Memorandum: Addressing IT and Network Problems at ABC Private Ltd.
VerifiedAdded on  2020/04/21
|6
|1024
|58
Report
AI Summary
This memorandum presents a research project addressing IT and network issues at ABC Private Ltd., a medium-sized IT solutions provider. The report identifies critical problems, including wireless connection difficulties, slow application response, lack of centralized management, slow internet speed, and security vulnerabilities related to BYOD devices. The proposed solutions include virtualization, outsourcing network management, wireless monitoring tools, packet analyzers, automated backups, regular performance tests, BYOD device monitoring, strong security protocols, employee training, equipment updates, anti-virus software, firewalls, and BYOD policies. The report highlights the benefits of these solutions, such as improved productivity, efficiency, higher profits, and increased customer satisfaction, supported by a Gantt chart and a comprehensive bibliography. The report aims to provide practical recommendations to enhance the company's IT infrastructure and security posture.

Writing Memorandum
Name of the Student
Name of the University
Author’s note
Name of the Student
Name of the University
Author’s note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

To: [Please insert professor’s name and designation]
From: [Please enter your name]
Date: 06.11.2017
Subject: Addressing the IT and network issues in ABC Private Ltd.
I am writing this memorandum to present my final project topic for research that will meet your
expectations. This memorandum will address the issues present in the network infrastructure and
IT system of the ABC Private Ltd. Company. I have faced several network related problems and
discovered certain IT security issues while working in this company. I am writing this
memorandum to propose certain solutions to overcome the identified limitations of the company.
Problems
ABC Private Ltd. is a medium sized organization that provides IT solutions. This company has
200 devices that need to be managed and there are two people who manage the internal network.
They are not dependent on any vendor. There are several networking and IT related issues that
exist in the company. They are as follows:
Wireless connection issues: It has been seen that most of the wireless devices of the employees
are unable to get connected to the Wi-Fi. These devices are unable to detect the access points.
The reasons behind this problem are channel interference and dead spots. This is a major issue
that causes delay in the operations.
Application response issues: It has been seen that the company has encountered slow application
response. High usage of bandwidth can be one of the possible reasons behind this issue. The
application generally freezes or halts at the time of data access.
From: [Please enter your name]
Date: 06.11.2017
Subject: Addressing the IT and network issues in ABC Private Ltd.
I am writing this memorandum to present my final project topic for research that will meet your
expectations. This memorandum will address the issues present in the network infrastructure and
IT system of the ABC Private Ltd. Company. I have faced several network related problems and
discovered certain IT security issues while working in this company. I am writing this
memorandum to propose certain solutions to overcome the identified limitations of the company.
Problems
ABC Private Ltd. is a medium sized organization that provides IT solutions. This company has
200 devices that need to be managed and there are two people who manage the internal network.
They are not dependent on any vendor. There are several networking and IT related issues that
exist in the company. They are as follows:
Wireless connection issues: It has been seen that most of the wireless devices of the employees
are unable to get connected to the Wi-Fi. These devices are unable to detect the access points.
The reasons behind this problem are channel interference and dead spots. This is a major issue
that causes delay in the operations.
Application response issues: It has been seen that the company has encountered slow application
response. High usage of bandwidth can be one of the possible reasons behind this issue. The
application generally freezes or halts at the time of data access.

Lack of centralized management: This Company uses conventional approach to manage the
network. Therefore, tracking configuration changes, updates and carrying out every management
task individually will be time consuming as well as repetitive.
Internet speed: It has been seen that the speed of the internet is slow. The employees face
difficulty in carrying out their work because of the slow speed of the internet connection. This
affects the productivity of the business.
Security issues: I have found out that there are security issues related to the BYOD devices in
the organization. The employees use their mobile devices to carry out certain tasks. This leads to
flexibility and improves the work quality. The loopholes in these devices can allow attackers to
hack the sensitive documents of the business. This company uses outdated equipments that can
cause data or security breach and corrupt the important documents.
Proposed Solutions and Benefits
The company has two people for managing its internal network. Virtualization solutions can be
used by the company for managing the network and server infrastructure from within the
company and even from a remote location. The contract for network management should be
given to an experienced service provider. This will save the time of the company and improve its
productivity as the change, compliance management and configuration services will be provided
by the vendor.
Wireless monitoring tools can be adopted by the company for measuring signal strength. This
will be able to solve the wireless connection issues. Use of packet analyzer equipped along with
simple counters can be used for overcoming the problem of slow application response.
Automating the backup process will help to save employee time and will improve the
network. Therefore, tracking configuration changes, updates and carrying out every management
task individually will be time consuming as well as repetitive.
Internet speed: It has been seen that the speed of the internet is slow. The employees face
difficulty in carrying out their work because of the slow speed of the internet connection. This
affects the productivity of the business.
Security issues: I have found out that there are security issues related to the BYOD devices in
the organization. The employees use their mobile devices to carry out certain tasks. This leads to
flexibility and improves the work quality. The loopholes in these devices can allow attackers to
hack the sensitive documents of the business. This company uses outdated equipments that can
cause data or security breach and corrupt the important documents.
Proposed Solutions and Benefits
The company has two people for managing its internal network. Virtualization solutions can be
used by the company for managing the network and server infrastructure from within the
company and even from a remote location. The contract for network management should be
given to an experienced service provider. This will save the time of the company and improve its
productivity as the change, compliance management and configuration services will be provided
by the vendor.
Wireless monitoring tools can be adopted by the company for measuring signal strength. This
will be able to solve the wireless connection issues. Use of packet analyzer equipped along with
simple counters can be used for overcoming the problem of slow application response.
Automating the backup process will help to save employee time and will improve the
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

