Explore BrainMass
Share

area of telecommunications or data communications to hardware and software

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

From the project scenario below, what area of telecommunications or data communications to hardware and software would you suggest to design for this company's needs. Please provide a list of solutions based on the Network requirements that are listed at the end of the project scenario.

Example of solution:
· Modem dial-up for employees when at home
A VPN-based extranet in order to use its access controls and authentication services to deny or grant access to specific information to the offsite employees.

From there I will build a UML model.

Example of a project scenario:

A computer training company needs an enterprise-wide network.

The company currently has Building 1 in which there are:
· 3 Administrators
· 5 Finance people in accounting
· 1 Finance person in bookstore
· 5 Sales people
· 5 Support people
· 1 Computer person
· 10 Training rooms
The company is leasing space in Building 2 (120' across a parking lot on the same property) in which will be moved from Building 1:
· 3 Administrators
· 5 Finance people in accounting
· 5 Sales people
· 3 Support people

Leaving in Building 1:
· 1 Finance person in bookstore
· 2 Support people
· 1 Computer person
· 10 Training rooms
The company is also leasing Building 3 (2000' away on another property across city streets) which will have:
· 2 New support people
· 20 Training rooms
The company has a branch (250 miles away in the same state) which houses:
· 1 Administrator
· 2 Sales people
· 1 Support person
· 10 Training rooms
The company will be opening more branches of the same size as its current branch in other states and other countries.

Network Requirements
Currently, everyone has either a 486DX66 or a Pentium stand-alone PC with Microsoft Office and Windows 3.11 or Windows95. The only network is a 5-station Lantastic network in accounting.
The new network is to allow:
· All employees to share databases.
· All employees to share scheduling.
· All employees to have secure company e-mail.
· All employees to be able to e-mail to non-company people.
· Videoconferencing for sales staff and administrators.
· Administrators and sales people to have WWW access.
· Modem dial-up for employees when at home.
· 4 wall connections in each training room so that trainers and students can connect to the WWW via laptop computers.
· Firewall to Internet.
· Intranet in the future, if not to be part of this network.
· Systems easily replicated in new branches.

© BrainMass Inc. brainmass.com October 24, 2018, 6:07 pm ad1c9bdddf
https://brainmass.com/computer-science/memory-management/area-of-telecommunications-or-data-communications-to-hardware-and-software-31782

Solution Preview

Hardware and Software suggestions:

A central DBMS (Database Management Systems) storage method should be used eg. store the DBMS in the server only with recommended software such as Oracle, Cold Fusion etc. of a commercial standard.

Use a dedicated server unit and make sure it has sufficient memories to carter for current organization storage requirements and plenty of rooms left for future growth needs

Server must be kept in a separate and secure enclosure and unit away from physical tempering either intentional or unintentional and away from fire, flood or other natural disasters.
...

Solution Summary

Hardware and Software suggestions are included.

$2.19
See Also This Related BrainMass Solution

Information Systems & Telecommunications Questions

? When an organization needs to use two or more computer systems, one of three basic processing strategies may be followed:
Centralized
Decentralized
Distributed

? Feasibility analysis is typically done during the investigation stage of systems development.

? The Internet protocol enables traffic to flow on the Internet from one network to another.

? A computer network consists of communications media, devices, and software needed to connect two or more computer systems and/or devices.

? Software that enables users to improve their personal effectiveness, increasing the amount of work they can do and its quality, is called personal productivity software.

? The electronic transmission of signals for communications is called telecommunications.

? Determining the needed hardware and software for a new system is an example of physical design.

? B2B a form of e-commerce, in which the participants are organizations.

? An information system is a set of interrelated components that collect, manipulate, and disseminate data and information; and provide a feedback mechanism to meet an objective.

? Prototyping takes an iterative approach to the systems development process.

? The following are the major functions of an information system:

output Function

processing Function

input Function

storage Function

? The primary communications protocol of the Internet is called TCP/IP.

? Software that has the greatest potential to affect the processes that add value to a business because it is designed for specific organizational activities and functions is called application software.

? The format of Internet address on the Web is called a Uniform Resource Locator (URL).

? Stakeholders are individuals that ultimately benefit from a systems development project.

? DBMS stands for database management system

? A computer-based information system consists of hardware, software, databases, telecommunications, people, and procedures.

? eBay is an example of the C2C form of e-commerce.

? A local area network connects computers, called workstations, within a limited geographical area.

? ROM chips are said to be nonvolatile, while RAM chips are volatile.

? A decision support system (DSS) is an organized collection of people, procedures, software, databases, and devices working to support managerial decision making.

? A data warehouse is a collection of data drawn from other databases used by the business.

? More stringent privacy laws would most likely cause higher prices, higher mortgage rates and fewer loans, fewer free Web sites, and less shopping convenience.

? One advantage of database processing is that programs are not dependent on the organization of the data in the database.

? Advantages to outsourcing include access to more skilled and experienced programmers, avoidance of diverting internal staff from current work, and possibly lower costs while disadvantages include losing control of the project, failure of internal developers to learn skills necessary to maintain the system, and failure of the outsourcer to deliver on its claim.

? A group of related bits are called characters (or bytes) that make up a field; while a group of related fields is called a record; a group of related records are called a data file; and finally a group of related data files is called a database.

? Spyware is software that monitors Internet usage and report it back to a server?

? The widespread use of computers has impacted the networked economy and our dependency on the Internet for communications.

? Processing that uses several processing units is called multiprocessing.

? Computers have continued to shrink and their performance/cost ratio has also reduced.

? An organization with a direct connection to the Internet must consider the trade-offs between making its Web, e-mail, and other Internet-related servers easily available to its stakeholders and protecting the servers from unwanted intrusions.

? People can use the Internet to spread negative information about another person or group, and this information can prove very difficult to correct.

? Web browsers have significantly changed the way people use the Internet.

? A type of application package used to back up data is known as backup software while software that protects us from virus infection is called anti-virus detection software.

? The microprocessor and memory are the two most important components in a computer.

? Computer hardware consists of the following:

central processing unit

input and output devices

primary storage

secondary storage

? A mouse and keyboard are considered input devices on a computer system.

? Software is defined as all the computer instructions necessary to perform a function

? The following are uses of the Internet for business:

electronic mail

news groups

telecommuting

live chats

? Java language is a third-generation language

? SQL is a standardized query language for DBMSs.

? Huge collections of related data are often referred to as databases.

? Data security does not guard software and data against disasters.

? ERP software is known as enterprise resource planning.

? The following are threats to privacy that exist in a networked economy:

exposure of information

data surveillance

identity theft

spam and spyware

View Full Posting Details