 92-93; Chopra, Leder/aging, Leder/prayer, (M1) (s-l orientation posting) February 3 Karma and Reincarnation: BG 235-241;WR 63-75; Fox, Bache pdf (H2) (G1) 5 Karma Yoga: WR 26-29, 37-41; BG 93-109 (S1) 10 Karma Yoga and Gandhi; BG 48-63t (H3) (G2) 12 Jnana Yoga; BG 111-131; WR 29m-32m; Ramana Maharshi link (M2) 17 TEST #1 (S2) 19 Raja and Bhakti Yoga WR 41b-50m; BG 133-45; Muktananda pdf 24 BhaktiYoga/Gods and Goddesses; WR 32t-36; BG 169-77; Sanatan, Ramakrishna link (G3) 26 The Cosmic Vision: Gods and Gurus BG 191-209; 262-65 Ram Dass (Neem Karoli Baba) pdf (M3) (H4) March 10 Introduction to Buddhism and the Buddha; WR 82-99; Leder/Buddha pdf; Buddha film 12 The Four Noble Truths, Anicca; WR 99-103b; Sogyal Rinpoche pdf (H5) 17 Anatta, Interbeing, Nirvana; WR 112-119; PS 95-104; Bresnan pdf (S3) 19 Right...

Words: 5433 - Pages: 22

Free Essay

Customer Satisfaction

...on the College’s policies, programmes and services. Programme information in this catalogue is effective from September 2010. Students who commenced studies at the College prior to this date, are to be guided by programme requirements as stipulated by the relevant department. Updates on the schedule of classes and changes in academic policies, degree requirements, fees, new course offerings, and other information will be issued by the Office of the Registrar. Students are advised to consult with their departmental academic advisors at least once per semester, regarding their course of study. The policies, rules and regulations of the College are informed by the laws of the Republic of Trinidad and Tobago. iii Table of Contents PG 9 PG 9 PG 10 PG 11 PG 11 PG 12 PG 12 PG 13 PG 14 PG 14 PG 14 PG 14 PG 15 PG 17 PG 18 PG 20 PG 20 PG 20 PG 21 PG 22 PG 22 PG 22 PG 23 PG 23 PG 23 PG 23 PG 24 PG 24 PG 24 PG 24 PG 25 PG 25 PG 25 PG 26 PG 26 PG 26 PG 26 PG 26 PG 26 PG 27 PG 27 PG 27 PG 27 PG 27 PG 27 PG 28 PG 28 PG 28 PG 28 PG 28 PG 33 PG 37 Vision Mission President’s Welcome Institutional Profile Management Structure Registered Status and Accreditation Candidacy Commitment to Quality and Continuous Improvement Core Values General Information Equal Opportunity Disability Right to Privacy Campus Safety and Security How to Use this Catalogue List of Programmes Admissions Four-tiered Admissions Process Prior Learning and Assessment (PLA) How to Apply...

Words: 108220 - Pages: 433

Premium Essay

Tyco

...Tyco International | Week 8 Final Project | | | 4/26/2013 | On September 12, 2002, national television showcased Tyco International’s former chief executive officer (CEO) L. Dennis Kozlowski and former chief financial officer (CFO) Mark H. Swartz in handcuffs after being arrested and charged with misappropriating more than $170 million from the company. They were also accused of stealing more than $430 million through fraudulent sales of Tyco stock and concealing the information from shareholders. The two executives were charged with more than thirty counts of misconduct, including grand larceny, enterprise corruption, and falsifying business records. Another executive, former general counsel Mark A. Belnick, was charged with concealing $14 million in personal loans. Months after the initial arrests, charges and lawsuits were still being filed—making the Tyco scandal one of the most notorious of the early 2000s. Founded in 1960 by Arthur J. Rosenberg, Tyco began as an investment and holding company focused on solid-state science and energy conversion. In 1964, Tyco became a publicly traded company. It also began a series of rapid acquisitions – sixteen companies by 1968. The expansion continued through 1982, as the company sought to fill gaps in its development and distribution networks. Between 1973 and 1982, the company grew from $34 million to $500 million in consolidated sales. In 1982, Tyco was reorganized into three business segments: Fire Protection...

Words: 2324 - Pages: 10

Free Essay

Marketing

...Government of India INDUCTION MATERIAL 2009 MINISTRY OF FINANCE DEPARTMENT OF ECONOMIC AFFAIRS NEW DELHI First Edition … 15.06.1981 Second Edition … 01.01.1984 Third Edition … 30.06.1986 Fourth Edition … 01.06.1989 Fifth Edition … 08.05.1993 Sixth Edition … 14.12.1995 Seventh Edition … 18.06.1998 Eighth Edition … 17.12.2002 Ninth Edition … 03.11.2009 PREFACE TO THE NINTH EDITION The Eighth edition of Induction Material of the Department of Economic Affairs (DEA) was printed in December, 2002. Since then many changes have taken place in the incumbency and work allocation of various Divisions/ Sections. These factors necessitated revision of this document. The ninth edition indicates the position as on October 31, 2009. 2. DEA is the nodal agency of the Union Government to formulate and monitor the country's economic policies and programmes having a bearing on domestic and international aspects of economic management. In May 2009, a major reorganization of the work among the Divisions in DEA was undertaken to deal more effectively and comprehensively with the changing trends, emerging issues and power blocs in the national and international economic scenario. A new Multilateral Institutions Division has been carved out of the erstwhile Fund Bank Division to provide focused and outcome oriented engagement with various multilateral organizations on a host of current and emerging economic/financial...

Words: 24651 - Pages: 99