It can be concluded from the above report that the current infrastructure of Singapore Gaming Academy is not secure and it should be developed for increasing the reliability and reducing the network downtime. A future proof network solution is suggested for the organization and the existing problems are identified for the mitigation of the problems and develop a network design. The created network solution meets all the needs of the organization and wireless access point are installed in the network for increasing the flexibility of the network. The VOIP protocol is used for implementation of telephony service in the network and different network channels are used for data and voice for improvement of the quality of service and reducing congestion in the network.
Armbrust, M., Xin, R.S., Lian, C., Huai, Y., Liu, D., Bradley, J.K., Meng, X., Kaftan, T., Franklin, M.J., Ghodsi, A. and Zaharia, M., 2015, May. Spark sql: Relational data processing in spark. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data (pp. 1383-1394). ACM.
Berger, H. and Jones, A., 2016, July. Cyber Security & Ethical Hacking For SMEs. In Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society (p. 12). ACM.
Cater-Steel, A., Tan, W.G., McLeod, P. and Thompson, M., 2013. The Australian National Broadband Network. Management of Broadband Technology and Innovation: Policy, Deployment, and Use, 31, p.81.
CEPAL, N., 2016. Exploring cooperation between the Republic of Korea and the Community of Latin American and Caribbean States (CELAC) in the areas of innovation and SME internationalization strategies.
Colombo, M.G., Croce, A. and Grilli, L., 2013. ICT services and small businesses’ productivity gains: An analysis of the adoption of broadband Internet technology. Information Economics and Policy, 25(3), pp.171-189.
Cruz-Cunha, M.M., Varajao, J. and Trigo, A. eds., 2013. Sociotechnical Enterprise Information Systems Design and Integration. IGI Global.
Davies, R.J., 2014. The development of a methodology for measuring the effect of broadband quality on SME performance (Doctoral dissertation, Cardiff University).
Doherty, E., Ramsey, E., Harrigan, P. and Ibbotson, P., 2016. Impact of Broadband Internet Technologies on Business Performance of Irish SMEs. Strategic Change, 25(6), pp.693-716.
Gerber, T., Thomson, K.L. and Gerber, M., 2013. VoIP: a corporate governance approach to avoid the risk of civil liability. J. Int't Com. L. & Tech., 8, p.281.
Giambene, G., 2014. Introduction to Telecommunication Networks. In Queuing Theory and Telecommunications (pp. 3-60). Springer US.
Jahongir, A. and Shin, H.K., 2014. Factors Influencing e-Commerce Adoption in Uzbekistan SMEs. Management Review: An International Journal, 9(2), p.67.
Mazidah, S., 2015. ICT Usage In Malaysian SMEs: Analysis On ICT Adoption And Perceived Attributes (Doctoral dissertation, Universiti Teknikal Malaysia Melaka).
Mohlameane, M.J. and Ruxwana, N.L., 2013. The Potential of Cloud Computing as an Alternative Technology for SMEs in South Africa. Journal of Economics, Business and Management, 1(4), pp.396-400.
Oliviero, A. and Woodward, B., 2014. Cabling: the complete guide to copper and fiber-optic networking. John Wiley & Sons.
Olupot, C. and Kituyi, G.M., 2013. A Framework for the Adoption of Electronic Customer Relationship Management Information Systems in Developing Countries. The Electronic Journal of Information Systems in Developing Countries, 58.
Pillay, P., 2016. Barriers to information and communication technology (ICT) adoption and use amongst SMEs: a study of the South African manufacturing sector (Doctoral dissertation).
Quinn, P. and Guichard, J., 2014. Service function chaining: Creating a service plane via network service headers. Computer, 47(11), pp.38-44.
Quinones, G., Nicholson, B. and Heeks, R., 2013. Positioning Research on e-Entrepreneurship in Emerging Economies: A study of Latin American Digital Ventures.
Rana, N.Y., 2013. Designing and optimization of VOIP PBX infrastructure.
Regis Jr, J., 2014. Securing VoIP: Keeping Your VoIP Network Safe. Elsevier.
Sadique, S.A.M. and Shah, P.N., 2016, March. To use software defined networking technology in telecommunication for 5-G network. In Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference on (pp. 1046-1049). IEEE.
Sahhaf, S., Tavernier, W., Colle, D. and Pickavet, M., 2015, April. Network service chaining with efficient network function mapping based on service decompositions. In Network Softwarization (NetSoft), 2015 1st IEEE Conference on (pp. 1-5). IEEE.
Wong, W.Y., 2015. Framework of Six Sigma implementation analysis on SMEs in Malaysia for information technology services, products and processes (Doctoral dissertation, University of Nottingham).
Wu, X., Zhu, X., Wu, G.Q. and Ding, W., 2014. Data mining with big data. ieee transactions on knowledge and data engineering, 26(1), pp.97-107.