Module #8: Comprehensive and Secure Networking Solution
Scenario:
Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based Wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.
You have been hired to secure the RMC network and ensure that the company has a properly designed network that allows for future growth (500 users in 12 months) and for the highest levels of security to protect against internal and external attacks.
RMC has scheduled a meeting with its key executives and you in order to provide you with any additional information you may need.
Instructions:
In an eight- to ten-page proposal, address the following three sections and their action items to provide a comprehensive secure environment:
Section 1: Topology (type of network) and network devices
RMC needs to set up a network; it requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization. The company is looking for guidance regarding the type of network devices that will connect devices to the Local Area Network (LAN).
The company asks that you explain what internal and external networking components are required (explain each and justify why you chose the network devices you did).
Provide a cryptography method that will ensure vital data is encrypted.
Provide an explanation of what network protocols will be used on the LAN and why.
Ensure that the network has the capacity to:
connect all users to company resources (e.g. printers, scanners, and other items).
provide file sharing options.
manage these resources in a central location.
allow for internal users to access the internet; and
allow external users vendors to access the LAN remotely.
Your proposal should include budgetary cost estimates for the chosen topology.
Section 2: IP Infrastructure
RMC has asked that you provide details regarding an IP structure (which includes static, DHCP—or the possibility of both—and proper IP Class assignment), which is mindful of the company’s expectation of continued growth.
Provide a remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner
Section 3: Security
Basic security has been in place and now the company would like you to make this a more secure facility in hopes of protecting against internal and external security threats.
Generate a plan to provide secure access control methods for all internal-user access including a viable password policy, which includes complexity, duration, and history requirements.
Provide a thorough plan to protect the network from malware and various types of malicious attacks.
Submission:
Your proposal should include all of the bulleted elements in the three sections above, with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with outside sources.
Length: Your paper must be eight to ten pages in length, not including the required cover and references pages.
Sources: Include a minimum of six sources. (For each of the three sections, include at least two scholarly references as well as material from the uCertify.) The CSU Global LibraryLinks to an external site. is a great place to find your sources.
You cannot use your textbook as your primary source of information. You must draw on other sources such as books, websites, business and trade journals, legal and compliance journals, government agencies, professional associations, and industry standards, for example.
Visit the library’s special research guide for this discipline.
If you have questions about the format or content of references, discuss it with your instructor.
Formatting: Ensure your entire document, including citations of sources, is in conformity with the APA standards in the CSU Global Writing Center APA standards in the CSU Global Writing CenterLinks to an external site.. Visit the to find numerous guides on how to write and research papers including an APA template paper.
Paper Sections on Comprehensive and Secure Networking Solution: Your submission should include the following (title each portion accordingly): Cover page
Abstract: The abstract is an “executive overview” of your paper. It must be a 50- to 100-word summary that would be appropriate to present to a manager. The abstract provides the reader with the essence of your project without reading the paper in its entirety.
Table of Contents: This lists the sections of your paper with corresponding page numbers. Include tables and figures (if you have more than two in your paper), and any appendices.
Introduction: In this section, state the basis of the Detailed Technical Proposal—Comprehensive and Secure Solution example that you will be presenting. Discuss how this analysis will be based upon the concepts studied in the course.
Body of the paper. Include discussion, implications, and conclusion/recommendations. Provide a thorough discussion of your findings and the implications of your study. Use as headings each of the three sections under Instructions.
You need a Google account to do this assessment. You can create a free Google account here: https://myaccount.google.com/.
Once created, you need to navigate to the Google created lab: “Intro to Modelling” here: https://colab.research.google.com/github/google/engedu/blob/master/ml/fe/exercises/intro_to_modeling.ipynb?utm_source=ss-dataprep&utm_campaign=colab-external&utm_medium=referral&utm_content=intro_to_modeling
In addition to following the instructions outlined in the lab, you must:
• Implement a possible solution to each of the tasks outlined in the lab
• Add appropriate comments to your code created, following machine learning best practices for clean coding: https://towardsdatascience.com/clean-machine-learning-codebd32bd0e9212
• Identify various different models that would be appropriate to use as alternatives for the tasks presented by the lab by varying hyperparameters and features. There is also an opportunity for you to create your own custom model by using different regressor functions within TensorFlow.
For more details, see: https://www.tensorflow.org/tutorials/customization/basics
• Familiarise yourself with the assessment’s rubric to understand how the various assignment grades are assigned.
• Produce a manual of 500 words in length outlining:
o The answers to the questions posed in each of the tasks within the lab.
o The choice of models you made during your assessment including the various hyperparameters you chose and feature engineering performed for the appropriate task.
o An analysis of the various models created and an evaluation of their efficiency
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, Implement a possible solution to each of the tasks outlined in the lab
Programme Code BN021, BN112 BA in Creative Digital Media Module Code DMED 2028, Multimedia Development 2 Autumn repeat assessment breakdown Project 100% Deliverable 1 – Interactive E-learning Solution Deliverable 2 – Demo Defence Video Deadline Friday 20th August at 9:00 am Multimedia Development 2 Repeat Assignment Shaun Ferns Institute of Technology Blanchardstown By submitting your project for assessment you agree to the following: “The material contained in this assignment is the author’s original work, except where work quoted is duly acknowledged in the text. No aspect of this assignment has been previously submitted for assessment in any other unit or course.” IMPORTANT NOTE This assignment is an individual project. The work you submit must be your own. It is fine for you to ask a lecturer or fellow student for assistance with the project, but the actual work created and submitted must be your own. Plagiarism and academic dishonesty can lead to failure of the module and other penalties outlined in the Institute’s rules and regulations. Deliverable 1 – Interactive E-learning Solution The project is to design, create, present, publish and defend an interactive E-Learning solution, to demonstrate what you have learnt from this module’s topics. The Interactive E-learning Solution should be an original piece of work whose purpose is to teach the Twine software(twinery.org). There is no specified application for the creation of the E-Learning solution though in the past students have used both Unity &/or Adobe Animate. Remember this is a multimedia project, it must consist of a more than once form of media and must include some form of interactive assessment. • So, remember, this project is your ‘vehicle’ to demonstrate the range and depth of your technical and creative skills. • Your project should demonstrate the range of skills/technologies introduced in the module. For example, your code should demonstrate the use of the user interaction time-based, actionbased motion How you will be assessed: • The quality of your interactive eLearning solution o Does it illustrate knowledge of timelines and coding concepts from the topics in the module o Does it all work? o Is it easy to use by someone who visits it the first time? o Does it have a professional look & feel of an interactive eLearning solution? o Does it demonstrate achievement of technically challenging features? • The quality of the arguments you make in your demo/defence session and video • Deliverable – zipped folder containing copy of interactive files o “StudentNumber_webdev.zip” o You are to submit a ZIP file containing a copy of the contents of your interactive story • Include: o documentation ? The documentation file should include a report summarising the procedures and tools/techniques used, file listing, navigation flowchart/storyboard, and support material including production and user instruction documentation e.g. Read Me files. o “sources.txt” (inside folder “images) ? You are to submit a text file which states the origin of each image/audio used in your website (be specific, e.g. saying “Google images” is not good enough! You need to state the URL including the original filename of the image from that source, and also state the image filename as it appears in your interactive story). Please apply Harvard referencing to sources ? You should also declare any other sources used in your story, and state clearly how they have been used, so it is clear which parts of your project are your own work, which are the work of others, and the extent to which you have changed any work from others Additional Resource You are required to move through a planning, design and development phase before delivering the product. This could include some of the following stages if appropriate, but your client’s needs (if justified) may require alternative phases: • Background information on the project • Define the scope for the product • Identify learner characteristics • Establish constraints • Produce a style manual • Identify required resources • Ideas for content • Detailed program description (types of learning, chosen methodology, program sequence) • Media types and formats to be used • System inputs or outputs (if any) • Flowcharts and/or Storyboards Deliverable 2 – Demo Defence Video As there is little opportunity to demonstrate your creation of the interactive story you are required to demonstrate by screen capture your work. Similar to presenting during class time this is your opportunity to demonstrate your understanding of the process for developing and creating your interactive E-Learning solution. In your video defence/presentation you will be required to demonstrate and defend your understanding of your selected platform, specifically the use of code to enhance your work, your methods, choices and design, and the quality of your final interactive E-Learning solution. You may also be asked to defend/present your work in person if there is some query about your project/grade. Demo/Defence video • video file o “StudentNumber_defense.wmv” o You are to submit a 5min video file containing your video demo/defence o Load video on YouTube or Vimeo(private – password “md2”) Method of submission All work is to be uploaded to Moodle – deadlines are as specified on Moodle. Due to tight correction deadline no late submissions. Files should be named in the style: B0007 (but with your names and student number…). Folders should be correctly named BEFORE being ZIPed. Incorrect file names will not be assessed. When a ZIP folder is required do not use RAR or 7zip etc. Submission Checklist 1. A zip file containing a. interactive E-Learning solution b. all documents relating to the interactive E-Learning solution 2. Demo/Defence video • video file o “StudentNumber_defense.wmv” o You are to submit a 5min video file containing your video demo/defence, Load video on YouTube or Vimeo(private password “md2”) 1. Additionally, all files to be submitted in hardcopy on DVD. (Submit August 20th D-Block Shaun Ferns mailbox) Penalties • Due to a tight correction deadline, late submissions will not be accepted. • Incorrect file names will not be assessed. • Where no proof of creation is offered for the development of a new asset, it will be assumed that the asset is from a 3rd party. In such a case, zero marks will be awarded for the creation of that asset. • 3rd party assets used but not listed in the sources list will incur a penalty. • If a particular asset does not work or run correctly, marks will be not be awarded for this part. • Marks will only be awarded for files submitted. If, for example, the student submits an incomplete project file, resulting in the project file being corrupt or ‘unopenable’, zero marks will be awarded for that component. • It is important to note that work already submitted may NOT be submitted again. This is considered plagiarism. Hint: To avoid penalties, document your work periodically and create versions of your game. Create a realistic schedule of tasks to ensure a timely completion of the project. Approach the project incrementally to ensure that, even if the project is unfinished, a version is still submitted.
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Interactive E-learning Solution Deliverable
You have convinced the management team that a phone-based solution is not the most appropriate solution. Your recommendation is to set up a self-service-based support environment. Take this opportunity to prepare a report for the management team describing what self-service support entails and how a Web-based solution can be implemented to meet the request. Include a discussion about the tools that are available with Web-based support and how real-time assistance differs from delayed assistance and is implemented in a Web-based solution.
Also, as a very important tool involved in any help desk environment, but arguably more important in a self-service support environment, describe what a knowledge base is and how it plays an integral part in any help desk application.
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. You have convinced the management team that a phone-based solution is not the most appropriate solution
At the anode, a metal electrode (M) is placed in a saturated aqueous solution containing ions of the same metal (M) and a halogen (X), MX. At the cathode, a second electrode of the same metal (M) is placed in a solution with [M+] = 0.100 M.The two half-cells are connected by a salt bridge, and the measured cell voltage is 0.417 V. The cell reaction occurring in this concentration cell is
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. a metal electrode (M) is placed in a saturated aqueous solution containing ions of the same metal (M) and a halogen (X)
Networking Assignment Designing a solution for Small Office Home Office (SOHO) network Mark & Horton tax accountants have opened a new office in Melbourne, Australia. They are committed to providing taxation and financial planning services to both individuals and small business owners. Currently, they have four (4) full-time tax accountants, two (2) junior accountants and two (2) receptionists appointed to facilitate the clients. Additionally, two (2) financial advisors work two days a week. You have been hired as a network technician to help in the design and deployment of this network. Tax Accountants: 04 Junior Accountants: 02 Receptionist: 02 Financial Advisors: 02 Total Host= 10 host Objectives: • Set up a small office network, identify devices, network components and media type used • Assigning IP addresses to devices connected in a LAN environment • Identify issues and suggest solutions related to network or internet Scenario – Designing a solution for Shine Dental Clinic (Network Solution): Tom and Steph has recently opened a new clinic, “Shine Dental”, in Sydney, Australia. They are committed to providing quality dental services to people of all age group. They have four full-time surgeons using surgery rooms, four assistants working with the surgeons while performing surgery, three receptionists/admin staff, completing daily paperwork, admin, client consulting and handling the front desk. The area for the new office is 250 sqm approximately. For detailed dimensions and floorplan, refer to Figure 1. The clinic required eight workstations, one server and a printer and needed to be installed at the following locations: • One reception desk with space to place two computers (Workstation 5 and 6), • One small consulting room (Workstation 7) • One server room with extra space to place an additional computer (Server, Workstation 8) • Four surgery rooms (Workstation 1 – 4) The entire floor divided with each other by drywall sheets. The office is fully furnished (except computers, networking devices and cabling) The owner of “Shine Dental” has purchased eight (8) desktop computers of the same type. Table 1 shows the sample specification. Desktops x 8 Specifications Acer Aspire TC-series Desktop Processor Brand/Type AMD A10-7800 RAM 16GB HDD 1TB Wired Networking Gigabit Ethernet Connectivity 1xHDMI, 1xVGA, 3xUSB3.0, 4xUSB 2.0, RJ45 Operating System Windows 10 Pro Table 1 The owner of “Shine Dental” has also purchased one (1) server, eight (8) monitors to be connected with desktops and four (4) overhead screens, with the specifications provided in Table 2, Table 3 and Table 4 simultaneously for your reference. Server x 1 Specifications Acer TS-series Server Processor Brand/Type Intel Processor RAM 64 GB HDD 2TB Wired Networking Gigabit Ethernet Connectivity 1xHDMI, 1xVGA, 3xUSB3.0, 4xUSB 2.0, RJ45 Operating System Windows 2012 R2 Table 2
Monitors x 8 Specifications BenQ BL2400 series Brand BenQ Display LED-TN Dimension 579 x 213 x 502 mm Display resolution 1920 x 1080 Connectivity HDMI, D-sub Display size 24” Table 3 Overhead screens x 4 Specifications Sony 3200 series Brand Sony Display LED Dimension 731.8 x 87.3 x 435 mm Display resolution 1280 x 720, 1366 x 768 Connectivity DVI, USB, Ethernet, Antenna in Display size 32” Table 4
Figure 1 In addition to the computers, he has also wanted to purchase one LaserJet multifunction printer for print/copy/scan/fax. The printer should have USB 2.0, Gigabit LAN, Wi-Fi(n) and other prominent printing and scanning features. All computers/server has got a dedicated screen. In addition to that, there are four additional overhead screens attached in the four surgery rooms for patients to view local TV channels. Those four screens are also attached to the main computers in the surgery room. Doctors should display x-rays on the overhead screen for patients, but simply changing the input on the TV, your job is to connect the overhead screen/TV to the computer as an extended display or mirror and the Antenna. You are also required to set up a backup for all the computers/server. All the backups should run each night and should get stored at one physical location within the premises, and a copy of the local backup has to be held on to the cloud utilizing one of the cloud services. As a consultant, you can choose any cloud service of your choice but must justify your recommendation. Assume that you have been hired as a network technician to help design and deploy this network. Perform the following tasks to support this. Task 1 To inter-connect the desktop computers and connect the overhead screens/TV with the computers and TV antenna, you have decided to use a wired network. What is the primary transmission media, connectors, adaptors you would use for this? For your recommendation of media, consider and explain the following criteria: • Speed • Length • Ease of installation • Compatibility with intermediary devices Your answer must also include transmission media, connectors, adaptors, and other necessary devices to help you implement this successfully. Task 2 Waiting customers should be able to access the “Shine Dental” Wi-Fi network for internet usage. What devices will you need to extend your wired network to support wireless devices with maximum speed and make sure that customers using “Shine Dental” internet do not cause interruption to the clinic’s network? Justify your answer. Task 3 In addition to the workstations and server, the multifunctional printer needs to be connected to the network. Would you connect it via a wired media or wireless media? Justify your answer. Recommend a make and model of the multifunctional printer as per the customer requirement. Task 4 Complete Table 5 to assign suitable static IP version 4 addresses to the devices (with subnet mask) on the network. You have decided to go with the class C private IP address range 192.168.30.0/24 (except where it is indicated otherwise). You need to complete 3rd column of Table 5. Device IP address IP address with subnet mask Workstation_1 (Surgery1) 1st usable IP address 192.168.30._ ? _ /24 255.255.255._ ? _ Workstation_2 (Surgery2) 2nd usable IP address 192.168.30._ ? _ /24 255.255.255._ ? _ Workstation 3 (Surgery3) 4th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Workstation 4 (Surgery4) 5th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Workstation 5 (Fdesk1) 7th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Workstation 6 (Fdesk2) 8th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Workstation 7 (Consulting) 10th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Workstation 8 (BDesk) 11th usable IP address 192.168.30. ? _ /24 255.255.255._ ? _ Server_9 (Server) 14th usable IP address 192.168.30._ ? _ /24 255.255.255._ ? _ Printer 192.168.200.100/24 192.168.200.100 /24 255.255.255._ ? _ Table 5
Task 5 Implement the network topology (Figure 2 is a partial design to assist you) using a packet tracer. For example, it would help if you considered the following: • All devices (Server, workstations and printer etc.) mentioned in table 5 are labelled and have their IP addresses and subnet mask configured (as per your answer in Task 4) • Select the appropriate media in packet tracer, label the media type and use the switch 2960 with 24 ports and two-gigabit uplink ports to interconnect the Desktops • Connect workstation_5 and workstation_6 to one of the “5 port switch” of your choice and connect the switch to the 24-port switch • A standard wireless access point is added and configured with security. This wireless access point should be then connected to the 24-port switch via suitable wired media. • Printer is configured and connected to the previously added “5 port switch.” Figure 2 Task 6 Test the network using a suitable network utility and verify that workstation_7 can communicate with other workstations and servers. Provide screenshots to confirm that you have used the appropriate tools for this purpose. Use command-line utility only to test the connectivity Task 7 Configure the most secure protocol (available in packet tracer) to authenticate three newly hired part-time employees’ “Jason”, “John”, and “Steph”, assign 21st, 36th and 43rd usable IP addresses, respectively. Users should be able to differentiate the network before connecting to the office network easily. For example, provide screenshots and justify. Label Jason’s laptop as “jason_laptop”, John’s laptop as “john_laptop”, and Steph’s laptop as “steph_laptop” and configure in packet tracer. Task 8 Assume that Workstation_5 (consulting room) is a Linux box. You have run standard command-line tools and receive the following output:
Figure 3 Use Figure 3 above to answer the following questions:
What is the IP version 4 address of this machine?
What is the IP version 6 address of this machine?
What is the MAC address of this machine?
What is the default gateway?
Ping command gives the following error below, and the site cannot be opened. Give possible explanations, and provide a solution. Task 9 Assume that the network has been physically set up, as you have demonstrated in your packet tracer file (created in task 8). Users have complained that none of them can print. Using the packet tracer file, troubleshoot this issue and identify what might be causing this. Assume that the printer is mechanically functional and has no physical defect. Identify and discuss. The answer should be based on Task 4. Task 10 “Shine Dental” needs to store an image of all workstations and server in one location. Backups need to run each night, two copies of the backups need to be maintained at Shine Dental premises, and another copy will be stored on the cloud. You have decided to install NAS (Network Attached Storage) as a solution. How many hard drives would you install in NAS, and what raid Level would you use and why? Provide a cost-effective solution for the business. Performance is not essential. What media would you use to connect NAS to the network, and how would you connect it. For demonstration purposes, you can include a server in packet tracer, label it as NAS, and assign it 56th usable IP address to NAS. You must provide a relevant screenshot as an example
Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. Designing a solution for Small Office Home Office (SOHO) network Mark
Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.
Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service? film dealing with the march on Washington on August 28, 1963
Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. compute the solution to the 2D heat equation on a circular disk in Matlab
Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.
This project requires you to design requirement specification models for Kayak Melbourne and finally recommend an appropriate solution that consists of several sub-systems. A sub-system is a system that is part of a larger system. For example, a sales management system might be one sub-system of a customer relationship management (CRM) system. Another CRM sub-system might enable customers to view past and current orders, track order fulfilment and shipping, and modify their account information. A third CRM sub-system might maintain the product catalogue database and provide Web-based access to product specifications and manuals. A fourth CRM sub-system might provide technical support via telephone and a Web site with detailed tracking of customer support requests and related reporting to improve call centre management and product quality. Systems and sub-systems depend on the project you are working on.Case study: Kayak Melbourne Kayak Melbourne (KMB) (https://www.kayakmelbourne.com.au/) offers ecotours and kayak rentals along the Yarra River and other Melbourne waterways. Kent and Jenny Cuthbert are avid kayakers and amateur naturalists who spent many weekends exploring the Yarra River’s numerous creeks and tributaries. Kent was a sales representative, and Jenny worked as a freelance Web designer. Two years ago, Kent’s division was purchased by a rival company, which announced plans to move operations to another state. Rather than relocate, the Cuthbert family decided to launch KMB. They reasoned that Jenny could continue her work, which would provide some income while Kent tried to build KMB into a profitable business. Kent and Jenny are convinced that the ecotourism market will expand greatly, and they look forward to sharing their experience and knowledge with others who enjoy nature and kayaking. Kayak Melbourne advertises in regional magazines and maintains a Web site, which Jenny designed. At this time, no other kayak rental firms operate within 20 miles of KMB’s location. Customers say that the KMB site is attractive and informative, but the Cuthbert family is not sure it is attracting new business. So far, the Cuthbert family’s plan is working out well. KMB rents space at a nearby marina, where Jenny runs the office and operates her Web design business. She also handles rentals when Kent is giving lessons or busy with a tour group. On summer weekends and holidays, Janet Jacobs, a Swinburne University student, handles telephone inquiries and reservations. KMB’s inventory includes 16 rental kayaks of various types, lengths, and capacities, eight car-top carriers, and a large assortment of accessories and safety equipment. Based on customer requests, Jenny is considering adding a selection of books and videos about kayaking and ecotourism. KMB has three main business segments: rentals, instruction, and guided tours (Moonlight Kayak Tour, City Sights Kayak Tour, Yoga Sunrise Kayak Tour, River to Sky Tour, and Custom Kayak Experience). Most customers make advance reservations for scheduled tours and instruction sessions, but sometimes space is available for last-minute customers. Rentals are split evenly between reservations and walk-in customers. Reservations are entered in a loose-leaf binder, with separate tabs for each business activity. Jenny also created a Microsoft Access database to record reservations. When she has time, she enters the reservation date, the reservation details and kayak type, and the customer information into a table, which is sorted by reservation date. Each day, she prints a reservation list. For quick reference, Jenny also displays kayak availability on a wall-mounted board with colour-coded magnets that show the available or reserved status of each rental kayak. In addition to the database, Jenny uses an inexpensive accounting package to keep KMB’s books. Although the KMB database handles the basic information, the Cuthbert family have noticed some drawbacks. For example, reservations for guided tours or instruction sessions sometimes conflict with Kent’s or Jenny’s availability. The Cuthbert family also would like to get more information about rental patterns, customer profiles, advertising effectiveness, and future business opportunities. Kent and Jenny have talked about updating the system, but they have been too busy to do so. Important note: This is reflective of an actual client project, and the information given in the assignment is very minimum. As IT consultants, your group need to research the industry to find out probable business processes and systems that might fit into this scenario. ………………………………………………………………………………………………………………………………………………………………….. What Need To Do 1. Use Case Descriptions (Word limit: Approx 500 +) Description: Must develop two fully developed use case descriptions. 2. User Interface Designs (Word limit: Approx 500 +) Description: Create a storyboard visual prototype for one use case for a mobile phone device, showing each step of the dialog that maximizes the use of check boxes, radio buttons, and list boxes.
IT Business Application Case Study Identify and describe a business problem with an IT solution from your work or personal experience. Are there any specific artificial intelligence (AI) applications that can be considered as part of the solution? If you don’t have specific personal experience, select 1 management enterprise system (MIS) solution with a specific use case. Then, answer the following questions: What have you identified as the existing business problem? What is your expected deliverable of the business process? What specific IT application did you identify to provide an effective solution? What are the specific features and benefits of the new IT application? How does the new application provide long-term support to the business process by maintaining data integrity in cases of disaster recovery and continuity planning? Submitting your assignment in APA format means, at a minimum, you will need the following: Title page: Remember the running head. The title should be in all capitals. Length: 5 pages minimum Abstract: This is a summary of your paper, not an introduction. Begin writing in the third person. Body: This begins on the page following the title page and abstract page and must be double-spaced (be careful not to triple- or quadruple-space between paragraphs). The typeface should be 12-pt. Times Roman or 12-pt. Courier in regular black type. Do not use color, bold type, or italics, except as required for APA-level headings and references. The deliverable length of the body of your paper for this assignment is 5 pages. In-body academic citations to support your decisions and analysis are required. A variety of academic sources is encouraged. Reference page: References that align with your in-body academic sources are listed on the final page of your paper. The references must be in APA format using appropriate spacing, hanging indent, italics, and uppercase and lowercase usage as appropriate for the type of resource used. Remember, the Reference page is not a bibliography but a further listing of the abbreviated in-body citations used in the paper. Every referenced item must have a corresponding in-body citation.