Rene Guillen
NTC/362
July 13, 2015
Fernando Casafranca
Individual: INDP, Part 1
Kudler Fine Foods has realized that to become more efficient in their operations and to better serve their customers, an effective and secure network has to be implemented. For several weeks a thorough analyses has been conducted, to include interviews with key personnel from all hierarchy levels and inspection of competitor methods. Several site visits facilitated the inventory of data sharing technology and collaboration approaches. During this intensive data collection phase, it was determined what technology needed to be applied, practical installation and how to lessen the amount of downtime, while keeping all information as secure as possible, both during network implementation and afterwards. To accomplish this level of sophistication, an adequate network design that met all Kudler Fine Foods goals was needed.
The Kudler Fine Foods organization is comprised currently of three locations and their goal includes connecting all their locales so they can easily transfer and analyze human resource and customer data, while combining all their finest resources. In order to accomplish this, Kudler Fine Foods will need to purchase equipment, to include routers, modems, computers and security software to protect the network. It will also be necessary to implement this new system, using the most up to date methods and techniques, so they can streamline all their current collaboration methods.
This new system will allow them to save files and documents onto a new server, creating a centralized file system storage system, where only approved representatives are permitted. Having a centralized storage/retrieval system, also helps to secure the information being shared across the network. This also creates efficiency as only the server needs to be backed up, as opposed to having to secure many individual and independent workstations. In addition to
References: Beal (2015) “Latency”; Retrieved from http://www.webopedia.com/TERM/L/latency.html Chen (2005) “Network Protocols Discussion/Traffic Shaping Strategies” Cobb (2014) Firewall; obtained from: searchsecurity.techtarget.com/definition/firewall Frenzel (2013) What’s The Difference Between The OSI Seven Layer-Network Model and TCP/IP? Obtained from: http://electronicdesign.com/what-s-difference-between/what-s-difference-between-osi-seven-layer-network-model-and-tcpip Gookin (2008) Troubleshooting Your PC For Dummies, 3rd Edition; Hardware Needed for a Wireless Network; obtained from http://www.dummies.com/how-to/content/hardware-needed-for-a-wireless-network.html