Capstone Project Summary

Improved Essays
Capstone Project Summary
Acme Produce was established in California's Central Valley, an agricultural epicenter for the state, in the spring of 1950. The organization has been family owned and operated scene inception. Currently Acme Produce provides several services to local farmers and grocers including produce preservation utilizing bleeding edge technology to slow the ripening process, allowing produce to be stored longer and shipped further. Acme Produce also provides a counter part to the produce preservation service providing produce rapid ripening, allowing farmers to harvest produce early and have the unripe produce swiftly ripened, providing the ability to meet delivery dates that would otherwise be unobtainable. Acme produce also
…show more content…
Recently Acme Produce has experienced random unscheduled down time due to network outages resulting from various points of failure within the network infrastructure including power surges and blackouts, loss of WAN connectivity, failed hardware and virus and malware network propagation. The loss of network resources and unscheduled down time can equate to tens of thousands of dollars in a matter of hours for Acme Produce. Due to the associated cost of downtime and nature of Acme Produce's operations, several constraints are placed on the implementation of the new network infrastructure. Constraints to network implementation include minimal downtime, migration to new facility should appear seamless to end users, and users at the new facility will require access to network resources at the existing facility to allow for ease of collaboration with team members who have yet to transfer to the new …show more content…
The Enterprise Network Engineer, leading the project, will inventory Acme Produces network resources to locate nodes which may be at or approaching end of life, out of warranty or comprised of dated hardware which may introduce bottlenecks and latency if added to the new network infrastructure. The network inventory and audit will assist the Enterprise Network Engineer in determining which resources can be safely repurposed and which resources should be fully decommissioned. The Enterprise Network Engineer will audit networked resources for both company policy compliance and industry standard security best practices. The policy compliance and security audit will assist the Enterprise Network Engineer in securing the network in an effort to minimize network disruptions caused by viruses, malware and unauthorized access. The design of the new network infrastructure will consist of physical location of hardware resources throughout the new location, Open Systems Interconnection layer 2 design and Open Systems Interconnection layer 3 design. The network design will follow industry standard best practice to maximize uptime and

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Case Study

    • 1143 Words
    • 5 Pages

    The best thing is that if anything needs reconnecting for a different use, all source connections are available in a single space without needing to change any cables. The fiber optic cable would be appropriate because as the business relies on the internet for more and more of their ongoing operations, they are essentially sending and receiving more packets of data. There will be running, on average,…

    • 1143 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    ABC Company has a few diverse equipment and software needs to meet the prerequisites of their network. We've investigated the different pieces of equipment and software to suit the needs of the company. We've looked into what every building will require with respect to what benefit every site gives and decided their needs based on those results. Servers…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    I would suggest to have a windows server 2012 enterprise Depending on the size of the company a minimum of 3 TB of space on raid 10. Use the main server as a host and deploy at least 2…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    For this section of the report I will explain the management tools and technologies used for communicating through network to network, I will also give example on how these tools are used especially in business. Operating systems are simple software which will enable the user to be able to access function to the computer itself, the process is an input and output process where the user will input a function, e.g. through keyboard, and the output will be shown through the monitor. There are many different types of operating systems and depending on your hardware (computer), you can have a different operating systems, in different electronic devices, from computers to mobile phones and tablets. Here are the most common computer operating system:…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Decent Essays

    St. Jude Children’s Research Hospital in Memphis, Tennessee is the hospital I chose for my Capstone project. The reason I choose this hospital is because the amazing job they do with children with cancer and the support for their families. The St. Jude children’s hospital has an amazing mission to provide advance research to help prevent pediatrics catastrophic diseases and they will never denied treatment to anyone based on race, religion or ability to pay. The idea of this project is to show how the organization works showing the facility physical setting, vision and goals, patient base, researches.…

    • 98 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Technology Framework Design In this section, we combine the user domain needs described in Part 1 of this proposal, the physical framework requirements described in Part 2, and the technology selections described in Part 3 to create the final Digital Edge Manufacturing network infrastructure proposal. Choosing the Cabling Used in the Network We considered infrastructure costs, speed, and reliability for cabling and adaptors. Our network employed hybrid type of network sine we use Ethernet cable, Wi-Fi and fiber optic as our media.…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The area of my topic for my Capstone Project is the environment and the United States should stop the production of the North Dakota Access Pipeline. The pipeline is 1,172 miles long and it will transport 470,000 barrels of oil per day. The pipeline will begin in North Dakota, travel through South Dakota, and Iowa, and end in central Illinois. The pipeline will be placed through the Standing Rock Sioux land, which is in North Dakota, and the pipeline would affect their only water supply if the pipeline spills. I chose this area because the media doesn't show what is happening in North Dakota and I want people to be informed about what is going on in our country and stand with Standing Rock to end this battle.…

    • 695 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    INFO498 Final Case Studies Name:_Chris Harlan____ Instructions: Your essays will be graded on content to include grammar and spelling. Each case should take 1-2 pages including diagrams. The essay answers for both #2 and #3 should be 500 to 700 words each, in order to completely answer the questions. Please submit as one document.…

    • 1517 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    As the senior project comes to an end, I am truly excited about the benefit my influence has had on the community. My senior project was just another step to the legacy that I have implemented in Warren County. Thinking back to freshman year, senior project seemed so boring and far away. I never would have imagined the progress and success I've had with my senior project. My interest has stayed the same but I wouldn't think that I would have County Commissioners and a House of Representative present at my event.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Perfect Pizza, Inc.

    • 1254 Words
    • 6 Pages

    It is a very effective tool for long term planning and trouble shooting. This study should most essentially support the financial information of an organization. It helps organizations to determine whether the technical resources meet capacity and whether the team is capable of translating the ideas into working systems. Technical feasibility also involves evaluation of the hardware, software, and other technology requirements of the proposed system. Operational Feasibility:…

    • 1254 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Capstone Reflection Paper

    • 590 Words
    • 3 Pages

    Capstone class has challenged my communication, writing, and presentation skills. These skills I have improved on and found my voice in doing presentation. Working in a group has thought me on how to communicate with difficult people especially when everyone has their own opinion. Even though the workload was intense under a short time frame it was rewarding, challenging, and manageable. I learned that I could complete an assignment under pressure and in a short time frame.…

    • 590 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    This analysis focuses on assessment information provided by an elementary class comprised of 20 students. The results for one particular student named Bobby will also be highlighted in order to analyze and discuss his present developmental word study stage and procedures to support his and his peers spelling acquisition. The words spelled correctly, feature points, and the total feature score will be explained along with the rationalization for grouping the students recorded in this classroom composite inventory. Also, a description of the features that each group will begin working on and the activities that will be used to reinforce each student’s orthographic knowledge will be addressed.…

    • 1510 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays