0% found this document useful (0 votes)
35 views7 pages

CMGTCB554 Competency 2 Reflection

The document outlines a reflection assignment focused on networking infrastructure for two companies: a small office and a larger multi-location firm. It recommends a peer-to-peer model for the small company and a client-server model for the larger company, emphasizing the importance of scalability, centralized data management, and security. Additionally, it discusses challenges in telecommunications and networking operations, including interoperability issues and the need for robust security measures.

Uploaded by

Dan Mshefah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views7 pages

CMGTCB554 Competency 2 Reflection

The document outlines a reflection assignment focused on networking infrastructure for two companies: a small office and a larger multi-location firm. It recommends a peer-to-peer model for the small company and a client-server model for the larger company, emphasizing the importance of scalability, centralized data management, and security. Additionally, it discusses challenges in telecommunications and networking operations, including interoperability issues and the need for robust security measures.

Uploaded by

Dan Mshefah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Assignment Content

1.

Once your faculty marks this activity as complete in the gradebook,


the competency assessment will open for you to submit.

Competency 2: Understand how to build an environment that blends


telecommunications and computer networks.

This reflection activity is comprised of two sections collectively totaling


a minimum of 500 words. Complete your reflections by responding to
all prompts.

Networking Infrastructure

One of the most important decisions a company can make in terms of


its IT infrastructure is the design of its network.

Consider the following 2 companies:


o Company 1: This company is a small 1-office company that uses 20
computers and 2 printers in its suite.
o Company 2: This company has multiple locations with a datacenter
located in one of its facilities that all the other facilities connect to for
information.

Respond to the following:


o What type of networking model and equipment would you recommend
for each of the 2 companies?
o Why did you select these network models? Add further networking and
telecommunications equipment recommendations for the selected
network model for each company.

Telecommunication and Network Standards and Protocols

One of the most important roles of IT managers is to make sure that


the organization has available communication that works 24/7.
Consider the major telecommunications and networking standards and
protocols in use today, and how they are monitored to ensure
continuous availability.

Respond to the following:


o In your current or former organization, what are the biggest challenges
you observe in your networking and telecommunications operations?

Submit your reflection.


Competency 2 – Reflection

Networking Infrastructure

A peer-to-peer networking approach is suitable for corporation 1, a small corporation

with limited resources and a single office. In this framework, all machines have equal status

for easy file and printer sharing. The computers would be connected using a network switch

for communication and a router for internet access. Using a Network Attached Storage (NAS)

device centralizes file storage for easier collaboration. To enhance security, install a firewall

and use a dedicated print server for efficient printer management and sharing. These

guidelines are simple and cost-effective for a smaller environment.

A client-server networking approach is recommended for Company 2, a larger firm

with multiple locations operating under a central datacenter. Core switches link multiple sites

for fast data transmission. Routers enable interconnection and internet access. Servers and

network equipment are stored in a server rack in the datacenter. The datacenter has redundant

power supply to ensure continuous operation and reduce downtime (Priol & Alléon, 2021). A

Virtual Private Network (VPN) improves confidential communication between different

locations in a larger organization, meeting scalability and centralized data management

requirements. These guidelines consider the scalability and complexity needs of a multi-

location configuration.
I chose the peer-to-peer networking model for Company 1 because it is simple, cost-

effective, and suitable for the company's small-scale operations. The peer-to-peer model is

easy to set up and manage without a dedicated server. Additional recommendations for this

model include implementing a reliable network switch, a router for internet connectivity, a

Network Attached Storage (NAS) device for centralized file storage, a firewall for enhanced

security, and a dedicated print server for efficient printer management and sharing. On the

other hand, I recommended a client-server networking model for Company 2 because it is


scalable and allows for centralized data management, which is important for a larger

organization. The central server manages resources and services across multiple locations. I

suggested a core switch, router, server rack, redundant power supplies, and a VPN for secure

communication between locations in the datacenter. These recommendations meet the needs

of a larger organization with multiple facilities, improving data management, scalability, and

security.

Telecommunication and Network Standards and Protocols

My prior organization had networking and telecommunications issues that affected IT

infrastructure efficiency and reliability. Maintaining a heterogeneous network with different

technologies, hardware, and software proved difficult. When old and new technologies

coexist, interoperability issues arise. Problems hampered departmental data exchange and

collaboration. Upgrades and standardization of the network infrastructure were required for

integration and efficiency. Another issue was the constant threat to Network security.

Protecting important data's security, integrity, and availability is essential as cyber threats rise.

The company has to install rigorous security measures, perform frequent vulnerability

assessments, and educate people to encourage security awareness to keep ahead of

cybersecurity threats. Diverse and creative strategies were required to balance network

security and corporate communication.

Enterprise productivity is hampered by network outages. Due to technology, hardware,

or system improvements, unplanned outages may impair operations. To prevent unexpected

interruptions, downtime management includes redundancy, frequent maintenance outside of

business hours, and well-defined contingency plans (Yang, 2019). Monitoring and managing
downtime reasons required a proactive approach. Organization scaling and adapting were

difficult. As the company grew, its network architecture required to enable data transmission,

storage, and communication. Network management to accommodate expansion and minimize

disturbance proved difficult. Technology changed quickly, making it hard to incorporate new

innovations into infrastructure. For flexibility and technical competitiveness, the network was

designed strategically and new technologies were evaluated often.


References

Priol, T., & Alléon, G. (2021). A client/server approach for HPC applications within a

networking environment. Future Generation Computer Systems, 17(6), 813-822.

Yang, T. (2019). ICT technologies standards and protocols for active distribution network.

In Smart power distribution systems (pp. 205-230). Academic Press.

You might also like