StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A Network Solution for Alpha Omega Technical Industries - Case Study Example

Cite this document
Summary
This essay analyzes that the network will serve millions of users with the desire to access any of the file systems related to storage affairs. Business customers will also have the opportunity to use the network as a gadget for storing and even retrieving information regarding company products…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
A Network Solution for Alpha Omega Technical Industries
Read Text Preview

Extract of sample "A Network Solution for Alpha Omega Technical Industries"

A Network Solution for Alpha Omega Technical Industries The Setup A Network Solution that meets the demands on the vertical growth of Alpha Omega Technical Industries across the globe. It is a design for worldwide distributed file system covering many areas including operations in Florida, Miami, Rio de Janeiro in Brazil, Frankfurt IN Germany, Dubai in the United Arab Emirates, as well as Shanghai in China.The network will serve millions of users with the potential and desire to access any of the file systems related to storage affairs. Business customers will also have the opportunity to use the network as a gadget for storing and even retrieving information regarding company products. The network will guarantee particular degrees of performance, security, and availability in the process of satisfying client needs(Rangan, 1987). The network will link computers with a broad spectrum of performance that will also run various operating systems. In future, the performance of networks will vary from one area to other depending on the speed of communication lines such as installation of fibre optic cables. The new system will give room to the user to apply knowledge regarding versatility of the network with limited inquiries from all the people accessing the system. The network puts into consideration the fact that the clientele base is heterogeneous as it covers more than three continents. The network will also remain different in power covering desk tops, personal computers, as well as large mainframes. The services provided by the new network will be simple but with enormous abilities to satisfy the complex nature of clients served by the business.The software and hardware system entailed in the network is heterogeneous enough to link the administration of the company to the rest of the staffs within the stores department. The network will cross many countries and several continents. As opposed to other systems, each portion of the network in each country will fall under a single management unit although it an agent will handle the same where necessary. Appointed agents areimportant for economic and security reasons in certain countries.The surety concerning privacy of files will be the responsibility of independent subnets where they serve in their countries. Assumed Facilities The network covering storage file servers will base on RPC communications as well as transactional file serves. The function of file servers will be keeping unstructured files where every file remains logical and the storage pattern assumes a specific sequence containing data bytes. The file servers will also isolate files exceptionally, and in the process carry out file operations among them writing and reading. It will also be a function of file servers to give room to various operations on many files kept in various servers waiting for transactional guarantees to allow performance including atomicity and serializability.On the other hand, RPC communication channels allow transmission of only reliable typed or structured information(Walker, 2004). With RPC communication, a user can perform operations using two machines. However, it is not possible to give assurances on performances.Technically, every server machine and customer workstation contains an only one of its kind identifier specific across the globe. It is not automatic that people can read the identifier. The network will make various assumptions among them each server and computer unithave hardware embeddings gadgets with the potential to function in security procedures. The system will have adequate ways of generating private-key and public-key pairs applied by security networks on demand. Necessary Features The company expects the networkto offer its customers with severalof the operations as well as assurances expected from a single-machine file network.Particular features provided by the network correspond to extensions to the old file systems relevant to the new network settings.Files in the new storage system will contain encrypted references to corresponding files(Birrel, 2000). One option of making the files active will be through the application of triggers. These are programs that the user will invoke using other operations.As examples, users will be required to check among remote distribution files and automatic compilation files where some will be stored. The files will contain specific names that will apply as labels that will also remain independent to the location of the user. They will also be independent of their replica numbers. This will help in offering support and extend shelter to the people using the network from complexities that come with the distributed file network. Customers accessing the system will also outline files containing descriptive names that permit the access of files based on content. We will design the security framework of the system in a manner that will allow every organization in all the regions including overseas centres gain autonomous management powers regarding the security of their individual files(Taylor, 2005). It will be easy to revoke or grant the rights of particular groups and users while they carry out their daily or selected operations. Nonetheless, the security network will give a flat-rate way of validating those allowed to use the system and in the process ensure the privacy operations as well as data from non-authorized personnel. The software and hardware system within the network is heterogeneous enough to link the administration of the company to the rest of the staffs within the stores department. The network will cross many countries and several continents. Choices will come out within the file system concerning the significance of performance as well as availability of the consistency of files common across the board. The network will have five significant components including a name service, a group of file server ancients, a security framework, a service covering replication, and a way of triggering the system into action. The network considers various fact among them the fact that the clientele base is heterogeneous as it covers more than three continents. The network will also remain different in power covering desk tops, personal computers, as well as large mainframes. The services provided by the new network will be simple but with enormous abilities to satisfy the complex nature of clients served by the business. The components remain very different from each other. A case in point is the naming service does not relate with understanding of the storage of replica files besides evaluating data as much as it stores the information regarding the site of replication servers in addition to the activities available to customers(Terry,1985).The independence of the components sets the new network apart from other systems and traditional methods of data storage in the stores departments.The current networks do not have independence among its components. Furthermore, the independent subsystems are assumed toavail themselves without provision. References Birrel D. (2000).A Universal file server.IEEE Transactions of software engineering, pp. 450-453. Rangan P. (1987). Security & Trust Relationships in Large Distributed Systems. Oxford: Oxford University Press. Taylor B. (2005). Secure Networking in the Sun Environment. Proceedings from the USENIX Summer Conference, pp. 28-37. Terry D. (1985). The Berkeley Internet Domain Server.Journal of UNISEX SummerConference, pp. 23-31. Walker B. (2004). The LOCUS Distributed Operating System. An Operating system review journal, Vol17(5), pp. 49-70. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“A Network Solution for Alpha Omega Technical Industries Case Study”, n.d.)
A Network Solution for Alpha Omega Technical Industries Case Study. Retrieved from https://studentshare.org/information-technology/1653277-network-case-study
(A Network Solution for Alpha Omega Technical Industries Case Study)
A Network Solution for Alpha Omega Technical Industries Case Study. https://studentshare.org/information-technology/1653277-network-case-study.
“A Network Solution for Alpha Omega Technical Industries Case Study”, n.d. https://studentshare.org/information-technology/1653277-network-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Network Solution for Alpha Omega Technical Industries

TECHNICAL REPORT & LOG BOOK

The main purpose and technical areas of expertise of this unit would be introduce the usage of new green materials of construction and then provide sustainable construction processes and pathways.... alpha Construction Ltd 3.... alpha Construction Ltd There are mainly two reasons for selecting alpha Construction, which makes it's an important representative example of an organization which fits into construction industry.... Firstly alpha construction is an ideal example for a SME, Civil Engineering and Building Contractor whose range of contracts value from ?...
4 Pages (1000 words) Essay

Alpha Omega Industries

Providing A Network Solution for Alpha Omega Technical Industries Name: Tutor: Course: Date: In order for Alpha Omega industries to solve its global expansion problem, I recommend that the company make certain drastic measures to its current infrastructure and network, starting from its Los Angeles headquarters moving outwards.... The most appropriate public cloud storage facility for alpha omega Technologies industries would be Amazon Simple Storage facility (Amazon s3)....
6 Pages (1500 words) Case Study

Evolution Of Global Cultural Industries

This essay discusses the evolution of global cultural industries and especially analyzes global cultural economy, that is characterised principally by sectors such as high-technology manufacturing, neo-artisanal customer goods and various services of organisational shape.... The researcher of this essay states that one of the most imperative segments of global cultural economy discussed embraces a collection of industries, that can be insecurely notorious as purveyors of cultural products....
8 Pages (2000 words) Essay

Industrial Networks

urthermore in the context of the power structure it may be stated that the power structure is the degree of control and resources in the hands of the various actors and may or may not always be equally distributed and this will have a major impact upon the over all overall structure and decisions taken with in the network.... ast there is intemporal dependence with this so called industrial network which pertains to a large number of investments in business networking,PR and the infrastructure and since this book talks about network change there is a chance that we are looking at something which aids a smoother transition and more grounded in past industrial practice....
12 Pages (3000 words) Essay

Report Detailing Network Solution for Extension Site

This should facilitate for scalability of the network. The efficiency of the network to be set-up at the university's school of nursing network solution for Extension Site DeVry NETW206: Introduction to Switching Submitted 14/04 Introduction For a network that is concentrating on sensitive and specific co-ordination of information such as security cameras, the topology should ensure that the defectiveness of one section does not interfere with the flow of data.... For a network that is concentrating on sensitive and specific co-ordination of information such as security cameras, the topology should ensure that the defectiveness of one section does not interfere with the flow of data....
1 Pages (250 words) Assignment

Network Solution to Real Vertical Growth Demands

Service provider, like ΑΩ TechInd (alpha omega technical industries) should often select the vertical market(s) to specialize in, in order to facilitate… A richer range of offerings, resulting into higher revenues and operations that are more successful, should characterize these developments.... Beyond a simple The company, ΑΩ TechInd, has been enjoying huge vertical growth over the past six months, and this paper provides a network solution for satisfying these demands....
4 Pages (1000 words) Case Study

A Successful Technical Solution to Speed-Deliverys

"A Successful technical Solution To Speed-Delivery's" paper examines GSM with WAP, GPRS, and 3G and identifies which of the three technologies would be most suitable in this case can only be decided after the technical suitability of all the three mobile services, their advantages and limitations.... hellip; Looking at the advantages and limitations of all the three options I would like to suggest that for our client, Speed–delivery, 3G is the best option from the point of technical suitability....
6 Pages (1500 words) Coursework

AOC Network Solution

The paper "AOC network solution" pinpoints the design of a LAN requires to consider the topology chosen dependent on the number of clients and servers making up the network.... hellip; LAN refers to a network that is isolated within a single building, floor, or even a limited area.... Link, in this case, is the communication path between two nodes, where a node is an endpoint to any branch of a network.... LAN provides a popular solution of the client/server computer configuration by allowing the interconnection of devices such as servers, clients, sharing of printers, OCR readers, and high-resolution monitors....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us