ads

Style6

Style3[OneLeft]

Style3[OneRight]

Style4

Style5[ImagesOnly]

Style2

Validation: Assessment Model of BYOD

Demonstrate the value of ICT.

   This artifact demonstrates the value of ICT research process and methodology.   

   ICT research explores the dissemination of innovations throughout the workplace.  For example, the employee practice of bring your own device (BYOD) is innovative because it changes the way people work.

   This research covers a wide scope of material relating to BYOD.  The literature review explores the origins of BYOD, and is defined by four significant events: 
  •  Moore's Law, as it relates to workplace technology.  Perpetual innovation of computer systems has changed the way people work. 
  • Moore's Law for Power Consumption.  Traditional models do not scale well for mobility becuse computers have an insatiable appetite for power.  
  • Koomey's Law, as it relates to mobile efficiency.  Efficiency gains are revolutionary for battery powered mobile devices. 
  • Grove's Law, as it relates to bandwidth influences.    Grove’s Law transcends bandwidth innovation from cables to the airwaves.  The broadband revolution has begun to take shape and current designs favor mobility. 
   UW-Stout incorporates research methodology throughout the entire ICT curriculumThis research topic is about personal technology in the workplace.  It closely relates to the advanced switching and routing concepts in the emphasis curriculum.

   Employees connect their personal devices to the company network.  Consequently, network threats may manifest as smart devices connect to the corporate network.Unfounded assumptions, “can lead to broken, misconfigured, or bypassed security mechanisms” (Cisco Press, 2010).  An effective network assessment allows companies to make informed decisions.  Managers and network administrators may use it as reference to support decisions on whether to implement, or reject BYOD policy.

References:
Cisco. (2010). 6.4.3 Wireless Security Solutions. In Cisco, CCNA Security Course Booklet (p. 180). Indianapolis, IN: Cisco Press.

ICT Validation: Ethics

Ethical principles relating to ICT and IT Management.

Ethics is a synthesis of three elements, (a) law, (b) morals, (c) and personal conduct:  

A)  Is it legal?   For example, it is illegal to download and install pirated software.  Maintaining good licensing and documentation protects an organization from potential litigation. 

B)  Is it moral?  Society shapes issues of right and wrongand people are expected to uphold common values.  For example, it is unacceptable to abuse administrative authority to look up co-workers' salaries.   

C)  Is it something you would do?  There are circumstances when an action may be both legal, and immoral.  Conversely, a moral remedy may be unlawful.  The controversy surrounding systems administrator, Eric Snowden, serves as a relevant example for ICT ethics and personal conduct.

Snowden is accused of stealing and publishing classified government information.  Reuters reports that Eric Snowden used his role as a systems administrator to persuade co-workers to collect passwords (McNamara, 2013).  

However, Snowden maintains his innocence as a whistle blower.  Snowden argues that the National Security Agency (NSA) illegally collects phone records of millions of Americans (Wiebe, 2013).  Snowden's motivation may be moral, but his actions were illegal.

In a quasi-related case, U.S. Federal District Court Judge, Richard Leon, ruled that the the NSA phone program is likely unconstitutional (Gerstien, 2013).  The Department of Justice is expected to appeal the decision.  The NSA actions are legally unethical if upper courts uphold Leon's decision.  The director of the NSA, Gen. Keith Alexander had previously stated, "I think what we're doing to protect American citizens here is the right thing" (Michaels, J., 2013).

Some view Snowden as a hero, and other's view him as a traitor.  In regard to ICT, Snowden was an unethical system administrator.  Snowden lacks integrity because he abused his administrative privileges by trolling confidential data.
   

ICT is an institutional process that contributes value to organizations (Brynjolfsson, 2003).  Information Technology (IT) is responsible for an organizations' systems, services, and support. Typical responsibilities include:
  • ICT related purchasing.  
  • Maintaining sensitive data on file servers, databases, and backups.
  •  Ensuring the electronic privacy for all individuals within the organization.
  •  Intellectual property and software licensing.
  •  Preventing digital fraud.
 Network administrators have the "digital" keys to everything on the network.  Network administration requires ethical conduct to ensure standards of integrity, confidentiality, and availability. 

Why did you create this artifact? 

This artifact demonstrates the ethical principles of ICT.  I chose to review The Adventures of an IT Leader, by Robert Austin, Richard Nolan, and Shannon O'Donnell, for a class project.  The story examines typical ICT challenges and presents examples of effective leadership skills to overcome them.  In each situation, the IT leader had to navigate through a variety of ethical issues.   

References:

Brynjolfsson, E. (2003, July). The IT Productivity Gap. Optimize Magazine (21). Retrieved from http://ebusiness.mit.edu/erik/Optimize/pr_roi.html
Gerstein, J.,  (2013, December 16th).  Retrieved from:  http://www.politico.com/story/2013/12/national-security-agency-phones-judge-101203.html
McNamara, J. (2013, November 8th) Retrieved from:  http://www.networkworld.com/community/blog/snowden-used-sys-admin-role-collect-passwords-reuters
Michaels, J. (2013, June 13th).  Retrieved from:  http://www.usatoday.com/story/news/politics/2013/06/12/alexander-nsa-cyber-snowden/2415217/
Wiebe, K., (2013, December 17th).  Retrieved from:    http://www.cnn.com/2013/12/17/opinion/wiebe-snowden-amnesty/

SMB2 PowerPoint Artifact

Artifact: Evaluate and use ICTs appropriate to one's own career.

CCNP Artifact Validation

Demonstrate command of advanced routing and switching.

   This artifact demonstrates proficiency of advanced routing and switching skills.

   Cisco Certified Network Professional (CCNP) certification validates the ability to design, implement, verify and troubleshoot local and wide-area enterprise networks (Cisco, 2013). 
Disciplines include:
  • Routing protocols. 
  • EIGRP 
  • OSPF 
  • BGP 
  • Switching architecture. 
  • Inter-VLAN routing. 
  • Spanning Tree. 
  • High availability (e.g., HSRP, VRRP, GLBP). 
  • Load balancing (e.g., EtherChannel). 
Cisco offers multiple levels of network certification: 
  •  Cisco Certified Entry Network Technician (CCENT). 
  • Cisco Certified Network Associate (CCNA). 
  • Cisco Certified Network Professional (CCNP). 
  • Cisco Certified Internetwork Expert (CCIE). 
   CCNA certification is as a prerequisite for the CCNP certification.

   The CCNP certification process consists of three proctored exams: 
  • 642-902:  Implementing Cisco IP Routing (ROUTE) 
  • 642-813:  Implementing Cisco IP Switched Network (SWITCH) 
  • 642-832:  Troubleshooting and Maintaining Cisco IP Networks (TSHOOT). 
   The entire certification process took one year to complete.  I achieved the CCNP certification through a series of lectures, discussions, course materials and extensive lab work.    

   Every systems administrator should understand routing and switching.  Networking fundamentals provide the foundations for all other network systems Cisco Certified Network Professional skill-sets are applicable to the entire infrastructure (e.g., Microsoft, Linux, etc..).  Additionally, network administrators with Cisco backgrounds should be capable of working with most other brands of networking equipment (e.g., Juniper, Fortinet, etc..).  

References:


Cisco, 2013.  CCNP Overview.  Retrieved December, 2013,  from Cisco Systems, Inc. : http://www.cisco.com/web/learning/certifications/professional/ccnp/index.html  

CCNA Security Artifact Validation


Promote Enterprise Network Security Strategies. 

This artifact acknowledges that I have met the training standard for Information Systems Security Professionals, set forth by the National Secuirty Agency (NSA) and the Committee on National Security Systems (CNSS).

The Cisco Certified Network Associate Security (CCNA Security) validates my knowledge and ability to secure enterprise networks.

CCNA Security curriculum outlines infrastructure security, as follows:  firewall installation, monitoring and troubleshooting; integrity, confidentiality and data availability.

UW-Stout participates with the Cisco Networking Academy.  I achieved the CCNA Security certification through a series of lectures, discussions, course manuals, and extensive lab work.

Cryptography and encryption technologies are integrated with every infrastructure system at my workplace, including:
  • Internal certificate authority (CA) servers distributes certificates to internal systems.
  • Workstations use certificates to authenticate with a process similar to user authentication.
  • Secure socket tunneling protocol (SSTP) virtual private networks (VPNs) allows remote access.
  • Microsoft Direct Access and Terminal Services Gateway use public key infrastructure (PKI) certificates to support remote access.
  • BranchCache uses hashes to ensure data integrity.   