performance of the server and systems. Regular performance test can be done for improving the
internet connectivity. Monitoring the BYOD devices will help the company to improve its
operational efficiency and productivity.
Strong security principles and protocols can be incorporated to overcome security threats and
risks. Employee must be trained to maintain the security policy of the company and also so that
they understand the need for security measure. The existing equipments must be surveyed and
updated on a regular basis. The systems can install Anti-Virus programs for preventing any virus
attack. The company must implement firewall so that there is no external intrusion. The
company must incorporate BYOD policies for providing standardized security protocols. The
company must dictate how and when the employees can access sensitive data of the company
from their personal devices.
Gantt chart
Figure 1: Representing the Gantt chart of the research proposal
internet connectivity. Monitoring the BYOD devices will help the company to improve its
operational efficiency and productivity.
Strong security principles and protocols can be incorporated to overcome security threats and
risks. Employee must be trained to maintain the security policy of the company and also so that
they understand the need for security measure. The existing equipments must be surveyed and
updated on a regular basis. The systems can install Anti-Virus programs for preventing any virus
attack. The company must implement firewall so that there is no external intrusion. The
company must incorporate BYOD policies for providing standardized security protocols. The
company must dictate how and when the employees can access sensitive data of the company
from their personal devices.
Gantt chart
Figure 1: Representing the Gantt chart of the research proposal
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

It can be said that ABC Private Ltd. can overcome its weaknesses in the IT and network
infrastructure by automating the monitoring and backup procedure and also by implementing a
strong security policy in the organization. Proper policy implementation will improve the
productivity and efficiency of the company. This will generate higher profits and increase
customer satisfaction level.
infrastructure by automating the monitoring and backup procedure and also by implementing a
strong security policy in the organization. Proper policy implementation will improve the
productivity and efficiency of the company. This will generate higher profits and increase
customer satisfaction level.

Bibliography
Eslahi, Meisam, et al. "BYOD: Current state and security challenges." Computer Applications
and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on. IEEE, 2014.
Kumkar, Vishal, et al. "Vulnerabilities of Wireless Security protocols (WEP and
WPA2)." International Journal of Advanced Research in Computer Engineering & Technology
(IJARCET) 1.2 (2012): pp-34.
Liang, Chengchao, and F. Richard Yu. "Wireless network virtualization: A survey, some
research issues and challenges." IEEE Communications Surveys & Tutorials 17.1 (2015): 358-
380.
Miller, Keith W., Jeffrey Voas, and George F. Hurlburt. "BYOD: Security and privacy
considerations." It Professional 14.5 (2012): 53-55.
Othman, Mohd Fauzi, and Khairunnisa Shazali. "Wireless sensor network applications: A study
in environment monitoring system." Procedia Engineering 41 (2012): 1204-1210.
Suh, Michelle, et al. "Building firewall over the software-defined network controller." Advanced
Communication Technology (ICACT), 2014 16th International Conference on. IEEE, 2014.
Eslahi, Meisam, et al. "BYOD: Current state and security challenges." Computer Applications
and Industrial Electronics (ISCAIE), 2014 IEEE Symposium on. IEEE, 2014.
Kumkar, Vishal, et al. "Vulnerabilities of Wireless Security protocols (WEP and
WPA2)." International Journal of Advanced Research in Computer Engineering & Technology
(IJARCET) 1.2 (2012): pp-34.
Liang, Chengchao, and F. Richard Yu. "Wireless network virtualization: A survey, some
research issues and challenges." IEEE Communications Surveys & Tutorials 17.1 (2015): 358-
380.
Miller, Keith W., Jeffrey Voas, and George F. Hurlburt. "BYOD: Security and privacy
considerations." It Professional 14.5 (2012): 53-55.
Othman, Mohd Fauzi, and Khairunnisa Shazali. "Wireless sensor network applications: A study
in environment monitoring system." Procedia Engineering 41 (2012): 1204-1210.
Suh, Michelle, et al. "Building firewall over the software-defined network controller." Advanced
Communication Technology (ICACT), 2014 16th International Conference on. IEEE, 2014.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.