Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Review of literature on inventory management
Review of literature on inventory management
Project work report on inventory management
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Review of literature on inventory management
Riordan Manufacturing WAN Project
The current architecture of the Riordan Manufacturing Company Inc. Wide Area Network (WAN) and network security in place requires updated documentation. The purpose of this paper is to consolidate the existing information into a single format and evaluate the WAN and security documentation for an executive overview. Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. With state-of-the art design capabilities, they create innovative plastic designs that have earned international acclaim. Attention to detail, extreme precision and enthusiastic quality controls are the hallmarks of Riordan Manufacturing. With facilities in San Jose, California, Albany, Georgia, Pontiac, Michigan and Hangzhou, China, the company is heavily dependent upon their communication networks. The documentation produced by this analysis will give the management at Riordan Manufacturing an understanding of their current network topology and a baseline to evaluate security of the network.
The current information regarding the security of Riordan Manufacturing's WAN is sparse at best. The diagrams supplied to our organization show the network setup for each facility. Information regarding the port configuration, router configuration, and any security software is not available at this time. An inventory of each site and a brief description of possible security settings and procedures for each facility will follow.
The corporate headquarters network in San Jose (see attachment 1) has 2 WAN connections. The first one is a T1 wired connection protected by an unknown firewall. The second connection is a satellite link to China no security devices noted. The network inventory includes:
2 each VoIP/Data routers model unknown
2 each 24 port switch Cisco 5950
1 each 24 port hub Linksys EF2H24
2 each gateway/switch model unknown
1 each Uninterruptible Power Supply model and size unknown
3 ea IBM H520 Blade Servers, 2 each for network and 1 each for exchange
1 each IBM pSeries 6E4 Unix server
1 each NAS Iomega P800M
35 each IP phones model unknown
35 each desktops Dell Optiplex
15 each desktops G5 MAC
3 each color printer Phaser
1 each plotter Hewlett Packard
The Albany, GA. (See attachment 2) network has 1 WAN connection to corporate headquarters. This connection is a fractional T1 with a 256k circuit for email and 1.5Mbps for burst. The WAN is not protected by any type of network security devices. The network inventory includes:
DataSMART 658 single-port add/drop DSU/CSUs to connect LAN to corporate network
3 each 24 port Nortel Baystack 450 switches
1 each Cisco 1760 router
2 each Compaq Proliant PIII 800MHZ servers, 1 each for file and print and 1 each for exchange
Based on information provided by the SANS Institute, obtaining as much information as possible, regarding the company’s network infrastructure, network topology, and even previously discovered vulnerabilities is important, in order to better-plan for executing various penetration tests (source). Also, with Alexander Rocco Corporation based in Hawaii, a legal analysis should be conducted, accounting for the following state laws regarding penetration testing and/or cybercrimes:
Employee motivation and rewards are effective means to retain employees. When an employee is motivated, his or her needs are being met. When an employee is unmotivated, his or her needs are not being met which results in a high employee attrition rate. Riordan Manufacturing is experiencing a high attrition rate. Riordan Manufacturing has 3 plants and employs 550 people. Recently, Riordan hired Human Capital Consulting to perform an analysis on the underlying issues that are causing the decreasing employee satisfaction and to recommend courses of action that will address the underlying issues. Research has been done to identify the issues and opportunities, the stakeholders and ethical dilemmas, and the end state vision. A gap analysis has also been performed to determine the gap between the current situation and the end state goals. Riordan Manufacturing will use this information to determine the best way to proceed towards improving its working environment for the employees.
Cisco Designs, manufactures, and sells Internet Protocol (IP) - based networking and other products related to the communications and information technology (IT) industry and provide services associated with these products and their use. The company provides products for transporting data, voice within buildings, across campuses and globally. The products are utilized at enterprise businesses, public institutions, telecommunications companies and other service providers, commercial businesses, and personal residences. Cisco conducts its business globally and manages its business geographically. Its business is divided into the following three geographic segments: The Americans; Europe, M...
Although Riordan Manufacturing has a generic strategic direction, a comprehensive strategic plan reevaluation and development must occur after the move to China. Environmental scanning, strategy formulation, strategy implementation, evaluation, and control are fundamental to the creation of a strategic plan (Wheelen & Hunger, 2010). Because, strategic planning is integral to the corporate strategy and success of Riordan the board of directors' requesting Team B formulate a comprehensive strategic plan for their organization.
Physical and environmental security programs are generally considered to be a collection of mechanisms and controls put into place that help ensure the availability of information technology capabilities. These programs protect an organization from fire, flood, theft, power failure, intentional, and even unintentional damage through negligence. Implementation of these programs at the organizational level can take place in a number of ways but most organizations choose to follow the application of a body of standards, usually set forth by an organization such as the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Once such body of standards put forth by ISO/IEC is 27002, Information technology – Security techniques – Code of practice for information secur...
The main location, which is a much larger office, uses a Class A IP address schema. This class is for very large networks. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses.
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
Although VPN is very popular in the market for networking technology, it may raise some concerns for IT managers. VPN requires an in-depth understanding of public network security issues and proper deployment precautions. The task of choosing and deploying a VPN solution is far from being simple and may require the training of workers in at least the basics...
In designing a network, it is essential to first determine the scope of the project by asking key questions that will aid in the design and build. Questions such as how many servers and computers will be connected, what is the intended purpose of the network, and how much money is available are basic questions that come immediately to mind. Other questions such as security considerations, and how will the physical architecture of the building affect the design are often ignored but are equally important to the success of the network. Once these questions have been answered, the process of network design can begin. As the design of the network affects both media choices and performance, it is crucial that a design which takes current needs into account, allows room for growth, and provides a proven path for upgradeability is chosen.
...fice location will have a VPN capable router connected to the T1 connection. Various workstations will also be connected to the LAN at each office.
When you are getting hardware for your office you must have plenty of computers and also have a main computer server (McKay, 2011). “A server is the primary computer in the network, stores and transfers data to and from connected computers, and acts as a “clearing house” for all internet data traveling to and from the network” according to McKay (2011). It depends on how big the network is, if you need more than one server (McKay, 2011).
A WAN (wide area network) goes across large physical distance. Many times a WAN will go almost around most of the world! The most popular WAN is the Internet. The Internet is one big huge WAN and it is also the most used WAN.
While an intranet is private and is protected from public visits by firewalls, an organization can create an Extranet to allow authorized suppliers/distributors and customers/shareholders to have limited access to its internal intranet. An Extranet, or extended Internet, is a private business network of several cooperating organizations located outside the corporate firewall. An Extranet service uses existing Internet interactive infrastructure, including standard servers, email clients and Web browsers. This makes the extranet far more economical than the creation and maintenance of a proprietary networks. It enables trading partners, suppliers and customers with common interests to form a tight business relationship and a strong communication bond (see Figure 2).
Corporate Networks in organisations can be complex structures that “requires a great deal of attention” (Clemm 2007). Even small companies can have quite complex networks that are a considerable investment to the business. The notion that corporate network management is a cost to a business rather than a continual beneficial investment is a naive assumption that requires further investigation to the benefits that network management brings. Clemm (Clemm 2007) states in his text that the ultimate goal of network management “is to reduce and minimize total cost of ownership”, improving operational efficiency and lowering cost. Clemm (Clemm 2007) also notes that “Network Management is not just related to cost and quality”, which will be an continual concept presented throughout the report. The report will address key issues with corporate network management and ultimately argue and justify that corporate network management must be seen as a positive benefit to the business and not as a continual expense. The supporting articles will also provide sound evidence that networking is crucial to a business’s processes and production which can be seen from the OpenSSL Heartbleed Security vulnerability fiasco (Nieva 2014) or the QANTAS Amadeus system failure (Heasley 2012).
The internet sharing in the data network was done in unplanned manner where two internet connections where assigned to individual users, that is one connection per user, and the other two connections where supplying the rest of the data network, each connection assigned to a specific location that is the sales department have one connection and the drawing section has one connection, Microsoft internet sharing connection facility that is freely available in Windows client operating systems is used to share internet connection to the other devices, in each section, by default this type of connection will assign the gateway with a 192.168.0.1/24 IP address and by enabling the clients to get the IP addresses dynamical, they will all be assigned with an IP address from this subnet, since the same setup is used at the other section, an IP conflict occurs when the uplink cable is connected permanently. Therefore the link is being used as a back up, with the cable only plugged in when the link on the other side has failed.