Advantages And Disadvantages Of Remote Working Information Technology Essay
|✅ Paper Type: Free Essay||✅ Subject: Information Technology|
|✅ Wordcount: 5343 words||✅ Published: 1st Jan 2015|
I am Su May Khing and attending the International Diploma Computer Studies course. I have to learn eight modules in IDCS. During the First Semester, I have learnt four modules and now I am learning four modules in the Second Semester. In the second Semester, I have to study Networking, System development, Java and Business Communication. Of these eight subjects, I am mostly interested in Networking. This assignment can give me more knowledge and experience. This assignment is to produce feasibility reports outlining the case for the provision of a remote working system within the company and to develop a comprehensive project plan for Wi-Fi network implementation in the office.
SU MAY KHING
Myanmar Computer Company Limited (MCC)
Firstly I have to thank my module leader, U Aye Chan. Because of his guidance, I have been able to complete this assignment easily. And thanks to Myanmar Computer Company (MCC), and to NCC education, I have a very high spirit in understanding Java. If NCC and MCC did not exist, I will have no chance for Java subject to learn fluently. And I also give thanks to my classmates for their help and kindness in doing this assignment.
SU MAY KHING
Myanmar Computer Company Limited (MCC)
Introduction of Remote Working System
One more higher productivity and ” The capacity which does not break off, especially can use; work” Project; Principal duty of ability and staff, principal loyalty, a happy staff, higher moral, of a many stimuli, as for retention of list better staff, life and ” The balance is improved; friendly” Family; We working for the sake of is possible the people conformity which uses the domestic adjustment to the capacity which offers state, time and the office where the coverage of work is wide, it contributes and equipment of other things goes the indirect cost where directly, we are decreased continuation for the customer and note to the customer, is better tension for the staff who affirmative image for the company where the coverage which is serviced and is formed is wide, dynamic is lowered, principal are
The Computer hardware/software equipment requirements include the following:
â€¢ Laptop (may require docking station, wireless enable)
â€¢ Desktop (Wire and wireless enable)
â€¢ Secure ID Key Fob (User Authentication)
â€¢ Personal Digital Assistants (PDAs)
â€¢ Internet Access (ADSL, IPStar, Broadband, Dialup) connections
â€¢ Dedicated telephone line from specified address (ISDN may be necessary, dependent on nature
Of information systems and speed of transmission required)
â€¢ Mobile phone card (if mobile remote access)
â€¢ Account on the Constabulary Remote Access Server (RAS)
â€¢ Telephony equipment relevant to the role
Provide any relevant office furniture, including lockable storage (where necessary) in line with the
Workstation risk assessment requirements of the Constabulary Display Screen Equipment (DSE) Policy
Provide and/or purchase IT equipment for the remote workers and arrange and finance the set-up of
Remote network access or stand-alone IT equipment.
Remote working on protectively marked information must be carried out using Constabulary IT equipment
(Refer to the section below entitled ‘Acceptable Use of Personally Owned Computers’ for exceptions).
Although the IT requirements may vary for each remote worker (therefore requiring case-by-case
Consideration), it is strongly recommended that a Constabulary laptop (rather than desktop) be used for
Remote work. This will allow easier transport of the equipment when returning to Constabulary premises
Advantage and possible disadvantages of implementing a remote working system
. When he is appropriate is repaired, you can connect with all place Internet his apartment either (or radius Bluetooth equipment’s 30 feet within marriage) transfer the intermediate frequency type in the radius 300 meters to receive one. Has the spot which the public joins to spread New York (to see also: The cloth bears the graciousness special park to let to his use they and Internet’s connection free connection). If you have a card, does not use the thread which installs in his laptop computer, you can bear the graciousness special park to the cloth to bring it, she revise some adjustments and she may verify & Email; under tree practice ocean waves fabric. The laptop computer’s battery usually continues for 2-3 hours, the followed use. Also have you to be able each hour payment loading to be able to enter to the Internet the spot which has his laptop computer’s public to join. Does not have the thread reception to change from the region to the region, to even has the apartment in his within. It’ Guarantee s not always you’ll has with Internet’s connection
Specifications of MSI GX640, Core i5 gaming laptop:
Windows® 7 Home Premium
Intel Core i5 processors
ATI Radio HD5850 with 1G GDDR5 VRAM
DDRIII SODIMM slot x 2 (Up to 8GB)
15.4â€³ TFT LCD
2.5â€³ 320/500/640GB SATA
4 in 1 (XD/SD/MMC/Memory Stick)
HDMI, D-sub, USB 2.0*2, e-SATA, 1394, Mic-in, Headphone out, RJ-45/RJ-11
Intel 802.11 a/b/g/draft n, Bluetooth V2.0EDR
Cinema Pro, ECO Engine, Numeric Keyboard
This notebook is available now on Amazon for $1,099.99, which is pretty cheap for a gaming notebook.
Features -WMV/RV/MP4/3GP video player
– MP3/WMA/WAV/RA/AAC/M4A music player
– Document viewer (Word, Excel, and PowerPoint)
– Blackberry connectivity
Practically unlimited entries and fields, Photo call
Cisco-Linksys WRT54G Wireless-G Router
The Linksys wireless g broadband drill is really three devices in a box. First it’ wireless point of entrance S. – A., which lets you attach wireless-closely or to wireless b the devices to the net.
The price of this wireless router is very cheap because it is very useful and it’s price is only $135.48.
ES3528M-PoE / L2 Fast Ethernet Standalone PoE Switch
24FE+2GT+2ComboG L2/L4 PoE Standalone
SDRAM for CPU
Lexmark Interact S605 Multifunction Printer
Description: Interact S605 Multifunction Printer
Lowest Price: $129.98
Network adapter card
Device type network adapter
Form Factor Plug-in card
Interface (bus) Type PCI
Connectivity Technology wireless
Data Transfer Rate 54Mbps
Encryption Algorithm 128-bit WEP, 64-bit WEP
Certified for Windows Vista “Compatible with Windows 7” software and devices carry Microsoft’s assurance that these products have passed tests for compatibility and reliability with 32-bit and 64-bit Windows 7.
Compliant Standards FCC
Belkin Patch cable – 2 x LC – M – 2 x SC – M – Fiber optic 3.3 ft
Network Cable Type
Core / Cladding Diameter
62.5 / 125 micron
2 x LC – male
Connector(s) (Other Side)
2 x SC – male
Miscellaneous Package Type Retail
Procurement for remote working system
The Remote Access System, which serves both the client and server. In this system, the server designates a specific directory, thus enabling clients to run executable programs only from inside the directory. After the systems were implemented, we combined chat-like functions with a RAS system server, called the Remote Working System. In this system, users can talk, work, or meet with friends. All clients are able to see what all on-line users are working on. We also designed the server side of the Remote Working System using not only the single-process concurrent paradigm, but also the concurrent connection-oriented paradigm with shared memory.
The main challenge of this project is intercommunication of processes, which is implemented in two ways: pipes and shared memory.
Security for remote working system
1.1 The purpose of this policy is to specify our company (hereafter known as the “Constabulary”) security rules and procedures for the use of and access to Constabulary information assets, systems and equipment for the purpose of remote working.
1.2 This policy applies to all Constabulary staff carrying out remote working.
2. Principles of Remote working
2.1 The remote operation will be defined as: “Complete work or per hours of the staffs realized by the staff personnel of a location of the not-police where the network access must be obtained marking inside through servant of the remote access (EVENNESS). More in three main types of remote operation can be classified thorough: â€¢ (movable something that a host spot) access of movable remote network using a presentation of the card of the telephone e.g. of the evidence in the court, or operations including the firearms â€¢ in the short term (less than six months) or of long term (six months or more) completely or for hours work of our staffs with the access of network of a host spot, including the direction of beginning of the disc track (instead of police premises it based the work). â€¢ outside work our staffs of the office using HE equipment that does not require conference of the network access e.g. or ‘ overflow’ work of address.” caretaker; 2.2 Like general requirement, the remote workers must use our company computers. Nevertheless, there will be some limited and exceptional circumstances in which overflow of `or working moved away of `can be realized using the owned personal computers. The operational our company works or the sensible work of the staff is due to never realize in owning personally IT equipment. The direction and the rules well are defined in the titled section ‘ Acceptable use of Computers’ personally owning; 2.3 This policy is not a movable strategy of the data. The policy of security of the remote operation thinks to deal with the risks for the security associated to all the present forms moved away operation to maintain an atmosphere safe, reducing to the minimum risks to the secret, integrity and availability of the police information. Exclusions of the policy.
If you need assistance with writing your essay, our professional essay writing service is here to help!Essay Writing Service
Maintenances for remote working system
Progress in wireless communications, in model-created diagnoses, into which human machine interfaces, in which electronics and in embedded system technologies have the basis for a drastic shift to the kind caused, which the carriers are determined and maintained. These progress makes possible to be accomplished far away the carrier diagnosis and – maintenance, while the carrier is driven. It also gave new strong consumer interest at the remote diagnostics and at maintenance. As consequence is design increased attention in the automobile industry. This paper supplies the present status of the remote diagnostics of the carrier and maintenance, analyzes the possible characteristics and their meaning and discuss like the following production of automobile products could from research and development within this range profit.
While the times introduce to change and new technologies in a constantly rising step, the requirement can be realized driven by the ship-owners for faster repair and maintenance of the equipment on board its containers with this technically advanced service tool, with the result of the more economic time/value solutions for modern IT, sea-industry.
Support for remote working system
Carrier sense multiple access with collision avoid ance (CSMA/CA)
Media Access Protocol
OFDM: BPSK, QPSK, 16-QAM, 64-QAM
DBPSK, DQPSK, CCK
11 for North America
IEEE802.11g 6Mbps@ -92dBm 54Mbps@ -74dBm
Receive Sensitivity (Typical)
IEEE802.11b 1Mbps@ -97dBm 11Mbps@ -89dBm
IEEE802.11g 26dBm@6~24 Mbps 25dBm@36 Mbps
Available transmit power 23dBm@48 Mbps 22dBm@54Mbps
IEEE802.11b 27dBm@1 ~ 11Mbps
Directional Embedded antenna (Diversity support)
Antenna Gain = 4 dBi Infrastructure/Ad-Hoc
Topology Operation Mode
Access Point/Universal Repeater/WDS
Since the popularity of the Internet grew, the risks rotated too as extension of their own nets. It is for company employees of the use only, place is planned. Now much you cause for companies its own VPN (practically private net) around distant employees and distant offices to adapt the necessities of. Generally VPN is a private net, for which a general net (normally Internet) removed used, in order places or users together to connect. Instead of using, a specific, realistic connection such as rented line, VPN â€žuse; virtual” Connections by Internet of company’ are crushed; s-private net to the distant place or to the employee. In this article you receive from VPNs and from references of the fundamental components of VPN, technologies, it to fundamental view a tunnel Sepulchers and learn security.
The asymmetric Digital Line of the Subscriber (ADSL) – one form of Digital technology of the Line of the Subscriber, technology of data transmission which allows faster data transmission on copper telephone lines, than usual voiceband can provide the modem. It does it, using frequencies which are not used by phone call of a voice.  divider – or the microfilter – allows unique telecommunication to be used both for service ADSL and for inquiries of a voice at the same time. ADSL can be distributed only in general on short distances from the central office, it is typical less than 4 kilometers (2 Ð¼Ð¸), , but as is known, exceeded 8 kilometers (5 Ð¼Ð¸) if originally put wire pattern considers farther distribution. In 2005, ability to transfer copper services ADSL/DSL on a fibre an optical cable became possible, using RLH ADSL/DSL a fibre optical communication, providing distances from one item up to the opposite end of system it is more than 30 miles.
In a telephone exchange the line in general comes to an end in DSLAM where other divider of frequency separates a signal of a strip of a voice for a usual telephone system. Data whom bears ADSL are typically broken on a network of data transmission of the telephone company and finally reach usual the Internet-network of the Report.
Linksys Simultaneous Dual-N Band Wireless Router WRT610N Wireless router
Top of Form
The wireless Gigabit is really four devices in a box. First there’s the wireless point of double volume entrance, which lets you attach to the net without wires. There’s also built in 4 a full duplex 10/100/1000 haven switch to attach to their Ethernet devices with up to Gigabit together. The drill function ties it together all and lets its complete net a high-speed cable or a DSL Internet connection divide. Linksys included also a memory connection, which you add easily gigabyte storage capacity on your net using easily available non removable disk drive assemblies of the USB-2.0 – or a USB sharp disk to attach leaves, so that a comfortable way falls back to your mobile files. Built in central operators flow music, video and photo from the attached data storage unit to each UPnP compatible central adapter. And you can arrive at your documents everywhere from the world by the Internet inside. The point of entrance, which is established into the drill, uses a double volume version of the very latest wireless network connection port, wireless n (draft 802.11n). By the coverage of the signals of the repeated radios for each volume, wireless N ” Multiple connection place inside, repeated Out” Technology (MIMO) multiplies the effective data rate. Differently than usual wireless network connection technologies, which are confused by signal reflections, MIMO really uses these reflections to increase over the distance and ” to reduce; dead spots” within the wireless cover range. The robust signals travel far and keep wireless of connections much far as Standard g with to wire-draw the work, which is large with Standard g, – A and – building armament, but, if both ends of the wireless connection are wireless n, the drill knows the throughput, by even increasing twice so much radio volume use and furnish, accelerates many faster than Standard g. But differently than other speed-increased the technologies, wireless can for this doubling speed mode possible for wireless devices make dynamically, with two other wireless apparatuses with their respective fastest speeds still attach. Within clogged ranges “good neighbor” Mode guarantees that the drill examines on other wireless apparatuses within the range, before it devours the radio volume up. In order to help your data and private lives protect, the drill can all wireless transmissions with industrialist strength 256 code bit coding. It can as your network’ serve; s DHCP operator, has an efficient SPI party wall to protect to your PC from intruders and most well-known Internet attacks and supports VPN passage. Configuration is a catch with the net Browser created configuration utility program. The unbelievable speed to wire-draw and Gigabit of the wired network connection is ideal for central center applications like a flowing of the video, the play and the voice over IP telephony and gives you much the passage height to the repeated central intensive data streams of the run by the net at the same time, without reduction in the achievement.
Bottom of Form
Device Type Wireless router
Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.View our services
Form Factor External
Width 8.9 in
Depth 7.1 in
Height 1.4 in
Weight 15.9 oz
Connectivity Technology Wireless, wired
Integrated Switch 4-port switch
Line Coding Format CCK, 64 QAM, BPSK, QPSK, 16 QAM, OFDM
Data Link Protocol Ethernet, Fast Ethernet, Gigabit Ethernet, IEEE 802.11b, IEEE
Switching Protocol Ethernet
Network / Transport Protocol PPTP, L2TP, PPPoE
Routing Protocol RIP, static IP routing
Remote Management Protocol HTTP, HTTPS
Status Indicators Port status, power
Firewall protection, NAT support, auto-uplink (auto MDI/MDI-X), State Packet Inspection (SPI), VPN pass through, firmware upgradable, MIMO technology, Wi-Fi Multimedia (WMM) support, Quality of Service (Quos), Wi-Fi Protected Setup (WPS), DHCP server
Compliant Standards IEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.11b
Antenna Internal integrated
Antenna Qty 3
Interfaces 1 x network – Ethernet 10Base-T/100Base-TX/1000Base-T – RJ-45 ( WAN ) 4 x network – Ethernet 10Base-T/100Base-TX/1000Base-T – RJ-45 1 x Hi-Speed USB – 4 pin USB Type A
Cables (Details) 1 x network cable
Encryption Algorithm 128-bit WEP, 64-bit WEP, WPA, WPA2
Certified for Windows Vista Certified for Windows Vista software and devices have undergone compatibility tests for ease-of-use, better performance and enhanced security.
Compliant Standards CE, IC, FCC
Power Device Power adapter – external
Service & Support 1 year warranty
Service & Support Details Limited warranty – 1 year
Min Operating Temperature 32 °F
Max Operating Temperature 104 °F
Humidity Range Operating 10 – 80%
Universal Product Identifiers
Part Number WRT610N
UPC 0745883585205, 0045883585206
Open the web browser and enter the Router’s default IP address, 192.168.1.1, in the Address field. Then, press Enter.
Change Router IP Default 192.168.1.1 to 192.168.248.57
Choose Subnet Mask : 255.255.255.0
Click Save Settings Button and Restart Router.
In the web browser and enter the Router’s IP address, 192.168.248.57, in the Address field. Then, press Enter.
In DHCP Server Settings, DHCP Server is Enabled and Starting IP Address 192.168.248.60 and In Maximun Number of DHCP Users box, Type 31, so IP Address Range is 192.168.248.60~90 and Click Save Settings Buttom.
In Router Menu Choose Wireless and Click Basic Wireless Settings
In Mode Box, Select Mixed
In Wireless Network Name (SSID), type PTLSJC
In Wireless Channel, Select 06
In Wireless SSID Broadcast, Select Enabled
Click Save Settings Button.
In Router Menu Choose Wireless and Click Wireless Security
In Security Mode, Select WPA Personal
In Encryption, Select TKIP
In Passphrase, Type Security Key (8~63 characters)
Click Save Settings Button.
Connect to the Notebook PC to Connect Accesspoint SSID PTLSJC
Connecting to the SSID PTLSJC
Type the Wireless Security Key WPA assign from Accesspoint
Viewing Notebook PC from Network Configuration (Network Sharing Center)
Viewing Notebook PC from Wireless Network Connection Status (Network Sharing Center)
Viewing Notebook PC from Network Connection Details (Network Sharing Center)
Connection Testing Gateway IP 192.168.248.57 from Command Line
Connection Testing Other Notebook PC connecting Accsspoint PTLSJC
Copy Folder Sharing and Sharing File Copying Testing form Other Notepad PC (192.168.248.60) to My Notebook PC (192.168.248.61).
Type Run Box, 192.168.248.60
Viewing Share Folder from NoteBook PC (192.168.248.60)
Viewing Share Folder Public ƒ Double Click Public Folder ƒ Double Click Public Documents ƒ Select Neworks can command.docx
Copying Document Select ƒ Press Ctrl+C (or) select document on right click ƒ select Copy
Open My NoteBook PC Windows Explorer ƒ Select Local Drive (C:) ƒ Press Ctrl+V (or) In Local Drive (C:) ƒ Right Click ƒ Select Paste
Pront Message Box for Destination Folder to Copy Right Permission for Administrator
Click to Continue
Still Copying to My Computer Local Drive (C:)
Viewing after copying file (Network can command.docx)
Linksys WRT300N-UK Wireless-N Broadband Router
The wireless standard, correctly admits as IEEE 802.11n, was, in the draft mode for over three years however is suitable for final agreement in April. When such the flooding to wire-draw of the devices, which had network connection companies in the background for nearly, while long finally into the headlight moves. Linksys offers wireless N broadband drill to the WRT300N-UK as universal, wireless high-speed drill for head or small office use. It doesn’t’ cover an ADSL modem, the you’ ill necessity at a divided Internet connection. The standard 802.11n specifies a data transmission rate of 540Mbps, 10mal faster than 802.11g (Linksys maintains 12x in the tests against its own installation set 802.11g) and a distance 50m at home. The unit a strange animal is physical. It can be attached at the desk or vertically into a supplied location flat, has three antennas – the middle, like one of K-9′ looks; S-ears – and a row announcements on the front lining, the so weak it’ are; s strongly to explain, are which. At the back are four Ethernet ports and fifth for this ADSL modem. The unit supports six wireless safety minutes: PSK personally, PSK2-Personal, PSK enterprise, RADIUS and incoming inspection. You’ RH turn out, in order to use one from them to, in order to prevent the unwanted users, who lift into your net. As realistic test we took a 1GB mixed basket of the documents and copied them first over a net 802.11g, using a Linksys WRT54G of drill. This took one second in eight minutes. We then created a connection 802.11n, using the WRT300N-UK and the supplementing WMP300N-UK Linksys to wire-draw PCI map and repeated the data relocating. This mark took it 4:53, so hardly 12 times the speed, although there was a 64-Prozent-Zunahme. The Linksys utility program for the wireless map reported any way over a maximum data transmission rate of 300Mbps, but computed more nearer at 200Mbps, below the theoretical maximum average. This test was locked with the drill and the map around 4m of each other, therefore signal strength was with 100 per cent. We separated the two devices 10m, also a few partitions between, and the basket of the documents took 6:05 to the transmission, the Linksys software, which reports over a data transmission rate of 117Mbps. The distance is better than with Linksys’ Hardware s-802.11g, but doesn’t’ t appear four times better than the requirements for box. Within six months all wireless drills and maps are to the standard 802.11n and prices are practical please. In the instant as, although, you’ RH, a premium as early adoption paying for a product that isn’t this much faster than 802.11g.
Cisco-Linksys WRT54G Wireless-G Router
All-in-one Internet-sharing router, 4-port switch, and Wireless-G (802.11g) access point
Wireless data rates up to 54 Mbps–5 times faster than 802.11b
Shares a single Internet connection and other resources with Ethernet wired and Wireless-G clients
Interoperates with 802.11b clients at 11 Mbps
Advanced wireless security with 128-bit WEP encryption, MAC, or IP address filtering
Product Manual [1.20mb PDF]
Product Dimensions: 3.8 x 1.1 x 4.4 inches ; 3.9 pounds
Shipping Weight: 4 pounds (View shipping rates and policies)
Shipping: Currently, item can be shipped only within the U.S.
Item model number: WRT54G
Average Customer Review: 3.6 out of 5 stars See all reviews
`The Linksys wireless g broadband drill is really three devices in a box. First it’ wireless point of entrance S. – A., which lets you attach wireless-closely or to wireless b the devices to the net. There’ s also an inserted full duplex 10/100 four-opening switch to attach to their Ethernet devices. Attach four PC directly, or daisy chain out to more hubs and to switches to cause the largely a net how you need. Finally the drill function ties it together all and lets its complete net a high-speed cable or a DSL Internet connection divide. In order to protect your data and private lives, the wireless g broadband drill can code all wireless transmissions, and he supports the industrialist strength wireless security of the authentication 802.1x and the authorization. The drill can serve passage as DHCP operators, has from Internet intruders to protect the NAT technology, supports themselves VPN and can be assembled, around internal users’ to filter; Entrance to the Internet. Configuration is a catch with the net Browser created configuration utility program. With the Linksys wireless-closely broadband drills in the center of your output or office net, can divide you a high-speed Internet connection, documents, printers and multi-player plays with the flexibility, the speed and the security, which you need! The 54 Mbps wireless network connection is Standard that’ Wireless g; s more as four times faster than the wireless b unfolded far products (802.11b) found in the houses, in the business and in the general wireless crisis centers around the country. But, since they divide same 2,4 the gigahertz radio volume, wireless g devices can also interact with the existing 11 Mbps wireless b equipment. Because both standards are inserted, you can your investment in existing infrastructure 802.11b protect and walk to the new cry-fast wireless-closely standard off, while your necessities grow.
The price of this wi
Cite This Work
To export a reference to this article please select a referencing stye below:
Related ServicesView all
DMCA / Removal Request
If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: