Network Infrastructure

You start each morning by logging into your computer and checking your email and voice messages.  Although, you might not be aware of how many systems work in tandem to accomplish this.  Your computer first needs permission from the server to validate who you are by checking if your password is correct.  In order to get that permission, your request travels over Ethernet and switches or over the air via Wi-Fi.  Once logged in, you are delegated access to printers and shared drives.  Next, it is time to check your email and voice messages.  Those systems run on completely different servers and need care and attention to work correctly.  This might all seem complicated but running and maintaining network infrastructure is our specialty.