Imagine you have been tasked with creating a network infrastructure for your company or organization. What are the requirements for the following scenarios and what hurdles does each one face? What hardware and software technology would you use in each case? Would you rely on existing infrastructure or build your own?
Network infrastructure for any organization in general is the foundation for any system. It is useful in creating operating makeup for the network.
Existing Network:
we have to understand how well the existing network infrastructure is meeting the deployment goals. Then we can decide whether we need to buy new components for upgrading . A complete list of existing infrastructure is to be made including
a) Physical links like cable length,grade and communication links like analog,ISDN,VPN,T3, bandwidth and latency between the sites.
b)Information of server like Host names, IP addresses,DNS
c)Device locations of switches,proxy servers,hubs,modems,routers and bridges,firewalls,load balancers, Storage area networks
d)static and mobile users
Network Infrastructure layout planning:
In designing the topology of infrastructure the following concepts are to be taken into account:
Intranet,DMZ,Internal network,proxies,Fire wall
The above aspects are to be reviewed and then the changes are to be noted.
UNIVERSITY CAMPUS WITH ONE MAIN CAMPUS:
REQUIREMENTS:
Physical links like cable length,grade and communication links like analog,ISDN,VPN,T3, bandwidth and latency between the sites,Information of server like Host names, IP addresses,DNS ,Device locations of switches,proxy servers,hubs,modems,routers and bridges,firewalls,load balancers, Storage area networks and static and mobile users
HURDLES:
Speed of the network,Connectivity losses, Access control, maintaining the intranet
HARDWARE AND SOFTWARE TECHNOLOGY:
Multiprotocol support including TCP/Ip protocol, SNA
LAN to WAN routing
IPSec and VPN for security
IEEE 802.11 wireless remote access
METROPOLITAN AREA NETWORK
REQUIREMENTS:
Devices that interconnects users of a particular geographical location.Interconnecting LAN's of a city
Physical links like cable length,grade and communication links like analog,ISDN,VPN,T3, bandwidth and latency between the sites,Information of server like Host names, IP addresses,DNS ,Device locations of switches,proxy servers,hubs,modems,routers and bridges,firewalls,load balancers, Storage area networks and static and mobile users
Ethernet protocols.
HURDLES:
Connectivity.mobile users, Maintaining the database servers and application servers, speed, Type of switching
HARDWARE AND SOFTWARE TECHNOLOGY:
DQDB(Distributed queue dual bus), Software components include Internet browser, computers with os, firewalls, emailing system,tcp/Ip protocol
hardware includes Wireless Ethernet NIC, Communication links like T3,VPN, optic fibe cables or ethernets, switches, routers, cabling and phone lines, interface cards,cabling
If the existing infrastructure is meeting the deployment goals then its not necessary to build a new one.
CORPORATE CAMPUS WITH MULTIPLE SITES ACROSS THE GLOBE
REQUIREMENTS:
Internet and intranet facilities, Strong security , physical setup links within the office and virtual setup across the globe, network protocols, server information, device locations , users at each site
HURDLES:
Security issues, Access control , Load balancing across the globe, Maintaining internal network and proxies
HARDWARE AND SOFTWARE TECHNOLOGY:
Hardware includes the physical aspects like computers, Ethernet cabling, switches, hubs,routers and bridges, proxy servers, load balancers
Software includes the network protocol and most of the companies are configured DMZ.It separates corporate network from the internet.Internally DMZ manages everything like web, mailing, internal DNS and file serving, proxy maintenance, firewall configuration
If a new office somewhere else is opened then a new intranet is to be built and then is connected to the other offices across the globe.
Imagine you have been tasked with creating a network infrastructure for your company or organization. What...
Imagine you are the Chief Information Officer in your organization. You have been tasked with identifying the potential threats to your organization. Describe the steps you would take in a disaster recovery plan. What are some of the threats you may need to consider in your location? Include information on the roles and responsibilities be of the different people in the plan. Share your ideas for designing information security practices, including disaster recovery plans for data and service delivery.
Imagine that you are on a team that that has been tasked with creating an online course delivery system. One of your coworkers wants to model the entire course in UML. Another coworker disagrees with the use of UML and would rather use pseudocode exclusively. Analyze both strategies and suggest at least two (2) major benefits of using UML as well as two (2) major benefits of using pseudocode. Recommend the approach you would suggest in the given scenario and...
Create a Business Impact Analysis (BIA) Plan for this scenario. Scenario: You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a colocation data center,...
An effective digital health ecosystem relies on a broad spectrum of technical, clinical, and administrative stakeholders to gather and analyze patient data and then use that information to improve the quality of care offered. Within the health care environment, information systems and technology (IS/IT) are used to ensure patient privacy and security, inform optimal decision making, and assist in operational efficiency, which further enhances the services that clinicians, hospitals, technology developers, researchers, and policymakers are able to provide. The textbook...
1. You have been working as engineer for many years in your organization. One year ago, you were promoted to a project management role and assigned a very large project. Your team has over 400 team members from around the world. Your technical background did not prepare you for the work you are doing today. Most of your team members are virtual. Your current focus is on negotiating for the team members you already have been working with. In what...
TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...
1.What was the problem at Celcom that was described this case?
What people, organization, and technology factors contributed to
this problem?
2.What was Celcom’s business strategy and what was the role of
customer relationship management in that strategy?
3.Describe Celcom’s solution to its problem. What people,
organization, and technology issues did the solution have to
address?
4. How effective was this solution? How did it affect the way
Celcom ran its business and its business performance?
5. Describe two operational...
Everybody knows that email is important, but should each company develop, own, support, and maintain its own email infrastructure, or should it instead use lower-cost or free services? That is the question that Michael Jagger, CEO of Provident Security, faced as he contemplated a costly upgrade of the company’s internal email infrastructure. Founded in 1996 by Michael Jagger as a way to pay his undergraduate tuition, Provident started out as a company that provided special event security. Today, it has...
Putting Your Best Cyberface Forward By STEPHANIE ROSENBLOOMJAN. 3, 2008 your nails? Have you pierced your tongue? Is your tote bag emblazoned with the words "I'm not a plastic bag"? at the way they do for reasons too numerous to fit into any therapist's notebook. Yet we commonly shape People look and act the way they do for reasons too ir behavior or tweak our appearance in an attempt to control how others perceive us i m mon sense. Social...
Imagine that you are human resource manager asked to review a job description for a Chief Financial Officer opening at your company. The finance department mentioned that they have had a lot of difficulty retaining talent because of long hours, outdated technology, and isolation from the operational departments so they need positive change from their new leader. You know it will be critical to get the right person in the role to improve business processes which should in turn increase...