Instant messaging and Voice Over Internet protocol Essay
Order ID:89JHGSJE83839 Style:APA/MLA/Harvard/Chicago Pages:5-10 Instructions:
Instant messaging and Voice Over Internet protocol Essay
Running head: Capstone Project Activity – Unit 2 2
Capstone Project Activity – Unit 2
Student Name
Frank Owusu Boadu
Course
Program Capstone in IT
Date
09/02/2018
Capstone Project Activity – Unit 2
Which type of network topology would you recommend for the corporate backbone and the wired and wireless connections? Why do you think this would be the best choice?
Internet bubble burst led to many reforms in most organizations. The reforms were due to the value of equity markets which grew rapidly. Rapid technology advancement led to the highest capital
growth in the industries which later contributed to them crushing. One of this industries is the Verbania, Inc. which was shut down in the early 20’s. The company now wants to reinvent and launch itself
again. To do this, it will need to create a well-integrated social relationship platform that goes in hand with other technologies for instance the CRM. The company will require an efficient network
topology such as Bus topology. This kind of network will enable computers and other network devices stay connected on a single cable. It will transmit data in only one direction since it will have only
two end points also known as the Linear Bus Topology. This will enable every device to stay connected to the network. This kind of Topology will be advantageous to the company as it is cost effective
and easy to expand. However, in case the cable fails it means the whole network fails. For wireless connections, the company can use HYBRID Topology. This kind of topology is reliable as detecting
errors is quit very easy (Rahman, & Esmailpour, April 2014). This makes the topology be regarded as effective and flexible. However, the design is complex and costly to install, this is because it is a combination of two topologies.
Which type of cabling would you recommend? Why do you think this would be the best choice?
To complete these networking, the company will require several networking cabling. Cabling carries data across the network, voice, serial-communications, alarm signals, video and audio transmission.
This is why the company will require a reliable and well-designed structured cabling system. Cabling typical accounts for less than 10% of the total cost of network infrastructure (Croft, et al 2011). You
can be sure the life span of the cabling system is more than 16 years if well installed. It is also important to know that more than half of the problems related to networking are due to poor cabling. This problems are such as slow access while accessing information. There are several communication cabling; this are twisted-pair, shielded or screened twisted pair and fiber optic. However, it is important
to distinguish between the backbone cables and the horizontal cables. The backbone cables connect devices such as; servers, switches and routers while the horizontal cables connect the communication closets and the wall outlets. To bring the company back to life, twisted-pair cable can be recommended. It is less expensive and the tools required to install are less costly. It also has
some outer covering which consist of non-conducting materials. This will increase the lifespan of the cabling system. The second recommendable is optical-fiber cable. This cabling system was
established in the early 90’s. The advantages to this cabling system is that transmission data can be much greater than with copper cable. Potential bandwidth is dramatically higher than with copper. Also, fiber optic is much secure than copper cable and is not susceptible to outside crosstalk interference (Agrawal, 2012). It is also easy to handle data at a speed above 1gps in fact it can handle data
not exceeding 200gps. This is possible because fiber optic uses a strand of plastic to transmit data signals using light. The data is usually carried in light pulses. It is important to note that optic fiber are not electrical in nature. It is also important to comprehend the two types of fiber optic cables.
How will the network infrastructure accommodate remote access?
Remote access VPNs allow secure access to corporate resources by establishing an encrypted tunnel across the internet (Croft, et al 2011). Network access gives employees great flexibility regarding
when and where they are. VPNs, also provides a secure solutions for providing limited network aces to non-employees. This will help secure the business hence avoiding it to crush again. Logically,
VPNs offer remote access connectivity by providing secure communications to only authorized personnel’s. It also enhances productivity by extending corporate network as well as reducing
communications costs. Remote access is will help the organization connect to the network from any host. This future is designed to minimize the potential exposure from damages which may result from resources. However, it is important for the organization to secure the remote access VPN to avoid possible threats. There are several VPN technologies that might be of use to the company. This are;
- Application and Network resource access. This offers broad access to virtually any application or network resource.
- End-user Access method. Remote access is offered through web browsers and sveral VPN software’s.
- End-user Access Device options. This will enable the company to manage and access information of the employees, contractor and business partners.
- Desktop software. Updates and requirements. This kind of technology will help the company operate without any special purpose desktop software hence no updates required.
- Customized user access. This will offer access to the company policies.
What solution would you propose to integrate the social media site with a CRM solution?
Every interactions people take online is necessary in identifying what kind of customer relationship management you will take. CRM is valuable to the company when you create a customized email campaign that appeals to the unique interests of behavior of each segment (Kuss, & Griffiths, 2011). With CRM interactions, you can
- Creating a mobile friendly account and a profile
- Creating discussion forums and posting as well as auto-add new contacts to your CRM account.
- Search capability for people
- Add gaming component
- Calendar component for reminders
- Instant messaging and Voice Over Internet protocol (VOIP)-type calling between friends
- Secure account and email feature
- Availability seven days a week
- Add notes to submitted leads for easy segmentation.
- Updated existing contacts to the CRM account
The basic company requirements for the social networking solution must are:
- Collect, store, back up, and mine user data to better understand users.
- Integrate collected data with customer relationship management (CRM) to improve business and customer support processes.
- Analyze user patterns, behavior, and generated traffic to present to advertisers.
Requested functionality for the social networking application includes the following:
- Account setup and log-in functionality
- Creating a profile
- Adding or removing friends
- Posting to a discussion area
It is evident that a positive return on investment will be automatic. However, the company will need to train employees to constantly utilize the CRM effectively as well as keep the data up to date. This is because the decisions made are purely dependent on the data found in the systems. It will also be necessary for users to keep track of customer’s interactions and manage the data.
What security considerations are involved?
There are a number of threats that can be involved when using social media. Social networking has changed the interactions between customers and associates. With over a hundred millions users online, these possible threats are prone to;
- Cases where customers identity are stolen. To protect the customer’s identity, the company will have to set a requirement of a strong password when customers are opening social accounts (Linoff, & Berry,2011).
- Cases have occurred where, some customers social profile have been hacked. To offer solutions to this, it is necessary for the company to educate their customers not to click on any link unless there are sure of the source.
The company will have to set social media policy to protect its customers from security threats. It will also need to train its staffs on social media security best practices.
References
Agrawal, G. P. (2012). Fiber-optic communication systems (Vol. 222). John Wiley & Sons.
Croft, R. J., Low, A. E., Mazzaferri, R. J., Robinson, D. N., & Pedersen, B. J. (2011). U.S. Patent No. 7,949,677. Washington, DC: U.S. Patent and Trademark Office.
Kuss, D. J., & Griffiths, M. D. (2011). Online social networking and addiction—a review of the psychological literature. International journal of environmental research and public health, 8(9), 3528-3552.
Linoff, G. S., & Berry, M. J. (2011). Data mining techniques: for marketing, sales, and customer relationship management. John Wiley & Sons.
Rahman, M. N., & Esmailpour, A. (2014, April). A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network. In ASEE 2014 Zone I Conference.
RUBRIC
Excellent Quality
95-100%
Introduction 45-41 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Literature Support
91-84 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Methodology
58-53 points
Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met.
Average Score
50-85%
40-38 points
More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided.
83-76 points
Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration.
52-49 points
Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met.
Poor Quality
0-45%
37-1 points
The background and/or significance are missing. No search history information is provided.
75-1 points
Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration.
48-1 points
There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow Instant messaging and Voice Over Internet protocol Essay