Saturday, 22 May 2010

Network Scenarios

A Gigabit Ethernet ‘backbone’ LAN that might be used in a corporation in a single building with 10 to 20 floors and using either a IEEE 802.11 (select any version) wireless LAN, a Bluetooth wireless LAN, or two 100 Base T Switched Ethernet LANs (per floor)

Executive Summary

This report would be required for a corporation in a single building with 10 to 20 floors and using wireless LAN and 100 Base T Switched Ethernet LANs in each floor. It should been insured this building each Personal Computer and each wireless Access Point can be detected the single such as Laptops, portable machines and mobiles which have the wireless function. It also should be made sure “the real time speed” qualification and used like VOIP and video functions during the high traffic time.

Thus, the network environment of this report has been set as a real corporation environment. It also has been required the limit budget and suitable for the network system. This report will show the suitable network topology, equipments, and system security. To insure the whole network environment have enough abilities to maintain the stable performance of network and to prevent the basic hacker attack. Furthermore, the most important part will be how to prevent the whole corporation’s information access and data disclosure. As our team members regard, this network system should be involved in the servers maintain such as database server, file server and mail server etc. Each department of members should have their own access level and security detective solutions. These issues will be shown on the following contents.

This report will show from rough area such the standard of wireless and Ethernet equipments to the detailed segments and frames of package. The reference and bibliography will be listed at the last.

Table of Contents

1. Introduction…………………………………………………………4

2. Gigabit Ethernet backbone LAN with wireless networking...4

2.1 Suitable Topology……………………………………………4

2.2 Physical Media………………………………………………..6

2.3 Distance Limitations…………………………………………6

3. Monitoring and Modeling Network Traffic……………………..6

3.1 Wireless Network Traffic……………………………………6

3.1.1 Monitoring and Modeling for wireless……………..7

3.2 100 Base T Network Traffic……………………………………………..8

4. Security Issues……………………………………………………..9

4.1 The Process of logging in system………………………11

4.2 Tag format……………………………………………………11

4.3 Basic Beacon (IP Broadcast) …………………………….11

5. Suitability for Real-Time Streaming Applications…..………12

5.1 Real Time Streaming Protocol (RTSP) process...….….12

5.2 Examples: Real Time Streaming Protocol process…..13

6. Conclusion…………………………………………………………13

7. List of References…………………………………………..……14

8. List of Bibliography………………………………………………14

1. Introduction

Since 1997, the standard IEEE 802.11 was founded as the first wireless networking protocol. After that, the 802.11b and 802.11g were widely used over the world for public places and home. Nowadays 802.11n was found. This last protocol can transfer 200Mbps by radio frequency. Which means using the Internet has not to stay the some place because there are not only the utilize line and cable to connect the network. Users can use the wireless network. More than half per cent of population have used the Internet.

2. Gigabit Ethernet backbone LAN with wireless networking

Due to this kind of networking have to coexist two different equipments, wireless Access Point (wireless-AP) and Routers. The Extended-Star topology is adequate to connect and control these equipments because these equipments will set on around 20 floors building and every floor need hub or switch and wireless Access Point (wireless-AP). Every floor around 100 users, as a result this building will have over two thousand users.

On other hand, a building only needs a router to connect to Wide Area Network (WAN). Security is focus on local area network (LAN). The Extended-Star topology can also provide this higher security because local area network (LAN) does not too high security to limit users to access any data and waste cost on this one. However, only one important is careful that the user ranks and not anyone can access secret data.

2.1 Suitable Topology

The Extended-Star topology is suitable topology in 20 floors building because this topology can become more apparent in later chapters when switches and routers are discussed in detail including with wireless Access Point (AP). In the build needs one router to connect the Wide Area Network (WAN) and every floor needs more than one hub and wireless Access Point (AP). This policy will provide around 100 users per floor and a company can save money on equipment. Due to the company does not set up many RJ15 connecters and wireless Access Point (AP) is easy to maintenance (see Figure 2.1, 2.2).

Figure 2.1: Network per Building

Figure 2.2: Network Maps

2.2 Physical Media

In this 20 floors building will needs using either a IEEE 802.11n wireless LAN (see Picture 2.1) and 100 Base TX Switched Ethernet LANs per floor (see Picture 2.1).

Picture 2.1 Picture 2.2

2.3 Distance Limitations

Every floor will have more than one Hub and every room have more than ten RJ45 connecters. The distance limit in areas and wireless Access Point (AP) will set every room per one. The wireless Access Point (AP) can cover 50 meters.

3. Monitoring and Modeling Network Traffic

3.1 Wireless Network Traffic

IEEE 802,11n provides 200Mbps to transfer data. The bandwidth is about 2.4GHZ and the frequency band is scientific and medical (ISM) which is initially reserved internationally for the using RF electromagnetic fields. IEEE 802.11n equipment also is Multiple Input Multiple Output (MIMO) and this traffic distance is 50 meters.

3.1.1 Monitoring and Modeling for wireless:

Host Configuration

n IP assignment (DHCP), Default Gateway

n On-site network access software installation

n Network discovery for enabling/disabling network access protocol

Key Management

n Store/invalidate session keys collected from multiple networks

n Roaming: always bypass authentication process if possible

n Renew keys within a session to enhance security

Mobility One

AP

Authorizer

Verifier

Internet

Client+driver

MS PASSPORT

subnet

beacon

The subnet mask of Beacon is different

Verifier IP

Mobility Two

AP

Authorizer

Verifier

Internet

Client+driver

MS PASSPORT

subnet

beacon

Network_id is different authentication

Authorizer

3.2 100 Base T Network Traffic

100 Base TX uses 4B/5B encoded data, which is scrambled and converted to multilevel transmit-three levels. For example, converts each set of 4 bits into a 5 bit pattern, improved error detection and simplified transmitter and receiver design

4. Security Issues

The popular security for wireless networking is Service Set ID (SSID)

Service Set ID (SSID) uses Shared-Key. The model has four.

1. MAC-level Filtering

l No protection against hardware address spoofing; does not scale

2. WEP (Wired Equivalent Privacy) Key Security

l Keys are hard-wired and cannot be changed flexibly

l WEP keys can be broken over time

l OK for small enterprises, but does not scale well

3. IEEE 802.1x port-based access control

l May require changes to existing AP hardware and software

4. WPA2

l Personal protects unauthorized network access by utilizing a set-up password.

l Enterprise verifies network users through a server.

The WPA2 will be safer for wireless networking security (see figure 4.1). However this building has to use two equipments. As a result, a good method for wired networking and wireless networking are into the Internet to be log in system.

3. session key public

4. WLAN SSID

5. Login internet

3. Authority

1. Client Connect

2. Client Authentication

session key protocol

Figure 4.1: SSID Authentication: WPA2 + Radius Server

4.1 The Process of logging in system

Steps:

1. Client through DHCP to get IP Address

2. Client through Authorizer send beacon to get the network parameter

3. Beacon connect to web authentication

4. Authorizer sent session key, token to client and Verifier, than Verifier release IP Filter

5. Client transfer packet and tag

Process to Internet (1/3)

AP

Authorizer

Verifier

Internet

Client+driver

1. Client through DHCP to get IP Address

2. Client through Authorizer send beacon to get the network parameter

beacon

MS PASSPORT

DHCP

Process to Internet (2/3)

AP

Authorizer

Verifier

Internet

Client + driver

3. Beacon connect to web authentication

4. Authorizer sent session key, token to client and Verifier, than Verifier release IP Filter

Beacon

Network_id

Verifier_IP

Authorizer_IP

Web url

Web

MS PASSPORT

Process to Internet (3/3)

AP

Authorizer

Verifier

Internet

Client+driver

MS PASSPORT

packet

tag

packet

5. Client transfer packet and tag

Check and delete tag than sent to Internet

Policy

4.2 Tag format

Using session key to encrypt token, checksum

4.3 Basic Beacon (IP Broadcast)

l Beacon periodically sends

l Have not received beacon

n Client (Mobile node) Leave CHOICE network

n Resume originally setting up, packet does not add tag


5. Suitability for Real-Time Streaming Applications

Real-Time Streaming is protocol and Real-Time Streaming is useful for Video Conference and this protocol tolerates transmission to delay and doesn’t need synchronization on networking. As a result, Wireless networking also suits for Real-Time Streaming Applications.

5.1 Real Time Streaming Protocol (RTSP) process:

Initially, user finds presentation description which one is user want and to click this presentation. RTSP browser will connect the presentation description file than find the address, port, and directory. Than connect to server and open presentation to show to user.

5.2 Examples: Real Time Streaming Protocol process

Data form: http://dslab.ee.ncku.edu.tw/~lily/learning/example1.html


6. Conclusion

802.11n is last protocol for wireless, the equipment also expensive but it can provide huge bandwidth and transmission speed. If uses the Extended-Star topology, the networking will reach maximum efficiency. On the other hand, the Extended-Star topology also suit two different kinds of equipment because every floor only need one switch to connect to router. It will save cost for company. The last point, this networking also suit for Real-Time Streaming Applications but one different point is that Real-Time Streaming Applications will use in LAN, if want to connect WAN, the Extended-Star topology will delay a lot of time.

7. List of References

1. Rich, H (2002), Gigabit Ethernet: Auto-Negotiation Retrieved 28 January 2008 from http://www.dell.com/powersolutions

2. Junyi-L, Laroia-R, Richardson-T(2007) Progressively Broadcasting Information In Beacon Signals

3. National Cheng Kung University (2004) Real Time Streaming Protocol process Retrieved 28 January 2008 from http://dslab.ee.ncku.edu.tw/~lily/learning/example1.html

4. Cisco System, Inc.(2006) Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, third Edition (ISBN 1587131501)

8. List of Bibliography

1. Cisco System, Inc.(2006) Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, third Edition (ISBN 1587131501)

2. Cisco System, Inc. (2003) Cisco Access Routers

3. Ergen, M(2002) IEEE tutorial, University of California Berkeley

4. Intel Corporation(2001) Gigabit Ethernet Technology and Solutions

5. Junyi-L, Laroia-R, Richardson-T(2007) Progressively Broadcasting Information In Beacon Signals

6. Novaes, M(2000) Beacon: A Hierarchical Network Topology Monitoring System Based on IP Multicast

7. Pablo, B(1997) A Technical Tutorial on the IEEE 802.11 Protocol

8. Rich, H (2002), Gigabit Ethernet: Auto-Negotiation Retrieved 28 January 2008 from http://www.dell.com/powersolutions

IPV6

Table of Contents

1. Introduction…………………………………………………………2

2. The Internet…………………………………………………………2

3. The Internet Protocol………………………………………………3

4. IPv4………………………………………………………………….4

5. IPv6………………………………………………………………….5

6. Conclusion……………………………………………………….…7

7. List of References………………………………………...….…....8

8. List of Bibliography………………………………………...………9

Introduction

Since 1964, the network-structure was required from the national defense with American Ministry of National Defense (Advanced Research Projects Agency, ARPA). 1974, Transmission Control Protocol (TCP), Internet Protocol (IP) replaced Network Control Protocol (NCP) gradually. 1983, TCP/IP became the standard communication protocol on Internet.

The current version of IP (known as Version 4 or IPv4) has not been substantially changed since RFC 791 was published in 1981. IPv4 has proven to be strong, stable, easily implemented and interoperable. It has stood the test of scaling an internetwork to a global utility the size of today’s Internet.

According to the estimation by the network expert of Asia Pacific Network Information Centre (APNIC) Geoff Huston, however, IPv4 address will finish allotting in 2010 or 2011, in order to solve the problem that will have no address to use then, the Internet Engineering Task Force (IETF) has developed a suite of protocols and standards known as IP version 6 (IPv6). (APNIC, 2008) This new version, previously called IP-The Next Generation (IPng), incorporates the concepts of many proposed methods for updating the IPv4 protocol. “The design of IPv6 is intentionally targeted for minimal impact on upper and lower layer protocols by avoiding the random addition of new features.” (Microsoft Windows Server 2008 White Paper, 2008)

The Internet

As the original, the network was designed for the national defense and the education using. The functions were focus on the researching and transition of speed. So IPv4 has not considered the security question at the beginning of designing, the materials have not used the safe mechanism to convey in the network, therefore Internet in early days often happens in enterprises or organization networks and is attacked, such online security incidents as the secret data are stolen. The looks was relatively 20 years ago, now's internet network was extremely general, accompanied by the exchange of a large number of bodies of safe demand information at the same time, problem that the technology that security becomes any kind of network must all be faced, though IPv4 can pass the internet online security protocol (IP Security, IPSec) Offer safe protection, but it is all extra burden to erect and managerial, in view of this, have already considered the online security function, the point-to-point safe protection ability of the inlaying type while hoping to offer at the time of IPv6 protocol design, by way of offering a piece of safer materials of internet network in the future to exchange.

Internet Protocol

The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. Whenever one person send or receive data (for example, an e-mail note or a Web page), the message gets divided into little chunks called packets. Each of these packets contains both the sender's Internet address and the receiver's address. Any packet is sent first to a gateway computer that understands a small part of the Internet. The gateway reads the destination address and forwards the packet to an adjacent gateway that in turn reads the destination address and so forth across the Internet until one gateway recognizes the packet as belonging to a computer within its immediate neighborhood or domain. That gateway then forwards the packet directly to the computer whose address is specified.

Because a message is divided into a number of packets, each packet can, if necessary, be sent by a different route across the Internet. Packets can arrive in a different order than the order they were sent in. The Internet Protocol just delivers them. It's up to another protocol, the Transmission Control Protocol (TCP) to put them back in the right order.

IP is a connectionless protocol, which means that there is no continuing connection between the end points that are communicating. Each packet that travels through the Internet is treated as an independent unit of data without any relation to any other unit of data. (The reason the packets do get put in the right order is because of TCP, the connection-oriented protocol that keeps track of the packet sequence in a message.) In the Open Systems Interconnection (OSI) communication model, IP is in layer 3, the Networking Layer. The most widely used version of IP today is IPv4.

However, IPv6 is also beginning to be supported. IPv6 provides for much longer addresses and therefore for the possibility of many more Internet users. IPv6 includes the capabilities of IPv4 and any server that can support IPv6 packets can also support IPv4 packets.

IPv4

IPv4 is the fourth version of Internet protocol, but the first one to be widely deployed. It uses a 32 bit addressing and allows for 4,294,967,296 unique addresses. IPv4 has four different class types, the class types are A, B, C, and D. An example of IPv4 is 207. 142. 131. 235. The IPv4 uses a subnet mask because of the large numbers of computers used today.

However, the initial design did not anticipate some elements. There are some examples and limitation will be following:

l IPv4 addresses have become relatively scarce, forcing some organizations to use a Network Address Translator (NAT) to map multiple private addresses to a single public IP address.

l IPv4 address prefixes have been and are currently allocated; there are routinely over 85,000 routes in the routing tables of Internet backbone routers. The current IPv4 Internet routing infrastructure is a combination of both flat and hierarchical routing.

l Most current IPv4 implementations must be either manually configured or use a stateful address configuration protocol such as Dynamic Host Configuration Protocol (DHCP). With more computers and devices using IP, there is a need for a simpler and more automatic configuration of addresses and other configuration settings that do not rely on the administration of a DHCP infrastructure.

l While standards for Quality Of Service (QoS) exist for IPv4, real-time traffic support relies on the IPv4 Type of Service (TOS) field and the identification of the payload, typically using a UDP or TCP port. Unfortunately, the IPv4 TOS field has limited functionality and over time there were various local interpretations. In addition, payload identification using a TCP and UDP port is not possible when the IPv4 packet payload is encrypted.

IPv6

IPv6 possesses the following characteristic:

l Space of larger address

IPv6 uses 128 the units to make the location internet network node, it is up to the 128th power of 2 to fix the space of location (32 bits extend into 128 bits).

l Combine the mechanisms of the authentication and security

Authentication Header which IPv6 department utilizes in Next Header and Encrypted Security Payload Header carry on authentication to the materials that are transmitted and encrypt so can be in order to reach the efficiency of the online security through the extra apparatus or software that the user will not need in the future.

l Better route efficiency and optimization

IPv6 uses stratum type way of the space of address to divide into Top Level Aggregator Identifier, Next Level Aggregator Identifier, Site Level Aggregator Identifier three layers, every administration in charge of authorizing IP network section for its lower floor, the management style information can via remit, simplify very much exactly so as to route that exchange. In addition, IPv6 also supports the function of any cast, by selecting one to be best (shortest distance or the minimum speed from the route form of the router) Host computer, thus it shorten complex reaction time and not disperse and save wide flow frequently load.

l Assurance of service quality

In the gauge outfit of IPv6, have kept the field of Flow Label, can be with Multiple Protocol Label Switch (MPLS) Technology cooperate, flow different one the materialness because it is corresponding that different Flow Label will be arrived, can as service basis where quality control. IPv6 also joins two parameters in the header, including Traffic Class and Flow Label flows with the materials will facilitate the design of the quality controlling mechanism of the service.

l Set up Automatically and Motivation function

IPv6 established the mechanism of supporting the motivate IP in the design, supports the internet network of the action in the future with the profit. And support another important characteristic in the action IP mechanism to look for Neighbor Discovery with the neighbor of network promptly with Auto-configuration, the mechanism comes to simplify the user IP address' establishment. The host computer on IPv6 network can obtain IP and does not need through setting up manually automatically. And utilize Destination Header and Routing Header of Extension Header, will make the route mechanism in the action communication optimized, have solved the triangle route question.

l It is more efficient that the package gauge outfit is dealt with:

IPv6 simplifies originally the gauge outfit of IPv4 is designed, though IP address extends four times to become 128 from 32 original, it last twice and lengths fixed, because IPv6 ' expansion some alternative ' but gauge outfit length with ' IP cut ' function delete last shelf head lengths fixed. In addition also delete checking yard (Checksum) at the same time And at byte, fixed length and design aligning let the gauge outfit simplify much more so each field alien as much as possible, there will be a valid rate while dealing with the package gauge outfit even more.

Figure 1 shows the IPv4 Packets details of shaded fields are absent from IPv6

l Expandability

It deletes to be originally IPv4 alternative some expansion, IPv6 design until ' gauge outfit (Next Header) the next ' way about increase gauge outfit expandability. The user can pass ' the next gauge outfit (Next Header) ' way to point out next content of gauge outfit have by network ends favorable or receive there aren't end, it is a implementation example of IPv6 expandability design, such a design lets IPv6 shelf very beginning have higher expansion.

Figure 2 shows the IPv6 Packets details.

Conclusion

Originally to the IPv4 genesises to be extreme point communication ability and two-way communication ability in extreme point internet, communications can last terminal machine of two sets since from communication without lasting computering to pass intermediary, two-way ability means either party of two communicators can all open the line of the communication.

Demand because of two these, can with willful to roam internet in internet early user, but, because of the shortage of IPv4 address at present, so the network address is changed (NAT) Use popularize very much, make too there aren't these two pieces and this.

When the line among the terminal computers needs to pass the computer of the intermediary, this way hinders the service that can work between the terminal computers, the intermediary computer that hinders from must be improved to support the new service.

Because there is not ability of two-way communication, only have one-way ability that communicates left, for example, the user end can deposit and withdraw the end of the server but the end of the server is unable to deposit and withdraw user's end, it will be unable to make any requirements to user's end to represent the end of the server like this.

IPv6 has offered a large number of IPv4 address, enable internet to come back, its original demand, have extreme point communication ability and two-way communication ability in extreme point, make internet development of application program light the new spark. The service that cannot imagine on IP address scarce internet at present will all become possible. IPv6 to increase IP figure of address, prove internet can an example of the change especially not merely.

List of References:

1. APNIC (2008) Transition to IPv6 Retrieved19 January 2009 from http://www.apnic.net/community/research/ipv6/

2. Microsoft Windows Server 2008 White Paper (2008) Introduction to IP Version 6 Retrieved 19 January 2009 from http://technet.microsoft.com/en-us/library/bb726944.aspx

3. Search Unified Communications.com (2008) Internet Protocol Retrieved 19 January 2009 from http://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci214031,00.html

4. Piers O'Hanlon, University College London (2004) IPv6 and AccessGrid Retrieved 19 January 2009 from http://www-unix.mcs.anl.gov/fl/flevents/ag/agr04/talks/ohanlon-ucl.pdf

List of Bibliography

1. anonymous, (2009) IPv6: IPv6 / IPv4 Comparative Statistics Retrieved 19 January 2009 from http://bgp.potaroo.net/v6/v6rpt.html

2. APNIC (2008) Internet Evolution and IPv6 Retrieved 19 January 2009 from http://www.apnic.net/meetings/20/docs/other/plenary-pres-huston-internet-evolution-ipv6.pdf

3. Cisco Systems Inc, (2008) The Internet Protocol Journal Retrieved 19 January 2009 from http://www.cisco.com/web/about/ac123/ac147/about_cisco_the_internet_protocol_journal.html

4. Cram Session website, (2008) An Introduction to IPV6 Retrieved 19 January 2009 from http://www.cramsession.com/articles/get-article.asp?aid=23

5. Feyrer. H (2001) Introduction to IPv6 Retrieved 19 January 2009 from http://www.onlamp.com/pub/a/onlamp/2001/05/24/ipv6_tutorial.html

6. Professor Don Colton,Brigham Young University Hawaii (2006) IPv4 Classful Addresses Retrieved 19 January 20098 from http://209.85.173.132/search?q=cache:Fv-9hF87Pc4J:quizgen.org/tut/q28.IPv4.Classful.Addressing.p3.pdf+IPv4+class+C&hl=en&ct=clnk&cd=27

7. Sparq Corp, Taiwan (2008) IPv6 Service Retrieved 19 January 2009 from http://www.ipv6.sparqnet.net/

8. TWNIC, (2002) IPv6 Introduction Retrieved 19 January 2009 from http://www.ipv6.org.tw/seminar/IPv6%20Tutorial/IPv6%20Introduction%20(TP).pdf

9. Vest. T , (2005) IP Address Allocation vs. Internet Production I: Understanding the Relationship, and the Differences Retrieved 19 January 2009 from http://www.circleid.com/posts/ip_address_allocation_vs_internet_production_i_understanding_the_relationsh/

10. Xisto Corporation, (2005) Ipv4 Vs. Ipv6 - IPV6 the future. Retrieved 19 January 2009 from http://www.trap17.com/index.php/ipv4-vs-ipv6_t24034.html

Thursday, 4 February 2010

Avoiding Employee Termination – Being Yourself at Work While Maintaining a Favorable Image

Avoiding Employee Termination – Being Yourself at Work While Maintaining a Favorable Image

Everyone knows it’s important to be true to yourself. But in today’s economy, the looming threat of employee termination (URL: http://www.calbizcentral.com/gateway/hrc/pages/california-wrongful-termination.aspx) makes many wonder just how much of themselves they can let shine in the office. While you don’t want to be an office drone, you also don’t want to stand out so much that higher-ups may see you as “a problem.” Here are five ways to be yourself while maintaining a favorable image at work.

1. Be Nice to People

If your natural inclination is to be a nice person, you can certainly do that at work. Smile and offer and return greetings. However, it’s possible to take it too far. Don’t let people walk all over you. If someone asks you for a favor, make sure you do it only if it’s reasonable, and make sure you ask for a favor in return somewhere down the road so it’s clear the relationship is reciprocal. Also, don’t try to strike up a casual conversation when it’s clear that a co-worker or supervisor is very busy (or that you should be very busy).

2. Know the Tone of the Office

You like to tell the occasional joke. That’s great. But make sure you know just how light it is acceptable to keep it in your office. Observe how others interact with each other and how they seem to respond to your jokes. Also, keep the inappropriate material at home (or get rid of it entirely).

3. Be Careful About Venting

If you’re not happy and you complain about it to everyone you see, people will start to wonder why you’re there. If you are dissatisfied with your work situation you should by all means try to do something to change it—but not on work time. Spread the word that you’re not happy and you suddenly may be forced to accelerate your new job search.

4. Reconsider Romance

Every office has a romance or two, but have you ever seen one that ends well? When you romance a co-worker, you risk a whole host of unpleasant consequences, including but not limited to: Charges of sexual harassment, jealousy or envy from other co-workers, an awkward or untenable work environment after the inevitable break up. If you are just a natural romantic, find someone outside the office, or at the very least, on a different floor/different division.

5. Have Lunch Outside of the Office

If you’re really feeling you can’t let your true self shine in the office, schedule some “me” time during the day outside of the office. Try to schedule lunches with non-work friends or plan to do something that’s signature you during lunch, whether it’s a bike ride or a trip to the local comic book store. This should keep you grounded enough to get you through the work day.

Friday, 15 August 2008

The Takeover Targets Research Report

The Takeover Targets Research Report

To see the complete file: The Takeover Targets Research Report.pdf

The Takeover Targets Research Report

Targets: Starlight PLC, Mario Ferrino, Coffee Ground PLC

Introduction

This report is especially for Bon Appetit PLC to consider to takeover target’s analyses. It will show the three companies’ turnover in recent years and their share prices on the marketing. This report will also show the debt’s ratio, their background, and their costumers’ valuation. We should estimate these companies’ future which can feed Bon Appetit PLC Group’s need.

Mission Target

• To increase Bon Appetit’s profits
• To enhance Bon Appetit’s image
• To buy a company which will continue to grow and contribute the group’s success.
• To buy a company which will not take up too much of the present management’s time and energy.

Backgrounds and Analyses of three companies

Starlight PLC (London, UK):
• Founded: 6 years ago.
• Type of business: Ground floor restaurant + cabaret nightclub below ground or first floor.
• Ownership: Joachim and Theresa Lopez (Brazilian) – 100% voting share.
• Plans: to create a national network with an annual turnover in excess of 100 million Euros.

Mario Ferrino (Genoa, Italy):
• Founded: 35 years ago.
• Type of business: Delicatessen selling wide range of luxury food and drinks.
• Ownership: Mario Ferrino and his brother Marcello and family members.
(Family Companies)
• Plans: Mario and Marcello old (over 70). They want to retire. Relatives always arguing. No one keen to take over.

Coffee Ground PLC (London, UK):
• Founded: 12 years ago. First outlet in Brighton, seaside town.
• Type of business: Coffee shop serving drinks (mainly coffee) and food
• Ownership: 65% of voting shares: small shareholders + big institutions, banks, insurance company’s pension funds, etc.
(complicate)
• Plans: want to open new outlets next year in Italy or Spain.
• Mainly customers: young and medium age people.


Findings


Starlight PLC:
Risk point: ★★★★☆
• Although Starlight plc’s annual turnover is rising, but it doesn’t have much pre-fax profits. And its debt ratio is too high (72%).
• It cannot grow at their present rate without setting up a more professional management structure.
• Although its customers are all aged and service is good and full of energy, but all nationalities are one of reasons that is hard to control the qualifications and all restaurants are different type of style.
• It has already copycat cabaret clubs have started up in the north of England.
• Its cost is rising and has already reflected on the prices.
• Because the company is growing up and make the money, we want to takeover them that we have to pay more money for them. In my opinion, this is not a good deal and has highly risky. And we must invest in more people and time to take it over.


Mario Ferrino:
Risk point: ★★☆☆☆
• The company has a long history and well-known brand in food industry; Mario’s avocado and bacon sandwich.
• They have loyal customers.
• Good turnover and pre-tax profits (about £ 2.5millions) and Medium debt ratio: 44%
• Although the share price has smoothly declined, but it still has competitive on dishes market
• Simple ownership: its voted 100% by their family.
• The Major operator, Mario and Marcello are old (over 70), they want to retire. Relatives always arguing. No one keen to take over. In my opinion, it is a very good chance to takeover the company without huge mounts of money. And it has only lack of management in business. I believe that Bon Appetit PLC Group have good qualifications to reorganize this company.

Coffee Ground PLC:
Risk point: ★★★☆☆
• The company has fabulous turnover but its share price sharply decline in recent 12 months. It shows they have extremely tough rival like Starbuck, and it also shows their customers cannot afford their price so they had already decided to decline the prices.
• They have good debt ratio: 32% and mainly customers’ age (18~32).
• Their product is mainly focus on health and low-fat coffee and chocolates.
• With the pressure of the tough rival’s competition, their plan has already focused on the overseas markets. They want to open new outlets next year in Italy or Spain.
• So, the company’s future is uncertain future. This doesn’t fit Bon Appetit PLC Group’s need.

Conclusion

As the result shows, the most suitable target is Mario Ferrino. We don’t have to pay a lot of money to takeover that, and we also have spaces to negotiate the price with them. Because the major operators, Mario and Marcello, are old and they want to retire. And no one keen to take over. Furthermore, it has only lack of management in business. I believe that Bon Appetit PLC Group have good qualifications to reorganize this company.

Recommendations

Bon Appetit PLC Group is a chain of restaurants in the UK offering top class cuisine. It has well organized in business management and food industry.
There will be possible benefits under the list:
1. If this merger will be success, we can make varied to two types of restaurants, with mixed Italian foods and England foods.
2. It can supply the Bon Appetit plc’s restaurants the new element: Italian varied foods, such as olive oil, canned fish, pasta, and drinks etc.
3. Also, it will enhance the brand and image about Bon Appetit PLC in Italy.
4. After recreating the management system of Mario Ferrino, it will bring respectable profits for Bon Appetit PLC.


Reporter
Cody Chou.
15 August 2008