Preview

Cis/207 Web or Mobile System Paper

Good Essays
Open Document
Open Document
763 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cis/207 Web or Mobile System Paper
As a network engineer it is very important to keep the network available for users at all times. “A highly available network means that the network and the applications that are used on it are both operational and accessible at all times” (CiscoPress 2008 p. 124). Working as a network engineer I am always on call because there is someone always using the network. “An always on facility is needed to maintain the business-critical apps” (Volonino 2011). The network is monitored 24 hours 7 days a week even if no one is scheduled to be in the office we still have to monitor the network to make sure there are not outages are hiccups along the way. If there is a network outage are any bandwidth issues that come up, I need to be able to run diagnostics and be able to manage the switches and routers as needed 24 hours 7 days a week just in case, and if something does happen I need to be able to find out what is causing this issue before it becomes a major problem. We also have to monitor all of our network equipment to make sure there is no unusual behavior like a Denial Of Service (DoS) or security breaches. Each engineer on our team has a laptop that we take home with us so when we are on call it is easy to vpn into our corporate network to run diagnostics on the network equipment to make sure everything is functioning properly. The majority of devices we us on our network are Cisco devices. Cisco systems offer a software application called LMS (Cisco Works LAN Management Solution). LMS is a centralized system for sharing device information across all LAN management applications (Cisco 2012). We use the LMS software to monitor equipment, traffic, and users. I use this software to do the majority of my daily work. Recently cisco developed a mobile app for this software application for iPhone and Droid OS. This gives me a huge advantage because when I am on call I don’t have to lug my laptop around with me all the time and I can still monitor the equipment and run


References: Doherty, J., Anderson, N., Maggiora, P.D. (2008). Cisco Networking Simplified. 2nd edition. Indianapolis,IN. Cisco Systems, Inc. Cisco Press. Turban, E., & Volonino, L. (2011). Information technology for management: Improving strategic and operational performance (8th ed.). Hoboken, NJ: John Wiley & Sons. www.cisco.com/en/US/customer/products/sw/cscowork/ps2425/index.html

You May Also Find These Documents Helpful

  • Good Essays

    They first order the products that are needed. Then these items are shipped to Riordan manufacturing warehouse. Once truck arrives each item must be scanned to ensure they are receiving every item, the correct items, and making sure it was not over ordered. As they scan each item in it is electronically put in to their warehouse system and then if all information is accurate they put it all away in the warehouse at that time. There new system has stopped them from wasting time in areas that they did before, which was what their goal as a business was to…

    • 766 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NTC 411 Week 2 Individual Network Management Paper. NTC 411 Week 2 Summary.…

    • 151 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Firewall these devices are designed to keep threats out of the company network, but unfortunately, the devices are configured by humans which can have error or security risks put in place to take over the network.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Remote access to the company 's network or the use of wireless hotspots can cause an increase in the risk of data loss, so having a second set of policies in place for when it is part of an end users job is especially important. Employees working inside a facility can be more closely monitored than those working outside of it. Even if there are measures in place for audits of the devices granted to those who work remotely, things like transfer of data to another computer or theft are much harder to counter or…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Clark, B. (2012). 5 steps to pay per click advertising that works. Retrieved from http://www.copyblogger.com/5-steps-to-pay-per-click-advertising-that-works/…

    • 814 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Some employees are using the company networks to access the Internet. Some expect the company to provide this type of access. This presents a number of challenges to company network management. Identify three challenges and suggest strategies for a company to address these challenges.…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Dirt Bikes had been spending thousands of dollars in cost on communicating with people inside and outside the organization to obtain information about the developments in the motorcycle industry and the global community. I investigated and found that the company will save an average of 75% simpy by investing in Information Systems. Dirt Bikes can benefit signifinatly by providing its staff members with intranet. Networking and Communication has continued to be an important trend in the Dirt Bike business. Advancement to wireless access has also become one of the most important tools to the staff at Dirt Bike.…

    • 1010 Words
    • 5 Pages
    Better Essays
  • Good Essays

    In today’s world, most businesses rely heavily on the use of information technology ad information systems. Corporate communication is usually dependent upon wired as well as wired networks within the company. With these networks being set up in businesses, there has been a major shift in data storage to using computers to store and transfer data instead of the traditional ways of using paperwork and hard copies. Companies can securely share information with other companies through the use of virtual private networks, called VPNs. My current occupation is very technologically driven.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Chances are you have probably come across HIPPA before while in a doctor’s office in the past. HIPPA is the acronym for Health Insurance Portability and Accountability Act. This Act was passed by Congress in 1996. As far as one can remember, medical files containing all medical and personal information were kept in locked drawers or file cabinets which were for authorized personnel’s only before HIPPA was passed but that was not enough to guarantee the protection of patient information. It also protects the people who have changed job or lost their job to reinstate their health coverage without any complications. Although HIPPA was proposed to become a law in 1996, it did not officially become a law until 2001. HIPAA opposes unfair guidelines of health insurance carries. HIPAA has put into place strict criteria for keeping medical records of patients, including being able to transfer patient information using electronic devices. These devices also assist in managing and keeping sensitive patient information safe. There were many hoops to jump through, however, it was eventually decided and was released to the general public.…

    • 541 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    There are two types of elephant, the Asian elephant and the African elephant (although There are two types of elephant, the Asian elephant and the African elephant (although sometimes the African Elephant is split into two species, the African Forest Elephant and the African Bush Elephant).…

    • 1967 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Shelli Smith and Cindy Johnson have been best friends and co-workers for over 30 years. One of their long time passions they’ve shared together over the years is music. Although they have both worked together in the retail industry since they were in high school, Shelli worked mainly in Customer Service while Cindy worked behind the scenes in the office utilizing many different business systems. The intent of this proposal is to create a business that will allow customers to find music from the past before CD’s or internet music were available. In addition, it will provide Shelli with an overview on the various types of information systems that would work well for our small business. After examining the various systems, Shelli and Cindy should be able to select the most appropriate systems to start their business together.…

    • 1127 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    List and discuss briefly the benefits claimed by Cisco for its “In-person” experiences using telepresence.…

    • 788 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Children are our society’s most valuable and fragile resources. It is our responsibility as parents, adults, and caregivers to provide our children with as many safeguards to protect them from physical and virtual dangers. Children are spending more and more time on the internet and without the proper protection and supervision they can be exposed to indecent or harmful material or predators that seek to harm them. “What children are encountering on the Internet, particularly in terms of indecent or otherwise unsuitable material or contacts with strangers who intend to do them harm, is an issue of major concern.” (Smith, 2001). The Children’s Internet Protection Act (CIPA) of 2000 and the Children’s Online Privacy Protection Act (COPPA) of 1998 were put in place as an attempt to protect our children from the harm that could befall them on the internet from harmful materials and predators that target children.…

    • 794 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Answer: Data communications networks facilitate more efficient use of computers and improve the day-to-day control of a business by providing faster information flow. They also provide message transfer services to allow computer users to talk to one another via email, chat and video streaming. It helps business have more control & provide faster online services, transactions and also automate business systems like accounting, purchasing & tracking different internal processes.…

    • 1388 Words
    • 6 Pages
    Powerful Essays