WAN File Services Artifact

Interpret and conduct research to improve the body of knowledge relating to ICT.

This artifact investigates a network file service problem.   End users complained of slow file browsing, slow file enumeration, and a random inability to save Microsoft Word files from a branch office.  ICT methodology determined that the problem resulted from server message block (SMB) network protocol limitations.   Recommendations were made to resolve the issues.

This artifact explores advanced SMB protocols and ICT methodology.  Additionally, it explores numerous WAN technologies: wide area file systems (WAFS); distributed file services (DFS); DFS replication (DFSR); and Microsoft BranchCache.

Legacy SMB protocol was singled out from a series of network tests.  Data statistics were gathered with network latency, bandwidth, and performance tests.

SMB2 was considered the enhanced protocol at the time the research was conducted.  SMB2 was followed by SMB 2.1 and SMB 3.0.  Microsoft released SMB 3.1, along with Windows 8.1 on October 17th, 2013.

SMB 3.1 provides file service innovations to any organization.  SMB advancements help organizations as follows: reduceds CPU workloads; reduces disruptions to shared resources; protocol encryption prevents eavesdropping; improved response times to branch offices, etc... (Microsoft, 2013).

SMB protocol is only one of the many innovations introduced by Windows 8.1 and Windows 2012R2.  ICT methodology ensures systems are ready for upgrades through careful analysis of the adoption, implementation, development and use phases.  

References:

Microsoft, 2012.  Server Message Block Overview.  Retrieved from TechNet:  http://technet.microsoft.com/en-us/library/hh831795.aspx.  

Review and System Analysis Validation


Analyze the philosophy and principles underlying the organization and operation of ICT enterprises.

This artifact explores ICT philosophy and principles through an interview conducted with Tim Hapeman, IT Director at Oconomowoc Residential Programs (ORP).   

ORP provides group homes, work opportunities, and educational services for people with mental disabilities.  They are a $100 Million dollar company and have locations across the Midwest.  The IT department services over 100 locations and provides network services for over 2000 employees

Hapeman has been with ORP for ywo years.  He previously worked for Goodwill Industries, as the Manager of Information Technology, and Leprino Foods, as their System and Security Supervisor.  Hapeman has a bachelor in Mathematics from Michigan State University, as well as a graduate degree in Computer Information Technology from Regis University in Denver, Colorado.

Peter A. High's, World Class IT, argued that businesses need successful IT departments in order to succeed.   High outlined five principles that align IT with business strategy:

  1. Talent.  Recruit, train, and retain talented staff.  
  2.  Infrastructure.  Build and maintain robust IT systems.  
  3. Project Management.  Systematic planning and implementation ensure success. 
  4. IT and Business Partnerships.  Develop teamwork and communication between departments.  
  5. External Partnerships.  Collaboration with vendors, customers, and consultants. 
ICT diffusion principles are applied throughout the interview process.  The adoption phase consists of information gathering, design, and development.  The process begins with an analysis of High's World Class IT.  The interview questions are designed from modeling High's sub-principles of IT and business partnerships.

Artifact: Presentation on the Use of ICT

Evaluate and use ICT appropriate to IT Management.


     The validation examines Microsoft server message block network protocol (SMB2).  It represents relationships between technology, organizations, and staff.   

This validation uses an ICT innovation process  called diffusion. The four principles of  innovation diffusion are adoption, implementation, use, and effect.  This validation uses the diffusion process through the research project.

     This artifact documents an organizational problem with server message block protocol (SMB).  ICT provides a scientific approach to identify and resolve this problem. As such, it introduces SMB2 protocol innovations.

ADDIE Validation.


Plan, evaluate, and revise ICT systems.

   The artifact presents the full process management for the adoption, implementation, effects and use for computer based training modules (CBT).  The design introduces a web-based tour on the planning process for CBT modules.   The CBT project was designed using the ADDIE Process Model.


   ADDIE is short for:


  • Analysis
  • Design
  • Development
  • Implementation
  • Evaluation 

   ADDIE was the primary process management model used to design this computer based training module.

   ADDIE methodology is a combination of academic research and project implementation. 

  • ICT-710 requires a wide scope of research.  In depth reading and discussions provide working knowledge of the ADDIE process model
  • This example of a CBT module focuses on network security.
  • The web-based tour documents the ADDIE process model.
  
   The UW-Stout ICT program introduces its students to a number of business process improvement models.  Examples include ADDIE and Innovation Diffusion.  Cisco's Prepare, Plan, Design, Implement, Operate and Optimize (PPDIOO) methodology reinforces process improvement for routing and multi-layered switching projects.



Global Social Trasnformation Artifact

How Information society affects global social transformation.

   This artifact explores the role of intelligence, information, and communication in relation to the Internet.  Online global social transformations are expressed through a series of online cognitive, cooperative, collaborative, and motivational processes. 

   The Internet is a synthesis of communication, information, knowledge and intelligence.  
  • Communication is the exchange of information.
  • Information is the communication or reception of knowledge or intelligence.
  • Intelligence is the ability to acquire and apply knowledge and skills
  • Knowledge are facts, information, and skills acquired through experience or education. 
   The topic was inspired after reading concepts from, The Big Switch, by Nicolas Carr.  The information transformation is far reaching and may have social, economic, and political consequences.  My research hypothesizes that effects, such as group decision making and crowd sourcing, are a result of a greater intellectual process.

   The age of information has ushered unprecedented collaboration that connects people, cities, nations, and the globe.  Careful consideration and systematic analysis will identify innovations that may provide process improvements.

Valadation: The Adventures of an IT Leader Artifact.

Analyze current issues and trends in ICT.

   This artifact reviews, The Adventures of an IT Leader, by Robert Austin, Richard Nolan, and Shannon O'Donnell.  It offers relevant discussion on ICT practices and explores current issues and trends in IT Management.  

   ICT topics include:
  • Qualities of IT Management. 
  • Agile Project Management (APM). 
  • Service-oriented architectures (SOA).  
  • Business intelligence (BI).  
  • Managing talent. 
  • Vendor partnerships.  
  • Cris controls and communication.  
  • ICT ethical considerations.   
   Jim Barton, the story's protagonist, navigated through the daily adventures of IT management.  The authors included a series of questions at the end of each chapter.  These questions refocus the material and provided thought provoking lessons.  

   The material is a wake-up call to all IT professionals; raw technical skills will not cut it in the modern business environment.  Keep an open mind to ICT philosophies:  organizational, managerial, end users experiences, and other communication lines.

ICT Global Economy Validation

Abstract:  

   The historical, philosophical, sociological, psychological, multicultural, and political influences of ICT on a global economy.
  
    This artifact discusses the wide scope of influences of ICT on a global economy.  In 1980, Alvin Toffler predicted that society will soon undergo a transition from the industrial age to the information age (Toffler, 1980).

    Toffler described three waves that have advanced civilization:


  1. The agrarian society.  Farming innovations supported larger populations.
  2. The industrial society.  Manufacturing and distribution innovations shaped the modern world.
  3. The information society.  The advancement of computers and networks shapes the post-modern world. 
   Toffler's argument is uncannily accurate when considering his work was published 20 years before the Dot-com boom of 2000.   The Internet of Things (IoT) represents the next major development of the Internet.  The IoT is the continuum of Toffler's Third Wave.

   To date, there have been four successive phases of the Internet:
  1. Academic.  Allowed universities to share basic information (e.g., email).
  2. Static content.  Simple web pages provided limited content and information to the public.
  3. Commerce.  Dynamic content introduced the exchange of goods and services (e.g. Ebay, Craigslist, online banking, etc..).
  4. Social media.   Social networks provided innovative communication (e.g., Facebook, Twitter, etc...). 
   The Internet is on the cusp of a major transformation that will change its purpose from serving humanity to technology. 

   The Internet supplies people with information.  In the near future, devices will compete with people for information bandwidth.   People will continue to use the Internet, however they will be vastly outnumbered by their online gadgets. 

   System administrators will have to plan for physical and logical network limitations.  IoT cannot be implemented with the current IPv4 addressing scheme.  IPv6 protocol must be implemented in order to support the billions upon billions of smart objects.  

ICT Communication Breakdowns


Validation:  Determining the value of ICT methodology.

By Steven Jordan on November 26th, 2013.

Abstract:  

ICT methodology is used to research a BGP routing problem.  The research found that interdepartmental communication breakdowns failed to immediately identify and resolve the problem.

Problem:   

Customers, all from the same organization, complained of poor web site usability.  Symptoms of the problem were described as slow loading web pages,  limited functionality, and unreasonable delay of data.

