Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Can not be copied!

This assignment contains two (2) Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to complete this assignment.

The owners of DesignIT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. DesignIT is a graphic arts company that, up until now, had contracted work out to temporary design services. The new space will allow them to hire two (2) full time designers and a receptionist.

Description of space purchased:

  • 4 Cubicles
  • 1 Office
  • 1 Server room
  • 1 Reception desk
  • 1 Conference room

Below is the design of the space purchased:

Click here if you are having trouble viewing the above image.

Using the building layout, your role is to provide DesignIT with a network design that interconnects the following considerations:

  • DesignIT plans to relocate three (3) servers already configured as follows:
    • 1 Web Server - Microsoft IIS Server
    • 1 File Server - Microsoft Server 2008
    • 1 Server - Server 2008 Small Business Server
  • DesignIT has requested that the design include the following:
    • High speed Internet access
    • Firewall
    • Antivirus / malware protection
    • Six (6) computers
    • Three (3) color laser printers
    • Wireless access for portable devices
  • Design IT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance.

Section 1: Network Consultation Proposal
(Microsoft Word)

Create a cost analysis, and develop a proposal for the company.

  1. Write an five to seven (5-7) page proposal in which you:
    1. Recommend one (1) suitable network design.
    2. Suggest one (1) network architecture.
    3. Suggest LAN and Wireless LAN (WLAN) wiring considerations.
    4. Recommend hardware options and costs.
    5. Suggest security considerations for:
      1. Firewall
      2. Antivirus software
    6. Recommend software options and costs.
    7. Outline the labor costs, equipment costs, and service costs for your suggested design in table format.
    8. Identify the single point of failure, and recommend potential mitigation strategies.
    9. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 1 of your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: Network Consultation Presentation
(Microsoft PowerPoint or equivalent)
Use Microsoft PowerPoint or an open source alternative to present your findings to the client.

  1. Create a five to ten (5-10) slide presentation in which you:
    1. Outline the recommendations from your written proposal in Section 1.
    2. Provide general speaking notes that you would use to highlight non-visual content.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91838349
  • Price:- $45

Priced at Now at $45, Verified Solution

Have any Question?


Related Questions in Computer Engineering

System analysis project 4 can you answer the 4 questions at

System Analysis project 4: can you answer the 4 questions at the task section, thank you. Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company ...

The contracts manager at a company needs to make a large

The contracts manager at a company needs to make a large legal document available to an overseas customer. However, she has some challenges: The document contains sensitive information; it is too large to send via e-mail ...

A study sample was done regarding the association between

A study sample was done regarding the association between family history and the risk of developing AD. Exposure were family history of AD and no family history of AD. Outcomes were development of AD or no development of ...

Describe the role of an ethical hacker and describe what

Describe the role of an ethical hacker and describe what you can do legally as an ethical hacker

Program in cit is often times advantageous to be able to

*Program in C* It is often times advantageous to be able to transfer data between two arrays. Need a help with program (transfer.c) that add a range (by start index and end index) of numbers from array #1 to array #2 at ...

Mary kate is a project manager in the it department for a

Mary Kate is a project manager in the IT department for a university. She has been asked to manage a project to create faculty intranet. The university has multiple campuses in various locations, and professors and other ...

Question when setting quotas for disk space what are the

Question : When setting quotas for disk space, what are the two tools for enabling and configuring quotas? And which of the two are the more flexible? When creating a new share, what is the configuration option that enab ...

What is the probability of a value from a normal

What is the probability of a value from a normal distribution being between 0.75 standard deviations above the mean and 1.75 standard deviations below the mean? (Round calculations to nearest thousandth (3 digits))

Question research microwave serices and report on what

Question : Research microwave serices and report on what kinds of applications can be supported, what equipment will be necessary, where the equipment will be located, and what services these companies that offers.

Describe the role of an ethical hacker and describe what

Describe the role of an ethical hacker and describe what you can do legally as an ethical hacker

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As