Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Background:

You have obtained a contract position at a small marketing and advertising firm called the Colour Ability Corporation (CAC). Your contract responsibilities are to help them plan their emerging networking and communications requirements and update their IT resources. CAC currently hires 80 employees and operates from Level 10 and 11 on the X Tower in Brisbane CBD. CAC has recently purchased a four-story building in a Brisbane suburb where they can allocate a separate floor to each of their four departments, i.e., (1) marketing, (2) advertising, (3) design and photography, and (4) HR and accounting. They plan to move to their new office in three months. Also, CAC's list of customers has greatly expanded to other cities, mainly Sydney where their customers in Sydney are demanding more interactive advertising media, including video presentations. The management recognizes the business potential in this new market in Sydney and have leased a small office in Sydney (aka CAC's fifth department) to host 8 local employees.

They have hired you to review their existing IT resources and produce a proposal that allows the company to take advantage of their firm's expansion. The management has stated that if the proposal meets their requirements, they may hire you full-time to implement and manage these new resources.

You now have an idea of the scope of the project that you have undertaken, but do not have all of the information required to proceed. Using the details provided in the following sections you are required to prepare a professional business report of 2500 words addressing the eight activities identified below.

Activity 1

Use the following form to develop a proposed computer system for each of the specific uses, i.e., general use, graphics production and film production. Search the Internet or local sources for availability and pricing information. Use the same form to propose a server that can support their email and FTP requirements.

Computer System Planning Form

After the end-user systems have been selected, it is time to look at the workflow and decide on any shared components and network technology to support this workflow. This can include such things as shared printers, scanners, and storage as well as any routers, switches, access points and integrated service routers. When planning a network infrastructure, always plan into the future. For larger companies, because it is usually a substantial investment, the infrastructure should have a lifetime of about 10 years. For smaller companies and home users, the investment is significantly less and change occurs more frequently.

Activity 2
Using the Internet and locally available resources, select a high-speed, color copier/printer for the CAC offices. Provide supporting details to justify your selection.

Activity 3
Demonstrate a network layout for CAC requirements - you can use Figure 3 as the starting point. Because the company has limited funds available for this project, it is important that where possible only equipment designed for the small business and home markets be used. Provide supporting details to justify your selection of each equipment type, e.g., access points, switches and routers.

Activity 4
It is necessary to plan the Internet connectivity, and which services are provided by the ISP and which services must be provided in-house. Larger companies usually provide services in-house, while small businesses and individuals normally rely on an ISP to provide these services. Most ISPs offer a variety of services and service levels. Selecting an ISP is complicated, and not all technologies and services are available in all regions of the world.
Using the Internet, research alternative local ISPs to provide connectivity for CAC. If selected, CAC will rely upon this ISP for DNS and web mail. The ISP must also provide 99.999% uptime for access to the internal FTP/email server. Because you are the only IT person at CAC, it is also important that the ISP provides a high-level of technical support. Create a comparison worksheet for at least two local ISPs, including costing.

Activity 5
Which internal services must be offered by CAC, and which devices provide these services? Provide supporting details to justify your answer.

Activity 6
Complete the following network planning form and justify your answers as it relates to the proposed CAC network.

Part 2: Plan the installation.
After the equipment has been selected and the required services planned, the physical and logical installation is planned out. Physical installation includes the location of equipment and devices, along with how and when these devices are to be installed. In the business environment, it is important to minimize disruption of the normal work processes. Therefore, most installations, changes, and upgrades are done during hours when there is minimal business activity. Physical installation should also consider such things as adequate power outlets and ventilation, as well as the location of any necessary data drops.

Activity 7
Equally as important as planning the physical layout of the network and equipment is planning the logical layout. This includes such things as subnetting, addressing, naming, data flow, and security measures. Servers and network devices are assigned static IP addresses to allow them to be easily identified on the network and to also provide a mechanism for controlling access to these devices. Most other devices can be assigned addresses using DHCP. Note that both a server and its backup server must be accessed via the same public IP address.
Devise subnetting and addressing schemes for CAC. The schemes must provide all network devices and servers with a static address and allow all other hosts to be configured via DHCP. Identify the ranges of useable IP addresses (and default gateways) for DHCP, and assign all network devices an appropriate IP address (and default gateways). Use the following tables to report all the required setups, and then reflect this information on the network layout developed in Activity 3.

Activity 8
CAC is concerned that their files and resources may be vulnerable through the wired or wireless networks. Explain how the use of public and private IP addresses together may address this concern, and provide a security plan that allows only CAC employees to connect to the network and gain access to company information and resources.

Part 3: Prepare and present the proposal.
All of the gathered information and the proposed technical solution must be assembled into a format that makes sense to the company who has asked you to provide a solution. The formal report usually contains many different sections, including:
- Title page
- Executive Summary
- Tables of Contents, Figures and Tables
- Introduction
- Project proposal, comprising needs statement; goals and objectives; methodology and timetable; technical solutions and evaluation; budget summary; future plans
- Recommendations and Conclusions
- Bibliography and List of Refences
- Appended information
The report is often presented to various groups for approval. When presenting the report, present it in a confident, professional, and enthusiastic manner. The report must be technically accurate and free from spelling and grammatical errors.

Assignment Requirements and deliverables
You are to prepare a formal proposal report for CAC that includes all the components listed above by detailing the equipment, management and security requirements for the above case study and justifying suitable technologies to enhance the business's communications and networking within and outside the organisation. Be sure to include all cost information and network diagrams.

The report must be written in Microsoft Word. Multiple files will not be accepted. Report Structure: The report must be formatted using the following guidelines:
- Paragraph text: Use 11-point Calibri single line spacing
- Headings: Use Arial in an appropriate type size
- Margins: 2.0cm on all margins
- Header: Report title
- Footer: Page numbering - up to and including the Table of Contents use roman numerals (i, ii, iii, iv), restart numbering using conventional numerals (1, 2, 3, 4) from the first page after the Table of Contents.
- Title Page must not contain headers or footers
- The report is to be structured as a formal business report.

Referencing: The report is to include appropriate references and these references should follow the Harvard method of referencing. Note that ALL references should be from journal articles, conference papers, technical papers, recognized experts in the field or vendors' and service providers' websites.

Attachment:- Task.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93124757
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Rsa internet securitywhy is rsa believed to be hard to

RSA, Internet security Why is RSA believed to be hard to break? I. E. The complexity of what computational problem leads to the belief that it is secure? RSA can be used to authenticate messages by concatenateing to the ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

If a firms total cost function is given byt c

If a firm's total cost function is given byT C= 115,000Q-500Q2+Q3, what range of output does the firm have economies of scale?

Question suppose you wish encrypt the message beyonce using

Question : Suppose you wish encrypt the message BEYONCE using the one-time pad with the key RIHANNA (a) Encode to this message and the key as bits. (b) Encrypt with the one-time pad using XOR. What is the resulting ciphe ...

Backgroundyou have obtained a contract position at a small

Background: You have obtained a contract position at a small marketing and advertising firm called the Colour Ability Corporation (CAC). Your contract responsibilities are to help them plan their emerging networking and ...

Compare the importance of three categories described in the

Compare the importance of three categories described in the article: 1. window of exposure, 2. full public disclosure, 3. reasonable disclosure for three types of software applications: 4. military, 5. medical, 6. educat ...

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

Question 1 for rsa encryption we need a modulus that is the

Question : 1. For RSA encryption we need a modulus that is the product of two prime numbers, p and q. Assume p = 11 and q = 13, and thus n = p*q = 143. In this case, the RSA encryption exponent e must be relatively prime ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As