The report depicts the importance of implementing proper network as well as server implementation for developing the system architecture of Aotearoa Technology College. In order to gain competitive advantages and at the same time for effective revenue the Aotearoa Technology College authority is willing to open four different college campuses respectively in Auckland, Hamilton, Wellington, and Christchurch in the coming year. For the successful implementation of the system support of IT and strategies are required to be considered. However in order to conduct the monitoring and survey approaches of these four campuses it is necessary to develop network architecture as well as a secured server. With the help of a secured server the management and the authorized users will be able to access the information stored in the data server. After considering the blueprint, it has been found that, they are expecting to have 1000 students all round. Among them 400 will be in the Auckland branch and for the rest of the branches 200 students are expected to be accommodated.
In order to lease the computer equipments in terms of computer, printers, and many other peripherals it is necessary to sign an agreement to the computer manufacturer. However, the responsibilities just not get over after the implementation of the network architecture but also maintenance is another important part that is strictly required to be considered by the system developers and by the. For the help desk operators job descriptions is requiring to be developed and on the other hand a code of ethics is required to be conducted that is needed to be abided are also illustrated in this report. Even in order to manage the incident management approaches properly, accurate software are needed to be purchased by the system developer of Aotearoa Technology College. Considering the requirement of the entire centre, a physical centre is needed to ne developer and that is also elaborated in this report.
The help desk is a specialized job description that is optimized for the posting of online job boards rather career pages and it is very much easier for the company customization (Conger, 2015). While conducting the research approach the advantage and disadvantages of help desk job description and the responsibilities of help desk specialists are also elaborated. The responsibilities of help desk specialists are as follows:
The responsibilities of the system are as follows:
Customer satisfaction: The main advantage of the help desk job description is it could provide high level satisfaction to the consumers. Due to the clear visibility of the job description in the company website and in the product brochures the users will be able to access the desired information (Chunpir & Ludwig, 2014). However, there are enterprises that outsource their help desk services to the offshore companies. Due to lack of trained staffs and longer wait time management the customer might get dissatisfied from the help desk services.
Quality improvement: The overall quality of a system can be completely improved with the hep if the system. The product quality and services served by the business enterprises can be improved with the help of the job description. The identified issues can be mitigated from the core management areas, if the customers call the help desk specialists. In order to track and tabulate the reports accurately the companies can utilize proper software system. In order to implement the improvements the users the problems can be reviewed by the designers.
Communication error: If the company fails to possess accurate communication skills then, the organization will fail to keep the connection along with strong client facing components (Agyapong et al., 2014).
Lack of multitasking skills: If the management fails to adopt accurate advanced troubleshooting and multitasking skills then, the service provider will not be able to provide the desired outcome.
While developing the network architecture for the college it is very much necessary to develop the standard code of ethics. The two policy principle developed for the concept is as follows:
Honesty and integrity are referred to as one the most important factors that are required to be considered by the management authority while developing the network architecture. If they fail to do such then the entire system might get corrupted with the external attackers (Shahri et al., 2014). On the other hand, if they avail this approaches then the entire process will give measurable benefit to the system develops and to the college authority also. The employees who will work as the system developers must be sincere and honest at the same time (Council, 2013). However many advantages and disadvantages are associated to it.
With the help of the code of ethics the college management authority can make proper decision making and the comprehensive guidelines could enhance the employee’s awareness and commitment towards the code. In a small business the foundation can give effective internal as well as external decision making power (Pirrone & Trainor, 2015). A strong code of ethics might guide the college from the external attackers. Even in day to day decision making this approach is also very much helpful.
At the same time, if company fails to adopt accurate code of ethics then from the ethical aspect the college authority will face major level of failure. On the other hand, security is referred to as one of the most important factor that is strictly required to be considered by the management authority (Hejazi, Halpin & Biggs, 2014). Due to lack of security concern the external attackers will easily come and hijack the information stored in the data server of the business organization.
In order to manage large set of data the recommended software that the college management authority must afford is the SAP ERP. It will help the authority to possess effective decision making.
All the business functionalities could get integrated and the organizational efficiency will be enhanced and business process can be managed properly after the adoption of ERP solution. In order to manage and track the system capability SAP provides single interface to the system developers (Iriberri, Kwon & Henson, 2015). The network level transaction and processes can be automated and due to the system integration the users will be able to access information from the server regardless of time and location as well.
As the budget of the authority is not as mush higher as the large businesses thus, implementation of SAP will be expensive while purchasing and maintaining the system. The system is very much complex and due to the extreme level complexity most of the small organizations might not adjust with the SAP ERP (Hejazi et al., 2014). For the maintenance expert team is needed if the authority fails to adopt expert team then it will be a major disadvantage for Aotearoa Technology College.
The suggested network is represented below which will be beneficial for Aotearoa Technology College to manage their different branches throughout. In this suggested network architecture the routers, Ethernet hub, Ethernet switch and firewall are incorporated (Leicester, 2016). The advantages and disadvantages of the support centre are as follows:
With the help of proper network architecture, the entire system will be secured from the external attackers and at the same time, due to the application firewall only the authorized users will be access information from the server (Wang et al., 2015). For the presence of SAP ERP the data could be integrated perfectly.
