Featured Post

Juvenile justice Thesis Example | Topics and Well Written Essays - 3250 words

Adolescent equity - Thesis Example It is unequivocally felt that the best foundations that could attempt kid or adolescent wrongdoers sho...

Monday, December 9, 2019

System Network Design for Harriet’s Fruit & Chocolate Company Click

Question: Describe about the System Network Design for Harriets Fruit and Chocolate Company. Answer: Design Scenario To ship gift baskets of home-grown pears and peaches to customers residing in the United States, Harriets Fruit and Chocolate Company was created in the Pacific Northwest located in the United States in 1935. For gift baskets, the company started to make baked goods and chocolates. Over the years it has expanded a lot to become one of the largest enterprises in the Pacific Northwest. Harriets descendants who recently identified the need to report immediately when fruits should be plucked and kept in close storage the moment it starts to ripen. The need to access inventory data for the cold storage and the fruits in the orchards has been identified by the marketing department employees. For the web employees to correctly specify the availability of products, data needs to be into e-commerce applications. An ambitious programmer was hired by the company who is not sure of her knowledge in DB2, SQL, and SAS programming for designing reporting applications for the senior management. The programmer would call every day to convey innovative ideas on what she can achieve if the network is upgraded for her to access current data on cold storage buildings and orchards. A network designer is tasked with choosing network technologies to connect the cold storage buildings and orchards. A printer and one or two standalone PCs are part of the shack in each of the six orchards. The cold storage buildings which are large warehouses are three in number and contain printers and few standalone PCs. The network designer has been suggested by the local telephone company to lease T1 links which give speeds of 1.544 Mbps, but these links are costly and are beyond the budget of the network designer. The network designer has considered wireless technologies but then he has heard that RF signal or Wireless Radio frequency signal can affect trees that are full-grown and are leafy and tall. The network designer also heard that ice hazards are possible in cold storage buildings, but the network designer is quite determined not to let these problems deter him from chalking out a solution. The company wants to know the investigation the network designer will carry out in regards to the physical infrastructure of the cold storage buildings, orchard shacks, and the orchards. The network designer responds that he will investigate whether the building has a proper heating system, checking for leakage and cracks along the walls (Iyengar, 2015). He will also note the available space of the buildings for devices to be installed and the distance to be maintained between each device (Pollack, 2015). Harriets Fruit and Chocolate Company asks the network designer to come up with business objectives and to mention the constraints that might affect the goals. The business goals as stated by the network designer are new technology, e-commerce, and access within the proper time. The goals might be affected by budget and time constraints (Wang, Meng Yang, 2013). Harriets Fruit and Chocolate Company has told the network designer to specify the technical goals for the company. What are the trade-offs he needs to make to achieve the goals? The technical goals as mentioned by him are adaptability, usability, and scalability. Trade-offs that are to be made to meet these targets are affordability and security (Susarapu, 2012). Will the need of the applications be completed if the low delay is supported by a wireless solution? The answer needs to be defended. The network designer responds that access points can be installed on polls through which orchards can be overlooked and at places where the interference in the building is quite less (Pera Dayanandan, 2013). During the designing phase of network upgrade, what are the security concerns that can come up? The concerns that can come up during designing the network upgrade are physical security and data security of electronic computing devices. It can be prevented by a properly locked room and secure passwords (Kim Solomon, 2013). Considering a length 1000 bytes for an inventory packet to spread over a link of 5000 km distance, with 2.5 x 108 m/s propagation speed and 1 Mbps transmission rate, how long are the transmission and propagation delay? In general, how long it takes for a packet of length L to spread of a link of d distance, transmission rate R bps, and propagation speed "s"? Does packet length contribute to delay? Is transmission rate independent of the delay? Here R = 1 Mbps, s = 2.5 x 108 m/s, d = 5000 km and L = 1000 bytes. After formulating those values, propagation delay will be 20ms and transmission delay will be 8ms. Propagation delay is independent of transmission rate and packet length. Transmission delay is independent of link length and link speed. References Iyengar, R. S., Sekhar, C., Karimabad, A. S., Haghighat, F., Zhu, K. (2015). A Comparative Study of Leakage Characteristics between an Under Floor Air Distribution System and an Over Head Air Distribution System.International Journal of Ventilation,14(1), 1-10. Kim, D., Solomon, M. G. (2013).Fundamentals of information systems security. Jones Bartlett Publishers. Pera, R. J., Dayanandan, S. (2013).U.S. Patent No. 8,400,997. Washington, DC: U.S. Patent and Trademark Office. Pollack, R. W. (2015).U.S. Patent Application No. 14/731,103. Susarapu, S. R. (2012). Aligning security and usability objectives for computer based information systems. Wang, S., Meng, Q., Yang, H. (2013). Global optimization methods for the discrete network design problem.Transportation Research Part B: Methodological,50, 42-60.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.