Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment

This assignment contains two Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to complete this assignment.

The owners of DesignIT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. DesignIT is a graphic arts company that, up until now, had contracted work out to temporary design services. The new space will allow them to hire two full time designers and a receptionist.

Description of space purchased:

- 4 Cubicles
- 1 Office
- 1 Server room
- 1 Reception desk
- 1 Conference room

Below is the design of the space purchased:

Using the building layout, your role is to provide DesignIT with a network design that interconnects the following considerations:

- DesignIT plans to relocate three servers already configured as follows:

o 1 Web Server - Microsoft IIS Server
o 1 File Server - Microsoft Server 2008
o 1 Server - Server 2008 Small Business Server

DesignIT has requested that the design include the following:

o High speed Internet access
o Firewall
o Antivirus / malware protection
o Six computers
o Three color laser printers
o Wireless access for portable devices

DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance.

Section 1: Network Consultation Proposal

(Microsoft Word)

Create a cost analysis, and develop a proposal for the company.

1. Write an five to seven page proposal in which you:

a. Recommend one suitable network design.

b. Suggest one network architecture.

c. Suggest LAN and Wireless LAN (WLAN) wiring considerations.

d. Recommend hardware options and costs.

e. Suggest security considerations for:

i. Firewall
ii. Antivirus software

f. Recommend software options and costs.

g. Outline the labor costs, equipment costs, and service costs for your suggested design in table format.

h. Identify the single point of failure, and recommend potential mitigation strategies.

i. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 1 of your assignment must follow these formatting requirements:

- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

- Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: Network Consultation Presentation

(Microsoft PowerPoint or equivalent)

Use Microsoft PowerPoint or an open source alternative to present your findings to the client.

2. Create a five to ten slide presentation in which you:

a. Outline the recommendations from your written proposal in Section 1.
b. Provide general speaking notes that you would use to highlight non-visual content.

The specific course learning outcomes associated with this assignment are:

- Explain the basic components and media of network systems and distinguish between LANs, MANs, and WANs.

- Summarize current networking standards and how standards bodies and the standardization process impact networking technology.

- Describe the TCP / IP protocols and various functions among the application layer.

- Contrast why different technologies are deployed in different contexts of networking, such as topology, bandwidth, distance, and number of users.

- Explain and differentiate among network hardware devices and components.

- Compare and contrast among network operating systems.

- Describe security policy, practices, encryption techniques, and design considerations in support of business operations in a networked environment.

- Explain the role of integrity and availability in a networked environment.

- Use technology and information resources to research issues in computing networks.

- Write clearly and concisely about introductory networking topics using proper writing mechanics and technical style conventions.

Attachment:- Network-Diagram.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92568599
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Assessment taskstarting from the logical network design

Assessment Task Starting from the logical network design that you completed in Assessment Item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you received ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

1srin response to nmap -n -sn localhost what kind of

1. SR In response to "nmap -n -sn localhost": What kind of information did the nmap scan results show you, specifically? 2. FIB What does the "-sn" option do in nmap? ping scan -disable port scan 3. SR How does the "-sn" ...

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Assessment - network analysis using wiresharkpurpose of the

Assessment - Network Analysis using Wireshark Purpose of the assessment (with ULO Mapping) This assignment is designed to develop deeper analytical understanding of different distributed network conditions. At the comple ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As