Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

You have been hired by an international coffee and tea retailer with hundreds of

ID: 3915633 • Letter: Y

Question

You have been hired by an international coffee and tea retailer with hundreds of shops around the world. This organization, like most in the industry, is known for providing high-end coffees, teas, and snacks in a café setting frequented by neighbors and business people in search of an Internet connection. This organization has a corporate headquarters located in Seattle, Washington. Your task is to recommend a network architecture that will be optimal for the organization to implement in order to offer secure public wireless in each location in a consistent, cost-effective, and secure manner. Engage in research to explore the available alternatives that would fit these criteria as well as apply the information from the required study materials. Write a 2–3 page paper that covers the following topics:


Describe the alternative architectures that would be appropriate to meet the objectives of the project.


Analyze the pros and cons of each alternative architecture.


Determine the security implications of each alternative architecture.


Recommend an architecture that is optimal for implementation by this coffee and tea retailer


Provide support for your recommendations.


Explanation / Answer

Answer)

The alternative architecture which can be used are as follows:

Inventory and Ordering

Business operation management

POS Softwares

Customer Enticement etc.

POS Softwares help for digitalizing the monetary usage but can lead to financial breach.

Business Operation Management will help to manage the business but might hamper the operation activity at peak time.

Inventory and ordering will help to create different versions where as will lead to obsolation of the existin products.

As per security concerns the POS Machines have to be well secure so as not to allow any hacker hack the details of the card owner.

All of the above architectures are optimal and can be used.

Apologies for not providing the resources as it is against the rules and policy of Chegg

Hit like/ upvote if you find the answer useful. Your response is important to us and is much needed.

Hope this answer helps. Happy to help. :)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote