Free Essay

Ntc 362 Individual Final Assignment

In:

Submitted By figueroagalo
Words 1984
Pages 8
Week 5 Individual Final Assignment
Galo Figueroa
NTC / 362
October 26th, 2017
Eric Winch

Week 5 Individual Final Assignment

I will begin by explaining the network’s current characteristics and components. KFF is comprised of three geographic locations in San Diego County, California. Their home office is located in La Jolla. The two other locations are in Del Mar and Encinitas. They have an OC 1 SONET using a T3 dedicated line connecting all three stores. This requires a fiber optic physical connection between stores since a T3 is equivalent to 28 T1 lines. This dedicated network is leased from the ISP and is guaranteed a continuous uninterrupted connection. This type of connection allows for a total of about 44736 Kbps and has 672 channels. KFF is using a 25Mbps connection to the internet.
All three KFF locations are using a linear bus topology using 100base T Ethernet, which means that Ethernet is used and allows for data transfer rates of up to 100Mbps. The file server, workstations and all equipment previously mentioned are connected to a linear cable. This type of LAN network has disadvantages that outweigh the advantages. One major disadvantage is that the entire network is disabled if there is a break in the main cable, and locating the break can prove to be difficult. Another disadvantage is that the more devices are added, the less efficient it becomes. This outdated design broadcasts data which uses up important bandwidth that can be used for better purposes. The conversion from this topology to a WLAN will benefit KFF on several levels. The addition of wireless technology is a cost-friendly alternative for KFF. It will be less vulnerable to complete outages due to line breaks. If there is a network issue, it will be much easier to isolate. In some cases, issues can even be resolved remotely without ever needing to go the location. Adding and removing stations will be easier by eliminating the need for cabling. Routers and smart switches will be added to learn and map each devices location. This will greatly improve data transfer efficiency by avoiding collisions and using less bandwidth. The addition of wireless technology is a cost-friendly alternative for KFF.
The highest standard of Ethernet wire will still be utilized to connect other KFF devices such as POS stations, VOIP telephones, servers, routers, etc. We will designate a locked (accessible only by authorized personnel) closet which will require biometric access. This room will house the main servers for each location as well as updated compatible UPS backups.. All the switches and connection points will be located here as well. From here, all physical cabling will be installed through ceilings and within walls for concealment. Detailed blueprints will map all cables in case access is needed. Access to the WAN will also be located here.
The effects of data rates in each part of the network are important factors. For example, studies have revealed that most of the traffic happens within a LAN. For this reason, having a switch to control bandwidth and throughput to each device can make the best use out of it. Changes can range from 10/100/1000. Furthermore, when information needs to travel through the WAN, different adjustments can be made. A WAN will tie all three stores together. La Jolla will house the central servers. Backup facilities will be located in the all three stores to avert situations where vital information could be lost. Security measures will be taken into consideration to ensure the safe transmission of data. For example, firewalls will need to be provisioned along with encryption of data to deter information from being obtained by unwanted solicitors. I will explain in more detail later in this paper.
Communication protocols are important in order to maintain a smooth running network. Data is transferred through different mediums such as Fiber optic, twisted pair, and through the air, we will ensure that the software and hardware at each end will be speaking the same language for successful communication. There are connection-oriented protocols and connectionless protocols in the KFF re-design. Each serves its purpose and will be tailored to fit each of KFFs needs. For example, they may need to video conference between locations which will use a connectionless protocol such as UDP. This type of connection can afford to drop some data in order to improve speed. They will also need connection-oriented protocols such as TCP/IP for more sensitive material where losing data is less tolerable. For example, when important files are being transferred, one device will initiate communication by sending a request to open a connection, the other device will acknowledge the request in order for communication to begin. The two devices will communicate back and forth to assure all packets are received. This method enhances QoS.
For communication between the different KFF locations, a fiber optic SONET ring will be established and maintained by the ISP. This will ensure proper maintenance of the lines and quick response times to outages. Although more expensive, a SONET ring greatly protects against outages between locations. If one path is unavailable to one location, it can make its way to the same location through the back. KFF will use ATM over Frame Relay and will require new equipment. The long-term benefit of ATM is that it will allow for future growth and expansion. Also, it provides bandwidth flexibility which allows the customer to monitor and adjust these parameters. An example is if high traffic is anticipated during certain hours, then metrics can be adjusted accordingly. ATM was chosen because different protocols may be used and this provides a great platform and QoS for multimedia. ATM gives the flexibility to scale in speed and network size, and has strong traffic-engineering and network management capabilities.
Traffic analysis is useful in that packets and data traveling through the network can be monitored. This can reveal information such as time of day when traffic may be busiest or even which devices and websites take up the most bandwidth. By understanding traffic flow, the proper adjustments can be made to maximize bandwidth.
The proper security measures will be applied to minimize threats related to data entering or leaving KFF. For the WLAN, we will be using wireless routers and access points, so WPA2 encryption will be used to safeguard against unwanted activity. Our Antivirus software will be McAfee, it allows for different firewalls and settings throughout the network to allow us to minimize any breaches. This software isn’t just plug-and-play. Security settings must be adjusted to the companies’ needs. We will meet with every employee including management to establish permissions and passwords accordingly. We will educate every employee about possible ways the network can be compromised. Examples are changing SSIDs frequently. Also, using long, non-common passwords and changing them often. We will educate them about techniques such as phishing, sniffing, keylogging, etc. that are used to try to infiltrate networks. KFF will have a strict policy on personal devices. They simply will not be allowed to connect to any part of the network including WiFi. NICs will be monitored, and accessing company WiFi with personal devices will not be tolerated.
Firewalls are a key part in keeping networked computers secure. Firewalls are not only used to protect the perimeter, there are host-based firewalls to protect against the entire network being damaged. These help to isolate and protect the LAN if an attacker penetrates the perimeter. There are variations on firewall settings. For example, you can set incoming traffic to monitor packet content or destination address. These are just a few examples on how Firewalls can help lessen the effects of a cyber-attack. Even though security measures will be established, continued monitoring is mandatory to keep data secure. Logs will be examined in a timely manner. We will keep up with patch updates. We will maintain constant vigilance because once security has been successfully compromised, then it is much harder to guarantee its safety.
This network redesign will definitely be a process. We will provide a timeline for the project. Feedback is encouraged and it is important to work closely with the ISP, management, employees, and everyone involved with this project. The methodology includes Analysis, design, implementation, testing, and evaluation. We will include deliverables to show our progress. We have already analyzed and have come up with a design for the new KFF network. The next step is implementation. The implementation process itself involves the next three phases: the first phase will be the installation of the network. This includes ISP setup of the WAN, our LAN setup including WLAN and VLAN. The second phase will involve all the testing and security measures. The third phase is evaluating the network performance once it goes live.
The best way to go about the implementation is to get the WAN established to all three locations with ATM first. The ISP will be given plenty of time to prepare and do whatever is necessary to have the system ready by the start date. Then, we will begin with one LAN. The Del Mar location first, this will facilitate the next two locations because we will learn about any oversights that occur. The second location will be Encinitas, this shall take a relatively shorter amount of time to establish since we will have had experience from Del Mar. Finally, La Jolla will be completed and after successful testing and evaluation, the old network can be removed.

Implementation Phase (Del Mar)

* Establish the WAN between all locations and verify with ISP techs. (2 days) * Setup up Telco room and all locations with all the hardware required by the new network. This means switches, routers, servers, computers, telephone systems, etc. all necessary cabling will be run concurrently. All physical security such as alarms, cameras and biometrics will also be done at the same time. (6 days) * Set up all necessary software and security such as firewalls, passwords, permissions, etc. Also educate all employees (6 days) * Create test plan (1 day) * Testing (4 days) * Evaluate project and interview users for feedback (3 days)

Implementation Phase (Encinitas)

* Setup up Telco room and all locations with all the hardware required by the new network. This means switches, routers, servers, computers, telephone systems, etc. all necessary cabling will be run concurrently. All physical security such as alarms, cameras and biometrics will also be done at the same time. (4 days) * Set up all necessary software and security such as firewalls, passwords, permissions, etc. Also educate all employees (4 days) * Create test plan (1 day) * Testing (3 days) * Evaluate project and interview users for feedback (1 day)

Implementation Phase (La Jolla)

* Setup up Telco room and all locations with all the hardware required by the new network. This means switches, routers, servers, computers, telephone systems, etc. all necessary cabling will be run concurrently. All physical security such as alarms, cameras and biometrics will also be done at the same time. (4 days) * Set up all necessary software and security such as firewalls, passwords, permissions, etc. Also educate all employees (4 days) * Create test plan (1 day) * Testing (3 days) * Evaluate project and interview users for feedback (1 day)

Once the new network has been finalized, it will begin to save KFF time and money by providing real-time updates to the entire network. For example, Inventory will be seamless and will require much less time effort by employees. This new network will allow KFF to stay ahead of the competition and will also allow them to make necessary upgrades for future expansion.

References

Telecommunications Essentials: The Complete Global Source, Second Edition, by Lillian Goleniewski. Published by Addison-Wesley.
Copyright © 2007 by Pearson Education, Inc

https://www.wikipedia.org/

http://computernetworkingsimplified.com/category-1/basic-building-blocks-of-a-computer-network/what-are-the-building-blocks-of-a-computer-network/

Similar Documents

Free Essay

Ntc360 Summary

...Syllabus College of Information Systems & Technology NTC/362 Version 1 Fundamentals of Networking Copyright © 2013 by University of Phoenix. All rights reserved. Course Description This course provides a foundation in the basic telecommunications and networking technologies fundamental to the industry and to the broad field of telecommunications. Analog, digital, and radio frequency technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: · University policies: You must be logged into the student website to view this document. · Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Goleniewski, L. (2007). Telecommunications essentials. (2nd ed.) Boston, MA: Pearson. Panko, R. R., & Panko, J. L. (2011). Business data networks and telecommunication (8th ed.) Upper Saddle River, NJ: Prentice Hall All electronic materials...

Words: 2225 - Pages: 9

Free Essay

Ntc 362 Week 2

...Riordan Network Design Project NTC/362 November, 2013 Riordan Network Design Project Riordan Manufacturing is a plastics manufacturing company that produces products such as beverage containers, custom plastic parts and plastic fans. Riordan was created in 1991 and was founded by Dr. Riordan. Riordan currently has a location in Hangzhou China and is moving that location to Shanghai China. This document will outline the network design, Project timeline, design approach, detailed design, current network topology, new network topology, security and plans for starting up new location and decommissioning the old location. Network Design Project Timeline Assignment | Timeline | Design Approach | Phase 1-Four Weeks | Detailed Design | Phase 1-Four Weeks | Current Network and Establishing New Network | Phase 2 6 weeks | Security Considerations | Phase 2 6 weeks | Decommissioning Old Facility | Phase 3 4 weeks | Old Equipment | Phase 3 4 weeks | Old and New Employees | Phase 3 4 weeks | Design Approach and Rationale Riordan Manufacturing is currently seeking to move the current location from Hangzhou China to Shanghai China. In order to successfully move the entire location to its new location we will setup the new location and get it up and running before we shut down the current location. In doing so we will need to purchase new hardware and software for the new location and also setup a new firewall...

Words: 1997 - Pages: 8

Premium Essay

Syllabus

...|[pic] |Course Syllabus | | |College of Information Systems & Technology | | |NTC/362 Version 1 | | |Fundamentals of Networking | Copyright © 2013 by University of Phoenix. All rights reserved. Course Description This course provides a foundation in the basic telecommunications and networking technologies fundamental to the industry and to the broad field of telecommunications. Analog, digital, and radio frequency technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at...

Words: 2455 - Pages: 10

Premium Essay

Patton-Fuller

...INDP FINAL PROJECT Morris Arnwine NTC/362 10/29/2014 Steven Randel Patton- Fuller Community Hospital The network’s fundamental characteristics and components- The Patton-Fuller Community Hospital is serving the public and they have the responsibility of providing good service and protecting each patient’s rights. The Health Insurance Portability and Accountability Act (HIPAA) outlines the principles and requirements that the hospital must use to ensure they are protecting patient’s rights. In the Patton-Fuller Community Hospital there are a large amount of Protected Hospital Information that needs to remain protected to meet the standards that HIPAA defines. The network is a 1000BASE-T, which supplies 1Gigabit of Ethernet connectivity over 5 cables (CAT5). This long-haul, copper-based standard is ideally suited for use within the data center because which is used in all the clinical areas of the hospital such as Emergency rooms ,Operating rooms, Pharmacy, Labs, doctor’s offices, Wards, Outpatient examining rooms, and Intensive Care Units (ICU’s) but the throughput of copper wire connections leaves room for improvement. The Administrative sections of the hospital such as IT Department, Admitting/Discharge, Facilities, Human Resources (HR), Finances, and Hospital Senior Management are using 1000BASE-T network structure. “The backbone network structure for the entire hospital is 1000BASE-T. Individual sections of departmental networks such as Radiology use different standards...

Words: 3258 - Pages: 14

Premium Essay

Analysis of International Marketing

...3122-prelims.qxd 10/29/03 2:20 PM Page i International Human Resource Management 3122-prelims.qxd 10/29/03 2:20 PM Page ii 3122-prelims.qxd 10/29/03 2:20 PM Page iii second edition International Human Resource Management edited by A n n e - Wi l H a r z i n g J o r i s Va n R u y s s e v e l d t SAGE Publications London l Thousand Oaks l New Delhi 3122-prelims.qxd 10/29/03 2:20 PM Page iv © Anne-Wil Harzing and Joris van Ruysseveldt, 2004 First published 2004 Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act, 1988, this publication may be reproduced, stored or transmitted in any form, or by any means, only with the prior permission in writing of the publishers, or in the case of reprographic reproduction, in accordance with the terms of licences issued by the Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should be sent to the publishers. SAGE Publications Ltd 1 Olivers Yard London EC1Y 1SP SAGE Publications Inc 2455 Teller Road Thousand Oaks, California 91320 SAGE Publications India Pvt Ltd B-42, Panchsheel Enclave Post Box 4109 New Delhi 100 017 British Library Cataloguing in Publication data A catalogue record for this book is available from the British Library ISBN 0 7619 4039 1 ISBN 0 7619 4040 5 (pbk) Library of Congress Control Number...

Words: 205529 - Pages: 823

Free Essay

Business

...AN EVALUATION OF COMMUNICATION INTEGRATION WITHIN A STATE-OWNED ORGANISATION by MOALUSI JONAS MAENETJA Submitted in partial fulfilment of the requirements for the degree of MASTER OF ARTS WITH SPECIALISATION IN ORGANISATIONAL COMMUNICATION RESEARCH AND PRACTICE at the UNIVERSITY OF SOUTH AFRICA SUPERVISOR: PROF TC DU PLESSIS JOINT SUPERVISOR: PROF DF DU PLESSIS APRIL 2009 Student number: 697-616-6 DECLARATION I declare that THE EVALUATION OF THE CURRENT POSITION OF COMMUNICATION INTEGRATION WITHIN A STATE - OWNED ORGANISATION is my own work and that all the sources I have used or quoted have been indicated and acknowledged by means of complete references. …………………………………….. SIGNATURE (MR MJ MAENETJA) ………………… DATE 2 ACKNOWLEDGEMENTS Throughout the composition of this Masters Dissertation I was blessed to have the support and encouragement of some very special people. I hereby wish to acknowledge the contribution of the following persons: • To my family, friends and Eskom colleagues for supporting me through all my years of study. Thank you for believing in me, even when I did not believe in myself. Thank you for all of the unconditional love and support you gave me. What I have done, I have done to make you proud. • Large amounts of gratitude to professor TC Du Plessis and professor DF Du Plessis from the Department of Communication at the University of South Africa for...

Words: 53763 - Pages: 216

Premium Essay

Business

...NIKE, INC. ANNUAL REPORT ON FORM 10-K Table of Contents Page PART I ITEM 1. Business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sales and Marketing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . United States Market . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . International Markets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 57555 - Pages: 231

Premium Essay

Nike

...NIKE INC FORMReport) 10-K (Annual Filed 07/23/13 for the Period Ending 05/31/13 Address Telephone CIK Symbol SIC Code Industry Sector Fiscal Year ONE BOWERMAN DR BEAVERTON, OR 97005-6453 5036713173 0000320187 NKE 3021 - Rubber and Plastics Footwear Footwear Consumer Cyclical 05/31 http://www.edgar-online.com © Copyright 2013, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE FISCAL YEAR ENDED May 31, 2013 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(D) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE TRANSITION PERIOD FROM TO . Commission File No. 1-10635 (Exact name of Registrant as specified in its charter) OREGON (State or other jurisdiction of incorporation) One Bowerman Drive Beaverton, Oregon (Address of principal executive offices) (503) 671-6453 93-0584541 (IRS Employer Identification No.) 97005-6453 (Zip Code) (Registrant’s Telephone Number, Including Area Code) SECURITIES REGISTERED PURSUANT TO SECTION 12(B) OF THE ACT: Class B Common Stock (Title of Each Class) New York Stock Exchange (Name of Each Exchange on Which Registered) SECURITIES REGISTERED PURSUANT TO SECTION 12(G) OF THE ACT: NONE Indicate by check mark • • • if the registrant is a well-known...

Words: 108131 - Pages: 433

Free Essay

Working Capital

...Business Plans Handbook Business Plans A COMPILATION OF BUSINESS PLANS DEVELOPED BY INDIVIDUALS NORTH THROUGHOUT AMERICA Handbook VOLUME 16 Lynn M. Pearce, Project Editor Business Plans Handbook, Volume 16 Project Editor: Lynn M. Pearce Product Manager: Jenai Drouillard Product Design: Jennifer Wahi Composition and Electronic Prepress: Evi Seoud Manufacturing: Rita Wimberley Editorial: Erin Braun ª 2010 Gale, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. This publication is a creative work fully protected by all applicable copyright laws, as well as by misappropriation, trade secret, unfair competition, and other applicable laws. The authors and editors of this work have added value to the underlying factual material herein through one or more of the following: unique and original selection, coordination, expression, arrangement, and classification of the information. For product information and technology assistance, contact us at Gale Customer Support, 1-800-877-4253. For permission to use material...

Words: 121839 - Pages: 488

Premium Essay

Philip Kotler Book

...Management, by Philip Kotler Copyright © 2001by Prentice-Hall, Inc. A Pearson Education Company Upper Saddle River, New Jersey 07458 Marketing Management Millenium Edition, Tenth Edition, by Philip Kotler Copyright © 2000 by Prentice-Hall, Inc. All rights reserved. No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher. Compilation Copyright © 2002 by Pearson Custom Publishing. This copyright covers material written expressly for this volume by the editor/s as well as the compilation itself. It does not cover the individual selections herein that first appeared elsewhere. Permission to reprint these has been obtained by Pearson Custom Publishing for this edition only. Further reproduction by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system, must be arranged with the individual copyright holders noted. This special edition published in cooperation with Pearson Custom Publishing Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 Please visit our web site at www.pearsoncustom.com ISBN 0–536–63099-2 BA 993095 PEARSON CUSTOM PUBLISHING 75 Arlington Street, Suite 300, Boston, MA 02116 A Pearson Education Company SECTION ONE Understanding Marketing Management Marketing in the Twenty-First Century We will address the following questions: ■ What are the tasks of marketing? ■ What are the major concepts and tools of marketing...

Words: 231198 - Pages: 925

Premium Essay

Integrated Marketing Communications

...Advertising, Promotion, and other aspects of Integrated Marketing Communications Terence A. Shimp University of South Carolina Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Advertising, Promotion, & Other Aspects of Integrated Marketing Communications, 8e Terence A. Shimp Vice President of Editorial, Business: Jack W. Calhoun Vice President/Editor-in-Chief: Melissa S. Acuna Acquisitions Editor: Mike Roche Sr. Developmental Editor: Susanna C. Smart Marketing Manager: Mike Aliscad Content Project Manager: Corey Geissler Media Editor: John Rich Production Technology Analyst: Emily Gross Frontlist Buyer, Manufacturing: Diane Gibbons Production Service: PrePressPMG Sr. Art Director: Stacy Shirley Internal Designer: Chris Miller/cmiller design Cover Designer: Chris Miller/cmiller design Cover Image: Getty Images/The Image Bank Permission Aquistion Manager/Photo: Deanna Ettinger Permission Aquistion Manager/Text: Mardell Glinski Schultz © 2010, 2007 South-Western, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution, information storage and retrieval systems, or in any other manner—except as may be permitted by the license terms herein. For product information and technology assistance, contact us at Cengage Learning Customer &...

Words: 219845 - Pages: 880

Free Essay

Internship

...An illustration denoting the timeless elegance of created by Mavra Almas, 2005 Suraj Miani Sahib in Multan. Annual Report of Packages Limited 2012 Naqsh School Foundation in of 2003, Arts was established by the Babar Ali with the purpose to revive the traditional arts of miniature, naqashi (the art of arabesques) and calligraphy.  Naqsh artists and students have excelled in the art of naqashi, which has been inspired from the rich historical monuments of the Packages Limited the years. We Annual Report Mughal is proud to have been a patron of Naqsh over are happy to dedicate the theme of this year’s to the revival of traditional naqashi, using some of the artworks produced by the A era. On the Naqsh School Cover Page: magnificent display of true arabesque patterns coming to life – Jahangir’s tomb Afshan Ijaz, n.d. a masterpiece inspired by created by in Lahore. of Arts. Ottoman Majesty The strikingly intricate beauty of a 16th century ceiling artwork. the mausoleum of Shah Rukn-e-Alam in Multan. A spectacularly intricate painting depicting Created 2 by Sadia Jamil, 2012 Annual Report of Packages Limited 2012 Contents 04 Company Profile 06 Company Information 08 Organogram 10 Business Divisions 21 Entity Rating Governance 22 24 26 30 31 Board of Directors Management Committees Vision, Mission...

Words: 78521 - Pages: 315

Premium Essay

Differing Perspectiveson Quality

...THESIS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Six Sigma Management Action research with some contributions to theories and methods PETER CRONEMYR Division of Quality Sciences Department of Technology Management and Economics CHALMERS UNIVERSITY OF TECHNOLOGY Göteborg, Sweden (2007) They wanted me to be respected as A doctor or a lawyer man But I had other plans Gonna be a rock ‘n’ roll singer Gonna be a rock ‘n’ roll star AC/DC - Rock ‘n’ Roll Singer Young/Young/Scott 1975 No matter what Quality will keep on rockin’ The Rock Stars of Quality Debbie Phillips-Donaldson, editor Quality Progress, July 2005 Six Sigma Management Action research with some contributions to theories and methods Peter Cronemyr Copyright © Peter Cronemyr (2007) ISBN 978-91-7385-021-6 Doktorsavhandlingar vid Chalmers tekniska högskola Ny serie nr 2702 ISSN: 0346-718X Published and distributed by: Division of Quality Sciences CHALMERS UNIVERSITY OF TECHNOLOGY S-412 96 Göteborg, Sweden Telephone: +46 (0)31 772 10 00 Printed at: Chalmers Reproservice Göteborg, Sweden Thesis Shortcuts Six Sigma A short introduction Go directly to Chapter 3.1 on page 47 Action Research Methodology Go directly to Chapter 2.2 on page 28 The Author Background and motives Go directly to Chapter 1.2 on page 15 Siemens Industrial Turbomachinery AB The Case Company Go directly to Appendix A, Chapter 2.1 on page A-3 The Conclusions of the Thesis Go directly to Chapter 5 on page 89 ...

Words: 98155 - Pages: 393

Premium Essay

Ggggggg

...Retailing in the 21st Century Manfred Krafft ´ Murali K. Mantrala (Editors) Retailing in the 21st Century Current and Future Trends With 79 Figures and 32 Tables 12 Professor Dr. Manfred Krafft University of Muenster Institute of Marketing Am Stadtgraben 13±15 48143 Muenster Germany mkrafft@uni-muenster.de Professor Murali K. Mantrala, PhD University of Missouri ± Columbia College of Business 438 Cornell Hall Columbia, MO 65211 USA mantralam@missouri.edu ISBN-10 3-540-28399-4 Springer Berlin Heidelberg New York ISBN-13 978-3-540-28399-7 Springer Berlin Heidelberg New York Cataloging-in-Publication Data Library of Congress Control Number: 2005932316 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com ° Springer Berlin ´ Heidelberg 2006 Printed in Germany The use of general descriptive names, registered names, trademarks, etc. in this publication does not...

Words: 158632 - Pages: 635