Figure 1: Network architecture for Aotearoa Technology College
(Source: Jo et al., 2015, pp-55)
If the authority fails to implement proper VPN and firewall then the external users can easily access the information from the serer without any kind of error (Jin et al., 2013). On the other hand of they fail to install proper security encryption keys then it will be again a major failure to Aotearoa Technology College.
Conclusion
From the overall discussion it has been found that it is necessary for Aotearoa Technology College to develop network architecture accurately that could help to monitor and control the overall system of all the branches including Auckland, Hamilton, Wellington, and Christchurch. Not only this, but also IT help desk is another important aspect that has been considered by the project manager and by the management authority of the college to control and monitor the system. The role of IT support and IT strategies are also illustrated in this report and in order to develop the network architecture the network developers are needed to consider different network alignment strategies. Before conducting the network structure selection of proper code of ethics should also be considered. In order to conduct the network system it is necessary to understand the system both the software and hardware requirement. The report has represented a network layout for Aotearoa Technology College which will be helpful for both the network and IT infrastructure. The advantages and disadvantages of help desk, software architecture and other approaches are also elaborated in this report. It is expected that the newly developed architecture will be able to serve the expected outcome of Aotearoa Technology College.
In order to mitigate the issues associated to IT help desk and network architecture that might hamper the expected system execution it is necessary to provide certain recommendations to Aotearoa Technology College. The recommendations for Aotearoa Technology College are as follows:
Development of proper security approaches: In order to mitigate the security issues it is necessary for the system developer to consider certain security approaches. With proper security approach the only the authenticated users will be able to access information from the data server. However due to lack of security implementation any external users could access data from the server and also can misuse them which is referred to as one of the very harmful issues.
Development of training and development programs: In order to mitigate the issues of IT support system and IT strategies it is necessary for the system developers to implement certain training and development programs for the system developers. It helps the system developers to conduct the network and computer manufacturing approaches properly. Not only this, but also for understand the advantages and disadvantages of the network system and computer manufacturing approach system it is necessary for the system developers to conduct the proper networking oriented training and development programs. However, before successful implementation, it is necessary to conduct alternative IT networking and IT support system as well.
Consideration of code of ethics: For the system developers it is necessary to consider the standard code of ethics. It will be helpful for the system developers. With the help of the ethical consideration the developers will be able to develop network architecture accurately.
References
Agyapong, P. K., Iwamura, M., Staehle, D., Kiess, W., & Benjebbour, A. (2014). Design considerations for a 5G network architecture. IEEE Communications Magazine, 52(11), 65-75.
Beatty, R. C., Arnett, K. P., & Liu, C. (2015). CIO/CTO job roles: An emerging organizational model. Communications of the IIMA, 5(2), 1.
Chunpir, H. I., & Ludwig, T. (2014). Reviewing the Governance Structure of End-User Support in e-Science Infrastructures. In GI-Jahrestagung (pp. 1687-1697).
Conger, S. (2015). Six sigma and business process management. In Handbook on Business Process Management 1 (pp. 127-146). Springer Berlin Heidelberg.
Council, S. A. N. (2013). Code of ethics for nursing practitioners in South Africa. Pretoria: South African Nursing Council, 3-5.
Hejazi, S. S., Halpin, A. L., & Biggs, W. D. (2014). Using SAP ERP technology to integrate the undergraduate business curriculum. Developments in Business Simulation and Experiential Learning, 30.
Iriberri, A., Kwon, O., & Henson, J. (2015). Integrating an erp into the curriculum at a business school: the students’perceptions of SAP. Academy of Educational Leadership Journal, 19(2), 99.
Jin, X., Li, L. E., Vanbever, L., & Rexford, J. (2013, December). Softcell: Scalable and flexible cellular core network architecture. In Proceedings of the ninth ACM conference on Emerging networking experiments and technologies (pp. 163-174). ACM.
Jo, M., Maksymyuk, T., Strykhalyuk, B., & Cho, C. H. (2015). Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing. IEEE Wireless Communications, 22(3), 50-58.
Leicester, N. (2016). Ethics in the IT Profession: Does a Code of Ethics have an Effect on Professional Behaviour?.
Pirrone, M., & Trainor, J. E. (2015). Code of Ethics Amendments Required by Section 406 of the Sarbanes-Oxley Act. Journal of Leadership, Accountability and Ethics, 12(1), 25.
Shahri, A., Hosseini, M., Phalp, K., Taylor, J., & Ali, R. (2014, November). Towards a Code of Ethics for Gamification at Enterprise. In PoEM (pp. 235-245).
Sykes, T. A. (2015). Support Structures and Their Impacts on Employee Outcomes: A Longitudinal Field Study of an Enterprise System Implementation. MIS quarterly, 39(2), 437-495.
Wang, H., Chen, S., Xu, H., Ai, M., & Shi, Y. (2015). SoftNet: A software defined decentralized mobile network architecture toward 5G. IEEE Network, 29(2), 16-22.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download