Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Systems Architecture and Design, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
System Design and Architecture indicate a comprehensive and sheer computer communication structure with rationale for technology design, constructing and network communication management. Likewise, system design and architecture follows a layered approach that incorporates updated principles for network design. This approach allocates the communication into a number of short sections, each part completing a clearly defined sub division and communicating with defined methods in small numbers. Moreover, layering also facilitates the communication parts for designing and testing a combination of cases and making the design easy. If one can read and view the network architecture design, none of the vendor possesses the technology, competence and control for development and classification. Everyone can suggest or design hardware, software and network architecture.
Network Architecture
Before selecting a topology, there are some factors that must be considered. These factors include installation, infrastructure, troubleshooting, distances, maintenance, legacy network and future considerations (Al-Khatib & Alam, 2007). The current situation acquires bus topology that is most widely adopted and cost-effective topology. However, in order to restore the bus topology with the star topology, there are certain factors that need to be addressed. Star topology supports network redundancy by connecting each node from the workstation to the switch as hub can also be used instead of a switch. Moreover, star topology also provides centralized administration and configuration of data objects on the network. However, this feature requires a configuration of a domain within the network along with cable length that is somewhat higher. The domain is manageable by a domain controller and is maintaining Microsoft active directory. However, a resource is used for domain configuration and control that is known as network administrator or system engineer. Likewise, Microsoft Active directory provides auditing, security and configuration features that can be customized according to the business requirements and job functions on the network. In terms of hardware, network switches must keep 10/100 Mbps full duplex mode for an credible star topology functionality. For instance, if the current network is functioning on a bus topology with a 10M bits/sec Mbps supported network devices, there is a requirement of replacing them with an updated network devices supporting 10/100 Mbps full/ half duplex mode. Likewise, active directory can handle centralized administration and auditing features for managing access control within the organization. For instance, active directory provides functionality for creating users on a domain i.e. [email protected]. This user is now available for granting or denying access to specific objects on the network. If we show an example of a Human resource department of an organization, a user named as [email protected] is created on the domain. This user will log credentials for authentication and authorization purpose before getting access to the data objects. Likewise, the network administrator will provide access to only data objects associated with human resource to the end user Peter. When peter enters credentials i.e. name and password, active directory automatically accept or deny access according to the policy applied to the user [email protected]. In case of changing a specific group policy, all the objects and users in the group will be changed. All these configuration settings from a centralized domain controller configured on a star topology, Lightweight Directory access protocol, also known as Internet standard directory service protocol for access and update capabilities. Moreover, LDAP is configured for accessing directory listings e-mail and web browsers for querying LDAP supported directory. However, for the current scenario, switches supporting LDAP features must be addressed before replacing the legacy network hardware (Ldap.2003). Thus, a domain controller configured on a Windows Server, switches supporting 100 base-T and LDAP features and a twisted pair cable supporting 100 base-T is required for replacing the current bus topology with star topology.
Secure Project Management & Employee Monitoring and Legal Practices
Project Management security can also be considered as protecting project information confidentiality, integrity and availability. Project information incorporates data from sources such as, risks, project scheduling, project cost, staffing and procurement.. Organizational requirements may vary for protecting information, as it depends on project types. The best practice will continue to keep all project information (The need for secure project management – SC magazine, n.d).
Employee Monitoring Practices incorporates many tasks that may not limited to day by day activities. Some of the widely used techniques are:
Access Panels
Access Panels is categorized as physical controls that require employee identification prior to entering a controlled area or department. Access is permitted to employees after identification.
Automatic Screen Warnings
Automatic screen warning is messages or pop ups containing detailed information, For instance, if an employee is accessing the system first time, he or she will receive a message ‘You are responsible for the misuse of this system and all your activities will be monitored by our network monitoring and surveillance department’.
Attendance and Time Monitoring
For ensuring employee availability, attendance and monitoring bio metric controls are used. Logs associated with ‘Time in’ and ‘Time out’ is maintained at a back office system.
Desktop Monitoring applications
Desktop monitoring tools can also be installed on a centralized location. The integration of these tools is most likely with Active Directory. Likewise, the tool creates logs for user actions on the operation system.
Legal and Regulatory Considerations
Firewall restricts all user demand and data packets defined in the firewall policy. In this way, every request is accessible or denied and it is logged along with monitoring of employee act in certain situations. As per local regulations, email records are necessary in certain situations. For instance, an employee involved in embezzlement or espionage is proven to be guilty by retrieving email records demonstrating communication with criminals. In the year 1968, congress of the U.S endorsed Title III of the Omnibus Crime Control and Safe Streets Act that prevents the monitoring of wire and verbal conversation and communication by confidential personnel at both ends. Instead of explicit situations, the federal act of wire tapping do not allow intercepting of wire and verbal communication. For instance, the court permits the interception of wired and verbal communication (Prohibitions against monitoring employee E-mail and other electronic communications – law firm “Preeo Silverman Green & Egle” attorneys denver, Colorado, n.d ).
Work Cited
Al-Khatib, M., & Alam, M. S. (2007). IPTV multimedia networks: Concepts, developments, and design International Engineering Consortium.
Ldap. (2003). Essential Internet, , 121-121.
Prohibitions against monitoring employee E-mail and other electronic communications – law firm “Preeo Silverman Green & Egle” attorneys denver, colorado Retrieved 1/24/2013, 2013, from http://www.preeosilverman.com/CM/Articles/Articles24.asp
The need for secure project management – SC magazine, n.d, Retrieved 1/24/2013, 2013, from http://www.scmagazine.com/the-need-for-secure-project-management/article/30225/
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee