Describe the networking plan for a standard office

Assignment Help Management Information Sys
Reference no: EM132279405

Digital Manufacturing Strategic Plan - Part 1

Content Requirements for IST220 Semester Project Part 1

Digital Edge Manufacturing Networking Technology Plan

Modern companies realize that, no matter what they manufacture or what activities they perform, well-running networking technology, a digital nervous system, is a necessity. They know the importance of networking to monitor work progress and ensure the data needed to tailor their products to the customer reach the right resource at the right time.

For this project, you will be developing a unified networking framework for an advanced manufacturing company. Though the company is fictional, the class project is meant to demonstrate how important an understanding of networking technologies can be when preparing a company to compete in our modern, interconnected marketplace.

Digital Edge Manufacturing Profile

To make the project more realistic, you are asked to act as a consultant to a technology company and submit a networking proposal that will cover the networking at their manufacturing centers.

The company, Digital Edge Manufacturing (DEM), is a leader in the use of 3D-printing to create products for a variety of industries. DEM currently has one production site outside of Chicago, Illinois.

The demand for their work is exceeding current capacity and the Board of Directors has given the go-ahead to develop two more plant sites, with one on the East Coast and one on the West Coast of the United States.

The project requires a complete revamp of their current WAN and LAN networking structure.

Network Locations

The proposal will need to cover the following areas:

National

DEM has 6 sales offices in New York City, Atlanta, Pittsburgh (technology hub), Chicago (Corporate HQ), Dallas, and Los Angeles.

Your proposal will need to describe the networking plan for a standard office environment consisting of desktop machines, tablets, as well as several engineering stations. The engineering stations will be tied to 3D printers to allow technical staff the ability to work with clients in prototyping their products before being sent to plant sites for final engineering and production.

You will also need to incorporate WAN technologies to tie all offices and current/future manufacturing facilities into a protected and relatively seamless whole.

Per Campus

Some manufacturing sites will be multi-building. Your project should consider networking concerns for separate buildings yet physically close to one another.

For this, requirements per building would remain but now there is a need for strong connectivity between buildings. This may require a strong WiFi presence, physical media connection between some buildings and a campus size LAN design.
Per Building Depending on the manufacturing facility, there will obviously be a need for networking in several areas:

• Front office including administrative and engineering

• Supply Warehouse

• Shipping Warehouse

• Factory floor

Please remember that some of the equipment on the factory floor area may emit significant EM radiation. So there will be a need for direct connection networks

An example manufacturing location is shown in an attached figure.

User Domains

Your project write-up for Part 1 will need to include an in-depth review of the user population for a business network infrastructure. These include:

• Office and administrative

• Engineers / IT & Technical support

• Manufacturing Personnel

• Guests

For each, you will need to provide a descriptive profile of what an individual in each user group would need when interacting with the district's networking infrastructure. Components could include:

• Office and Administrative / Guests

o Bring Your Own Device (BYOD) needs

o Reasons for access within a room (testing, presentation, lectures, etc.)

o Security during meetings and presentations

o Secure home accessibility

• Engineering

o High bandwidth requirement workstations and manufacturing floor networking

o Independent server room installations

o Secure home accessibility

• Manufacturing Personne

o Due to heavy data demands, there is a need for a more guaranteed high speed throughput

o Include a discussion on in room networking needs for devices such as sensors, printers, 3-D printing devices, etc.

o Machinery will all be networked

o Provide networking structure for a robust sensor environment

o Secure networking including ID entry required

• Guests

o This includes customers, contractors, media that may need outside Internet access via or connection to company networks for presentations, etc.

Security Review

For the Part 1 overview, the discussion on security measures is a more general review of current security technologies and policies.

Your general discussion should include some aspect of these topics:

• Antivirus protection - you need to consider things like central server updates and end point protection

• Automated patch management - not only end-user but servers and security devices such as firewalls and intrusion detection devices need to be keep up-to-date

• Wireless network security - ease of use may be important but the risks will outweigh the advantages. Include a discussion of how access control and network-monitoring tools must be used to make sure that the network is not being exploited. This includes a review of the various networking protocols that can provide inherent encryption and password-protection point.

• Hardware review - Include a review of security hardware that could be implemented including:

o Firewalls

o Proxy servers

o Virtual Private Networks

o Intrusion Detection Sensors and System

Legal Issues

With the explosion of networking over the last twenty-five years has come the realization that the law must keep up with these technology changes to stay relevant and work to preserve privacy and security of private individual information when necessary.

As this is a public shareholder owned company, they fall under the legal requirements of some financial auditing rules including Sarbanes-Oxley Act.

• Hardware security includes the physical protection of equipment (e.g., computers, printers, monitors, etc.) from both theft and damage

• Servers and related equipment should be placed in a secure room with limited access

• Use network monitoring and packet-sniffing utilities that display and log data traffic to detect the installation of unauthorized hardware and/or software applications (i.e., monitor for protocol violations, bandwidth-intensive applications, etc.)

• Login stations or other biometric based access points

Paper Mechanics

• Paper format

o Serif font

o Single space sentences

o 1" margins

o Page numbering

• Paper sections and page length

o Cover page - not part of page count

o Table of Contents - not part of page count

o Executive summary - 1 page

o General review of design needs - 10-12 pages

o General review of user domains - 10-12 pages

o Report summary - 2 pages

o References - not part of page count

o Diagrams and images

There is no specific limit on the use of diagrams or images within the report. However, no matter the number of images/diagrams, they will only account for up to 2 pages of the page count requirement for both general reviews.

o Appendices are permitted but are not part of page count

Reference no: EM132279405

Questions Cloud

Write down the algorithm for cryptography : In developing algorithms as it relates to cryptography is to take already proven and tried algorithms. Why do you think that this is the preferred method?
Determine what made the individuals professional : In this Assignment, you will have an opportunity to view a set of slides. After viewing all of the choices of sets of slides, choose one of the sets that best.
Discussion about the womenswear apparel designer for zara : The area that needs to be written about is for a womenswear apparel designer for Zara. The first half of the essay needs to have a description about Zara.
Does the information you find persuade you to support : Visit online one of the following major art museums in Fort Worth, Texas: the Kimbell Art Museum or the Fort Worth Modern Art Museum and select an artist.
Describe the networking plan for a standard office : describe the networking plan for a standard office environment consisting of desktop machines, tablets, as well as several engineering stations.
Explanation in the potential career development lessons : Explanation in the potential career development lessons of Fiedler's contingency leadership model?
Process strategy to achieve competitive advantage : Effective operations managers understand how to use process strategy to achieve competitive advantage.
Charges of conspiring to advance violent jihad : Mohammad Omar Aly Hassan and nine others were indicted in a federal district court on charges of conspiring to advance violent jihad
Combinations of independent and dependent variables : In a few combinations of independent and dependent variables that you could test using a regression analysis and what types of results could the regression

Reviews

Write a Review

Management Information Sys Questions & Answers

  Review of an article where physical security failed

Propose a possible change in that organization's physical security that could have prevented the breach/failure for that scenario.

  How can internet technologies be involved in a process

Refer to the Real World Case on Dow Corning and DirectTV in the chapter. Are mobile applications limited to be scaled-down versions of their enterprise counterparts, or will companies start to develop enterprise applications thinking about mobile ..

  Discuss about the is strategic plan

Using the IS alignment work and the financial analysis from, submit a complete IS strategic plan. Your paper should include at least 5 references from peer-reviewed journals associated with how other companies are using the technologies you are re..

  Prepare an er diagram for the database

CSE1IS - Information Systems - To apply theoretical concepts of System Design and Implementation in a case study - Prepare an ER diagram for the database. Follow the correct notations for the diagram. All relationships must be labelled with cardinal..

  Trends in technology for entrepreneursthe eight business

trends in technology for entrepreneursthe eight business technology trends to watch article from mckinsey quarterly

  Briefly summarize how sqrl works

Briefly summarize how SQRL works and indicate how it fits into the categories of types of user authentication.

  Analyze the privacy factors

Analyze the privacy factors raised as a result of this type of screening. Imagine that you are the CIO for a company of one hundred employees. Would you recommend the use of social media to screen employees? Why or why not

  What is the technology or technologies

What is the technology or technologies? How are the two integrated? Or how does the technology work to support the business? Your comments. Or any suggestions for doing it differently.

  Develop three proposals for your development strategy

Develop 3 proposals for your development strategy, which include outsourcing (buy), insourcing (make), or a combination of both.

  What factors should weighed in the creation of a new ais

What factors should be weighed in the creation of a new AIS - Can a new system meet the needs of all users?

  Describe barbour and dysons ideas about freedom

Identify potential ways in which your chosen technology can be used either as a means of enabling participation.

  Calculate the cost performance index

Using the following information, calculate the cost performance index and the schedule performance index.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd