...SAMPLE TECH WRITING PROPOSAL INTRODUCTION AND DISCLAIMER This is an altered version of a real Tech Writing project submitted by a student and passed by an Evaluator. There is no guaranty that either the original version or this altered one would pass evaluation if submitted today. Despite our best efforts to provide consistent evaluation across all students and projects, Evaluators are human and are allowed latitude in grading. Additionally, your interpretation of what you see is likely to be different from the interpretations of others; in other words, even if you strictly follow the model of this paper, there is no guarantee of immediate success with your project. The original work was altered to mask the identity of its author and the various commercial products mentioned. References and their citations were also masked because no effort was made to determine whether other changes affected their validity. The inserted Comments indicate only that all required TaskStream sections are present, not that they are correctly completed for all types of projects. The best that can be said about the original work is that an evaluator found the work submitted to be sufficient to the task. Viewing this sample may or may not produce a similar result for you. Bottom line: You are the author of your work. We hope this sample helps to dissipate some of the uncertainty that surrounds the Capstone Project, but it cannot guaranty a trouble-free process. IMPORTANT: For maximum benefit...
Words: 7152 - Pages: 29
...5 Scope and Objectives 85 Scope 8 Objectives 9 Success Factors 10 System Design 11 Existing Dallas Network 11 Existing Dallas Network Diagram 12 Proposed Dallas Network 13 Proposed Dallas Network Diagram 16 Proposed Santa Rosa Network 17 Proposed Santa Rosa Network Diagram 19 Transition Plans 20 WAN Connectivity and Design 22 Backup Strategy 23 Network Security Plan 23 Business Continuity Plan 23 Financials 24 Budget 24 Recurring Costs 24 Non-Recurring Costs 25 Implementation Plan 26 Implementation Overview 26 Proposed Implementation Plan 26 Table of References 29 Charter Project Name | I-Link | Project Number | PROJ1337 | Project Manager | Kyle Schulz | Prioritization | 1 | Owner(s) | | Start Date: | January 2, 2013 | Scheduled Completion Date: | Sept.16,2013 | Our Mission | | Our mission will include testing of the network’s function and provide adequate training to ensure more efficient network for the four branch’s and the main office. We will provide onsite and offsite backup as well as an offsite database which will help protect from data loss and down time. | Scope | (I Left spaces so you can add/ edit these area) | * Install a new network * Implement a Security plan * Implement a Backup plan * Test for issues within the network * Provide network support and training | | Objectives | | Installing the new network will provide the following benefits: * Provide an easy way for the doctor’s...
Words: 4814 - Pages: 20
...Healthcare Network Allied Telesis Healthcare Network Construction Guidebook Contents Healthcare Network Solution | Introduction Outline of a Healthcare Network Importance of the network Main requirements in designing a healthcare network Non-stop Network Network bandwidth and QoS (Quality of Service) Data capacity Network bandwidth and cost of LAN devices QoS (Quality of Service) Redundancy and proactive measures to overcome network failures Core switch redundancy Comparison of redundancy of communication Loop protection Secure and Reliable Network Security Importance of security: both physical and human factors Threats to network security Network authentication External network (Internet) connection Inter-regional cooperative healthcare network Effective use of Wireless LAN Security in Wireless LAN Install and operation of Wireless LAN Ease of Operation Critical issues for network operation SNMP (Simple Network Management Protocol) Measures against system failures; device failures, incorrect wiring Use of SNMP IPv6 Network Configuration Example Network configuration for hospitals with fewer than 100 beds Network configuration for hospitals with more than 100 and fewer than 200 beds Network configuration for hospitals with more than 200 beds (i) Network configuration for hospitals with more than 200 beds (ii) 3 4 4 5 7 7 7 8 9 10 10 11 12 13 13 13 14 15 19 20 21 21 22 23 23 24 24 25 26 27 28 30 32 34 2 | Healthcare Network Solution Healthcare Network Solution...
Words: 8999 - Pages: 36
...In any application, the system development life cycle plays a crucial part as it passes through several stages such as data gathering, data design, system implementation, system testing, and system maintenance. The initial stage of design lie in identifying the processes and the entities which represents the functionality and performed of the system. The process is established using the processes in the data flow, which can be illustrated through data flow diagrams. The data flow diagram helps significantly in increasing the level of details with each level as the process involves sub-dividing the processes until indivisible sub-processes are reached. For the data flow to be established, certain criteria has to be met in collecting data. For Riordon Manufacturing, this includes: • Employees - These are the individuals which accounts for the manual human resources. The varied tasks ranges from production, to management, to engineers, to designers, to administrators, and task fields implemented as needed by the company. • Clients - The clients may range in designation from investors, to customers, or to simply referring to them as clients. These are the people who invest financing and specific interest in the company's products and services, ranging from small scaled interests to large scales interests. • Manager - These people represents the head of the chain of command for the general employees, even though being employees themselves. The varied tasks...
Words: 758 - Pages: 4
...New Job RMON Research Nearly every business depends on smooth-running communications networks. So the need for professionals that know how to design, implement, secure, and manage them is everywhere. After doing Network and Communications Management Degree Program. With new positions opening up and older NCM workers retiring, networking promises to be a growing career field in North America for years to come. After reading this report we will get that the features of it and how it will benefits to our organization to fulfill the corporate network solutions. Now I am going to tell you what are RMON and RMON probes and how they are utilized in enterprise network management systems and how they would benefit the company: RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site. It's specified as part of the Management Information Base (MIB) in Request for Comments 1757 as an extension of the Simple Network Management Protocol (SNMP). RMON can be supported by hardware monitoring devices (known as "probes") or through software or some combination. For example, Cisco's line of LAN switches includes software in each switch that can trap information as traffic flows through and record it in its MIB. RMON collects nine types of information, including packets sent, bytes sent, packets...
Words: 1242 - Pages: 5
...Executive Summary The Toy Company has requested an upgrade of their network system. The current system has over ten old Windows 95 Operating System desktops with MS Office 95 products. The office employees use the network to send e-mail, access the Internet, make the payroll, accounting, scheduling receiving and delivering, invoicing, human resources tasks, and an outdated inventory System. The manufacturing side of the operation has a legacy network managing a classic robotics system. Every part of this system is obsolete, and the vendors went out of business, eliminating the possibility of support. The only IT person at the manufacturing facility may be an expert on keeping this old system running, but they do not have any experience with new technology. Needless to say, the system is slow and when a problem arise the downtime can go on for hours and sometimes even days at a time. The Toy Factory management wants to address these issues through an upgrade to their system, but they are also looking to positively affect productivity and improve security of the network overall. The proposed network will require significant changes to The Toy Factory's systems. The current hardware is in dire need of an upgrade, which will be implemented with the new physical network architecture. The implementation of this new architecture will provide higher speeds, reliability, and easier maintenance of network (Dennis, 2009). The upgraded hardware will come with better software that will...
Words: 3448 - Pages: 14
...Network Security Policy Practices Every company or corporation with a computer network that has valuable assets stored has a well planned network security policy in place. A network security policy is defined as a manuscript that defines the regulations for computer network admission identifies policies and how they are enforced, and gives a basic layout of proper security procedures. Without a policy to prepare, prevent and respond to security breaches, reliability of the network could be compromised. Basic beginning steps to implementing a security policy, or preparing, include accessing the jeopardy to the network and creating a response panel. Next we look at the continuation, or prevention, of the network which consists of monitoring the network for violations and a security change management practice for when the policy needs to be updated. The final step for the policy is the review process which goes over past events and incidents, and implementing modifications to the existing policy to adapt these breaches. Each of these steps is essential to the integrity and continuation of a secure network and must be subject to constant observation and change. New types of viruses and attacks are dreamed up on a daily basis, and we need to be prepared to prevent and respond as quickly as possible in order to provide network availability to company employees and needs. Preparation is the groundwork in handling the security measures for a security policy and provides a...
Words: 2079 - Pages: 9
...I R E A S O N I N G S N M P L I B R A R Y iReasoning SNMP API User Guide Copyright © 2002-2014 iDeskCentric Inc., All Rights Reserved. The information contained herein is the property of iDeskCentric Inc. This document may not be copied, reproduced, reduced to any electronic medium or machine readable form, or otherwise duplicated, and the information herein may not be used, disseminated or otherwise disclosed, except with the prior written consent of iDeskCentric Inc. I R E A S O N I N G S N M P L I B R A R Y Table of Contents INTRODUCTION....................................................................................................................................................................................................................1 About this document ................................................................................................................................................................................................................1 Target Audience .......................................................................................................................................................................................................................1 INSTALLATION .....................................................................................................................................................................................................................2 Requirements..............
Words: 5569 - Pages: 23
...be used to analyze network problems and detect Internet misuse. But at the same time, it allows hackers and people with malicious intention to "sniff" out your password, get your personal information, and invade your privacy. That is also why securing and encrypting data is so important. In this paper, the definition of packet sniffing will be introduced and several functionality and possible uses of packet sniffers will be explained. Also, information on how to protect against sniffers and man-in-the-middle attacks will be provided. An example of a packet sniffer program, Wireshark, will be given, followed by a case study involving the restaurant chain Dave & Buster's, which will show the negative consequences that can occur when organizations are not aware of the threat of packet sniffing by hackers. A packet sniffer is "a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network" (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening in the network by allowing a view of the packet-by-packet data (Shimonski, 2002). Additionally, sniffers can also be used to steal information from a network (Whitman and Mattord...
Words: 2443 - Pages: 10
...Traffic monitoring and analysis in 3G networks: lessons learned from the METAWIN project F. Ricciato, P. Svoboda, J. Motz, W. Fleischer, M. Sedlak, M. Karner, R. Pilz, P. Romirer-Maierhofer, E. Hasenleithner, W. Jager, P. Kruger, F. Vacirca, M. Rupp ¨ ¨ A 3G network is a magnificently complex object embedded in a highly heterogeneous and ever-changing usage environment. It combines the functional complexity of the wireless cellular paradigm with the protocol dynamics of TCP=IP networks. Understanding such an environment is more urgent and at the same time more difficult than for legacy 2G networks. Continuous traffic monitoring by means of an advanced system, coupled with routine expert-driven traffic analysis, provides an in-depth understanding of the status and performances of the network as well as of the statistical behaviour of the user population. Such knowledge allows for a better engineering and operation practice of the whole network, and specifically the early detection of hidden risks and emerging troubles. Furthermore, the exploitation of certain TCP=IP dynamic behaviour, particularly the TCP control-loop, coupled with information extracted from the 3GPP layers, provides a cost-effective means to monitor the status of the whole network without requiring access to all network elements. In this article the main lessons are summarized learned from a two-year research activity on traffic monitoring and analysis on top of an operational 3G network. Keywords: traffic monitoring; traffic...
Words: 7609 - Pages: 31
...TB 11-5800-229-10 TECHNICAL BULLETIN SYSTEM OVERVIEW GUIDE WARFIGHTER INFORMATION NETWORK - TACTICAL (WIN-T) INCREMENT 2 FInal Draft DISTRIBUTION STATEMENT C: Distribution authorized to U.S. Government Agencies and their contractors. This publication is required for administrative and operational purposes. This determination was made on 15 March 2011. Other requests for this document must be referred to Commander, U.S. Army CECOM Life Cycle Management Command (LCMC), ATTN: AMSEL-LCL-ECM, Aberdeen Proving Ground, MD 21005-1846. WARNING: This document contains technical data whose export is restricted by the Arms Export Control Act (Title 22, U.S.C., Sec 2751, et. seq.) or the Export Administration Act of 1979, as amended, Title 50A, U.S.C., App. Violations of these export laws are subject to severe criminal penalties. Disseminate in accordance with provisions of DoD Directive 5230.25.. DESTRUCTION NOTICE - Destroy by any method that will prevent disclosure of contents or reconstruction of the document. HEADQUARTERS, DEPARTMENT OF THE ARMY 15 JUNE 2012 TB 11-5800-229-10 LIST OF EFFECTIVE PAGES/WORK PACKAGES NOTE: The portion of text affected by the change is indicated by a vertical bar in the outer margins of the page. Changes to illustrations are indicated by a vertical bar adjacent to the title. Zero (0) in the “Change No.” column indicates an original page or work package. Date of issue for the original manual is: Original: 15 June 2012 TOTAL...
Words: 42929 - Pages: 172
...With the development of network technology today the number of network attack types is growing. At the same time the network data traffic statistics also became to one of the important indicators of evaluation. Nowadays,Network intrusion detection system has become an important method to protect our network. The existing network monitoring equipment and the product cannot provide enough protection to the entire network and the whole network cannot be monitored. So, the scientists put forward a new thesis called the Network Security Situational Awareness(NSSA). The main work of NSSA is to do the analysis of existing data. Then we can predict the development of future network so as to realize the network monitor role. Based on the SNMP (Simple Network Management Protocol) with the characteristics of extensiveness, simplicity and generality we can collect the information of person computer and router in order to help us to analyses the situation of the network. This article first has made the analysis of technology development of our own country and all over the world. Then we proposed the detection technology of situational awareness of network when we combining with project background. Finally we come up with the idea of a method to do the detection based on the SNMP. The information we need to collect mainly in the SNMP’s MIB database .It includes interface group, IP group and ICMP group. After we collect the information we need we can begin the analysis work. We use data mining...
Words: 296 - Pages: 2
...This report was generated Using Two vulnerability scans Netwitness and Zenmap investigators. A list of the information will be listed below to be reviewed and analyzed with Company management department for further investigations, modifications and implementations if needed. Services: The scan shows the use of the following services: Services Use Msrpc A tool for running processes on a remote computer. netbios-ssn It provides services related to the session layer of the OSI model allowing the applications on a separate computer to communicate microsoft-ds This port replaces the notorious Windows NetBIOS trio (ports 137-139), for all versions of Windows after NT, as the preferred port for carrying Windows file sharing and numerous other services. ms-wbt-server Virtual data connection that can be used by programs to exchange data directly, instead of going through a file or other temporary storage location. wsdapi Used to develop client applications that find and access devices, and to develop device hosts and associated services that run on Windows Vista and Windows Server 2008. Unnecessary services and removing them: Ideally, a Web server should be on a dedicated, single-purpose host. When configuring the OS, disable everything except that which is expressly permitted—that is, disable all services and applications, re-enable only those required by the Web server, and then remove the unneeded services and applications. If possible, install the...
Words: 429 - Pages: 2
...to Fluke Networks’ EtherScope™ Network Assistant to bring visibility to missioncritical networks The weight of the world is on The New York Times Company to not only deliver up-to-the-minute news and information around the planet via The New York Times and The Boston Globe, but also to distribute news through their other news communications media. The company operates 21 regional newspapers, 8 network-affiliated television stations, three magazines and two New York City radio stations along with a news photo and graphic services group. Needless to say, a network hiccup could bring this vital flow of information to a screeching halt – something The New York Times ’ IT group keeps an ever-watchful eye on to prevent. The IT group works out of the Shared Services Center in Norfolk, Virginia, where personnel manage accounting, benefits, human resources and IT services for the company’s nearly 5000 employees. All of Shared Services’ data rides on two frame relay networks that serve 6800 nodes and provide internet access for the entire company’s operations. With an eye toward being more proactive, the IT group has developed a more automated problem detection process utilizing HP OpenView. This allows them to see trends early on and gauge utilization on all circuits. If hardware goes down, they know about it before it causes a problem at the site. Although they’re on the right track integrating their network analysis tools, they still need to see more information on the network. The network...
Words: 1074 - Pages: 5
...When referring to in-band or out-of-band it can be explained as simple as either sitting in the flow of network traffic or out of the flow. The differences between these two can be explained by their impact on performance, security, and manageability on a network. An in-band network management has to do with managing devices through common protocols. For example, telnet or SSH and the using of the network itself as a media. This is a way to provide identity based access controls, which will provide a better security. The segregation of management traffic is also a good practice, from production customer traffic. This helps in case your network is congested due to real user traffic. It offers you the ability to login into your devices to address the issue. The con here with in-band management is when your network is down or badly degraded, it will be little help. An out-of-band network management is an alternative means to accessing remote devices. An example in which this is handy to have both networks, would be in the case that the in-band network is down or terribly congested. The out-of-band network management can communicate with devices right through its console, without having the administrator having to go to the data center to correct the in-band network management situation. Each of these, out-of-band and in-band network management, have pros and drawbacks. The in-band management is often referred to as a fitting and a cheap way to obtain your system. The out-of-band...
Words: 764 - Pages: 4