Introduction A company wants to set up a new branch office in KL.It is expected
ID: 3601288 • Letter: I
Question
Introduction A company wants to set up a new branch office in KL.It is expected that 20 staff members will be allocated in this new building. The new building will have only one floor. All the staffs will be allocated in the same floor The Headquarter is located in Pinang, which is about 350km away from the new office. Network connection is required for new office's staff to access the centralized database located in headquarter. All staff will also require Internet access for their daily operation. Most of the staff will be provided with dedicated desktop computer. However, there will be few staffs that will be using Laptop computer and mobile devices. They will also need to access the company computer network. To save costs, all staffs will be sharing one Internet connection. They will also share one printer and one Photostat machine is they need to print or copy document. Company telephone service wl be using computer network for all internal calls within the company and only using the PSTN service for external callsExplanation / Answer
Data Transfer via Internet
We found in recent years with the introduction of ISDN,
POTS codecs, and IP audio codecs. In each case, we decided to put together
a “primer” for those who wished to gain the knowledge needed to use these
tools effectively, but were short on time. The goal was to put together all the
vital information in a booklet that could be consumed in under an hour. The
feedback we got proved these efforts have been worthwhile.
A new disruptive technology is taking hold, and it’s now time to cut another
primer. Due to cost and necessity, broadcasters are finding they need to get
educated about Voice over IP (VoIP), and do it fast.
Voice over IP provides an alternative to both traditional landline and cellular phone calling.VoIP is available in a wide range of services. Some basic, free VoIP services require all parties to be at their computers to make or receive calls. Others let you call from a traditional telephone handset or even a cell phone to any other phone.
A typical VoIP call only requires about 100 Kbps for best quality. Network latency obviously must be kept low for digital phone calls to maintain good sound quality; VoIP over satellite Internet can be problematic.
VoIP and other real-time communication protocols use UDP, which is a much
simpler delivery method. There is no error correction or resending available at
the native UDP layer. UDP is sometimes referred to as the “send and pray”
method, since the network provides no guarantees of delivery of any kind. In
it’s simplicity, UDP is a better choice for real-time communications because
higher-level applications can be designed to make smart choices about error
protection vs. delay.
With VoIP, analog voice calls are converted into packets of data. The packets travel like any other type of data, such as e-mail, over the public Internet and/or any private Internet Protocol (IP) network.
Internet telephony is much more like cellphone telephony, with people having unique telephone numbers that aren't permanently linked to one physical location: the person you're calling could be anywhere on the planet (and might not be in the same place two days running). So the first part of making a VoIP call involves your computer locating the receiver on the Internet, signalling their computer to receive a call, and, once that's done, the two computers agreeing the technical nitty-gritty of how they will actually exchange the data (just as fax machines and modems "handshake" at the start of a call). For VoIP to work effectively, every computer that uses it has to do these things exactly the same way—and that's why VoIP systems use carefully agreed international standards (known as protocols). The two protocols that cover signalling are technically known as H.323 and SIP (Session Initiation Protocol, sometimes also known as RFC 4168). Simply speaking, these protocols set up a communication route between two IP addresses (the sender's and the receiver's) across which the actual telephone call data can be sent and received.
The biggest plus point of VoIP is call cost, which is typically either free or much less than making traditional calls over the PSTN. VoIP is easy and often immediate to set up, and generally requires no long-term contract. You can usually send any kind of data over VoIP, from text and images of your computer desktop to voice and webcam chat. Another big plus is that VoIP liberates you from a fixed, physical location; if you have a Skype username, for example, you can sign in with it and receive calls from anywhere in the world. Even VoIP affords substantial cost savings over both due to it building on top of existing Internet and corporate intranet infrastructure.The main disadvantage of VoIP is a greater potential for dropped calls and degraded voice quality when the underlying network links are under heavy load.
Computer Use Policy
To address the issue of workplace privacy a company must establish policies that
define the rights or privileges that employees have. Merriam-Webster's dictionary
defines privacy as "a: the quality or state of being apart from company or observation b:
freedom from unauthorized intrusion". The first step in the process is to define and
establish a set of policies to address the needs and the expectations of the company.
Included in these policies would be a definition of what is appropriate use of system
resources and what is allowable and "authorized" intrusion. Some of the main points
that an acceptable use policy would contain are:
1. The business reason for the policy
2. The scope of the policy, i.e. what areas are covered by this policy
3. Document any expectation of privacy that may exist – there should not be any on
company provided resources
4. Document enforcement policy and disciplinary actions
5. A statement that the use of company resources is a consent to adhere to the
policy.
Legal and ethical employee computer monitoring is performed and the combination of the legality and ethics efforts is a fruitful one in terms of productivity:
* Employees accept responsibility
-The fair play sense of ethical monitoring make employees feel responsible and self-organized.
* Employers avoid unclear labour force input
-Legal and ethical monitoring provide a clear picture for employers, as they get the software reports providing with the information on the staff’s productivity.
* Both sides create healthy and highly productive atmosphere
-Keeping the moral and legal borders not crossed encourages engaged and healthy workplace atmosphere, which is the key to corporate productivity.
* About WorkTime
WorkTime, employee performance monitoring software, complies with the strictest regulations, remaining ethical.
In creating these policies, it is important that all areas of concern should be addressed in
explicit terms. Some companies establish policies that do allow some personal use of the
Internet and corporate e-mail systems. These exceptions can lead to problems for the
company.
Employees might expect to use workplace computer resources just like at home, but doing so could put their jobs or their company at risk. Inappropriate use of computers and computer systems at work could jeopardize the security of company data, prevent the conduct of business or even cause colleagues to issue claims of harassment. Workplace standards for the ethical use of computers and computer systems are typically established to prevent these situations.
Getting Internet access at work is not a free ticket to go surfing. Employees using company networks to shop, perform banking transactions, or access private emails and social media sites can put a strain on connectivity for the entire organization. If Internet access is slowed down by employees misusing the service for personal issues, business use could be hindered or prevented.
Email is a valuable communication tool for exchanging information in the workplace, but improper use of email systems could cost the company in data or business losses. Sensitive data such as trade secrets should not be transmitted by email unless the data is encrypted and the recipient email address is known and authorized. Even when the data is not considered sensitive, email content should always be professional and accurate. Writing a note using company email is like using company letterhead, although the format is less formal – the writer is acting on behalf of the company.
Inappropriate jokes, images and videos that can be considered discriminatory or sexually suggestive should never be accessed, viewed or shared on workplace computers, via company emails or using the company’s computer network. Employees who receive, intercept or accidentally view this type of data might find it offensive and can issue harassment claims in litigation brought against the company and against the employee originally accessing or sharing it.
Log in information, such as user names and passwords, is created based on the data access needs of each employee, and should never be shared – not even with close colleagues. Since not every employee has the same data needs, access rights vary. If an employee in human resources shares log in information with a friend in sales, she can unwittingly allow her friend to access employment records and other information that has been secured to remain private.
The ethical use of workplace computers and systems might exist in both information systems security policies and ethics policies issued by human resources or legal departments. Employee training programs are typically developed to cover both. Training approaches might involve classes or web-based training modules, and are provided during new employee orientation and whenever policies are updated, or when the company recognizes a need to remind employees of their legal and ethical obligations.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.