StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Meme-Tech Network Engineering Project - Case Study Example

Summary
The study "Meme-Tech Network Engineering Project" critically analyzes and evaluates some of the most successful start-ups in the Australian market to understand why they have succeeded. Meme.Tech hopes to develop a start-up that helps in the development of start-ups in Australia…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful

Extract of sample "Meme-Tech Network Engineering Project"

Network Engineering Name: Course: Instructor: Institution: Date of Submission: Table of Contents Table of Contents 2 1.0.INTRODUCTION 3 2.0.MILESTONE TWO 4 3.0.MILESTONE THREE 6 4.0.CONCLUSION 8 5.0.References 9 1.0. INTRODUCTION Meme.Tech hopes to develop a start-up that helps in the development of start-ups in Australia. Thus, to ensure the business is successful in the market, the project evaluates some of the most successful start-ups in the Australian market to understand why they have succeeded. In understanding the factors including the technologies that have influenced the success of this businesses, Meme.Tech will have an outline on what factors to consider for its success. The technologies that have influenced the businesses as presented below, will be used to ensuring the success of Meme.Tech. More importantly, the business requires to deliver flexible networking solutions for the rapid growth of start-ups. Thus, the project will first evaluate roughly ten start-ups and their technologies. Then based on milestone one, the technologies to be deployed for trial in Meme.Tech will be selected including an outline on how to deploy them in the business. Lastly, the project recommends a process that will be used to evaluate the deployed technologies in Meme.Tech. 2.0. MILESTONE TWO Meme.Tech business needs to deploy technologies that will create trust among the entrepreneurs to either continue trying starting business despite failure. It needs technologies that will engage people and more importantly, help the business grow (Hunt, et al., 2012). Thus, some of the recommendable technologies to apply in the business trial period are from the following start-ups. The technologies that should be deployed for the trial period include the Instamarket tech, Tanda, Start-up smart podcasts, Airtasker, and stockspot technologies. These technologies will not only help the Meme.Tech grow, but will ensure the business is successful in the market. Instamarket market technology as expressed above is an Instagram marketing app that increases the recognition of a business among its local users and other followers. Thus, Instagram will promote and market Meme.Tech among possible entrepreneurs that want to start businesses. The app does not have many dependencies as many people using the Instagram app can access the tech. Airtasker technology involves a platform where people outsource tasks. The platform is beneficial in that Meme.Tech can use the platform to post opportunities for start-ups. Thus, people who are looking to start-up businesses would know where to outsource for financial and other options that Meme.Tech offers. The dependency of the Instamarket and Airtasker technologies is as follows. Deployment of the Technologies The technologies will be deployed using the single provider, multi-AS deployment service. The most important feature of deploying this services is the VPN, which links different sites to the business despite the geographical differences (Anttalainen, 2003). The deployment included engaging in a physical design process where the network equipment’s are first installed in the business including the networking cables among others. Then the network design is deployed, which if followed by the routing process. Once the following equipment’s have been set, the VPN to be used is installed and monitored for stability including other generic requirements it ought to meet including scalability, availability and security among others (Haykin, 2004). The deployed VPN is monitored to ensure it meets the anticipated standards of production and reliability, which will be expected after the trial period is over. The evaluation process includes evaluating the availability of the service, VPN routes and other peering’s that will influence the efficiency of the tech deployed (Yuen, 2013). The dependency tree below provides an outline of the dependencies of Start-upSmart Podcasts, Tanda and Stockspot. Thus, based on the information provided above, the Instamarket and Airtasker are easy to deploy in the business. The deployment will include a single-provider, Multi-AS process (Anttalainen, 2003). The two deployment trees provided show that the business will require many multiple systems that are autonomous through routing to ensure people across the nation can use the business implemented technologies. The technologies were implemented in relation to the needs and demands in the market, poor competition strategies, poor products, marketing, employees and business model among other factors. Instamarket had a product that the market needed, it had an available market base, no direct competitors and considered the customer’s needs (Haykin, 2004). Thus, the technology had to succeed in the market. Airtasker also considered the needs of the customers, and the market demand for the services it offered was high. The technology would benefit private individuals and businesses. Similarly, the stockspot and Tanda were technologies that considered the needs of the customers and promoted a quality product, which is also seen for the Start-upSmart podcasts. Thus, these technologies will be deployed in the trial period while considering the dependencies provided above, including the goals considered and strategies that influenced the success of the technologies (Malyshkin, 2011). 3.0. MILESTONE THREE Network Evaluation of start-ups begins by determining the value of the business in the market/ industry that it exists in, which includes determining the demand and supply of the product/ service that the business intends to provide. Thus, the network evaluation process mainly includes ensuring that all the networking requirements needed are met for the selected technologies to run effectively. Some of the requirements include the provider, service and engineering requirements of networking. The provider requirements include management and scalability of the network implemented for the business. The service requirements that the network evaluation has to consider is availability, stability, traffic, security, topology, addressing and quality among others as will be evaluated thoroughly (Staessens, et al., 2011). The engineering requirements may include the forwarding plane and control plane requirements, and control plane containment, including interoperability among others. Thus, the network evaluation of Meme.Tech should ensure the provider, service and engineering network requirements are met of all the technologies to be implemented in the business. The business needs a technology that could continuously run the five selected technologies effectively (Staessens, et al., 2011). The deployment of the technology involves a single provider Multi-AS network design as shown below. The most important features that must be considered are the scalability features, which includes the ability of the service provider of the network to support the VPNs within a recommended number of years, despite the bulkiness of the data. Thus, some of the most important features of scalability include PPVPN that supports various size site interfaces, VPN routes, the PPVPN should also support high frequency values regarding change and configuration setup and the site user’s numbers while using similar logics (Staessens, et al., 2011). Others may include the solution specific metrics and number of addresses and their prefixes. The availability of the offered VPN should be significantly high for efficiency for easy connectivity among varying sites. The VPN provided must be stable for easy maintenance and upgrading the network. The security features to consider include security of private user data, access control, authentication and authorization of sites, and security of the domain. 4.0. CONCLUSION Business successful implementation of networks and business models is dependent on many factors. First, the business prior to commencement or implementation of network designs must conduct a market research to value the demand and supply of the products/ service been offered. When it comes to deploying networks, businesses must consider all the generic requirements of effectively implementing technologies such as the provider, service and engineering requirements as provided above. More importantly, when deploying technologies the consideration of features regarding the physical design, network equipment designs and routing considerations must be developed. Besides the benefits of networking, technology has to consider other market factors such as the availability of the market. The businesses implemented technologies cannot succeed unless other market factors are considered. For instance, besides the network engineering that enabled the flatmates technology to reach many markets while using single-provider multiple VPNs, without the available market, the technology would have failed. 5.0. References Anttalainen, T., 2003. Introduction to telecommunications network engineering. USA: Artech House. Haykin, S., 2004. A comprehensive foundation. Neural Networks, Volume 2, p. 41. Hunt, K. J., George, R. I. & Kevin, W., 2012. Neural network engineering in dynamic control systems. New York: Springer Science & Business Media. Malyshkin, V., 2011. Parallel Cmputing Technologies: 11th International Conference, PaCT 2011. Kazan, Russia: Springer Science & Business Media. Staessens, D. et al., 2011. Software defined networking: Meeting carrier grade requirements. Local & Metropolitan Area Networks (LANMAN). 18th IEEE Workshop on IEEE, Volume 18, pp. 1-6. Yuen, J. H., 2013. Deep space telecommunications systems engineering. US: Springer Science & Business Media,. Read More

CHECK THESE SAMPLES OF Meme-Tech Network Engineering Project

How to Maintain Network Security

This essay "How to Maintain network Security" focuses on a comprehensive literature review associated with the studies in the past on email security.... The research was related to link analysis, text analysis, network analysis, dynamic network analysis, machine learning, and data mining.... Organizations are more apprehensive about the security of the network rather than adding functionality.... Moreover, massive funds are allocated for network security along with advanced security hardware devices including Hardware Security Modules (HSM), which are deployed to secure mission-critical data....
24 Pages (6000 words) Essay

Project Management in a Changing Environment

The paper 'project Management in a Changing Environment' explains a project manager's multi-factorial work.... After analyzing environmental factors and focusing on the customers' needs, an algorithm of actions is planned, a budget is formed, during the project implementation adjustments are made.... Every project involves a set of interrelated activities, which has a definite beginning and end.... Since there are many aspects to be looked after for the attainment of project objective, the need for its proper management was seriously felt long back....
15 Pages (3750 words) Coursework

Operations Management of Toyota Motor Corporation

Jeannet (2000:83) defines operations management as “the business management function that is concerned with the physical development or generation of a product or service.... ?? Essentially, operations.... ... ... This paper examines the role of operations management in the achievement of the overall businesses objectives....
19 Pages (4750 words) Essay

Social Engineering

Then there will be an analysis of the research, and then a discussion of what I believe about the need to balance legitimate defenses against social engineering with the need to not go overboard and make people feel like common criminals or unwelcome.... Lastly, I will The term “social engineering” was coined by Kevin Mitnick, a hacker who spent many years in federal prison for nefarious activities, then became a highly sought-after computer expert, writing books and other journals....
12 Pages (3000 words) Essay

Cyber Attacks Against America Infrastructure

With the invention of computers and the Internet, it is difficult to envision what would happen if a massive cyber attack aimed at the major countries' cyber infrastructure and to.... ... ... According to an article published by Digital Journal, pressing the F1 key will cause cyber attack.... This threat will affect millions of users worldwide who log on to Windows....
16 Pages (4000 words) Research Paper

Reflecting on Being First-Time Applicant

However, the project didn't turn out to be a financial failure as the game platform could be sold out for RMB 500,000.... But I lacked the fund-raising skills which prevented the continuity of the project as it ran out of funds.... The vision behind co-founding the earliest Social network website of China was the tremendous market scope and the credit of being one of the pioneers in the field....
21 Pages (5250 words) Assignment

Implementing Self-Managed Teams in a Construction Project Organization

The paper 'Implementing Self-Managed Teams in a Construction project Organization' is a useful example of human resources case study.... The paper 'Implementing Self-Managed Teams in a Construction project Organization' is a useful example of human resources case study....
15 Pages (3750 words) Case Study

Women in the Workplace

Notably, women remain underrepresented in jobs that require science, technology, and engineering skills.... In effect, men have dominated the engineering fields.... This paper "Women in the Workplace" focuses on the fact that society has perceived the primary role of the American women as homemakers and mothers without any form of remuneration for years....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us