Premium Essay

Research About Network Documentation

In:

Submitted By kingrizan
Words 1654
Pages 7
Research about Network Documentation

Network Documentation Policy
1.0 Overview
This network documentation policy is an internal IT policy and defines the requirements for network documentation This policy defines the level of network documentation required such as documentation of which switch ports connect to what rooms and computers. It defines who will have access to read network documentation and who will have access to change it. It also defines who will be notified when changes are made to the network.
2.0 Purpose
This policy is designed to provide for network stability by ensuring that network documentation is complete and current. This policy should complement disaster management and recovery by ensuring that documentation is available in the event that systems should need to be rebuilt. This policy will help reduce troubleshooting time by ensuring that appropriate personnel are notified when changes are made to the network.
3.0 Documentation
The network structure and configuration shall be documented and provide the following information: 1. IP addresses of all devices on the network with static IP addresses. 2. Server documentation on all servers as outlined in the "Server Documentation" document. 3. Network drawings showing: 1. The locations and IP addresses of all hubs, switches, routers, and firewalls on the network. 2. The various security zones on the network and devices that control access between them. 3. The locations of every network drop and the associated switch and port on the switch supplying that connection. 4. The interrelationship between all network devices showing lines running between the network devices. 5. All subnets on the network and their relationships including the range of IP addresses on all subnets and netmask information. 6. All wide area network (WAN) or

Similar Documents

Premium Essay

Term Paper

...company building renovation project in port Harcourt ,rivers state, on short term base and they are efficiently meeting their client needs and requirement. Edichin services manage comprehensive project logistics services; specialize on human resources providing qualified Nigeria engineers, operators, skilled worker to the plant and construction field as per the project requirement. They provide higher level service, higher level management, and they serve their customers and consider customer satisfaction their number one priority. They also have a large transportation pool, largest capacity, proper rate classification exception process, and proper software, with the highest service level and at the lowest cost. QUESTION 2 DESCRIBE ABOUT YOUR JOB AND RESPONSIBILITIES During my two months internship in edichin service, I was assigned to the customer service department to assist the person in charge of the customer service department. MY RESPONSIBILITIES ARE: i. To maintain and develop a computerized customer and prospect database. ii. Plan and carry out direct logistics activities such as transportation schedule and timescales. iii. Respond to and follow up customer enquiries by post, telephone, and personal visits with my supervisor. iv. Maintain and develop existing and new customer through planned individual account support,...

Words: 1076 - Pages: 5

Premium Essay

Sentimental Anaysis

...decade. By understanding the public opinion about ongoing election will be used for the election candidates as well as for the voters. Because of these reason analyzing public opinions before the election, can forecast the results. The forecasted results can be used for the candidates for their own goods. As an example if the public giving their opinion in negative way for the particular candidate, candidates can identify the current opinion by analyzing the public options and do the campaign in better way. Same as the voters get to know the overall public opinion of the candidates and can do their voting for candidates who is having positive opinion from public. OVERVIEW OF the Solution Social media platforms have become an important site for political conversations throughout the world. By using automated real-time sentiment analysis of this public opinion data can provide fast indications of changes in opinion, showing for example how an audience reacts to particular candidate’s statements during an election period. Sentiment analysis is a new area in text analytics where it focuses on the analysis and understanding of the emotions from the text patterns. This new form of analysis has been widely online marketing area. From this project, trying to implement the application of using weighting techniques with online sentiment to predict the vote percentage that individual candidate will receive. There will be in depth discussion about the various ideas using sentiment analysis...

Words: 1072 - Pages: 5

Premium Essay

Comparison of Social Media Tools

...Comparison of Social Network Analysis Tools What is Social Network :? Social network is a social structure made up of many actors, for example firms, or people which are all tied up in relationships, connections, or interactions(1). The social network perspective is made up to employ the structure of a social group, how they interact with each other, how this structure has an influence on other variables and how it changes as time passes. What is Social Networking Analysis? Social network analysis is the mapping and measuring of all the factors that make up the social network, it is the measuring of relationships and flows between people, groups, organizations, computers, URL, and other connected information entries(3). The nodes in the network are represented as people and the links show their direct relationships with each other. To have deeper understanding of networks and their participants , we evaluate the location of actors in the network which basically means finding the centrality of a node . These measures give us insight into the various roles and groupings in a network -- who are the connectors, mavens, leaders, bridges, isolates, where are the clusters and who is in them, who is in the core of the network, and who is on the periphery? In order to evaluate and understand these networks and the relationships between their actors we use social network analysis tools. We will be discussing three different SNA tools, compare between them, talk about their main features...

Words: 1454 - Pages: 6

Premium Essay

Wireless Networks

...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Wireless Home Network Student Name: Degree Program: Information Technology Mentor Name: Signature Block Table of Contents Capstone Proposal Summary 1 Review of Other Work 2 Rationale and Systems Analysis 3 Project Goals and Objectives 5 Project Timeline and Milestones 6 Project Deliverables 8 References 10 Appendix 1: Competency Matrix 11 1 Capstone Proposal Summary This project is going to entail upgrading and installing new components to an existing wireless home network. This is a two story home with attic and basement. Inside this home, there are 8 rooms. A living area, an office area, kitchen, laundry room, 1 ½ bathrooms and 3 bedrooms. Following an interview and on site evaluation to assess what the current needs are, along with the direction of technology in the future. The new network needed to be focused on wireless connectivity of their various devices, which included smart phones, tablets and laptops. There also needed to be easy access for guests who wanted to connect to the wireless network for their own tablets, smart phones and laptops. Currently, the home has DSL internet service, with a basic wireless G router. The DSL service was adequate for the current network setup, but with more and more online content, they were having a problem with lag between devices. The current speed...

Words: 2803 - Pages: 12

Free Essay

Service Request Sr-Rm-022

...Service Request SR-rm-022 BSA/375 Monday, February 4, 2013 Mark Fairbanks Service Request SR-rm-022 Company Overview Riordan Manufacturing originated from a small research and development company called Riordan Plastics, Inc. that had its beginning in 1991 (Apollo Group, Inc., 2012). Its founder was a chemistry professor named Dr. Riordan, who acquired patents for processing polymers into plastic substrates that resisted breaking under extreme tension (Apollo Group, Inc., 2012). In 1992, Dr. Riordan acquired capital to expand his company and renamed it Riordan Manufacturing. By 2000, Riordan Manufacturing was so successful it grew into a global manufacturer that became a leader in plastic products (Apollo Group, Inc., 2012). Some of the products it produces are plastic beverage containers, plastic fan parts, and customized plastic parts. It has facilities in four locations: (1) Georgia, (2) Michigan, (3) California, and (4) China. Dr. Riordan prides himself on giving his customers quality service. This has led to loyal customers in the following industries consisting of automotive parts manufacturers, aircraft manufacturers, the Department of Defense, appliance manufacturers, and beverage makers and bottlers (Apollo Group, Inc., 2012). Riordan Manufacturer’s revenue is roughly about 46 million annually (Apollo Group, Inc., 2012). The company manages a global personnel consisting of 550 individuals. Employees are encouraged to be innovative and develop strong work...

Words: 4315 - Pages: 18

Premium Essay

It Admin

...Information Risk Management Plan Project Name | Network Vulnerability Colt Manufacturing R&D Server | Document Purpose The Project Information Risk Management Plan formalizes a system's information security and privacy upgrade. During the Project Planning Phase the project team: * works with Colt Manufacturing IT Department to register the data involved in the project and determine the data's classification. * useable resources in this document are reviewed to identify potential areas of information security and privacy risk. * document risks in the project Risk Register. During technical design activities in the Project Implementation phase, prior to purchasing or building an application: * System Proprietor (functional owner) works with the principal System Custodian to complete the Project Information Risk Management Plan. * Project Team submits the Plan to Colt Manufacturing IT Department and System/Network administrators for review and approval. Review & Approval Signature indicates review and approval of the Project Information Security Risk and Privacy Plan, and authorizes the Project Manager/Team to proceed with the detailed planning and execution of the project. Role | Name | Signature | Date | Colt Manufacturing Senior Management |                                                                            |                                                                                    |                      | IT Department...

Words: 3263 - Pages: 14

Premium Essay

Nurse Informatics

...Nurse Informatics Shannon S Goff Western Governors University Nursing Assignment The technology necessary to meet the federally mandated requirements which will affect the merged healthcare organizations. Electronic health records with satellite facilities supported by remote technology. Electronic health records emerged as one of the most relevant topics in health care; EHRs are central in the strategy of federal government to transform health care providing in the U.S. (Henricks, 2011). Federal actions are promoting EHR in order to guarantee important implications for nursing practices. The technology implies also payment penalties for those providers who do not manage to meet the requirements of EHRs use. EHR technology has to be certified according to technical and functional criteria that are set forth by the government. The using of EHR technology is significantly important for laboratories (Henricks, 2011) since the certification criteria of EHR have to be related directly to laboratory testing or laboratory management. Federal government identified the goals for improving healthcare and EHRs are central for these goals. EHRs with satellite facilities aims at the following points, it should: * improve safety, efficiency, and quality of public healthcare and reduce people's health disparities; * engage the patients and their families in healthcare services; * improve healthcare coordination; * improve public health and population in general; ...

Words: 2433 - Pages: 10

Premium Essay

Sr-Rm-022

...Riordan Manufacturing Service Request SR-rm-022 Student Name BSA 375 10/14/2013 Gaya P. Agrawal Hugh McCauley, the COO of Riordan Manufacturing has submitted service request SR-rm-022. In the request, he wants to integrate the variety of HR tools into a single integrated application for all of the plant locations. He wants to take advantage of the more sophisticated, state of the art information systems technology in the human resources department. To this end, Hugh McCauley has submitted service request SR-rm-022, and from that he is expecting a definition of the business requirements for the development of an HR system to support the request objective. He is also expecting a detailed system design and a project implementation plan required to complete the project. He wants this completed in six months so that the new system can be implanted and utilized in the second quarter of the next year. Riordan Manufacturing started its existence in 1991 as a company called Riordan plastics and its founder, Dr. Riordan, acquired patents for “processing polymers into plastic substrates that resisted breaking under extreme tension. In 1992, Dr. Riordan acquired capital to expand his company and renamed it Riordan Manufacturing. By 2000...

Words: 4638 - Pages: 19

Premium Essay

Contract Management Course Project 3

...Diana Brooks Future Tek, Inc. 28345 Beck Rd. Suite 101 Wixom, MI 48393 August 20, 2012 Tracy Birch Contracting Manager J Avenue DDC J7-AB, Bldg. 404 New Cumberland, PA 17070-5001 Dear Tracy Birch: Attached is our proposal for solicitation #SP3300-12-R-0007 for the On-Site Support Services project. This proposal assumes that if it is granted, all parties will work together to develop an on-site support service that is both robust and reliable for a lower price than our competitors. We are currently offering a 20% discount for our entire list of services or 10% on the minimal required services to complete this ongoing project. Please keep in mind that this proposal is based on information provided at this time. Any revisions made to the solicitation after today will be subject to a price review. We reserve the right to withdraw this bid if it is not accepted within 45 days. Thank you for giving us this opportunity. I look forward to hearing from you. Sincerely, Diana Brooks Sales Contract Manager I have enclosed a copy of Future Tek, Inc.’s resume, technical capabilities and pricing information. Copyright © 1998 by Ann Poe Future Tek, Inc. has been in the Information Technology for a total of 11 years. During those years we’ve dealt mainly with the integration of new information technology systems into Financial based institutions. We are looking to not only expand our services to other industries outside of banking. After reviewing the bid solicitation...

Words: 2807 - Pages: 12

Premium Essay

Personal Narrative: My LBC Experience

...that focused on documentation, capturing and deploying images. I also learned about projectors and how they work with the systems in classrooms. I chose this experience for my LBC and my internship because I wanted to focus on something that would help me understand my future employment. This experience has given me the opportunity to help others and interact with helping others and being able to interact with a client like I would in jobs in the actual field....

Words: 1578 - Pages: 7

Free Essay

Tech Writing Proposal

...students and projects, Evaluators are human and are allowed latitude in grading. Additionally, your interpretation of what you see is likely to be different from the interpretations of others; in other words, even if you strictly follow the model of this paper, there is no guarantee of immediate success with your project. The original work was altered to mask the identity of its author and the various commercial products mentioned. References and their citations were also masked because no effort was made to determine whether other changes affected their validity. The inserted Comments indicate only that all required TaskStream sections are present, not that they are correctly completed for all types of projects. The best that can be said about the original work is that an evaluator found the work submitted to be sufficient to the task. Viewing this sample may or may not produce a similar result for you. Bottom line: You are the author of your work. We hope this sample helps to dissipate some of the uncertainty that surrounds the Capstone Project, but it cannot guaranty a trouble-free process. IMPORTANT: For maximum benefit, carefully compare this report to its successor. Comment [t1]: A. Cover Sheet: Provide a cover sheet for your proposal that includes the following elements: a. Project name b. Your name c. Your degree program d. Your mentor’s name e. Signature block (A space for your mentor’s signature and your signature and the date. This will...

Words: 7152 - Pages: 29

Free Essay

Unit 2 Assignment 2: Vulnerability of a Cryptosystem

...the situation. There is a few websites that I have been advised to read as they may assist in my decision making process. After reading further I have been asked a large number of questions. I am planning to read up so I know about the cryptosystem then go into answering the provided questions. When we think about MD5 hashing we have to consider the hash and its long history of collisions on the network. When we were doing the practice labs in class the other night we say a number of student using the MD5 hashing and getting the same hash out of different text documents. This is not a good sign that this is the best type of hashing algorithm to use. I would advised using the latest greatest out with a known history of being secure. Asking if the threat is significant is an easy question to answer. Any organizations documentation at some level needs to be protected so it is not used in the wrong way. Yes, of course the cryptosystem being vulnerable is something that needs to be addresses right away. Modifying the hardware and software to provide a more secure hashing algorithm is on the top of the list. I need to continue doing research to find the best solution available for a price point that is reasonable for our university. When we think about how easy a system is to exploit I don’t think of a system being exploited as easy. I think of it like the attacker has some need for what you have and will work to find a way into...

Words: 1643 - Pages: 7

Premium Essay

Research Paper

...technology existed in 1960s to provide platform for exchanging data and information over a distance | Solution | Establishment on ARPANET and eventually the NSF (semi public organization), which lead to success of Internet | Table 61: Problem Statement on Internet Holistic Thinking Perspective HTPs on Internet | Big Picture | * The Internet was an U.S government initiative and established the Advanced Research Projects Agency (ARPA) was established in 1957 to respond to the perceived scientific and technological advantage the then-Soviet Union displayed in launching the Sputnik satellite * ARPA, along with the newly created National Aeronautics and Space Administration (NASA), was to regain technical superiority for the United States. * About this same time, a RAND researcher by the name of Paul Baran was working on a classified U.S. Air Force contract, whose purpose was to identify ways to strengthen the Nation's telecommunication infrastructure so that it could survive a nuclear strike. Part of his solution was to develop distributed telecommunication networks. * Till 1960s telephone was considered to be the best communication mechanism available. * At the World’s Fair in 1964, a “Picture phone” was displayed proudly by communications giant AT&T – a mere update of a picture phone that was introduced at another World’s Fair 30 years earlier. * Researchers were working behind closed doors to find a way to not only speak with colleagues over great distances, but...

Words: 3259 - Pages: 14

Premium Essay

Service

... Contents Testing Process: 3 Installation Process: 4 Training Plan Summary: 4 Documentation Plan Summary: 5 Support and Maintenance Plan: 6 Reference 7 Introduction: The goal of this project is to set up a loyalty system to not only reward customers for their purchasing habits, but to bring in more foot traffic and create more loyalty to Kudler Fine Foods. This program will also bring business to the vendors that will be working along with Kudler Fine Foods to provide the loyalty rewards. Testing Process: Testing occurs at every stage of the project before moving on to the next stage. This ensures compatibility within the system as it progresses. Testing’s ultimate goal is to validate that the system meets the requirements of the stakeholders (Valacich, George, & Hoffer, 2012) and is a deliverable with its own plan and what managers are trying to accomplish. According to Rehman Zafar (2013) testing process falls in the following types: “unit testing, integration tests, functional testing, system testing, stress testing, performance testing, usability testing, acceptance testing, regression testing, and beta test” (Para. 5). Testing also consists of hardware components to make sure they can interface. The testing phase of the project is somewhat similar to the documentation phase; the project team must register every test results and make necessary adjustment as the team proceeds...

Words: 1012 - Pages: 5

Premium Essay

Btec

...Unit 4 P6 Explain the operational issues in relation to the use of business information Saud Usman Shaikh 10B1 Unit 4 P6   Operational Issues Operational issues are the issues arising in the process of how something is done; these are the 4 types of operational issues Organizations have to store and manage countless pieces of information. These are very important and confidential Information. Information is received by the businesses mainly in two ways. • The organization receives the information it requires • The staff receives the information To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning security of information. Procedures for Security of Information • Backups • Health and Safety • Organizational Policies • Business Maintenance Plans Security of Information: Different ways for a company to secure data are: • Companies should download or purchase an anti virus software on their computers so that it will prevent hackers or third parties gaining access to their data. • Companies increase security by providing log in and password verification system for each of their employees that need to access their data. • Securely removing all the information before disposing old computers. Backups What should Companies do to back up their data? They can back-up their data and information by storing them...

Words: 1767 - Pages: 8