Remote working is all about having the flexibility to work from a range of locations other than your place of work. Whether you need to work away from the office a lot, never visit an office, or periodically leave the office, there is a remote working solution for you.(http://www.changeboard.com/hrcircles/blogs/globalisation/archive/2008/10/20/remote-working-realising-the-benefits.aspx)
Here our goal is to implement the remote working system. We now need to know how this system will be feasible for the company.
What we are going to do is as follows-
1. We will list the potential requirements of the basic scenario as described.
2. We will explain advantages and disadvantages of implementing remote working system within the company.
3. We will make estimate of the various costs of buying various equipments to implement remote working system.
The potential requirements to implement remote the working system are –
1. Remote user will deliver company’s message via power point presentation.
2. They will compile and print suitable quotations for insurance products.
3. Remote worker will check a central database for available products.
4. They will perform queries on existing customer records.
5. They also will send and receive e-mail and complete sales order online.
1. Provide telecommuter support.
2. Provide reliability.
3. Provide better security.
4. Better network management.
5. Better policy management.
6. Real-time access to email and Low/medium security risk.(http://www.changeboard.com/hrcircles/blogs/globalisation/archive/2008/10/20/remote-working-realising-the-benefits.aspx)
7. The remote computer has access to most business network resources at anytime.(http://www.changeboard.com/hrcircles/blogs/globalisation/archive/2008/10/20/remote-working-realising-the-benefits.aspx)
8. The Remote workstation is generally isolated from the network, which means data cannot come back to the business network if local access is disabled.(http://www.changeboard.com/hrcircles/blogs/globalisation/archive/2008/10/20/remote-working-realising-the-benefits.aspx)
9. Environment - remote working also dramatically reduces an enterprise’s green impact on the environment by eliminating the number of employees commuting in to the office(http://www.changeboard.com/hrcircles/blogs/globalisation/archive/2008/10/20/remote-working-realising-the-benefits.aspx)
10. Increased productivity - studies have found that those employees working remotely, away from the distractions of the office environment can increase their productivity considerably(http://www.changeboard.com/hrcircles/blogs/globalisation/archive/2008/10/20/remote-working-realising-the-benefits.aspx)
1. It can become quite expensive and often rises in cost.(http://www.changeboard.com/hrcircles/blogs/globalisation/archive/2008/10/20/remote-working-realising-the-benefits.aspx)
2. Remote working poses further risks to enterprises due to the lack of control when employees take sensitive company data off-site and potentially access documents online without sufficient security and encryption(http://www.changeboard.com/hrcircles/blogs/globalisation/archive/2008/10/20/remote-working-realising-the-benefits.aspx)
3. There are also the basic problems associated with human error – every day we read stories about USB devices, hard drives or CDs being lost or stolen when taken out of the safe confines of the office environment.(http://www.changeboard.com/hrcircles/blogs/globalisation/archive/2008/10/20/remote-working-realising-the-benefits.aspx)
4. But there can also be problems associated with remote working. For example, employees can have a tendency to feel alienated and cut off from their fellow colleagues.
5. It has a negative impact on customer service.
6. It has detrimental impact on quality.
7. It makes delay in achieving deadlines.
8. There are difficulties with communication.
9. There are reductions in team spirit.
1. ASUS Eee PC 900HA 8.9-Inch Netbook (1.6 GHz Intel ATOM N270 Processor, 1 GB RAM, 160 GB Hard Drive, XP Home) Black)-320.99$(http://www.amazon.com/electronics-store/b/ref=sa_menu_el4/189-4085478-1536403?_encoding=UTF8&node=172282&pf_rd_m=ATVPDKIKX0DER&pf_rd_s=left-nav-1&pf_rd_r=1CC9TN09216GA1H70DHP&pf_rd_t=101&pf_rd_p=328655101&pf_rd_i=507846)
2. Ubuntu 8.10(Server Edition-Pack of 20)-25.2$(http://shop.canonical.com/product_info.php?products_id=355&osCsid=265e88bf0dce57c8aa33adab01bc6204)
3. Linksys WRT54GL Wireless-G Broadband Router-$35.00- (http://www.amazon.com/Routers-Networking-Online-Communication-Add-Ons/b/ref=amb_link_6488902_57?ie=UTF8&node=300189&pf_rd_m=ATVPDKIKX0DER&pf_rd_s=left-1&pf_rd_r=0MNZJWRP7P7FK1H2ATHR&pf_rd_t=101&pf_rd_p=465144511&pf_rd_i=193870011)
4. Linksys Wag54g Wireless-g Adsl2+ Gateway Adsl Modem/router & Wireless Access Point with 4 Port Switch-$39.99(http://www.amazon.com/s/ref=nb_ss_pc?url=node%3D300189&field-keywords=Access+Point&x=19&y=16)
5. Peplink Balance 380 Enterprise Grade Multi-WAN Router-$2719.99(http://www.amazon.com/b/ref=amb_link_6488902_56?ie=UTF8&node=490502011&pf_rd_m=ATVPDKIKX0DER&pf_rd_s=left-1&pf_rd_r=0MNZJWRP7P7FK1H2ATHR&pf_rd_t=101&pf_rd_p=465144511&pf_rd_i=193870011)
6. PIX-520-FO-BUN Firewall Chassis Bundle-$2500.00(http://www.networkliquidators.com/base-units-category-1090.asp)
7. Bluetooth USB Adapter-$104.99(http://www.amazon.com/s/ref=nb_ss_pc?url=flatten%3D1%26node%3D300189&field-keywords=Bluetooth+device&x=0&y=0)
8. RCA DCM315R 30Mbps Cable Modem-$34.99(http://www.amazon.com/b/ref=amb_link_6488902_54?ie=UTF8&node=172507&pf_rd_m=ATVPDKIKX0DER&pf_rd_s=left-1&pf_rd_r=0MNZJWRP7P7FK1H2ATHR&pf_rd_t=101&pf_rd_p=465144511&pf_rd_i=193870011)
9. D-Link DAP1522 Xtreme 4-Port GigaBit Dual Band Draft 802.11n N Duo Wireless Bridge/Access Point-$103.63(http://www.amazon.com/s/ref=nb_ss_pc?url=node%3D300189&field-keywords=Access+Point&x=19&y=16)
10. Server: - IBM System x3850 M2 -$20,150
11. BlackBerry 8300 Curve PDA OEM Original Rubber Blue Skin Case-HDW-13840-004-$16.32 (http://www.amazon.com/s?ie=UTF8&field-zipjids=07400&x=19&y=15&field-keywords=PDA&url=search-alias%3Dwireless-aps)
12. Canon MP620 Wireless All-in-One Photo Printer, 2921B002-$129.95(http://www.amazon.com/computer-pc-hardware-accessories-add-ons/b/ref=sa_menu_pc3/189-4085478-1536403?_encoding=UTF8&node=541966&pf_rd_m=ATVPDKIKX0DER&pf_rd_s=left-nav-1&pf_rd_r=1CC9TN09216GA1H70DHP&pf_rd_t=101&pf_rd_p=328655101&pf_rd_i=507846)
13. ASUS Eee PC 904HA 8.9-Inch Netbook (1.6 GHz Intel ATOM N270 Processor, 1 GB RAM, 160 GB Hard Drive, 10 GB E-Storage, XP Home, 6 Cell Battery) Fine Ebony-$311.99(http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Daps&field-keywords=Laptop+PC&x=0&y=0)
14. Canon LK-51B Portable Kit - battery cabinet printer battery - Li-Ion ( 0073B001 )-$144.19(http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Daps&field-keywords=portable+printer&x=0&y=0)
Communication technologies that are using currently both wired and wireless. Wireless means that wire is not using in the system. It uses wave to send data in the air. The distance between sender and receiver device varies among the system and devices and technologies that will be use. It is easy to use and user can use mobile devices.
In wired mode using wire is must. In this communication method device is connected with wire and user use wire connected devices.
There are many technologies in wireless and wired connection method. They are
• Leased Line
DSL (Digital Subscriber Line): In analog data communication along the PSTN, a voice-band modem converts data from a piece of terminal equipment into electronic signals in the 200 Hz to 3.4 kHz frequency band. This allows the existing public network to transmit electronic data in the same way it traditionally would a human voice. In the early decades of data communication, this was not so much of a problem. However, as modems have evolved to transmit and receive data at ever-higher speeds, and as software has evolved to carry ever more complex forms of information, data communication presses up against the physical limitations of the copper medium. The bandwidth of 200-3400 Hz is simply too narrow to fit this data comfortably. The result is a communications bottleneck. Downloading a web page becomes an increasingly cumbersome process the more detailed its graphics are. Try to connect to a web page that features animation - or worse yet, video footage - and your computer will slow to a crawl.
DSL frees the end-user from the limitations of voice bandwidth, providing bandwidth measured in the hundreds of kilohertz and enabling communications at least 100 times faster than that available over pure POTS, while still allowing you to make phone calls while your PC or fax is transmitting or receiving. Let us examine a typical DSL modem to see how it accomplishes this.
The DSL chip set includes both analog and digital components. Among the analog components are analog transmit and receiver filters, the Digital to Analog Converter (DAC), the Analog to Digital Converter (ADC), and the automatic gain device (to adjust the received signal level to that which is suitable to the input of the ADC).
The modulation/demodulation function of the DSL transceiver, the modem proper, is digital. Modulation defines the process of converting each successive data symbol vector - in this case, a DSL input bit - into a continuous time analog signal that represents the message corresponding to each successive group of bits. At the far end of the transmission, the receiving DSL unit converts these analog signals back into bit form, hence "demodulation." Subsumed within the modulation/demodulation function are such aspects of digital signal processing as echo cancellation, adaptive channel equalizing, symbol/bit conversion, timing recovery, constellation mapping. In the cases of Carrierless AM/PM (CAP) or Quadrature Amplitude Modulation (QAM) line codes, the modem also provides the digital shaping filter, while in the case of Discrete MultiTone (DMT) line code, the modem includes Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT).
This brings us to the other major digital function of the DSL chip set, coding/decoding - performed by a part of the transceiver prosaically-known as the encoder. The task of the encoder is to map data bits from a digital bit stream prior to modulation and transmission. The importance of coding varies depending on the flavor of xDSL in use. Earlier DSLs, such as IDSL and HDSL, require no coding at all. Later DSLs, ADSL for example, can use Reed-Solomon codes, trellis codes or both. In the most recent generation of DSL systems, HDSL2 being the prime example, coding forms a critical part of the DSL transceiver.
Besides the DSL chip set, but there are two other components our hypothetical DSL transceiver may contain. The first element is the hybrid circuit, an interface converter for conversion from four-wire, dual half-duplex to two-wire full-duplex. The second element is the POTS splitter, a low-pass filter that separates the voice channel out from the DSL communication spectrum. The POTS splitter thus allows you to use your phone line as a phone line while simultaneously using it for data communication via modem, fax machine, or other terminal equipment. ( http://www.telebyteusa.com/dslprimer/dslch2.htm)
ISDN (Integrated Services Digital Network): an ISDN is a network in which connections are made by using digital switches. With this type of system, speech, data and other signals are transmitted as digital signals, using techniques such as time division multiplexing. After the appropriate wiring is connected to the customer premise for ISDN service, the user must configure any customer premise equipment to communicate with the ISDN telephony network. In current systems, the customer premise equipment must have information relating to the directory number (DN), service profile identifier (SPID) and the type of telephony switch utilized by the telephony network in order to communicate with the ISDN. The DN is a unique number identifying the customer premise and is typically the customer premise "phone number". The SPID is a unique number typically generated from the DN and network that is used by the ISDN to assign an endpoint identifier (EID). The method of generating the SPID varies due to the type of system, geographic area and the type of telephone switch used to establish an ISDN communication link. Telephone switches use different protocols and operate in different ways depending on the manufacturer and the class of switch. Therefore, conventional communication systems require the customer premise equipment to have information on the type of telephone switch and to use the appropriate protocols when communicating over the telephony network.
A user must typically enter information concerning the DN, SPID and switch type into the customer premise equipment. Typically, the user manually enters the information through a computer keyboard or a keypad connected to the customer premise equipment. The DN, SPID, and switch type are not readily available to the user. Although users typically know their own phone number, they may be using a different ISDN line to place the call and not be able to readily ascertain the DN being used. For example, the user may not know the phone number of a telephone line being used if the user is making a call from an unfamiliar remote location such as a conference room in a hotel. In conventional ISDN systems, the customer equipment can not access the ISDN without the information. As a result, conventional ISDN systems are difficult to use. A solution to this problem requires the standardization of ISDN protocols and SPIDS. However, because of the several different manufacturers of ISDN customer premise equipment and telephony equipment this solution will likely take several years to implement. In addition, some existing ISDN customer premise equipment may not operate on the standardized format.
Therefore, there exists a need for an ISDN network which does not require the user to enter information into the customer premise equipment in order to access the ISDN telephony network. ( http://www.freepatentsonline.com/5761293.html)
Leased Line: One way to get a large data connection to the internet is to purchase a leased data line into SpeedGate. This dedicated connection is available in sizes ranging from 384kbps all the way up to a full T1 (1.544mbps). (If you require bandwidth greater than a T1, please contact our sales department and pricing will be negotiated.) Note that with any leased connection you will also incur the telco charges for the data line itself.
With any dedicated connection from SpeedGate, you give your company full access to the internet -- 24 hours a day, seven days a week. You will be assigned a block of static IP addresses that you may assign to each of your workstations, giving them permanent access to everything the internet has to offer, including:
• World Wide Web
• Instant Messaging
• FTP (Download Software From Thousands of Hosts)
• And Much, Much More!
Of course, once you have static addresses on the internet, the possibilities are endless. You can set up your own mail gateway, your own name servers, your own ftp servers, your own web servers, your own, well, you get the idea. In addition, your dedicated connection will include set-up of a unique domain name, so people can look for you on the internet at yourcompany.com. (http://www.speed.net/information/business/leasedlines.html)
A permanent telephone connection between two points set up by a telecommunications common carrier. Typically, leased lines are used by businesses to connect geographically distant offices. Unlike normal dial-up connections, a leased line is always active. The fee for the connection is a fixed monthly rate. The primary factors affecting the monthly fee are distance between end points and the speed of the circuit. Because the connection doesn't carry anybody else's communications, the carrier can assure a given level of quality.
For example, a T-1 channel is a type of leased line that provides a maximum transmission speed of 1.544 Mbps. You can divide the connection into different lines for data and voice communication or use the channel for one high speed data circuit. Dividing the connection is called multiplexing.
Increasingly, leased lines are being used by companies, and even individuals, for Internet access because they afford faster data transfer rates and are cost-effective if the Internet is used heavily. (http://www.webopedia.com/TERM/L/leased_line.html)
VPN (Virtual Private Network): A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. A VPN enables you to send data between two computers across a shared or public internetwork in a manner that emulates the properties of a point-to-point private link. The act of configuring and creating a virtual private network is known as virtual private networking.
To emulate a point-to-point link, data is encapsulated, or wrapped, with a header that provides routing information allowing it to traverse the shared or public transit internetwork to reach its endpoint. To emulate a private link, the data being sent is encrypted for confidentiality. Packets that are intercepted on the shared or public network are indecipherable without the encryption keys. The portion of the connection in which the private data is encapsulated is known as the tunnel. The portion of the connection in which the private data is encrypted is known as the virtual private network (VPN) connection.
VPN technology also allows a corporation to connect to branch offices or to other companies over a public internetwork (such as the Internet), while maintaining secure communications. The VPN connection across the Internet logically operates as a wide area network (WAN) link between the sites.
To provide employees with the ability to connect to corporate computing resources, regardless of their location, a corporation must deploy a scalable remote access solution. Typically, corporations choose either an MIS department solution, where an internal information systems department is charged with buying, installing, and maintaining corporate modem pools and a private network infrastructure; or they choose a value-added network (VAN) solution, where they pay an outsourced company to buy, install, and maintain modem pools and a telecommunication infrastructure.
Tunneling is a method of using an internetwork infrastructure to transfer data for one network over another network. The data to be transferred (or payload) can be the frames (or packets) of another protocol. Instead of sending a frame as it is produced by the originating node, the tunneling protocol encapsulates the frame in an additional header. The additional header provides routing information so that the encapsulated payload can traverse the intermediate internetwork. (http://technet.microsoft.com/en-us/library/bb742566.aspx)
Hardware and Software Required to Implement the Company’s VPN
Required hardware and software to implement the company’s VPN is listed below:
• VPN server
• Tower Antenna
• Digital Certificates for IPSec VPNs
Hardware and Software Required for the Company’s Remote Working System
• Access Point
• Wireless Router
• VPN Client Software
• OS(Operating System)
Network manager is a modern profession responsible for the maintenance of computer hardware and software that comprises a computer network. Network manager responsibilities and rights are described below:
22. Networking Essentials-(5th Edition)-Greg Tomsho, Ed Tittel, David Johnson
Source: Essay UK - http://www.essay.uk.com/coursework/what-is-a-remote-working-system.php