     Multiple people, all from a single customer location, called to complain about access to our web service.  The Customers depended on the data and they were unable to complete their work because of reliability problems. 

     I usually have limited contact with our customers, however one of our sales representatives asked for my help with this issue.  We were reasonably sure there were no network or server problems but we felt it was best to investigate the problem further.   

     After I reviewed internal systems I reached out to the customers.  I spoke with 2 managers, and 3 different staff members, from their organization.  Each person had a similar experience.  The Internet appeared to work OK, but everyone was of the opinion that our site was slow and unresponsive.

     The company in question is a large organization located on the other side of the country.  Simple troubleshooting was a challenge because all workstations were securely locked down.  After some persistence I was able to get a hold of someone from their help desk department.

     The help desk associate stated that he firmly believed that there was a problem with our service.  I politely explained that while it was a possibility, I hadn't found evidence to confirm his position.  The help desk associate sounded annoyed with the situation, but I was happy he had agreed to troubleshoot the issue.

     Before I could offer a suggestion, the associate told me, "See?  I just pulled up Google quickly.  Yahoo is fast too.."  

     I politely countered, "Yes, but there may be some other underlying problem.  It would be very helpful if we could run some latency tests."

     The help desk associate shot back, "Google and Yahoo work fine.  Our Internet works fine.  Clearly your company has problems.  I suggest you fix it."  Click.  The help desk associate had hung up the phone.

     That hadn't gone as well as I had hoped.  People still needed help so I decided to try again.  I recalled a manager that I had spoken with earlier.  Kathy, had been frustrated, but she was also very friendly.  I called Kathy and explained I was unable to determine the problem based on my initial conversation with help desk.   I politely added that the phone call must have been accidentally disconnected.  

     I think Kathy got the hint.  She managed to track down another help desk associate that had helped her with other issues in the past.  The second help desk associate, Bob, was very helpful.   Bob was forthcoming as he explained his access to network resources was limited.  He was however, able to open a command prompt from which we ran some basic tests.   

     Basic ICMP tests, indeed, suggested there may be an Internet related problem.  We were also able to determine the organization's public IP information.  I was then able to determine the organization's Autonomous System (AS) number, and identify detailed information about the root of the problem. 

     Even after our tests, Bob was uneasy with approaching the organization's network administrators.  Bob sounded reluctant as he promised he would escalate the issue.  I assured him it was the right thing to do and let him know he was a big help with identifying the problem.  I also I told him I was going to immediately write an email that detailed the problem, and planned to forward it to the organization's management.  *Click here to view the email.*

    ICT is the study of technology and organizations.  The hierarchical divisions between departments, including interdepartmental, were nearly as disruptive as the BGP routing problem.  The end-users lost a full day of productivity because of poor communication.  The help desk staff provided limited assistance to the end-users.  The problem was additionally frustrating because the network administrators had a logical, or rather illogical, escalation buffer.  During the troubleshooting, both help desk associates were apprehensive about approaching the network administrators.  I suspect their hesitation was founded on previous experiences.  Nobody wanted to take ownership of the problem.

    The communication problems may be worse than they appeared.  In the course of my work, I have limited (no) contact with external customers.  Yet, I was able to identify the communicative dysfunction after only an hour of working remotely.  The IT department was in desperate need of a cultural shake-up.  From the outside, it appeared the network administrators sat atop of the IT silo.  The organization is large however, so the help desk department, and the network administrators, may have different department managers.  It's also possible that the separate IT fiefdoms operate from different buildings.  Whatever the case, increased face-time will help establish real communication.  It may also be beneficial to allow certain help desk staff to job shadow network administrators on occasion.  The experience may be educational as well as build camaraderie.  Conversely, it may be worthwhile for network administrators to occasionally man the help desk.  This may provide a greater appreciation for each others' contributions.  Basic workflow changes within the IT department may have positive reverberations throughout the entire organization. 


 


ITM 644 - Internetwork Troubleshooting

Course:
ITM 644 - Internetwork Troubleshooting
Instructor:
Renee Gunderson
Text:
Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide: Foundation learning for the CCNP TSHOOT 642-832
Amir Ranjbar
Pearson Education, 2010
158714171X, 9781587141713
552 pages
Syllabus:
ITM 644 Syllabus
Papers:

Projects:

Presentations:

Miscellaneous: