Question

Discuss how the Metro-E can contribute with respects to both the POS and Phone systems From...

Discuss how the Metro-E can contribute with respects to both the POS and Phone systems

From the perspective of Human Resource manager in HR department : Suggest ONE advantage for the POS and ONE advantage for the phones.

Request information from TWO other departments that could assist in your investigation. Please specify both the TYPE, and specific CONTENTS of the report you are requesting (Unit 3 types of output)

Discuss how the metro-E and the internet can contribute with respects to backups and disaster recovery

From the perspective of your department and management level, discuss the implications of backup and recovery over Metro-E and into the cloud.

Suggest ONE advantage and ONE disadvantage.

Discuss ONE security consequence that could arise from VPN access to the company’s IT infrastructure.

Critique TWO post made by group mates from other departments

Create the process diagram

DESIGN and DRAW a high level “as-is” process diagram depicting how the company could have complied a combined sales report BEFORE the Metro-E system was introduced (i.e. no connectivity among the sites).

Summarise and make Recommendations Summarise the information shared thus far, and discuss TWO findings about your analysis from your management level that can be used to justify the Metro-E and VPN solutions. Make TWO recommendations to prevent security breaches.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Numerous service providers offer metro Ethernet services by extending services metropolitan area network and wide area network. Metro-E services are rapidly increasing because of its advantages of Ethernet services which includes:

  • User- friendly in-terms of usage
  • More flexibility
  • More services than metropolitan and wide area network environment.

The major disadvantage in metro Ethernet network :

Scalability: There are certain limitation in scalability for example, network management and bandwidth issues. The main reason is that system operators should posses efficient network management capability unlike in LAN network where system operators need not worry about Ethernet devices. However this disadvantage can be overcome by employing simple network management protocol in the layer 3 topology.

Finding full physical topology: This limitation occurs in ethernet network in which physical topology becomes difficult to find because of minimum spanning tree path.

Advantage of POS

The POS can be adopted easily by HR department since it is posses these advantages:

  • Simple installation and deployment
  • No room for errors by POS and reduces human errors.
  • Faster transactions
  • Web-based POS will have automatic upgrades , backups and easier system reconfiguration

Advantages of phones for HR department

Now-a-days HR insists to install management software so that HR can monitor employees phones and this is done by user policies which gives permission HR to monitor phones . Hence phones are added advantage for HR to check whether the employee works during his/her office hours or uses his phone for personal work during office hours.  

Discuss how the metro-E and the internet can contribute with respects to backups and disaster recovery

Metro-E can contribute to disaster recovery as well as backup by connecting primary and disaster recovery sites and by implementing real- time data replication and site to site replication. All of these process takes place in a secure environment. In other words, data is transferred from one data site to a secondary among a company locations. In traditional method, data is moved to offsite using tape or disks.

Advantage of cloud in metro-E

When metro-E is integrated with cloud, it reduces costs , enhances simplicity , flexibility. Metro-E using cloud can connect to hundreds of sites leading to interconnect business data offices. As well as provide connectivity to public and private cloud.

Disadvantage of cloud in metro-E

It may lead to increased use of infrastructure requirements and equipments in implementation.

Discuss ONE security consequence that could arise from VPN access to the company’s IT infrastructure

Even-though VPN is an encrypted communication where employees can work even at home through secure channel. There are numerous VPN providers but these VPN providers must ensure integrity is supported by ensuring the client risk profile is covered by the VPN provider. The company should verify whether VPN services are not peer to peer technology since an employee will be a part of co-user of wider network and where other users can use the company own infrastructure for bad activities.

Make TWO recommendations to prevent security breaches in company

By protecting the network and securing employees devices are reliable methods to prevent security breaches. The IT services provider should secure the network by employing encrypting the communication , perform frequent penetration testing and scans , using better non-commercial VPNs. The HR department can provide employees with management installed software phones by employing encryption , tracking software. The FINRA (Financial Industry Regulatory Authority ) provides full detail and lists to prevent security breaches.

Add a comment
Know the answer?
Add Answer to:
Discuss how the Metro-E can contribute with respects to both the POS and Phone systems From...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations...

    MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations/Departments within the Caribbean territories, stood poised to meet the needs of its stakeholders by launching an online database, located at www.SSDCI.gov. The database will provide members and the public with access to the full set of services that can (also) be initiated face to face; and it will provide managed, private, secure access to a repository of public and/or personal information. For example, insured persons accumulate...

  • Who is your target audience? Where are they on the web? How can we monetize our...

    Who is your target audience? Where are they on the web? How can we monetize our “aiZip” technology? Speculate on what better compression and bandwidth could mean for the company in the context of these questions. From the perspective of your department and management level, discuss the implications of faster streaming to devices, including mobile devices and mobile apps and who, where this will impact. I am the chief financial officer of the accounting and finance department Suggest ONE advantage...

  • Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the...

    Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the marketplace? Explain through the case of Citibank. please make sure you give a unique answer (not copied one) ,Please no hand writing, and need references. This question is from ECOM 421 e-Business Strategies and Business Models course e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet....

  • e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today...

    e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet. They are aware of the opportunities and threats that are associated with the Web. Not a single traditional bank is brave enough to face investment analysts without an Internet strategy. But even a very thoughtful approach to the Web may do no good to the company/ organization. The main purpose behind launching online...

  • It is not unusual to experience resistance from clients during the diagnosis and feedback stage of...

    It is not unusual to experience resistance from clients during the diagnosis and feedback stage of the organization development process. Sometimes client resistance is overt, and sometimes it is covert or less obvious. It is critical that an OD practitioner have the skills to accurately identify behaviors indicative of resistance and effectively manage the resistance so that relationships are maintained or enhanced, and the engagement stays on track. Please read the background information for the exercise on pages 195 -...

  • Budgeting for an Academic Department at a State University: Can You Believe the Numbers? INTRODUCTION You...

    Budgeting for an Academic Department at a State University: Can You Believe the Numbers? INTRODUCTION You are the senior accounting faculty member in the business school and your dean, Dean Weller, is asking for help. She is very discouraged after a midyear budget meeting with the Vice President of Finance. The college's Department of Social Work has a large budget deficit, and because of this the VP is inclined towards closing the department entirely or closing its bachelor's program. The...

  • what discuss can you make about medicalization and chronic disease and illness? Adult Lealth Nursing Ethics...

    what discuss can you make about medicalization and chronic disease and illness? Adult Lealth Nursing Ethics mie B. Butts OBJECTIVES After reading this chapter, the reader should be able to do the following: 1. Explore the concept of medicalization as it relates to the societal shift away from physician predominance of the 1970s. 2. Differentiate among the following terms: compliance, noncompliance, adherence, nonadherence, and concordance. 3. Examine cultural views with regard to self-determination, decision making, and American healthcare professionals' values...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • Can Technology Save Sears? Sears, Roebuck used to be the largest retailer in the United States, w...

    Can Technology Save Sears? Sears, Roebuck used to be the largest retailer in the United States, with sales representing 1 to 2 percent of the U.S. gross national product for almost 40 years after World War II. Since then, Sears has steadily lost ground to discounters such as Walmart and Target and to competitively priced specialty retailers such as Home Depot and Lowe’s. Even the merger with Kmart in 2005 to create Sears Holding Company failed to stop the downward...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT