Verified Document

Telecommunication Network Action Plans Essay

Network and Asset Recovery Issues Part 1 Network Cabling

The issues at The Sunshine Health Corporation are deep and profound as they will require a strategic approach that addresses the problems at their core and provide real and practical solutions to the rather difficult environment. This document is action plans that addresses the old wiring issues the building has, laying new fiber cable where necessary, and presents the idea of developing wireless LANs, and Wi-Fi capability throughout the facility. The plan is intended to be effective, efficient and economical and deliver real and sustainable cost savings in the long-term.

Understanding the Environment

The first and most prescient issue dealing with this case is the identification of what the building possesses and what if any of the old wiring and cabling can be salvaged. The more that is known about the content of the wiring structure, which was left in somewhat disrepair, the more the plan can be developed in a detailed manner. Regardless of what the building has, it is also essential to understand what the building needs in order to reach the objectives and goals that include total intranet and internet wireless capability for a 200,000 square feet warehouse. The first step must include identifying the problem and dealing with it in the most direct manner.

Step 2: Identifying the Needs

Since the content of the wiring is unknown it makes logical sense to determine the cabling needs for the building as it is envisioned in the future. Using a site technician or an outside consultant may be prudent in this manner. This need can be addressed as other aspects of the plan are worked out simultaneously. What is most important is focusing on the value of the needs for managing a project. Tohidi (2011) supported this...

This vision has brought success and the competition has led the manufacturers to provide quality goods, in order to maintain their authority in the field. Since consumers are also always looking for quality and affordable goods and services and products are provided in hot competition fields, in addition to improving the quality of services and products, continuous improvement and how to use the methods to balance between the cost and the applications of a product play a fundamental role, and is one of the most important factors of economic development."
Step 3: Budgeting

Site Technician Consultant: $2,500

Cabling: $23,000

Wiring: $45,000

Labor $80,000

Networking Equipment: $35,000

Hardware: $33,000

Software: $12,000

Misc: $18,000/

Total: $271,000.

Budget $325,000.

Step 4 Determining Cost Savings

Due to the lack of explicit knowledge regarding the actual components of the wiring and cabling it is very challenging to predict an exact cost savings plan. The aforementioned budget is a presentation of what is known at the present moment and could adjust in one manner or another. What is important is that there is an action plan in place that can identify a starting point to determine the overall potential of this building and its ability to function at its new intended purposes.

Part 2 Asset Recovery

When performing asset recovery operations within an organization it is essential for many reasons to have the security and privacy of the issue at…

Sources used in this document:
References

Paul, P.K., Kumar, K., & Chatterjee, D. (2014). Cloud Computing and Information Infrastructure: Emerging Possibilities -- A SWOT Analysis. SRELS Journal of Information Management, 51(2), 129-134.

Tohidi, H. (2011). Review the benefits of using value engineering in information technology project management. Procedia Computer Science, 3, 917-924.

United States Environmental Protection Agency (nd). Electronics Donation and Recycling. Viewed 18 June 2015. Retrieved from http://www2.epa.gov/recycle/electronics-donation- and-recycling

Zhu, K., & Nordstrom, L. (2014). Design of wide-area damping systems based on the capabilities of the supporting Information Communication Technology infrastructure. IET Generation, Transmission & Distribution, 8(4), 640-650.
Cite this Document:
Copy Bibliography Citation

Related Documents

Justifications & Action Plan Net
Words: 5971 Length: 20 Document Type: Research Paper

For this reason alone net neutrality should be encouraged. In addition to the problem of restrictive nature of access tiering within a democratic society, such a system is problematic because it is inconsistent with America's image as a leader in the field of technology. Argument Opponents to Net Neutrality For the most part, there are two sides to the debate on net neutrality (Yoo, 2005). On the one hand operators such as

Telecommunications the Business Case FedEx
Words: 1786 Length: 6 Document Type: Research Paper

It is not known what cost FedEx will have to pay for a durable but reliable smartphone. Most such devices are not designed with longevity in mind, and FedEx normally utilizes devices with long lives. FedEx would be equipping upwards of 200,000 workers, so even negotiating a deal to pay $200 per unit would cost the company $40 million. In all likelihood, however, the cost will be much higher,

Network Security
Words: 3307 Length: 10 Document Type: Research Paper

Network Security: Past, Present and Future The work of Curtin (2007) states that a network is defined as "any set of interlinking lines resembling a net, a network of roads -- an interconnected system, a network of alliances." Quite simply a computer network is a system of computers that are interconnected. There are seven layers of communication types identified by the International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model

Telecommunications - Jordan the Impact
Words: 11320 Length: 34 Document Type: Multiple Chapters

According to Reidenberg (2000: 1318), policy in the United States protects personal information according to a market-dominated paradigm, where limited statutory and common law rights are granted for information privacy. In Europe, on the other hand, the privacy protection norm is dominated by privacy rights. The European Union, for example, requires Member States to include comprehensive statutory protections for its citizens when it comes to privacy rights. The fact that

Network Security and Security
Words: 1504 Length: 5 Document Type: Research Paper

Network Security Systems for Accounting Firm Vulnerabilities Assessment In the contemporary IT environment, the implementation of the IT tools has become an effective strategy that organizations employ to achieve competitive market advantages. In other words, the IT tools have become an effective strategy that organizations can employ to be ahead of competitors, and be first in the market. One of the crucial features of the information systems is the network connectivity that

Export Business Plan
Words: 4891 Length: 15 Document Type: Business Plan

Export Business Plan: Moldovan Cellular Phones Purpose-Why has the plan been written? The plan has been written in order to guide our mobile phone export business. Cell phones in Moldova are rapidly overtaking land phones as many cellular phones now provide Internet access and cell phone computers. SMS, MMS and broadband are becoming standard features on cell phones. Nonetheless, mobile phones are expensive in Moldova and not everyone can afford them. Furthermore,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now