...m Small Business Network Plan Gareth McCartney CIS – 175: Introduction to Networking Assignment 6 August 29th 2010 When designing and building a small business network we must consider the fact that small businesses generally lack the support associated with corporate IT offices. Therefore small business networks should ideally be straightforward and easy to manage. Since the needs of organizations vary, complications will always arise if we attempt to use a generic plan. The main principle we should use in creating this plan is to “follow the simplest approach to achieve the desired result” (Breeding, 2010). Our goal is the create the best possible network with the greatest functionality while maintaining the lowest possible cost. Typically a small business network would consist of around twenty four computers, possibly two servers, a network printer and access to other networks and/or the internet. However for this paper we will limit this network to two workstations one quality printer Internet access multiple email addresses. In most situations, the available finances to connect machines together to share files, printers and internet is limited. Therefore we should consider the cost of acquiring and setting up network adapters, hubs and other network devices such as gateways. An important factor that should be considered is the available options for connecting to the internet. Most areas of the United States have access to dial-up...
Words: 1308 - Pages: 6
...Acme Manufacturing Network Plan Ann Johnson IT/242 October 23, 2011 David Edwards Acme Manufacturing Network Plan Acme Manufacturing needs a new network plan implemented for corporate, three distribution centers in Chicago, Phoenix, and New York, and is expecting to expand with a new facility in China. A successful network design provides future growth within the organization. Meetings are scheduled weekly in the main Atlanta Headquarters conference room with the facilities from Phoenix, New York, Chicago, and China attending via telecommunications. The network plan will include the type of cabling needed for each facility, the equipment used to connect the different facilities, and the installation of Voice over IP (VoIP) and Virtual Local Area Networks (VLANs). Security measures are needed including firewalls and a backup plan. The lines required to carry the traffic on the network are leased T1 lines and a satellite connected overseas. T1 leased lines are used for the Atlanta, Phoenix, New York, and Chicago offices. China connects through a satellite service. A Virtual Private Network (VPN) connects wireless users to their designated department through mobile devices. Routers are used to direct communication between LANs and are needed at each department. Voice over IP (VoIP) has opened possibilities for more interactive communication across WAN networks. VoIP bypasses the need of conventional telephone hardware by transmitting voice over the existing data line...
Words: 1193 - Pages: 5
...A Case Project (Network Security Plan) - Acme Corporation Network infrastructure design for two campuses located in Atlanta and Cincinnati The following will be required • Unshielded Twisted Pair (UTP) Cables • Shielded Twisted Pair (STP) Cable • Coaxial Cable • Fiber Optic Cable • Cable Installation Guides • Unshielded Twisted Pair (UTP) Cable > In this network we will use CAT5 and CAT6 patch. These closets should be used in the server room of the location at Atlanta location and we shall also create one at the Cincinati location due to the big number of hanging wires that we shall use. >Wireless networks are much more susceptible to unauthorized use than cabled networks. We should encrypt the network by putting a password to keep out unauthorized access that may lead to network attacks. Using passwords and assigning privilege levels is a simple way of providing terminal access control in any network. To provide an additional layer of security, particularly for passwords that cross...
Words: 1177 - Pages: 5
...Network Security Plan For a general security solution plan at Richman Investments, this report will give an outline of the needed multi-layered security plan for the entire network including all branch offices. There are many risks that are involved with any network, good planning and policies put into place can mitigate security flaws. The multi-layer security solution can be a useful guideline to start and sustain these security measures within the company. The following topics for security planning will be discussed in a brief and general detail are; User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain. There are many different and unique threats to all domains listed; this report only covers a small portion of ways to mitigate such threats, risks, and vulnerabilities. User Domain In the first layer of the multi-layer security is the user domain. For any user within the company accessing the network on any given workstation or portable device, that user is subjected to the acceptable use policy (AUP). Users are the greatest risk to any network and proper assessment of user policies and the Global Policy configurations need to be well thought out and enforced by these policies. Under this AUP, if violated can be subjected to employee dismal or grounds for punishment actions. Users can be disgruntled employees and can cause serious issues to the network if they have access to sensitive information...
Words: 1254 - Pages: 6
...the security LAN will help the organization against any outside hackers. Another issue found was that the company did not have secure remote access to their computers while away from the organization. Granting access on a per-user basis only to those who have a bona fide need to access the network remotely. Implementing a remote access to the organizations computers while keeping it secure via firewalls and VPN server will ensure protection from outside intruders. I recommend that you install a VPN server as well as Remote access security. One firewall with Network Address Translation (NAT) this will add to the security that will not be visible outside of the organization and another firewall without NAT which will be visible outside of the organization. Network Security Plan Purpose Computer and network security incidents have become a fact of life for most organizations that provide networked information technology resources including connectivity with the global Internet. Current methods of dealing with such incidents are at best piecemeal relying on luck, varying working practices, good will and unofficial support from a few individuals normally engaged in central network or systems support. This approach undoubtedly leads to inefficiencies and associated problems with respect to: * · Duplicated effort * · Inappropriate actions * · Poor co-ordination * · Confusion - No obvious authority, identifiable responsibilities...
Words: 3365 - Pages: 14
...123 Textiles Company Network Disaster Plan Keith A Manley IT240/ Sorrells 11/30/2012 The 123 Textile Corporation has several solvable issues that we will address in this network updating proposal. They have been exposed to inclement weather and as of late a break in resulting in the companies sever and all pertinent data for sales, production, human resources. This proposal will lay out all necessary hardware upgrades as well as the software upgrades needed to maintain the new hardware. It will also look at off-site back up as a potential resolution to being in an area that may be more susceptible to break-ins resulting in equipment loss and or damage. The proposal will also address the issues of inclement weather and possible protection from natural disasters. Hardware and equipment proposal; A required designated space for the new computer equipment should be around 50 square feet with through wall ventilation but no window or exterior access points. In addition a cable line for modem connection and power source will be required. Power source should be of 20 amp circuit and non GFI, number of circuits at primary location in room to be four. In consideration of power outages that could result in loss of data a recommended solution will be the installation of an online UPS battery backup unit which provides continuous power while plugged in through the unit’s battery allowing for smoother and quicker power transition. This unit provides...
Words: 1340 - Pages: 6
...We will be creating a test plan for the SCR TIMS project that will use only the related items to the SCR TIMS network. This plan will address the testing strategies and all the quality requirements. There will be a Master Test Plan that will show a testing schedule and it will have four levels of testing. These levels will include the System, Acceptance, Unit and Integration. The test items will include: • Server Machine • Network Communication • Disk Arrays • Client Machines 1. Executives 2. Administrators 3. Project Managers 4. Systems 5. Business Solutions Network • Firewalls • Printers • Faxes • Scanners The Risks would be: • Network Security- This must be defined and verified and has to access everything within the network. • Backup and...
Words: 536 - Pages: 3
...Educational Development Plan To complete this plan, refer to the three University Orientation Seminar Readiness Center reports you received and used in the UOS1500 seminar courseroom. Using the results of those reports, along with your personal preferences and goals, identify three areas of strength and list them in the table provided below. Readiness Areas: • Technical Readiness. • Online Learning. • Online Communication. • Time Management. • Goals and Motivation. • Building a Support Network. • Learning Strategies. • Writing Strategies. • Information Literacy. Areas of Strength |1. Technical Readiness | |2. Learning Strategies | |3. Building a Support Network | Now follow the same process to identify three areas in which you would like to improve your knowledge and skills. For each of the areas, specify a short-term, specific goal: something you will accomplish that will improve your performance or knowledge in this area. Enter that goal, then a brief description of how you will achieve your goal. If there were resources identified in this seminar, or...
Words: 424 - Pages: 2
...their data plans. Apple will now ship out in their new iPad Air 2 and iPad Mini 3 a built-in sim card that allows users to purchase wireless service on the spot. Previous ipads have always had the ability to let you hop between carriers just by swapping out the sim card; however, Apple has simplified this process further with one sim card that lets you hop onto whichever carriers is listed on their iOS. These carriers include AT&T, Sprint, and T-Mobile in the U.S., and EE in the U.K. Apple does plan to expand the list of global carriers in the future. Why does this matter? Well I think this really takes the carriers out of the retail loop and makes it easier for Apple users to be able to switch seamlessly between the three major U.S. carriers for on the go data plans. It makes the carriers a lot closer to the interchangeable pipes that they’re afraid of seeing because it effectively lessens the powers of the mobile carriers since they rely on their control of the retail sales and service channels to prevent customers from switchovers and to be able to upsell additional products. Interestingly enough, Verizon has opted out of this new Apple sim so far, which shows the disproportionate strength of Verizon in our market as compared to the other three carriers. Verizon thinks that they have enough market power to tell Apple what to do to some extent that they can sell Verizon only sim cards and help people stick on Verizon with the renowned quality of their network. In summary...
Words: 386 - Pages: 2
...Strategic planning involves a structure or framework, a set of procedures (both formal and informal), and of course content. Beyond these basic elements, the underlying assumptions about strategic planning are that the future can be anticipated, forecasted, managed or even controlled, and that the best way to do so is to have a formal and integrated plan about it in place. The process of planning itself may turn out to be more important than the results, and that process requires, as Mintzberg suggests, both analysis and synthesis. Planning simply introduces a formal “discipline” for conducting long-term thinking about an institution, and for recognizing opportunities in and for minimizing risks from the external and internal environments. Among the hundreds available, perhaps the most well-know model of strategic planning has the SWOT (for strengths, weaknesses, opportunities, and threats) appraisal of internal and external environments as its centerpiece. But whatever the model, following decades of research across hundreds of organizations, empirical evidence on the effectiveness of strategic planning is mixed at best. So, why plan? Again, the answer may lie in the process itself; like the ritual rain dance, planning improves the dancing, if not the weather. 2 But...
Words: 4766 - Pages: 20
...software plan is used to implement perfect network as per clients requirement. The basic software plan is used to understand the roles and responsibilities in the given project, and it helps in estimation of effort and resources that are required for project. By this plan we can estimate the organisational risks and we get a chance to reduce them. (Rob Baxter, 2014) Network software planning ensures that you utilize all your network resources affecting network capacity, including both physical and logical constraints, network configuration, IP addresses and all types of network elements. Planning software tools help you predict and avoid resource and capacity shortages. (amdocs, 2016) As per our network design we used the following software...
Words: 464 - Pages: 2
...Denise Figueroa IT460 System Analysis and Design Professor Heith Hennel Unit 9 Assignment October 27, 2015 We will be creating a test plan for the SCR TIMS project that will use only the related items of the SCR TIMS network. This plan will address the testing strategies and all the quality requirements. There will be a testing plan that will exist of four different levels. These different levels will include the System, Acceptance, Unit and Integration. We will start off with the test items that will be included: • Server Machine • Network Communication • Disk Arrays • Client Machines 1. Executives 2. Administrators 3. Project Managers 4. Systems 5. Business Solutions Network • Firewalls • Printers • Faxes • Scanners Our...
Words: 626 - Pages: 3
...heritage of plant network and assess to raw material form the tarmac. The main objectives of union of these companies is to allow Tarmac aggregate business and the Lafarge concrete business to come together by which the company can work on different types of projects throughout the country. This also helps to leave better foot print in the economy. The company is also doing lots of work on sustainable products and system like reducing the embodied carbon in cement products, using waste-derived fuels and using several methods to reduce the energy consumption. The main objective of this joint venture is to reduce the production cost through innovation and exploring sustainability. AC 1.2 Issues involved in Strategic Planning at Lafarge Tarmac Strategic planning issues: Managers may have issues on facing the challenges in the company which can be minimized with the help of strategic planning. The managers can get the direction with the help of strategic planning. Strategic planning should be made in the right time. In the context of Lafarge Tarmac planning should be carried out frequently as there is lot of competitiveness in the market. As the company is new in the market strategic manager have to come up with better strategy to stand on top in the market. Every now and then the planning should be updated. Manager have to cross check time to time the outcomes. The people involved in the strategic planning includes those who will be making and implementing the plan, people who will...
Words: 350 - Pages: 2
...• TEST EXECUTION During this phase test team will carry out the testing based on the test plans and the test cases prepared. Bugs will be reported back to the development team for correction and retesting will be performed.Execute tests as per plan document test results, and log defects for failed cases Map defects to test cases in RTM ,Retest the defect fixes and Track the defects to closure • TEST CYCLE CLOSURE Testing team will meet , discuss and analyze testing artifacts to identify strategies that have to be implemented in future, taking lessons from the current test cycle. The idea is to remove the process bottlenecks for future test cycles and share best practices for any similar projects in future. Evaluate cycle completion criteria...
Words: 649 - Pages: 3
...Answer questions 1 through 7 and 12 through 18, 22 – 25, 27 and 29 1. Compare and contrast phases, steps, techniques, and deliverables. Phases (planning, analysis, design, and implementation) are composed of steps, which rely upon techniques, which produce deliverables. 2. Describe the major phases in the SDLC. planning- fundamental process of understanding why an information system should be built and determining how the project team will go about building it analysis- answers the questions of who will use the system, what it will do, and where and when it will be used design- decides how the system will operate, in terms of the hardware, software, and network infrastructure implementation- the system is actually built 3. Describe the principal steps in the...
Words: 933 - Pages: 4