Case Study: VentraIP - IT Services, Network Devices, and Data Comm

Verified

Added on  2021/02/19

|9
|2838
|204
Case Study
AI Summary
This case study analyzes VentraIP, an Australian web hosting and domain name registrar, exploring its IT infrastructure and service offerings. The report details the company's services, including domains, hosting, email, VPS, and SSL certificates, and how each department utilizes information technology. It identifies and discusses network devices such as hubs, switches, bridges, and modems used for daily operations. The study specifies Slack as the application software for data communication between clients and servers, justifying its use based on ease of installation, cloud hosting, and features like data security and collaboration. Finally, it applies the seven layers of the OSI model to illustrate how an employee interacts with the company's website, detailing the function of each layer from the application layer to the physical layer. The conclusion summarizes the key findings regarding VentraIP's IT strategies.
Document Page
Case Study
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
1. Introduction to illustrate the services of organisation and the way in which each department
use information technology..........................................................................................................1
2. Identification and discussion on the network devices required to achieve the organisation
day by day activities with function of each device......................................................................2
3. Specification regarding application of software required for data communication between
the clients and servers for each department with justification.....................................................3
4. Application of seven layers OSI model...................................................................................4
CONCLUSION................................................................................................................................6
REFERENCES................................................................................................................................7
Document Page
INTRODUCTION
Information system can be defined as a technology which is used for communication
purposes by business entities. With the help of it different companies facilitate their clients to
interact with them in appropriate manner (Arkoprovo, Adarsa and Prakash, 2012). The
organisation which is selected for this report is VentraIP. It is mainly established in Australia and
it is one of the largest privately owned web host and domain name registrar. It was founded by
Angelo Giuffrida in year 2008. It provides different IS services such as email, webpage, data
storage etc. to the customers. This assignment covers various topics, illustration of organisation's
services, discussion of network devices, different application software required for data
communication between clients and services for each department etc. Along with seven layers of
OSI model are also discussed under this report.
MAIN BODY
1. Introduction to illustrate the services of organisation and the way in which each department
use information technology
VentraIP is one of the largest web host and domain service providing companies which
are established in Australia. There are various different types of services of it which are rendered
to the clients. Description of all of them is as follows:
ï‚· Domains: VentraIP is a domain registrar of Australia which provides services to clients
in which they can register them self at the website and make a domain for their business.
The organisation makes sure that all the customers get best quality work and also provide
24 by 7 technical support to them. With the help of it all the patronages of the company
can set a name for the business which can represent it properly (Boonstra, 2013).
ï‚· Hosting: The company also provides shared hosting of service to the customers. These
are mainly used to multitude websites but it cal also used for the purpose of hosting
different games, images, files and other data. Different technologies which are required
for a website is provided by VentraIP so that the information which are shared by
companies to their clients could be saved or stored. Two different types of hosting
services are provided by the enterprise, shared and reseller. First one is best suitable for
small businesses and second one if best for web developers and resellers (Chen, Chang
and Huang, 2014).
1
Document Page
ï‚· Email (Electronic Mail): It is an electronic media to share information from one
computer to another. In other words it could be defined as transmittance of data with the
help of communication networks. There are various clients of VentraIP which are using
this service of the company in order to maintain good relation with their customers and
interact with staff members in formal manner.
ï‚· VPS (Virtual Private Server): It is one of the major services which are rendered by
VentraIP to its customers so that the business entities can install the software which is
required by them. Two different VPA are offered by the organisation, fully and self
managed (Different services of VentraIP, 2019).
ï‚· SSL certificates: It is one of the main certificate for the companies as it helps to boost up
SEO ranking. With the help of it organisations can enhance traffic at their websites. Main
of VentraIP behind offering this service is to improve conversion rates of its customers.
There are various departments in VetraIP which are using technology in different ways.
All of them are as follows:
Research and development: In this department of VetraIP information technology is
used by staff members to analyse market situations so that modifications in existing services of
the organisation could be made. In order to be the first choice of clients it is vital for the
company to make alteration in its services according to market trends.
Finance and accounting: This division is mainly concerned with handling all the
monetary transactions of the company. This department of VetraIP is using information
technology to keep record of each and every in and outflow of funds with the help of software
such as Tally (Khormi and Kumar, 2014).
Human resource: All the employees who are working within the organisation are
recruited by this department. Information technology is used by HR division of VetraIP in the
form of job portals such as indeed which helps them to screen different candidates for the vacant
posts.
2. Identification and discussion on the network devices required to achieve the organisation day
by day activities with function of each device
In all the companies different network devices which are used by companies such as
VetraIP for the purpose of managing day by day activities. All of them which are used by the
organisations are described below along with their functions:
2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Hub: It is used by VetraIP to connect more than two computers together. It is considered
as the device which could be installed and controlled easily because it interconnects different
components which are related to LAN with indistinguishable protocols. Main function of a hub
device is to make the networking system to be ready for the process of formatting the
information. It could be used for multiple types of data whether it is analogue or digital.
Switch: This type of device is having more intelligent role in networking as compare to
hub. With the help of it employees which are working in VetraIP try to enhance efficiency of
network so that day by day activities could be performed appropriately. Main function of a
switch is to read address of a hardware so that incoming data could be transmitted to the right
destination (Lee and et.al., 2012).
Bridges: In VetraIp these networking devices are used for the purpose of connecting
more than two network segments or hosts together. With the help of it frames are stored and
forwarded between the hosts which are connected by it so that day by day activities could be
performed in a proper manner. Its function is to divide big networks in to smaller ones so that
flow of data could be managed appropriately (Different network devices, 2019).
Modems: These are used by VetraIP to transfer digital signals over analogue telephone
lines. With the help of it all such types of incitations are converted in linear ones. Its major
function is to facilitate the staff members of the company to perform day to day activities by
changing digital signals in to radio ones.
3. Specification regarding application of software required for data communication between the
clients and servers for each department with justification
There are various types of application software which are used by business entities for the
purpose of data communication. These are Jive, Slack, Skype, RingCentral etc. From all of them
currently Slack is used in VetraIP which is required for data communication between clients and
servers for each department. It is an application which gives platform for all the real time
messages, file sharing, searches and archiving (Slack, 2019). With the help of it all the queries of
customers could be resolved on messages and to enhance their satisfaction level.
Justification: It is used because the process of its installation and maintenance is very
simple. Another reason behind using it is that organisation do not require any professional
training for its use because it is fully cloud hosted. There are various features of it which attracts
companies such as VetraIP to use it for the purpose of data communication. These are data
3
Document Page
security, collaboration, messaging and its history, two factor authentication, synchronization, file
sharing, conversation channels, webhooks etc. All these characteristics shows that it is very
advantageous for the company to manage all the communication processes between clients and
servers for each department (Liang and et.al., 2012).
4. Application of seven layers OSI model
OSI (Open Systems Interconnection) model: It was developed by international
standards organisation to divide network communication in seven different layers. First four are
considered as lower and last three are reasoned as upper layers of the model. All of them have
specific jobs and at the end each one passes information to the next stage. With the help of it big
tasks are divided in to seven layers and complete them in to a proper manner (OSI Model, 2019).
All the seven layers of it are described below with the application of the model when an
employee visits the website of the company:
Ill
ustration 1: OSI Model, 2019
(Source: OSI Model, 2019)
Open Systems Interconnection Model
4
Document Page
Layer 7 (Application): When an employee of VetraIP visits the website of the organisation
then the user can elect to browse or transfer files, perform networking related activities and
read messages. It is the starting stage of the model in which user directly interacts with the web
browser and the site. It allows individuals to access the resources related to network
(Narayanaswamy, Grover and Henry, 2013).
Layer 6 (Presentation): At this stage the employee of VetraIP can translate, encrypt and
compresses the data while visiting the website. With the help of this layer user can handle
decryption and encryption which is required by the seventh stage.
Layer 5 (Session): At this stage the employee who is visiting the website of VetraIP can
manage, terminate and establish connection between different types of applications. This layer
mainly deals with relation and session coordination. For example, while visiting the website the
computer of employee is required to create a specific session with the main server of that
particular website.
Layer 4 (Transport): This layer is mainly responsible for the transfer of information across a
network also provides mechanism for checking errors and control the flow of data. While
accessing the website of VetraIP the employee can decide that what amount of information
should be sent at a time. It also facilitates the procedures of delivering messages and recovering
errors. At this stage employee can ensure complete and proper transportation of data (Sherman
and et.al., 2014).
Layer 3 (Network): At this level the employee who is visiting the website of the VetraIP can
determine the IP address and move packets to the destination from the source. With the help of
it inter networking could be acquired. All the devices such as routers are used at this stage.
There are various functions of this layer which includes packet sequencing, error handling,
routing, addressing inter networking, forwarding etc.
Layer 2 (Data link): At this layer of the model employee of VetraIP can encode or decode the
information in bits while visiting the website. It is divided in two different parts MAC and
LAC. Media access control is focused with the controlling of the way in which a computer gain
access on a network. Logical Link Control is concerned with synchronisation, cross checking
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
errors and controlling flow of data or frames (Yang and Yang, 2012).
Layer 1 (Physical): It is the last stage of this model in which transmission of the information
takes place with the help of a specific medium. It combines all the sources which are used to
connect computer together. While visiting the website of VetraIP the employee can experience
the physical representation of system (Yeh and Teng, 2012). These are cable, layout of pins,
radio frequency link voltages etc.
CONCLUSION
From the above project report it has been concluded that information system is a type of
communication technology which is used by business entities to interact with the clients so that
business processes could be supported. There are various services such as domain, hosting,
email, VPA, SSL certificates etc. which are offered by organisations so that all of them can
execute business operations in appropriate manner. The service providers use different
networking devices such as modem, hub etc. which are used by them to carry out day by day
activities. In such organisations data communication is one of the main operations and for this
purpose different application software such as Jive, Slack, Skype, RingCentral etc. could be
used. While visiting a website an individual can follow the layers of OSI which can guide them
to operate it step by step.
6
Document Page
REFERENCES
Books and Journals:
Arkoprovo, B., Adarsa, J. and Prakash, S. S., 2012. Delineation of groundwater potential zones
using satellite remote sensing and geographic information system techniques: a case
study from Ganjam district, Orissa, India.
Boonstra, A., 2013. How do top managers support strategic information system projects and why
do they sometimes withhold this support?. International Journal of Project
Management. 31(4). pp.498-512.
Chen, C. Y., Chang, B. R. and Huang, P. S., 2014. Multimedia augmented reality information
system for museum guidance. Personal and ubiquitous computing. 18(2). pp.315-322.
Khormi, H. M. and Kumar, L., 2014. Climate change and the potential global distribution of
Aedes aegypti: spatial modelling using geographical information system and
CLIMEX. Geospatial health, pp.405-415.
Lee, S., and et.al., 2012. Regional groundwater productivity potential mapping using a
geographic information system (GIS) based artificial neural network
model. Hydrogeology Journal. 20(8). pp.1511-1527.
Liang, T. P., and et.al., 2012. The impact of value diversity on information system development
projects. International Journal of Project Management. 30(6). pp.731-739.
Narayanaswamy, R., Grover, V. and Henry, R. M., 2013. The impact of influence tactics in
information system development projects: A control-loss perspective. Journal of
Management Information Systems. 30(1). pp.191-226.
Sherman, G. G., and et.al., 2014. Laboratory information system data demonstrate successful
implementation of the prevention of motherto-child transmission programme in South
Africa. South African medical journal. 104(3). pp.235-238.
Yang, X. and Yang, J., 2012. Multigranulation rough sets in incomplete information system.
In Incomplete Information System and Rough Set Theory (pp. 195-222). Springer,
Berlin, Heidelberg.
Yeh, R. K. J. and Teng, J. T., 2012. Extended conceptualisation of perceived usefulness:
empirical test in the context of information system use continuance. Behaviour &
Information Technology. 31(5). pp.525-540.
Online
Different services of VentraIP. 2019. [Online]. Available through:
<https://ventraip.com.au/>
Different network devices. 2019. [Online]. Available through:
<https://blog.netwrix.com/2019/01/08/network-devices-explained/>
OSI Model. 2019. [Online]. Available through:
<https://www.networkworld.com/article/3239677/the-osi-model-explained-how-to-
understand-and-remember-the-7-layer-network-model.html>
Slack. 2019. [Online]. Available through:
<https://reviews.financesonline.com/p/slack/>
7
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]