SlideShare a Scribd company logo
Running head: NETWORK DESIGN
NETWORK DESIGN 6
Network Design
Student Name
Course
2 July 2014
Professor
Identify hardware and software needed to secure your choice of
networks against all electronic threats.
A network that helps a workstation to connect with each other is
called a Networking hardware. If a company uses both routers
and firewall, the company is assured protection of both wireless
and cabled networks that are used in the company. Network
hardware is suitable in any organization in the keeping of the
organizations network safe. In the software part I will choose to
use McAfee Anti-virus security software. This software in
conjunction with firewall is a sure way of protecting a company.
Routers when used along with hardware are the best security
hardware needed if the company needs to increase the security
of their network to a level where none of the intruders can be
able to access it (Radu, 2002). The function of the firewall in an
organization is to ensure that all unwanted activities are blocked
including hackers that can retrieve important and delicate
information of the company. Hacking will be a very dangerous
exercise where criminal can access the important information
that a company has and use this information in blackmailing the
company and its customers. Networking software’s also plays a
major role in securing an organizations network security. The
software has the capabilities of detecting viruses that may
attack an organization and make an organization loose its
critical information. McAfee is one of the top manufactures in
ensuring that network security is maintained. The virus apart
from detecting viruses, it is able to use internet firewall and
detect any malware that an organization may be suffering from.
It is true that an organization must have both hardware and
software to ensure that they secure their information from
hackers and viruses.
Distinguish between local area networks (LANs), wide area
networks (WANs), and wireless technologies.
A local area network is a network that has a shared group of
computers and the distance between the computers is generally
small. The computers within this distance share the same
network, this helps the Local area network to easily share
printers and do exchange of files within the same facility or
network. When Local areas network is connected to other
networks and also other local networks, they can turn to be
called Wide Area network. Local area networks are connected
using Ethernet cables, adapters and also hubs. Wide area
networks (WAN) are very different from the LAN. The internet
is an example of a wide area network because it usually links
computers that are outside the local area network and all over
the world (Zhang, 2010). The internet is considered the most
popular wide area network. When on has a personal computer
that is connected to the internet he/she is using wide area
network. Personal computers can also connect to local area
network and also metro area network. WAN is more expensive
than the LAN because it uses leased lines in transmitting the
network to users. Wireless local area network is a connected
local area network but without a cable and wires. The condition
of a local area network not using a cable in connection makes it
a WLAN. Some of the advantages that are associated with the
wireless local network is that they have low installation costs
because they do not use wires during transmission. The wireless
local network are also very mobile as compared to Wide area
network and the local area network (Rainer & Cegielski, 2010).
Wireless local area network can only be connected by the use of
Wireless Access Point (WAP) which is transmitted by radio
waves over a long area connected by the internet hub. The
difference between the local area network and the wireless local
area network is that the wireless local area network runs on IEE
802.11 standard. Wi-Fi connection is shared amongst people in
buildings and those that live together in a neighborhood. It is
the cheapest of all networks as it can be transmitted without
costs. It has some disadvantages of delaying video calls and it is
highly susceptible to security risks.
Explain the concepts and building blocks of today’s data
communication networks, such as switches, routers, and
cabling.
A network router is a more refined device as compared to the
network switch or the network hub. Routers are typically very
small in size just as switches and the hubs. They are shaped in a
box-like shape, many computers can connect through them. The
routers has features on the front and the back where one can
establish connections from. They also have a connection to
electric power and many a number of LED lights that blink
whenever it is turned on. All of the three, routers, switches and
hubs have the same physical appearance. Apart from the
physical appearances routers have different inner functions
(FitzGerald & Dennis, 2009). Traditional routers all have
connections from where the local area network can be connected
from. Routers are majorly used as intermediate destinations in
all network traffics. Routers receive incoming network packets,
they also have the role of looking inside each packet in
identifying the source and target network addresses. A network
switch is a device that serves as a controller that enables
network devices to talk to each other efficiently. This helps the
businesses money and also increases employee’s productivity.
Switches are responsible for creating a network while a router is
responsible in the connection of the network for users to be able
to share to the network.
Self-assess your work against the Peer Evaluation Rating Scale
In the part of team involvement, the student is very active and
very substantive in team discussions. He is also very good in
time management, he supported the team timelines and he was
able to meet all the assignments due date. He sacrificed and to a
lead on establishing and following the goals, the roles and the
responsibilities of the team. He was also a professional
communicator in that he interacted with other team member of
the team in a respectful and professional tone. Communication
was clear with no typographical or grammatical errors.
References
FitzGerald, J., & Dennis, A. (2009). Business Data
Communications and Networking. John Wiley & Sons, 2009.
Radu, C. (2002). Implementing Electronic Card Payment
Systems. Artech House, 2002.
Rainer, R. K., & Cegielski, C. G. (2010). Introduction to
Information Systems: Enabling and Transforming Business.
John Wiley & Sons, 2010.
Zhang, P. (2010). Advanced Industrial Control Technology.
William Andrew, 2010.
NETWORK DESIGN 2 1
Networking Design 2 3
Network Design 2
Student
Course name
25 June 2014
Professor
Introduction:
Protocols can be defined as rules that govern communication
between many computers. This paper will analyze the
advantages of protocols in an organization. It will also provide
solutions to the organization to prevent the organization from
making losses from consuming large bytes of bundles.
Importance of communication protocols
Protocols have a major role in communication in the world.
They ensure that there is communication between computers.
Some of the common communication protocols that have
enabled communication between computers include:
HTTP- this communication protocol helps us to view pages that
are kept in a different computer.
FTP- this communication protocol helps us send or receive files
from other computers that are connected by the protocol.
SMTP/POP3 is communication protocols that help in sending
and receiving of emails.
Identify the protocols in your design and provide rationale for
your decision
According to the definition of protocol, there is links of
communication in the given designs. Some of the protocols in
the design include the corporate head quarter because it uses
hypertext transfer protocol in viewing files that are contained in
other computers that are stationed in other stations. The
computers are interconnected by the internet. The information
that headquarter can access from the other computers include
information of the employees from customer plastic parts plant,
plastic fan plant and the plastic beverage container plant.
Another protocol s in the design is the plants because they can
send and receive files by the use of file transfer protocol in
receiving and sending information from the headquarters.
Define the overall network architecture
Network architecture is an organization’s computer framework
that is complete. The diagram shows the network architecture of
Riordan Manufacturing (McCabe, 2010). The network in this
organization shows a detailed view of all the resources that can
be accessed in the organization. The resources that can be
accessed here include the all the plants that are under the
corporate headquarter.
Explain the usefulness of a traffic analysis
Some of the major benefits traffic analysis is to prevent those
people in an organization tend to use more bandwidth making a
loss to the organization. By observing the IP address of the
HTTP requests, there is a possibility of you finding out the most
sites that employees in an organization visit and therefore
prevent them. Another usefulness of using traffic analysis is
ensuring network security by preventing anomalies in the usage
of bandwidth in the organization (Garber & Hoel, 2014). Traffic
analysis also helps to know the level of links and therefore plan
to get extra links that may reduce congestion.
Explain the terms latency, response time, and jitter, and
describe their effect on overall network performance and on the
performance of your chosen organization’s network.
Latency is the amount that a packet takes to be transmitted from
one end to another across a network. Response time is the total
time that a service takes to respond to a request and jitter is
used to refer variations that occur in the arrival rate of packets
under the same data flow (Weinstein, 2007). An abnormal jitter
values can have a negative effect on real-time applications like
videos. It is important to assess the delay time and jitter
because it helps to determine if the voice application works. In
an organization it is these terms will enable the organization to
evaluate whether all the voice application is working, of they
also help the organization to aid in the correct design and
configuration of traffic prioritization.
Explain the effect of data rates on each part of the network.
Data transfer rate is the amount of digital data that is moved
from one place to another in a specific time (SINGH, 2011.).
Increase of data rates increases the throughput of the
transmitted power. Increase in the data transfer rate means that
information is transferred very quickly, therefore the higher the
bandwidth of a given path, it means that the rate of transfer is
high.
Describe strategies to ensure the availability of network access
in switched and routed networks.
Some of the strategies that ensure that there is availability of
network access in switched and routed networks include
redundancy, high availability, virtualization, planned outages
and disaster recover. All this strategies are very vital in
ensuring that an organization is having a good design of their
backup solutions that the organization can count on and those
that are cost effective to the organization. Risk analysis also is
an important exercise to an organization because it evaluates the
organizations profits or losses. Virtualization helps an
organization to reduce power consumption and therefore they
reduce the costs the organization is spending on the enormous
power bills. Virtualization is also beneficial in providing high
availability for critical applications and rationalizes application
migration (Bauer & Adams, 2012). Virtualization can also
simplify IT operation and also allow IT organization to change
to faster business demands.
He is a very active and substantive in team work, very good in
time management because he supported team timelines and met
the assignment on time. He also took a lead in establishing and
following the goals and responsibilities of the team. He also has
professional communication in interacting with other members
of the team
References
Bauer, E., & Adams, R. (2012). Reliability and Availability of
Cloud Computing. John Wiley & Sons, 2012.
Garber, N., & Hoel, L. (2014). Traffic and Highway
Engineering. Cengage Learning, 2014.
McCabe, J. D. (2010). Network Analysis, Architecture, and
Design. Morgan Kaufmann, 2010.
SINGH, B. (2011.). DATA COMMUNICATIONS AND
COMPUTER NETWORKS. PHI Learning Pvt. Ltd., 2011.
Weinstein, S. (2007). The Multimedia Internet. Springer, 2007.

More Related Content

DOCX
Basic networking tutorial
PDF
unit 4 cds computer networking notesnotes.pdf
PPTX
networking hypherlink Group 2 presentation
DOCX
Chapter 6.0
PDF
An Introduction To Computer Networking A Survey
PDF
Computer network
PPTX
Computer networks
DOCX
Computer network
Basic networking tutorial
unit 4 cds computer networking notesnotes.pdf
networking hypherlink Group 2 presentation
Chapter 6.0
An Introduction To Computer Networking A Survey
Computer network
Computer networks
Computer network

Similar to Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docx (20)

PPTX
ITP-22 -COMPUTER NETWORK.pptx
PDF
1 computer networks basic
PPT
Computer network
PPTX
Distributed Systems - Information Technology
DOCX
What is a network
DOCX
Seminar report-networking
DOCX
Cisco Certified Networking Associate(Project Report)
PDF
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
DOCX
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
PPTX
DETERMNE BEST FIT-ip-address.pptx
PDF
Assignment1
PPTX
Communications
PPTX
Computer Communications
PPT
Networks
PDF
Computer Network Second Edition
PPT
Hcs Topic 4 Networks V2
PPT
Hcs Topic 4 Networks V2
PPT
Hcs Topic 4 Networks V2
PDF
Network administration Book
ITP-22 -COMPUTER NETWORK.pptx
1 computer networks basic
Computer network
Distributed Systems - Information Technology
What is a network
Seminar report-networking
Cisco Certified Networking Associate(Project Report)
Introduction to Computer Networks: Basic concept of Computer networks Goals o...
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
DETERMNE BEST FIT-ip-address.pptx
Assignment1
Communications
Computer Communications
Networks
Computer Network Second Edition
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
Network administration Book
Ad

More from charisellington63520 (20)

DOCX
in addition to these questions also answer the following;Answer .docx
DOCX
In an environment of compliancy laws, regulations, and standards, in.docx
DOCX
In American politics, people often compare their enemies to Hitler o.docx
DOCX
In addition to the thread, the student is required to reply to 2 oth.docx
DOCX
In addition to reading the Announcements, prepare for this d.docx
DOCX
In Act 4 during the trial scene, Bassanio says the following lin.docx
DOCX
In a Word document, please respond to the following questions.docx
DOCX
In a Word document, create A Set of Instructions. (you will want.docx
DOCX
In a two page response MLA format paperMaria Werner talks about .docx
DOCX
In a paragraph (150 words minimum), please respond to the follow.docx
DOCX
In a paragraph form, discuss the belowThe client comes to t.docx
DOCX
In a minimum of 300 words in APA format.Through the advent o.docx
DOCX
In a paragraph form, post your initial response after reading th.docx
DOCX
In a minimum 250-word paragraph, discuss at least one point the auth.docx
DOCX
In a hostage crisis, is it ethical for a government to agree to gran.docx
DOCX
In a double-spaced 12 Font paper  How did you immediately feel a.docx
DOCX
In a follow-up to your IoT discussion with management, you have .docx
DOCX
In a COVID-19 situation identify the guidelines for ethical use of t.docx
DOCX
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
DOCX
In a 600 word count (EACH bullet point having 300 words each) di.docx
in addition to these questions also answer the following;Answer .docx
In an environment of compliancy laws, regulations, and standards, in.docx
In American politics, people often compare their enemies to Hitler o.docx
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to reading the Announcements, prepare for this d.docx
In Act 4 during the trial scene, Bassanio says the following lin.docx
In a Word document, please respond to the following questions.docx
In a Word document, create A Set of Instructions. (you will want.docx
In a two page response MLA format paperMaria Werner talks about .docx
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph form, discuss the belowThe client comes to t.docx
In a minimum of 300 words in APA format.Through the advent o.docx
In a paragraph form, post your initial response after reading th.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a follow-up to your IoT discussion with management, you have .docx
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 600 word count (EACH bullet point having 300 words each) di.docx
Ad

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
GDM (1) (1).pptx small presentation for students
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Classroom Observation Tools for Teachers
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Cell Types and Its function , kingdom of life
PDF
Basic Mud Logging Guide for educational purpose
PDF
Pre independence Education in Inndia.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
master seminar digital applications in india
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
GDM (1) (1).pptx small presentation for students
VCE English Exam - Section C Student Revision Booklet
Classroom Observation Tools for Teachers
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Microbial disease of the cardiovascular and lymphatic systems
Cell Types and Its function , kingdom of life
Basic Mud Logging Guide for educational purpose
Pre independence Education in Inndia.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Complications of Minimal Access Surgery at WLH
master seminar digital applications in india

Running head NETWORK DESIGNNETWORK DESIGN6Netwo.docx

  • 1. Running head: NETWORK DESIGN NETWORK DESIGN 6 Network Design Student Name Course 2 July 2014 Professor Identify hardware and software needed to secure your choice of networks against all electronic threats. A network that helps a workstation to connect with each other is called a Networking hardware. If a company uses both routers and firewall, the company is assured protection of both wireless and cabled networks that are used in the company. Network hardware is suitable in any organization in the keeping of the organizations network safe. In the software part I will choose to use McAfee Anti-virus security software. This software in conjunction with firewall is a sure way of protecting a company. Routers when used along with hardware are the best security hardware needed if the company needs to increase the security of their network to a level where none of the intruders can be
  • 2. able to access it (Radu, 2002). The function of the firewall in an organization is to ensure that all unwanted activities are blocked including hackers that can retrieve important and delicate information of the company. Hacking will be a very dangerous exercise where criminal can access the important information that a company has and use this information in blackmailing the company and its customers. Networking software’s also plays a major role in securing an organizations network security. The software has the capabilities of detecting viruses that may attack an organization and make an organization loose its critical information. McAfee is one of the top manufactures in ensuring that network security is maintained. The virus apart from detecting viruses, it is able to use internet firewall and detect any malware that an organization may be suffering from. It is true that an organization must have both hardware and software to ensure that they secure their information from hackers and viruses. Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies. A local area network is a network that has a shared group of computers and the distance between the computers is generally small. The computers within this distance share the same network, this helps the Local area network to easily share printers and do exchange of files within the same facility or network. When Local areas network is connected to other networks and also other local networks, they can turn to be called Wide Area network. Local area networks are connected using Ethernet cables, adapters and also hubs. Wide area networks (WAN) are very different from the LAN. The internet is an example of a wide area network because it usually links computers that are outside the local area network and all over the world (Zhang, 2010). The internet is considered the most popular wide area network. When on has a personal computer that is connected to the internet he/she is using wide area network. Personal computers can also connect to local area
  • 3. network and also metro area network. WAN is more expensive than the LAN because it uses leased lines in transmitting the network to users. Wireless local area network is a connected local area network but without a cable and wires. The condition of a local area network not using a cable in connection makes it a WLAN. Some of the advantages that are associated with the wireless local network is that they have low installation costs because they do not use wires during transmission. The wireless local network are also very mobile as compared to Wide area network and the local area network (Rainer & Cegielski, 2010). Wireless local area network can only be connected by the use of Wireless Access Point (WAP) which is transmitted by radio waves over a long area connected by the internet hub. The difference between the local area network and the wireless local area network is that the wireless local area network runs on IEE 802.11 standard. Wi-Fi connection is shared amongst people in buildings and those that live together in a neighborhood. It is the cheapest of all networks as it can be transmitted without costs. It has some disadvantages of delaying video calls and it is highly susceptible to security risks. Explain the concepts and building blocks of today’s data communication networks, such as switches, routers, and cabling. A network router is a more refined device as compared to the network switch or the network hub. Routers are typically very small in size just as switches and the hubs. They are shaped in a box-like shape, many computers can connect through them. The routers has features on the front and the back where one can establish connections from. They also have a connection to electric power and many a number of LED lights that blink whenever it is turned on. All of the three, routers, switches and hubs have the same physical appearance. Apart from the physical appearances routers have different inner functions (FitzGerald & Dennis, 2009). Traditional routers all have connections from where the local area network can be connected from. Routers are majorly used as intermediate destinations in
  • 4. all network traffics. Routers receive incoming network packets, they also have the role of looking inside each packet in identifying the source and target network addresses. A network switch is a device that serves as a controller that enables network devices to talk to each other efficiently. This helps the businesses money and also increases employee’s productivity. Switches are responsible for creating a network while a router is responsible in the connection of the network for users to be able to share to the network. Self-assess your work against the Peer Evaluation Rating Scale In the part of team involvement, the student is very active and very substantive in team discussions. He is also very good in time management, he supported the team timelines and he was able to meet all the assignments due date. He sacrificed and to a lead on establishing and following the goals, the roles and the responsibilities of the team. He was also a professional communicator in that he interacted with other team member of the team in a respectful and professional tone. Communication was clear with no typographical or grammatical errors. References FitzGerald, J., & Dennis, A. (2009). Business Data Communications and Networking. John Wiley & Sons, 2009. Radu, C. (2002). Implementing Electronic Card Payment Systems. Artech House, 2002.
  • 5. Rainer, R. K., & Cegielski, C. G. (2010). Introduction to Information Systems: Enabling and Transforming Business. John Wiley & Sons, 2010. Zhang, P. (2010). Advanced Industrial Control Technology. William Andrew, 2010. NETWORK DESIGN 2 1 Networking Design 2 3 Network Design 2 Student Course name 25 June 2014 Professor Introduction: Protocols can be defined as rules that govern communication between many computers. This paper will analyze the advantages of protocols in an organization. It will also provide
  • 6. solutions to the organization to prevent the organization from making losses from consuming large bytes of bundles. Importance of communication protocols Protocols have a major role in communication in the world. They ensure that there is communication between computers. Some of the common communication protocols that have enabled communication between computers include: HTTP- this communication protocol helps us to view pages that are kept in a different computer. FTP- this communication protocol helps us send or receive files from other computers that are connected by the protocol. SMTP/POP3 is communication protocols that help in sending and receiving of emails. Identify the protocols in your design and provide rationale for your decision According to the definition of protocol, there is links of communication in the given designs. Some of the protocols in the design include the corporate head quarter because it uses hypertext transfer protocol in viewing files that are contained in other computers that are stationed in other stations. The computers are interconnected by the internet. The information that headquarter can access from the other computers include information of the employees from customer plastic parts plant, plastic fan plant and the plastic beverage container plant. Another protocol s in the design is the plants because they can send and receive files by the use of file transfer protocol in receiving and sending information from the headquarters. Define the overall network architecture Network architecture is an organization’s computer framework that is complete. The diagram shows the network architecture of Riordan Manufacturing (McCabe, 2010). The network in this organization shows a detailed view of all the resources that can be accessed in the organization. The resources that can be accessed here include the all the plants that are under the corporate headquarter. Explain the usefulness of a traffic analysis
  • 7. Some of the major benefits traffic analysis is to prevent those people in an organization tend to use more bandwidth making a loss to the organization. By observing the IP address of the HTTP requests, there is a possibility of you finding out the most sites that employees in an organization visit and therefore prevent them. Another usefulness of using traffic analysis is ensuring network security by preventing anomalies in the usage of bandwidth in the organization (Garber & Hoel, 2014). Traffic analysis also helps to know the level of links and therefore plan to get extra links that may reduce congestion. Explain the terms latency, response time, and jitter, and describe their effect on overall network performance and on the performance of your chosen organization’s network. Latency is the amount that a packet takes to be transmitted from one end to another across a network. Response time is the total time that a service takes to respond to a request and jitter is used to refer variations that occur in the arrival rate of packets under the same data flow (Weinstein, 2007). An abnormal jitter values can have a negative effect on real-time applications like videos. It is important to assess the delay time and jitter because it helps to determine if the voice application works. In an organization it is these terms will enable the organization to evaluate whether all the voice application is working, of they also help the organization to aid in the correct design and configuration of traffic prioritization. Explain the effect of data rates on each part of the network. Data transfer rate is the amount of digital data that is moved from one place to another in a specific time (SINGH, 2011.). Increase of data rates increases the throughput of the transmitted power. Increase in the data transfer rate means that information is transferred very quickly, therefore the higher the bandwidth of a given path, it means that the rate of transfer is high. Describe strategies to ensure the availability of network access in switched and routed networks. Some of the strategies that ensure that there is availability of
  • 8. network access in switched and routed networks include redundancy, high availability, virtualization, planned outages and disaster recover. All this strategies are very vital in ensuring that an organization is having a good design of their backup solutions that the organization can count on and those that are cost effective to the organization. Risk analysis also is an important exercise to an organization because it evaluates the organizations profits or losses. Virtualization helps an organization to reduce power consumption and therefore they reduce the costs the organization is spending on the enormous power bills. Virtualization is also beneficial in providing high availability for critical applications and rationalizes application migration (Bauer & Adams, 2012). Virtualization can also simplify IT operation and also allow IT organization to change to faster business demands. He is a very active and substantive in team work, very good in time management because he supported team timelines and met the assignment on time. He also took a lead in establishing and following the goals and responsibilities of the team. He also has professional communication in interacting with other members of the team
  • 9. References Bauer, E., & Adams, R. (2012). Reliability and Availability of Cloud Computing. John Wiley & Sons, 2012. Garber, N., & Hoel, L. (2014). Traffic and Highway Engineering. Cengage Learning, 2014. McCabe, J. D. (2010). Network Analysis, Architecture, and Design. Morgan Kaufmann, 2010. SINGH, B. (2011.). DATA COMMUNICATIONS AND COMPUTER NETWORKS. PHI Learning Pvt. Ltd., 2011. Weinstein, S. (2007). The Multimedia Internet. Springer, 2007.