Hardware Technology Options for Organizations: A Detailed Report

Verified

Added on  2021/04/19

|19
|3178
|55
Report
AI Summary
This report analyzes various hardware technology options for organizations, starting with proposed IT solutions for two companies: ABC Fashion Private Limited, which is recommended Big Data analytics using Hadoop, and Aura InfoTech solutions, which is recommended cloud services. The report then delves into the economic advantages of voice/data integration, VOIP overview and working principles, benefits of VOIP, self-configuring ADSL, and next-generation networks (NGN). It also covers architectural changes for NGN, IEEE 802.11 physical and data rate specifications, ad-hoc and infrastructure modes, SSID and its effect on security, access control lists, WEP, methods of collecting information, and the meaning of key terms like quantitative and qualitative research, key verifying, secondary research, validation, and Boolean operators. The report also discusses different types of data analysis, the importance of data analysis, exploratory, descriptive, and causal research, and techniques to ensure research validity.
Document Page
Running head: HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
1.Company name:
ABC fashion private Limited
Proposed IT solution:
Based on the requirements of the proposed business structure the IT solution
recommended is Big Data analytics.
Big Data analytics:
When it comes to big data analytics, Hadoop is an excellent choice for the affordability and
versatility. Hadoop is a software framework that is used to store data and run applications on
clusters provided by commodity hardware.
Hardware and software specifications for Hadoop:
Hardware requirements:
Resources Medium High End
CPU 8 physical cores 12 physical cores
Memory 16 GB 48 GB
Disk 4 disks x 1TB = 4 TB 12 disks x 3TB = 36 TB
Network 1 GB Ethernet 10 GB Ethernet
Software specifications:
Operating system:
Following are the Linux based operating system for Hadoop:
Document Page
2
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
RedHat Enterprise Linux (RHEL)
CentOS
Ubuntu
Java:
Hadoop is witten using Java. Oracle JDK 1.6 is most popular version of java platform for
Hadoop.
Benefits of big data:
Cost effective data analysis when affordable frameworks like Hadoop is used.
Big amount of data can be analyzed in quick time
Insight from the data to design and predict effective marketing strategy for better
business and customer serving.
Threats of big data:
Problem in data management due to huge of data processing
Risk of getting flaws in result due to misunderstanding and misinterpretation of data
Risk of data hack
Document Page
3
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
Cost estimation:
Area of cost Estimated cost per month
Database storage of 3 TB per month
based on leading platforms
$134,000
Developers and eight data scientist
to analyze data
$800,000
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
2.Company name: Aura InfoTech solutions
Proposed IT solution:
Based on the requirements of the proposed business structure the IT solution
recommended is cloud services.
Cloud services:
Hardware requirement:
x64 platform with AMD-V/VT-x hardware virtualization support enabled (Centos
5 or 6)
Quad Core 2Ghz+ CPU
8GB+ RAM
3x Gig network interface cards
30 GB of free disk space
Software requirement:
Ubuntu 14.04.02 LTS- Operating system for server and VMs
Contrail 2.21 with OpenStack (Icehouse), or VMware ESXi Version 5.5.0- Hypervisor on
Contrail Service Orchestration node
Additional software - Secure File Transfer Protocol (SFTP)
Document Page
5
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
Benefits of cloud service:
More data security
More data storage
Energy efficient hardware for advanced computing
Drawbacks of cloud services:
Threat of data theft
Capacity of storage depends on bandwidth allowance
Huge power requirement for running remote data server which increase the cost
for service provider.
Cost estimation:
Cloud server provider Estimated cost per month
Amazon EC2 $53,29
OpSource Server $74,46
Rackspace Server $55,48
GoGrid Server $52,56
Document Page
6
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
1.Economic advantages does Voice / Data integration:
The integration of voice and data communication over the internet has numerous benefits
for the business. Due to voice and data integration, organization these days does not need
separate experts to manage the telephone and data network as phones which support Voice over
Internet Protocol (VoIP) can operate on the data network (Singh et al. 2014). This helps to
reduce the cost for the organization by reducing the cost of employment, infrastructure and
system maintenance.
2. VOIP overview and working principle:
VOIP or voice over IP is the transmission technique where the voice as well as
multimedia content can be transmitted on the same network by using the internet protocol or IP.
The audio is first encapsulated into data packets using codecs and the data packet is then
sent over the IP network (Amir et al. 2014). The device at the other end of the connection
decodes this packet back into audio to extract the message. The network does not need the
traditional circuit switched network for voice communication and this reduces the complexity of
network significantly.
3. Benefits of VOIP other than the economical factors:
Apart from the cost, there are several other factors, which make the VOIP service
attractive for the business solutions. VOIP offers excellent call quality compared to the
traditional telephone service. VOIP enabled handsets can handle both the voice and data
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
communication. VOIP makes communication secure with advanced encryption technology and
this feature is must for business communication (Devi et al.2014).
4. Self-configuring ADSL:
ADSL refers to Asymmetric Digital Subscriber Line. It is a broadband communication
technology used for internet connection. It supports higher rate of data transmission (upstream
16 to 640 Kbps and downstream 1.5 to 9 Mbps) using the same standard copper telephones line
as compared to the data transmission rate supported by the standard modem lines (Bachy et al.
2015).
5. Next generation networks:
The term next generation network refers to the changes and modification to the
architecture of standard telecommunication networks. Next generation networks are designed
using the internet protocol (Liang and Yu 2015). Hence, the term IP network is often used to
describe the particular type of networks. The networks support both voice and data
communication.
6. Architectural changes for the NGN:
The next generation network or the NGN has brought major changes to the architecture
and design principle of core telecommunication network.
NGN has integrated different transport network, previously designed for different
services into one core transport network. The network is often built on Internet protocol (IP) and
sometimes Ethernet is also used for this purpose (Liang and Yu 2015). The circuit switched
Document Page
8
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
network that was previously used in public switched telephone network for voice transmission
has been integrated in the new design with the internet service network to support Voice over
Internet protocol or commonly known as VOIP. This integration has eliminated the need of
separate voice and data network.
7. IEEE 802.11 three physical and max data rate specifications:
Physical layer Max data rate
Diffuse infrared
1 Mbit/s
Frequency-hopping spread
spectrum
1 Mbit/s or 2 Mbit/s
Direct-sequence spread
spectrum
1 Mbit/s or 2 Mbit/s
Document Page
9
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
8. Ad-hoc mode:
Ad hoc mode is Wi-Fi wireless network technology. One of the prime benefits of using
ad hoc mode is that it does not require any central wireless router to operate. This makes the
infrastructure less complex and easy to maintain. The reduction in the network complexity means
cost reduction. However, there are certain limitation and drawbacks regarding the technology,
which needs to be considered before adopting the ad hoc solution for wireless internet
connection (Akyildiz 2018). The devices used in the ad hoc network offers very limited security
options against the unauthorized connection. the speed of the network is also slower than
infrastructure mode and max speed is 11Mbps.
9. Infrastructure mode of 802.11:
Infrastructure mode refers to 802.11 networking framework. In order to create a
communication between two devices in the network, the devices first need to go through an
access point or AP. The communication can be with a device or a wired network and for this
feature infrastructure mode is very popular in wireless LANs (Huang et al. 2015)
10. SSID and its effect on security:
SSID refers to service set identifier. It is a primary name that is used to identify a
wireless network that follows the 802.11 standard.
SSID is just a network name and it is not a password for the network. The primary use of
SSID is to distinguish a wireless network, so that it can be easily identified in presence of other
wireless network within a short range and for this reason, hiding the SSID has no effect on the
network security (Aziz, Razak and Ghani 2017).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
11. Access Control List and wireless security:
Access control list is a set of rules that is used to filter the packets that come through a
network. The packets are filtered on basis of various factors like source, destination and protocol
(Chate and Chirchi 2015). Based on the inspections, the packets are either allowed to pass
through the network or denied completely. Although firewalls plays an important role in making
network secure, but the addition of list to the network makes the network even more secured as
firewall itself cannot ensure effective network security.
12. Working principle of WEP:
WEP or Wired Equivalent Privacy is network protocol standard that is used to make Wi-
Fi or other 802.11 wireless networks more secured.
In order to make the network secure WEP combines the key values generated by the
users with the system generated key values for data encryption (Wright and Cache 2015). When
used in the Wi-Fi connection the incoming data packets is encrypted so that it is only machine-
readable. Previously WEP supported 64-bit encryption, which has been now increased to 128-bit
encryption for added security
13. Four different methods of collecting information:
These are the four different method of data collection (Matthews and Ross 2014 ) :
Interviews.
Questionnaires and Surveys.
Observations.
Documents or records
Document Page
11
HARDWARE TECHNOLOGY OPTIONS FOR ORGANIZATIONS
14. Meaning of the following terms:
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]