Assignment on Handmade Furniture Network Management
VerifiedAdded on  2022/08/21
|26
|5145
|10
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: - HANDMADE FURNITURE NETWORK MANAGEMENT
HANDMADE FURNITURE NETWORK MANAGEMENT
Name of the Student
Name of the University
Author Note
HANDMADE FURNITURE NETWORK MANAGEMENT
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1HANDMADE FURNITURE NETWORK MANAGEMENT
Table of Contents
1. Introduction:...........................................................................................................................2
2. Network Design (Existing):...................................................................................................3
3. Network Management Plan:...................................................................................................3
4. Network Security Plan:........................................................................................................14
5. Network Design (New):.......................................................................................................19
6. Conclusion:..........................................................................................................................19
7. Recommendations:...............................................................................................................20
8. References:...........................................................................................................................21
Table of Contents
1. Introduction:...........................................................................................................................2
2. Network Design (Existing):...................................................................................................3
3. Network Management Plan:...................................................................................................3
4. Network Security Plan:........................................................................................................14
5. Network Design (New):.......................................................................................................19
6. Conclusion:..........................................................................................................................19
7. Recommendations:...............................................................................................................20
8. References:...........................................................................................................................21
2HANDMADE FURNITURE NETWORK MANAGEMENT
1. Introduction:
HandMade Furniture is a company that specifically deals with the production and
manufacturing of furniture in their own factories but following a handmade procedure to be
exact. The company is in possession of two main sites, the office and that of the factory. The
organization consists of 80 employees in both the sites together, with 60 employees working
at the factory and the rest of the 20 working at the office doing desk jobs (Park et al. 2017).
In regards to the office, each individual of the 20 workers have their own workstations which
have various version of windows installed on them such as 7, 8 or 10. In addition to this, all
of the systems that are placed at the office have various versions of Microsoft office for
carrying out the basic work on a daily basis. On the other hand, the factory has an inclusion
of 8 personal computers with all of the systems installed with windows 7 and Microsoft
office 2010 (Ceselli, Premoli and Secci 2017). The entire network of the company runs on a
singular Windows Server 2012 along with an additional storage space added to the network
that provisions all the employees with a storage space of 10 TB. Internet connectivity is
provided to the network with the help of a local internet provider through the utilization of
ADSL account. The factory has been provided with a single Inkjet printer that needs to be
shared by all the 8 workstations within the factory. On the other hand, the office site of the
company has 23 printers among which, a high volume laser printer is attached to the
administration department and 22 other inkjet printers are shared by the remaining of the
workstations. The company has no centralized antivirus software and the employees have the
responsibility to deal with the same on their own. A recent situation of a virus infection was
solved by bringing in a local IT technician (Boland et al. 2017). As a reason, this discussion
carries the primary objective of creating a network management plan on the basis of which,
the entire network that belongs to the company shall be managed, as well as a network
1. Introduction:
HandMade Furniture is a company that specifically deals with the production and
manufacturing of furniture in their own factories but following a handmade procedure to be
exact. The company is in possession of two main sites, the office and that of the factory. The
organization consists of 80 employees in both the sites together, with 60 employees working
at the factory and the rest of the 20 working at the office doing desk jobs (Park et al. 2017).
In regards to the office, each individual of the 20 workers have their own workstations which
have various version of windows installed on them such as 7, 8 or 10. In addition to this, all
of the systems that are placed at the office have various versions of Microsoft office for
carrying out the basic work on a daily basis. On the other hand, the factory has an inclusion
of 8 personal computers with all of the systems installed with windows 7 and Microsoft
office 2010 (Ceselli, Premoli and Secci 2017). The entire network of the company runs on a
singular Windows Server 2012 along with an additional storage space added to the network
that provisions all the employees with a storage space of 10 TB. Internet connectivity is
provided to the network with the help of a local internet provider through the utilization of
ADSL account. The factory has been provided with a single Inkjet printer that needs to be
shared by all the 8 workstations within the factory. On the other hand, the office site of the
company has 23 printers among which, a high volume laser printer is attached to the
administration department and 22 other inkjet printers are shared by the remaining of the
workstations. The company has no centralized antivirus software and the employees have the
responsibility to deal with the same on their own. A recent situation of a virus infection was
solved by bringing in a local IT technician (Boland et al. 2017). As a reason, this discussion
carries the primary objective of creating a network management plan on the basis of which,
the entire network that belongs to the company shall be managed, as well as a network
3HANDMADE FURNITURE NETWORK MANAGEMENT
security plan that will provision the company with the required amount of security measures
that need to be implemented to make the network secure.
2. Network Design (Existing):
Figure-1: HandMade Furniture existing network
(Source- Created By Author)
3. Network Management Plan:
HandMade Furniture as a business organization have been making use of traditional
methods for running the company in terms of internet connectivity, wires, cloud services and
many other. In regards to this, the company needs to make drastic changes in various aspects
of the existing network for a better service to be provided to each of the individual employee
working within the organization.
security plan that will provision the company with the required amount of security measures
that need to be implemented to make the network secure.
2. Network Design (Existing):
Figure-1: HandMade Furniture existing network
(Source- Created By Author)
3. Network Management Plan:
HandMade Furniture as a business organization have been making use of traditional
methods for running the company in terms of internet connectivity, wires, cloud services and
many other. In regards to this, the company needs to make drastic changes in various aspects
of the existing network for a better service to be provided to each of the individual employee
working within the organization.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4HANDMADE FURNITURE NETWORK MANAGEMENT
Internet Connectivity:
The current system consists of a wired network with no existence of Wi-Fi services or
cloud services and the workstations are provisioned with the connection from a local service
provider with the help of an ADSL account (Cioffi et al. 2020). The entire network is
connected to a singularly
existing Windows Server 2012. Upgrading the internet connection of the company shall be
done according to the following steps,
i) Server- the Windows Server 2012 shall be replaced with that of the latest version,
Windows Server 2019. This is the primary step towards upgrading the internet
connection of the company. The windows server 2019 shall be integrated for
multiple benefits such as Azure Services, increased security as well as reducing
the risk to the business procedures with multiple layers of security protection
(Akpinar et al. 2017). For installing the Windows Server 2019, the company
needs to make an investment of $6,155 that is a one-time cost for the company.
Figure-2: Windows Server 2019
(Source- Cioffi et al. 2020)
Internet Connectivity:
The current system consists of a wired network with no existence of Wi-Fi services or
cloud services and the workstations are provisioned with the connection from a local service
provider with the help of an ADSL account (Cioffi et al. 2020). The entire network is
connected to a singularly
existing Windows Server 2012. Upgrading the internet connection of the company shall be
done according to the following steps,
i) Server- the Windows Server 2012 shall be replaced with that of the latest version,
Windows Server 2019. This is the primary step towards upgrading the internet
connection of the company. The windows server 2019 shall be integrated for
multiple benefits such as Azure Services, increased security as well as reducing
the risk to the business procedures with multiple layers of security protection
(Akpinar et al. 2017). For installing the Windows Server 2019, the company
needs to make an investment of $6,155 that is a one-time cost for the company.
Figure-2: Windows Server 2019
(Source- Cioffi et al. 2020)
5HANDMADE FURNITURE NETWORK MANAGEMENT
i) Internet provider- the existing ADSL account that is provided by the local
service provide shall be replaced by the FTTC (Fibre to the Cabinet) to
specifically improve the speed of the connection across the entire network of the
organization with transmission of connectivity through the fibre optics rather than
copper wires (Singh 2017). The FTTC connection will provide with better speed
of uploads and downloads, a high-speed connection of internet as well as lower
amount of traffic that will allow both the sites of the company to have an
unintended communication with no interventions. For implementing the FTTC,
the company has to make an investment of $2900 at the initial installation along
with variable costs for maintaining the entire system on a yearly basis.
Figure-3: FTTC Connection
(Source- Akpinar et al. 2017)
ii) Cloud services- the company has been working on a singular network with
internet connection from a local service provider through an ADSL account.
However, with the amount of data that the company deals with on a regular basis,
there is a need of implementing cloud services. Hence, the company needs to
i) Internet provider- the existing ADSL account that is provided by the local
service provide shall be replaced by the FTTC (Fibre to the Cabinet) to
specifically improve the speed of the connection across the entire network of the
organization with transmission of connectivity through the fibre optics rather than
copper wires (Singh 2017). The FTTC connection will provide with better speed
of uploads and downloads, a high-speed connection of internet as well as lower
amount of traffic that will allow both the sites of the company to have an
unintended communication with no interventions. For implementing the FTTC,
the company has to make an investment of $2900 at the initial installation along
with variable costs for maintaining the entire system on a yearly basis.
Figure-3: FTTC Connection
(Source- Akpinar et al. 2017)
ii) Cloud services- the company has been working on a singular network with
internet connection from a local service provider through an ADSL account.
However, with the amount of data that the company deals with on a regular basis,
there is a need of implementing cloud services. Hence, the company needs to
6HANDMADE FURNITURE NETWORK MANAGEMENT
include cloud service for carrying out the activities of data management, backup
as well as to have a faster access to the company data from anywhere at any point
of time (Learning and Tutorial 2017). For the storage, a minimum of 5TB space is
to be provided for which the annual cost is $419.4.
Figure-4: Cloud based services
(Source- Singh 2017)
Windows and Microsoft Office Versions:
The office site has 20 workers currently employed by the company for which 20
workstations have been provisioned. In regards to this, all the workstations are not having
Windows 10 installed on them (Adams 2018). As a reason, the workstations devoid of that
will be identified and the existing versions of windows operating system will be replaced by
the Windows 10 version to provide with greater efficiency and to increase the performance of
the work that is carried out with the help of the PCs.
include cloud service for carrying out the activities of data management, backup
as well as to have a faster access to the company data from anywhere at any point
of time (Learning and Tutorial 2017). For the storage, a minimum of 5TB space is
to be provided for which the annual cost is $419.4.
Figure-4: Cloud based services
(Source- Singh 2017)
Windows and Microsoft Office Versions:
The office site has 20 workers currently employed by the company for which 20
workstations have been provisioned. In regards to this, all the workstations are not having
Windows 10 installed on them (Adams 2018). As a reason, the workstations devoid of that
will be identified and the existing versions of windows operating system will be replaced by
the Windows 10 version to provide with greater efficiency and to increase the performance of
the work that is carried out with the help of the PCs.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7HANDMADE FURNITURE NETWORK MANAGEMENT
On the other hand, the factory has 8 workstations currently running with Windows 7
installed on them. Hence, as a part of upgrading the entire network of the organization, the
windows 7 will be replaced by Windows 10 on every single PC that is operated within the
factory premise of the HandMade Furniture. For installing the Windows 10, cost for each of
the original version of the operating system is $199.99.
Figure-5: Windows 10
(Source- Learning and Tutorial 2017)
In addition to this, the workstations have been provided with various versions of
Microsoft Office to carry out general activities related to the business of the organization. In
regards to this, all the PCs belonging to the office site as well as the factory site will be
installed with Microsoft Office 2019 to provide the employees with greater services to carry
out their individual work with greater efficiency (Nas 2019). Cost of Microsoft Office 2019 is
$249.99.
On the other hand, the factory has 8 workstations currently running with Windows 7
installed on them. Hence, as a part of upgrading the entire network of the organization, the
windows 7 will be replaced by Windows 10 on every single PC that is operated within the
factory premise of the HandMade Furniture. For installing the Windows 10, cost for each of
the original version of the operating system is $199.99.
Figure-5: Windows 10
(Source- Learning and Tutorial 2017)
In addition to this, the workstations have been provided with various versions of
Microsoft Office to carry out general activities related to the business of the organization. In
regards to this, all the PCs belonging to the office site as well as the factory site will be
installed with Microsoft Office 2019 to provide the employees with greater services to carry
out their individual work with greater efficiency (Nas 2019). Cost of Microsoft Office 2019 is
$249.99.
8HANDMADE FURNITURE NETWORK MANAGEMENT
Figure-6: Microsoft Office 2019
(Source- Adams 2018)
Email via Cloud Provider:
To improve the communication between all the individual employees of the
organization, cloud services have been provisioned for backing up data as well as to provide
the employees with an extra space for storage to access the same set of data whenever
necessary at any place or time. However, there is also a necessity of the employees to
communicate within themselves as well as to provide certain information to the upper
management of HandMade Furniture (Bhardwaj and Goundar 2017). As a reason, every
individual employee working at the office site and the factory site will have a specific email
address that can be used for the purpose of communicating as well as conveying various
forms of information related to the business activity. Microsoft Office 365 will be installed
on every single workstation of the organization to provision the employees with the
allowance to access their email and convey necessary information. This will cost the
company $99.99 on an annual basis.
Figure-7: Microsoft Office 365
(Source- Nas 2019)
Figure-6: Microsoft Office 2019
(Source- Adams 2018)
Email via Cloud Provider:
To improve the communication between all the individual employees of the
organization, cloud services have been provisioned for backing up data as well as to provide
the employees with an extra space for storage to access the same set of data whenever
necessary at any place or time. However, there is also a necessity of the employees to
communicate within themselves as well as to provide certain information to the upper
management of HandMade Furniture (Bhardwaj and Goundar 2017). As a reason, every
individual employee working at the office site and the factory site will have a specific email
address that can be used for the purpose of communicating as well as conveying various
forms of information related to the business activity. Microsoft Office 365 will be installed
on every single workstation of the organization to provision the employees with the
allowance to access their email and convey necessary information. This will cost the
company $99.99 on an annual basis.
Figure-7: Microsoft Office 365
(Source- Nas 2019)
9HANDMADE FURNITURE NETWORK MANAGEMENT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10HANDMADE FURNITURE NETWORK MANAGEMENT
Wi-Fi installation:
With the implementation of FTTC and cloud based services, the network will be
installed with a Wi-Fi server that will gain the internet access from the FTTC service
provider. This server will have a connection to a Wi-Fi router that will be open to all the
workstations as well as mobiles of the employees to connect to it and access the internet from
there itself (Vasisht, Kumar and Katabi 2016). Especially, the team leaders of every single
team will have a laptop that shall be Wi-Fi enabled to allow them to connect to the router and
carry out their daily work for the company. Netgear C7100V Nighthawk DOCSIS 3.0 Cable
Modem and Router will be installed into the company’s network to enable the Wi-Fi service.
The router will cost $ 521.20 that is a one-time investment for the company.
Figure-8: Netgear C7100V Nighthawk DOCSIS 3.0
(Source- Bhardwaj and Goundar 2017)
Bring Your Own Device (BYOD):
HandMade Furniture will provision all the existing employees to bring in any kinds of
their own computing device for any work that needs to be accomplished. Such devices can be
the like of smartphones, tablets or might as well be laptops. Now, the employees will also be
provisioned with the allowance to connect their own devices to the Wi-Fi service that will be
Wi-Fi installation:
With the implementation of FTTC and cloud based services, the network will be
installed with a Wi-Fi server that will gain the internet access from the FTTC service
provider. This server will have a connection to a Wi-Fi router that will be open to all the
workstations as well as mobiles of the employees to connect to it and access the internet from
there itself (Vasisht, Kumar and Katabi 2016). Especially, the team leaders of every single
team will have a laptop that shall be Wi-Fi enabled to allow them to connect to the router and
carry out their daily work for the company. Netgear C7100V Nighthawk DOCSIS 3.0 Cable
Modem and Router will be installed into the company’s network to enable the Wi-Fi service.
The router will cost $ 521.20 that is a one-time investment for the company.
Figure-8: Netgear C7100V Nighthawk DOCSIS 3.0
(Source- Bhardwaj and Goundar 2017)
Bring Your Own Device (BYOD):
HandMade Furniture will provision all the existing employees to bring in any kinds of
their own computing device for any work that needs to be accomplished. Such devices can be
the like of smartphones, tablets or might as well be laptops. Now, the employees will also be
provisioned with the allowance to connect their own devices to the Wi-Fi service that will be
11HANDMADE FURNITURE NETWORK MANAGEMENT
integrated into the newer design of the network after upgrading (Lee Jr et al. 2017). They will
be able to connect their devices and carry out their work on the internet through the Wi-Fi
router that has been included into the upgraded network of the company.
Figure-9: Bring Your Own Device
(Source- Lee Jr et al. 2017)
However, when the workers will be bringing their own device, every individual
device shall be monitored once before coming in and again when the person is leaving with
the device to check if some unethical misconduct has been carried out such as stealing away
company’s data. This can be done or improving the security of the BYOD policy in
particular.
Networked Pull Printing:
Pull printing refers to the technology that has the primary inclusion of server-based
printing or server less printing. This procedure refers to the method of printing that usually
exists in larger-sized business organizations that usually print long as well as documents that
are rich in colour (Kim and Oak 2017). For such pull printers, there is a separate existence of
a pull printing server that entirely controls as well as monitors over the printing
functionalities freeing the workstations of the business organizations for carrying out other
important procedures.
integrated into the newer design of the network after upgrading (Lee Jr et al. 2017). They will
be able to connect their devices and carry out their work on the internet through the Wi-Fi
router that has been included into the upgraded network of the company.
Figure-9: Bring Your Own Device
(Source- Lee Jr et al. 2017)
However, when the workers will be bringing their own device, every individual
device shall be monitored once before coming in and again when the person is leaving with
the device to check if some unethical misconduct has been carried out such as stealing away
company’s data. This can be done or improving the security of the BYOD policy in
particular.
Networked Pull Printing:
Pull printing refers to the technology that has the primary inclusion of server-based
printing or server less printing. This procedure refers to the method of printing that usually
exists in larger-sized business organizations that usually print long as well as documents that
are rich in colour (Kim and Oak 2017). For such pull printers, there is a separate existence of
a pull printing server that entirely controls as well as monitors over the printing
functionalities freeing the workstations of the business organizations for carrying out other
important procedures.
12HANDMADE FURNITURE NETWORK MANAGEMENT
For network pull printing, respective users need to authenticate the printer using an
embedded software that has a relation to the printer service. Once the authentication has been
done, the user is needed to select an option from the list of the print jobs that is presented to
the respective user on the server, the PC or the web portal of the company. The option is to be
selected and the printing is done on their own.
The HandMade Furniture has the inclusion of 1 inkjet printer at the factory site and 23
printers at the office site out of which one is a laser printer. However, to upgrade the entire
network of the organization, such existing printers need to be moved away and replaced by
network pull printers that will be provisioning the allowance of printing on a large scale to all
the existing employees of the organization (Oguma, Sato and Sun 2017). The printers will be
functioning with the help of a separate pull printing server that is again to be integrated into
the network just to control the printer service on a daily basis.
Figure-10: Network Pull Printer
(Source- Kim and Oak 2017)
With the office site holding 20 employees with 20 individual workstations, 2 pull
printers are to be provided to be shared between 20 employees where each of the printer is to
be connected to 10 workstations. On the other hand, at the factory site there are 8
For network pull printing, respective users need to authenticate the printer using an
embedded software that has a relation to the printer service. Once the authentication has been
done, the user is needed to select an option from the list of the print jobs that is presented to
the respective user on the server, the PC or the web portal of the company. The option is to be
selected and the printing is done on their own.
The HandMade Furniture has the inclusion of 1 inkjet printer at the factory site and 23
printers at the office site out of which one is a laser printer. However, to upgrade the entire
network of the organization, such existing printers need to be moved away and replaced by
network pull printers that will be provisioning the allowance of printing on a large scale to all
the existing employees of the organization (Oguma, Sato and Sun 2017). The printers will be
functioning with the help of a separate pull printing server that is again to be integrated into
the network just to control the printer service on a daily basis.
Figure-10: Network Pull Printer
(Source- Kim and Oak 2017)
With the office site holding 20 employees with 20 individual workstations, 2 pull
printers are to be provided to be shared between 20 employees where each of the printer is to
be connected to 10 workstations. On the other hand, at the factory site there are 8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13HANDMADE FURNITURE NETWORK MANAGEMENT
workstations for which 2 pull printers will be provided to increase the efficiency of printing
since, this is the site where the furniture is manufactured on a daily basis (Kusaka, Sugihara
and Ushijima 2016). HP LaserJet Pro MFP M521dn is the pull printer that shall be integrated
into the network of the HandMade Furniture enterprise. $1,106.32 will be the cost incurred
for each of the 4 pull printers that are to be brought and installed into the office and the
factory site.
Figure-11: Network Pull Printer working mechanism
(Source- Kusaka, Sugihara and Ushijima 2016)
Cloud service management:
With the implementation of cloud-based services into the network, the company has
also decided to carry out the functionalities of account as well as stock management on behalf
of the company by the cloud service provider.
The company deals with multiple revenue transactions on a daily basis such as
revenue collection from the customers and the clients who place order for manufacturing of
furniture. The financial transactions are taken half at the time of placing the order and again
at the end of the delivery (Adams et al. 2018). In addition to this, financial transactions also
include the likes of the payroll of all the employees of the organization. This also includes the
financial transactions of buying commodities for office purposes as well as maintenance and
repairing purposes.
workstations for which 2 pull printers will be provided to increase the efficiency of printing
since, this is the site where the furniture is manufactured on a daily basis (Kusaka, Sugihara
and Ushijima 2016). HP LaserJet Pro MFP M521dn is the pull printer that shall be integrated
into the network of the HandMade Furniture enterprise. $1,106.32 will be the cost incurred
for each of the 4 pull printers that are to be brought and installed into the office and the
factory site.
Figure-11: Network Pull Printer working mechanism
(Source- Kusaka, Sugihara and Ushijima 2016)
Cloud service management:
With the implementation of cloud-based services into the network, the company has
also decided to carry out the functionalities of account as well as stock management on behalf
of the company by the cloud service provider.
The company deals with multiple revenue transactions on a daily basis such as
revenue collection from the customers and the clients who place order for manufacturing of
furniture. The financial transactions are taken half at the time of placing the order and again
at the end of the delivery (Adams et al. 2018). In addition to this, financial transactions also
include the likes of the payroll of all the employees of the organization. This also includes the
financial transactions of buying commodities for office purposes as well as maintenance and
repairing purposes.
14HANDMADE FURNITURE NETWORK MANAGEMENT
In regards to the current condition of the company, the accounts department of the
organization had handled the financial transactions manually. However, the company wants
to entrust the cloud service provider for handling the accounts duty since the cloud-based
service is getting installed into the organization.
Figure-12: Cloud based accounts
(Source- Adams et al. 2018)
The cloud service provider that have been appointed by the board of the company will
maintain as well as track all the finance related activities along with transactions that are
carried out on a daily basis within the premise of the organization (Indu, Anand and Bhaskar
2018). Every incoming as well as outgoing amount of money will be integrated into the
database to keep an account of all the expenditures and income of the company for a better
management of the other services.
The organization also has taken the decision to control the stock of their inventory
with the help of a cloud service provider to bring in greater efficiency for keeping a check
upon their inventory. HandMade Furniture produces as well as manufactures huge amount of
furniture on a daily basis as per the orders from clients to keep running their business (Jones,
Shao and Riddick 2018). As a reason, the company is in possession of an inventory that
stores all kinds of raw materials that required by the company for manufacturing various
forms of furniture.
In regards to the current condition of the company, the accounts department of the
organization had handled the financial transactions manually. However, the company wants
to entrust the cloud service provider for handling the accounts duty since the cloud-based
service is getting installed into the organization.
Figure-12: Cloud based accounts
(Source- Adams et al. 2018)
The cloud service provider that have been appointed by the board of the company will
maintain as well as track all the finance related activities along with transactions that are
carried out on a daily basis within the premise of the organization (Indu, Anand and Bhaskar
2018). Every incoming as well as outgoing amount of money will be integrated into the
database to keep an account of all the expenditures and income of the company for a better
management of the other services.
The organization also has taken the decision to control the stock of their inventory
with the help of a cloud service provider to bring in greater efficiency for keeping a check
upon their inventory. HandMade Furniture produces as well as manufactures huge amount of
furniture on a daily basis as per the orders from clients to keep running their business (Jones,
Shao and Riddick 2018). As a reason, the company is in possession of an inventory that
stores all kinds of raw materials that required by the company for manufacturing various
forms of furniture.
15HANDMADE FURNITURE NETWORK MANAGEMENT
In regards to this, the company used to keep a manual control of the inventory by
keeping a track over the existing raw materials and the ones that are in short and need
fulfilling. However, keeping a manual track turns out to be difficult in some situations that
can be mitigated with the automatic control system for stocks with the help of cloud service
provider belonging to some other organization (Vargas and Festifo 2019). Hence, it can be
stated that the company’s decision of utilizing cloud services for maintaining their accounts
as well as stocks will bring in greater efficiency among the two primary business activities of
the organization.
The company will have to spend an amount of $299-$499 on an annual basis to carry
out this activity with the help of a cloud service provide for automating the activity to
increase the efficiency.
Figure-13: Cloud based stock control systems
(Source- Vargas and Festifo 2019)
4. Network Security Plan:
The network that belongs to the existing scenario of HandMade Furniture is low on
security that is evident from two primary scenarios. Firstly, it had been stated that the
company has no centralized subscription to any existing antivirus program to provide
protection to any of the workstations that forms a primary component of the organization
In regards to this, the company used to keep a manual control of the inventory by
keeping a track over the existing raw materials and the ones that are in short and need
fulfilling. However, keeping a manual track turns out to be difficult in some situations that
can be mitigated with the automatic control system for stocks with the help of cloud service
provider belonging to some other organization (Vargas and Festifo 2019). Hence, it can be
stated that the company’s decision of utilizing cloud services for maintaining their accounts
as well as stocks will bring in greater efficiency among the two primary business activities of
the organization.
The company will have to spend an amount of $299-$499 on an annual basis to carry
out this activity with the help of a cloud service provide for automating the activity to
increase the efficiency.
Figure-13: Cloud based stock control systems
(Source- Vargas and Festifo 2019)
4. Network Security Plan:
The network that belongs to the existing scenario of HandMade Furniture is low on
security that is evident from two primary scenarios. Firstly, it had been stated that the
company has no centralized subscription to any existing antivirus program to provide
protection to any of the workstations that forms a primary component of the organization
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
16HANDMADE FURNITURE NETWORK MANAGEMENT
(Acemoglu, Malekian and Ozdaglar 2016). Hence, in scenarios when the workstations are
attacked by various forms of viruses and malware, the respective employee of the
organization deals with the scenario single-handedly. Secondly, a similar scenario had
occurred in which a local IT technician had been called in to clear the respective number of
PCs that had been affected in that particular scenario.
Hence, in regards to such situations it can be concluded that the existing network of
the company has no real time protective and safeguarding procedures against such potential
threats to the network and the end user devices that are connected to the network of the
company (Kang and Kang 2016). Hence, the following network security procedures can be
implemented into the upgraded network of the company to mitigate the potential threat that is
posed by such forms of viruses as well as unauthorized access from externally exiting
sources.
Antivirus Programs:
The HandMade Furniture company has no subscription to any form of antivirus
program that works centrally but is necessary for keeping the network free of any forms of
malware or virus that carry the potential capability to cause harm towards the devices
attached to the network.
Installation of a proper antivirus will allow the organization to keep every single end
user device secure and safeguarded from such existing threats that might cause harm to the
components of the network.
(Acemoglu, Malekian and Ozdaglar 2016). Hence, in scenarios when the workstations are
attacked by various forms of viruses and malware, the respective employee of the
organization deals with the scenario single-handedly. Secondly, a similar scenario had
occurred in which a local IT technician had been called in to clear the respective number of
PCs that had been affected in that particular scenario.
Hence, in regards to such situations it can be concluded that the existing network of
the company has no real time protective and safeguarding procedures against such potential
threats to the network and the end user devices that are connected to the network of the
company (Kang and Kang 2016). Hence, the following network security procedures can be
implemented into the upgraded network of the company to mitigate the potential threat that is
posed by such forms of viruses as well as unauthorized access from externally exiting
sources.
Antivirus Programs:
The HandMade Furniture company has no subscription to any form of antivirus
program that works centrally but is necessary for keeping the network free of any forms of
malware or virus that carry the potential capability to cause harm towards the devices
attached to the network.
Installation of a proper antivirus will allow the organization to keep every single end
user device secure and safeguarded from such existing threats that might cause harm to the
components of the network.
17HANDMADE FURNITURE NETWORK MANAGEMENT
Figure-14: McAfee Antivirus
(Source- Acemoglu, Malekian and Ozdaglar 2016)
For making the network secure along with the components of the network, McAfee
antivirus shall be installed into all the computers of the company both at the factory site as
well as at the office site. The antivirus will be subscribed on a centralized basis through
which every single workstation will be gaining the access to the particular antivirus (Baker
2018). With the help of this antivirus program the workstations will be protected from all
sorts of such threats that come in from the internet to affect the workstations of the
organization on a regular basis. The antivirus program will cost $53.98 for a year to the
company.
Behavioural Analytics:
Since, the network of the company will be connected to servers that will again be
connected directly to the internet provider through FTTC there is a high possible chance of
any existing threat getting into the network of the organization and affecting the same. Hence,
applications will be installed into the network that have the capability to detect any minor
changes behavioural wise that might be occurring in the network (Dlamini et al. 2017). On
detecting such behaviour, the application will take the necessary action to mitigate the entry
of such threats and cause damage to the normal working of the HandMade Furniture network.
Figure-14: McAfee Antivirus
(Source- Acemoglu, Malekian and Ozdaglar 2016)
For making the network secure along with the components of the network, McAfee
antivirus shall be installed into all the computers of the company both at the factory site as
well as at the office site. The antivirus will be subscribed on a centralized basis through
which every single workstation will be gaining the access to the particular antivirus (Baker
2018). With the help of this antivirus program the workstations will be protected from all
sorts of such threats that come in from the internet to affect the workstations of the
organization on a regular basis. The antivirus program will cost $53.98 for a year to the
company.
Behavioural Analytics:
Since, the network of the company will be connected to servers that will again be
connected directly to the internet provider through FTTC there is a high possible chance of
any existing threat getting into the network of the organization and affecting the same. Hence,
applications will be installed into the network that have the capability to detect any minor
changes behavioural wise that might be occurring in the network (Dlamini et al. 2017). On
detecting such behaviour, the application will take the necessary action to mitigate the entry
of such threats and cause damage to the normal working of the HandMade Furniture network.
18HANDMADE FURNITURE NETWORK MANAGEMENT
Data Loss Prevention (DLP):
The company’s network will be communicating various forms of information from
one department to the other department of the organization. Sensitive information can also be
communicated between the office site and the factory site or from both the sites to the newly
opened store in the shopping mall nearby.
Such conveying of information is to be kept secure and safe from unauthorized access
that can be made by any external sources. In this regard, the DLP technology will
continuously monitor over the information that is being transmitted and protect them from
leakage to such external sources existing to cause further damage (Costante et al. 2016). For
integrating this technology into the organization, $200,000 need to be incurred as the price of
this particular technology.
Figure-15: Data Loss Prevention technology
(Source- Costante et al. 2016)
Email Security:
HandMade Furniture has taken the decision to provision individual users with
individual email addresses through Microsoft Office 365 for communicating various forms of
information to different departments of the organization (Singh, Kumar and Singh 2019). As
Data Loss Prevention (DLP):
The company’s network will be communicating various forms of information from
one department to the other department of the organization. Sensitive information can also be
communicated between the office site and the factory site or from both the sites to the newly
opened store in the shopping mall nearby.
Such conveying of information is to be kept secure and safe from unauthorized access
that can be made by any external sources. In this regard, the DLP technology will
continuously monitor over the information that is being transmitted and protect them from
leakage to such external sources existing to cause further damage (Costante et al. 2016). For
integrating this technology into the organization, $200,000 need to be incurred as the price of
this particular technology.
Figure-15: Data Loss Prevention technology
(Source- Costante et al. 2016)
Email Security:
HandMade Furniture has taken the decision to provision individual users with
individual email addresses through Microsoft Office 365 for communicating various forms of
information to different departments of the organization (Singh, Kumar and Singh 2019). As
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
19HANDMADE FURNITURE NETWORK MANAGEMENT
a reason, there is the necessity of having an email security tool that will monitor over all the
existing email gateways that will be existing to monitor over all the emails that are sent as
well as received on a daily basis and protect them from any third parties that might be
potentially existing within the network to extract information.
Figure-16: Email Security
(Source- Singh, Kumar and Singh 2019)
Firewall:
Lastly, the HandMade Furniture network will have to implement a firewall that will
have a continuous monitoring over the incoming as well as the outgoing traffic that shall be
based upon a collective set of predefined rules (Voronkov, Martucci and Lindskog 2020).
This monitoring will have a specific control over all the incoming as well as the outgoing
traffic to maintain the security of the entry and the exit points safeguarding the components
belonging to the network.
a reason, there is the necessity of having an email security tool that will monitor over all the
existing email gateways that will be existing to monitor over all the emails that are sent as
well as received on a daily basis and protect them from any third parties that might be
potentially existing within the network to extract information.
Figure-16: Email Security
(Source- Singh, Kumar and Singh 2019)
Firewall:
Lastly, the HandMade Furniture network will have to implement a firewall that will
have a continuous monitoring over the incoming as well as the outgoing traffic that shall be
based upon a collective set of predefined rules (Voronkov, Martucci and Lindskog 2020).
This monitoring will have a specific control over all the incoming as well as the outgoing
traffic to maintain the security of the entry and the exit points safeguarding the components
belonging to the network.
20HANDMADE FURNITURE NETWORK MANAGEMENT
Figure-17: Firewall Security
(Source- Voronkov, Martucci and Lindskog 2020)
5. Network Design (New):
Figure-18: HandMade Furniture new network design
(Source- Created By Author)
Figure-17: Firewall Security
(Source- Voronkov, Martucci and Lindskog 2020)
5. Network Design (New):
Figure-18: HandMade Furniture new network design
(Source- Created By Author)
21HANDMADE FURNITURE NETWORK MANAGEMENT
6. Conclusion:
The HandMade Furniture is in possession of a network that has been identified to be
lacking in terms of security as well as functionality. Such as insufficient technologies and
outdated usage of software has been identified. In addition to this, no presence of antivirus
software and other forms of security such as firewall has been found missing. Hence, this
discussion covers a network management plan as well as a network security plan for
designing a new network with various forms of additional services and functionalities along
with making the entire working network secure and safeguarded against external sources and
viruses. This report also states the cost implications of the same along with benefit that will
be occurring after their successful integration into the network.
7. Recommendations:
In regards to the problems that existed within the previous network of the
organization, a number of recommendations have been made. Firstly, it is recommended for
the company to install latest versions of Windows operating system and Microsoft Office for
efficiency in work. Following this, implementation of cloud based services, email, FTTC
internet provider, cloud service management as well as Wi-Fi is necessary from increasing
the productivity of the employees. In addition to this, various forms of security towards the
network has been recommended such as antivirus programs, firewalls, DLP and email
security has been recommended to make the new network secure.
6. Conclusion:
The HandMade Furniture is in possession of a network that has been identified to be
lacking in terms of security as well as functionality. Such as insufficient technologies and
outdated usage of software has been identified. In addition to this, no presence of antivirus
software and other forms of security such as firewall has been found missing. Hence, this
discussion covers a network management plan as well as a network security plan for
designing a new network with various forms of additional services and functionalities along
with making the entire working network secure and safeguarded against external sources and
viruses. This report also states the cost implications of the same along with benefit that will
be occurring after their successful integration into the network.
7. Recommendations:
In regards to the problems that existed within the previous network of the
organization, a number of recommendations have been made. Firstly, it is recommended for
the company to install latest versions of Windows operating system and Microsoft Office for
efficiency in work. Following this, implementation of cloud based services, email, FTTC
internet provider, cloud service management as well as Wi-Fi is necessary from increasing
the productivity of the employees. In addition to this, various forms of security towards the
network has been recommended such as antivirus programs, firewalls, DLP and email
security has been recommended to make the new network secure.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
22HANDMADE FURNITURE NETWORK MANAGEMENT
8. References:
Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion.
Journal of Economic Theory, 166, pp.536-585.
Adams, G., 2018. Windows 10: A complete Windows 10 guide and user manual for
beginners!.
Adams, M., Ouyang, C., ter Hofstede, A.H. and Yu, Y., 2018, October. Design and
Performance Analysis of Load Balancing Strategies for Cloud-Based Business Process
Management Systems. In OTM Confederated International Conferences" On the Move to
Meaningful Internet Systems" (pp. 390-406). Springer, Cham.
Akpinar, K., Jafariakinabad, F., Hua, K.A., Nakhila, O., Ye, J. and Zou, C., 2017, November.
Fault-Tolerant Network-Server Architecture for Time-Critical Web Applications. In 2017
IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on
Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and
Computing and Cyber Science and Technology Congress
(DASC/PiCom/DataCom/CyberSciTech) (pp. 377-384). IEEE.
Baker, E., 2018. Evaluating the Necessity of Third-Party Antivirus Software.
Bhardwaj, A. and Goundar, S., 2017. Security challenges for cloud-based email
infrastructure. Network Security, 2017(11), pp.8-15.
Boland, N., Hewitt, M., Marshall, L. and Savelsbergh, M., 2017. The continuous-time service
network design problem. Operations research, 65(5), pp.1303-1321.
Ceselli, A., Premoli, M. and Secci, S., 2017. Mobile edge cloud network design optimization.
IEEE/ACM Transactions on Networking, 25(3), pp.1818-1831.
8. References:
Acemoglu, D., Malekian, A. and Ozdaglar, A., 2016. Network security and contagion.
Journal of Economic Theory, 166, pp.536-585.
Adams, G., 2018. Windows 10: A complete Windows 10 guide and user manual for
beginners!.
Adams, M., Ouyang, C., ter Hofstede, A.H. and Yu, Y., 2018, October. Design and
Performance Analysis of Load Balancing Strategies for Cloud-Based Business Process
Management Systems. In OTM Confederated International Conferences" On the Move to
Meaningful Internet Systems" (pp. 390-406). Springer, Cham.
Akpinar, K., Jafariakinabad, F., Hua, K.A., Nakhila, O., Ye, J. and Zou, C., 2017, November.
Fault-Tolerant Network-Server Architecture for Time-Critical Web Applications. In 2017
IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on
Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and
Computing and Cyber Science and Technology Congress
(DASC/PiCom/DataCom/CyberSciTech) (pp. 377-384). IEEE.
Baker, E., 2018. Evaluating the Necessity of Third-Party Antivirus Software.
Bhardwaj, A. and Goundar, S., 2017. Security challenges for cloud-based email
infrastructure. Network Security, 2017(11), pp.8-15.
Boland, N., Hewitt, M., Marshall, L. and Savelsbergh, M., 2017. The continuous-time service
network design problem. Operations research, 65(5), pp.1303-1321.
Ceselli, A., Premoli, M. and Secci, S., 2017. Mobile edge cloud network design optimization.
IEEE/ACM Transactions on Networking, 25(3), pp.1818-1831.
23HANDMADE FURNITURE NETWORK MANAGEMENT
Cioffi, J., Christopher, F., Bednarz, P., Tehrani, A.M., Cil, T. and Lan, K.E., Assia Spe LLC,
2020. Methods and apparatus for detecting internet connection problems. U.S. Patent
10,567,266.
Costante, E., Fauri, D., Etalle, S., Den Hartog, J. and Zannone, N., 2016, May. A hybrid
framework for data loss prevention and detection. In 2016 IEEE Security and Privacy
Workshops (SPW) (pp. 324-333). IEEE.
Dlamini, T.M., Eloff, J.H.P., Venter, H.S., Eloff, M.M., Henha Eyono, R.P.S. and Mosola,
N.N., 2017. Behavioural analytics: Beyond risk-based MFA.
Indu, I., Anand, P.R. and Bhaskar, V., 2018. Identity and access management in cloud
environment: Mechanisms and challenges. Engineering science and technology, an
international journal, 21(4), pp.574-588.
Jones, A., Shao, G. and Riddick, F., 2018, December. Enabling control system and cloud-
based simulation service interoperability. In 2018 Winter Simulation Conference (WSC) (pp.
703-714). IEEE.
Kang, M.J. and Kang, J.W., 2016. Intrusion detection system using deep neural network for
in-vehicle network security. PloS one, 11(6).
Kim, J.H. and Oak, S.S., Samsung Electronics Co Ltd, 2017. Pull printing method, apparatus
and system. U.S. Patent 9,612,777.
Kusaka, Y., Sugihara, K. and Ushijima, H., 2016. Push-pull process for contact defect-free
patterning in reverse offset printing. Flexible and Printed Electronics, 1(4), p.045004.
Learning, C.I. and Tutorial, D.L., 2017. Internet. Cochrane Interactive Learning [cited 1 Jun
2018].
Cioffi, J., Christopher, F., Bednarz, P., Tehrani, A.M., Cil, T. and Lan, K.E., Assia Spe LLC,
2020. Methods and apparatus for detecting internet connection problems. U.S. Patent
10,567,266.
Costante, E., Fauri, D., Etalle, S., Den Hartog, J. and Zannone, N., 2016, May. A hybrid
framework for data loss prevention and detection. In 2016 IEEE Security and Privacy
Workshops (SPW) (pp. 324-333). IEEE.
Dlamini, T.M., Eloff, J.H.P., Venter, H.S., Eloff, M.M., Henha Eyono, R.P.S. and Mosola,
N.N., 2017. Behavioural analytics: Beyond risk-based MFA.
Indu, I., Anand, P.R. and Bhaskar, V., 2018. Identity and access management in cloud
environment: Mechanisms and challenges. Engineering science and technology, an
international journal, 21(4), pp.574-588.
Jones, A., Shao, G. and Riddick, F., 2018, December. Enabling control system and cloud-
based simulation service interoperability. In 2018 Winter Simulation Conference (WSC) (pp.
703-714). IEEE.
Kang, M.J. and Kang, J.W., 2016. Intrusion detection system using deep neural network for
in-vehicle network security. PloS one, 11(6).
Kim, J.H. and Oak, S.S., Samsung Electronics Co Ltd, 2017. Pull printing method, apparatus
and system. U.S. Patent 9,612,777.
Kusaka, Y., Sugihara, K. and Ushijima, H., 2016. Push-pull process for contact defect-free
patterning in reverse offset printing. Flexible and Printed Electronics, 1(4), p.045004.
Learning, C.I. and Tutorial, D.L., 2017. Internet. Cochrane Interactive Learning [cited 1 Jun
2018].
24HANDMADE FURNITURE NETWORK MANAGEMENT
Lee Jr, J., Warkentin, M., Crossler, R.E. and Otondo, R.F., 2017. Implications of monitoring
mechanisms on bring your own device adoption. Journal of Computer Information Systems,
57(4), pp.309-318.
Nas, S., 2019. Data Protection Impact Assessment: Assessing the Risks of Using Microsoft
Office ProPlus. Eur. Data Prot. L. Rev., 5, p.107.
Oguma, T., Sato, M. and Sun, Z., Kyocera Document Solutions Inc, 2017. Pull printing
system including printing data transmitter that transmits pull printing data and storage
medium. U.S. Patent 9,686,426.
Park, P., Ergen, S.C., Fischione, C., Lu, C. and Johansson, K.H., 2017. Wireless network
design for control systems: A survey. IEEE Communications Surveys & Tutorials, 20(2),
pp.978-1013.
Singh, A.K., Kumar, V. and Singh, S.P., 2019, May. A Study on Email Security Through
Cryptographic Techniques. In International Conference on Computer Networks and
Inventive Communication Technologies (pp. 342-348). Springer, Cham.
Singh, N., 2017. Managing the Internet Connection Speed. Asian Journal of Research in
Social Sciences and Humanities, 7(8), pp.414-421.
Vargas, E.D. and Festifo, E.D., 2019. A Cloud-Based Enterprise Application for Coating and
Plating Industrial Technology Incorporated with Product Inventory Management and
Analysis. International Journal of Simulation--Systems, Science & Technology, 20.
Vasisht, D., Kumar, S. and Katabi, D., 2016. Decimeter-level localization with a single WiFi
access point. In 13th {USENIX} Symposium on Networked Systems Design and
Implementation ({NSDI} 16) (pp. 165-178).
Lee Jr, J., Warkentin, M., Crossler, R.E. and Otondo, R.F., 2017. Implications of monitoring
mechanisms on bring your own device adoption. Journal of Computer Information Systems,
57(4), pp.309-318.
Nas, S., 2019. Data Protection Impact Assessment: Assessing the Risks of Using Microsoft
Office ProPlus. Eur. Data Prot. L. Rev., 5, p.107.
Oguma, T., Sato, M. and Sun, Z., Kyocera Document Solutions Inc, 2017. Pull printing
system including printing data transmitter that transmits pull printing data and storage
medium. U.S. Patent 9,686,426.
Park, P., Ergen, S.C., Fischione, C., Lu, C. and Johansson, K.H., 2017. Wireless network
design for control systems: A survey. IEEE Communications Surveys & Tutorials, 20(2),
pp.978-1013.
Singh, A.K., Kumar, V. and Singh, S.P., 2019, May. A Study on Email Security Through
Cryptographic Techniques. In International Conference on Computer Networks and
Inventive Communication Technologies (pp. 342-348). Springer, Cham.
Singh, N., 2017. Managing the Internet Connection Speed. Asian Journal of Research in
Social Sciences and Humanities, 7(8), pp.414-421.
Vargas, E.D. and Festifo, E.D., 2019. A Cloud-Based Enterprise Application for Coating and
Plating Industrial Technology Incorporated with Product Inventory Management and
Analysis. International Journal of Simulation--Systems, Science & Technology, 20.
Vasisht, D., Kumar, S. and Katabi, D., 2016. Decimeter-level localization with a single WiFi
access point. In 13th {USENIX} Symposium on Networked Systems Design and
Implementation ({NSDI} 16) (pp. 165-178).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
25HANDMADE FURNITURE NETWORK MANAGEMENT
Voronkov, A., Martucci, L.A. and Lindskog, S., 2020. Measuring the usability of firewall
rule sets. IEEE Access, 8, pp.27106-27121.
Voronkov, A., Martucci, L.A. and Lindskog, S., 2020. Measuring the usability of firewall
rule sets. IEEE Access, 8, pp.27106-27121.
1 out of 26
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.