All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Systems Architecture and Design, Research Paper Example

Pages: 4

Words: 1067

Research Paper

System Design and Architecture indicate a comprehensive and sheer computer communication structure with rationale for technology design, constructing and network communication management. Likewise, system design and architecture follows a layered approach that incorporates updated principles for network design. This approach allocates the communication into a number of short sections, each part completing a clearly defined sub division and communicating with defined methods in small numbers. Moreover, layering also facilitates the communication parts for designing and testing a combination of cases and making the design easy. If one can read and view the network architecture design, none of the vendor possesses the technology, competence and control for development and classification. Everyone can suggest or design hardware, software and network architecture.

Network Architecture

Before selecting a topology, there are some factors that must be considered. These factors include installation, infrastructure, troubleshooting, distances, maintenance, legacy network and future considerations (Al-Khatib & Alam, 2007). The current situation acquires bus topology that is most widely adopted and cost-effective topology. However, in order to restore the bus topology with the star topology, there are certain factors that need to be addressed. Star topology supports network redundancy by connecting each node from the workstation to the switch as hub can also be used instead of a switch. Moreover, star topology also provides centralized administration and configuration of data objects on the network. However, this feature requires a configuration of a domain within the network along with cable length that is somewhat higher. The domain is manageable by a domain controller and is maintaining Microsoft active directory. However, a resource is used for domain configuration and control that is known as network administrator or system engineer. Likewise, Microsoft Active directory provides auditing, security and configuration features that can be customized according to the business requirements and job functions on the network. In terms of hardware, network switches must keep 10/100 Mbps full duplex mode for an credible star topology functionality. For instance, if the current network is functioning on a bus topology with a 10M bits/sec Mbps supported network devices, there is a requirement of replacing them with an updated network devices supporting 10/100 Mbps full/ half duplex mode. Likewise, active directory can handle centralized administration and auditing features for managing access control within the organization. For instance, active directory provides functionality for creating users on a domain i.e. [email protected]. This user is now available for granting or denying access to specific objects on the network. If we show an example of a Human resource department of an organization, a user named as [email protected] is created on the domain. This user will log credentials for authentication and authorization purpose before getting access to the data objects. Likewise, the network administrator will provide access to only data objects associated with human resource to the end user Peter. When peter enters credentials i.e. name and password, active directory automatically accept or deny access according to the policy applied to the user [email protected]. In case of changing a specific group policy, all the objects and users in the group will be changed. All these configuration settings from a centralized domain controller configured on a star topology, Lightweight Directory access protocol, also known as Internet standard directory service protocol for access and update capabilities. Moreover, LDAP is configured for accessing directory listings e-mail and web browsers for querying LDAP supported directory. However, for the current scenario, switches supporting LDAP features must be addressed before replacing the legacy network hardware (Ldap.2003). Thus, a domain controller configured on a Windows Server, switches supporting 100 base-T and LDAP features and a twisted pair cable supporting 100 base-T is required for replacing the current bus topology with star topology.

Secure Project Management & Employee Monitoring and Legal Practices

Project Management security can also be considered as protecting project information confidentiality, integrity and availability. Project information incorporates data from sources such as, risks, project scheduling, project cost, staffing and procurement.. Organizational requirements may vary for protecting information, as it depends on project types. The best practice will continue to keep all project information (The need for secure project management – SC magazine, n.d).

Employee Monitoring Practices incorporates many tasks that may not limited to day by day activities. Some of the widely used techniques are:

Access Panels

Access Panels is categorized as physical controls that require employee identification prior to entering a controlled area or department. Access is permitted to employees after identification.

Automatic Screen Warnings

Automatic screen warning is messages or pop ups containing detailed information, For instance, if an employee is accessing the system first time, he or she will receive a message ‘You are responsible for the misuse of this system and all your activities will be monitored by our network monitoring and surveillance department’.

 

Attendance and Time Monitoring

For ensuring employee availability, attendance and monitoring bio metric controls are used. Logs associated with ‘Time in’ and ‘Time out’ is maintained at a back office system.

Desktop Monitoring applications

Desktop monitoring tools can also be installed on a centralized location. The integration of these tools is most likely with Active Directory. Likewise, the tool creates logs for user actions on the operation system.

Legal and Regulatory Considerations

Firewall restricts all user demand and data packets defined in the firewall policy. In this way, every request is accessible or denied and it is logged along with monitoring of employee act in certain situations. As per local regulations, email records are necessary in certain situations. For instance, an employee involved in embezzlement or espionage is proven to be guilty by retrieving email records demonstrating communication with criminals. In the year 1968, congress of the U.S endorsed Title III of the Omnibus Crime Control and Safe Streets Act that prevents the monitoring of wire and verbal conversation and communication by confidential personnel at both ends. Instead of explicit situations, the federal act of wire tapping do not allow intercepting of wire and verbal communication. For instance, the court permits the interception of wired and verbal communication (Prohibitions against monitoring employee E-mail and other electronic communications – law firm “Preeo Silverman Green & Egle” attorneys denver, Colorado, n.d ).

 

Work Cited

Al-Khatib, M., & Alam, M. S. (2007). IPTV multimedia networks: Concepts, developments, and design International Engineering Consortium.

Ldap. (2003). Essential Internet, , 121-121.

Prohibitions against monitoring employee E-mail and other electronic communications – law firm “Preeo Silverman Green & Egle” attorneys denver, colorado Retrieved 1/24/2013, 2013, from http://www.preeosilverman.com/CM/Articles/Articles24.asp

The need for secure project management – SC magazine, n.d, Retrieved 1/24/2013, 2013, from http://www.scmagazine.com/the-need-for-secure-project-management/article/30225/

 

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper