Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Comprehensive Authentic Assessment: Plan Deliverables

For this course AAP is a response for customer's RFP or customer's design requirements and type of solution used in network design. Typically, a customer's RFP includes following topics.

• Business goals for the project

• Scope of the project

• Information on existing network

• Information on new applications

• Technical requirements, including scalability, availability, network performance, security, manageability, usability, adaptability, and affordability

• Warranty requirements for products

• Environmental or architectural constraints

• Training and support requirements

• Preliminary schedule with milestones and deliverables

• Legal contractual terms and conditions

Your AAP should include responses to all of customer's RFP and should include logical and physical component pf the design, information on technologies used in design solution, and proposal to implementing the design. The following sections describe the format of AAP:

A: Executive Summary (ES)

The executive summary briefly states and emphasizes the major points of the customer's requirements. The ES should be no more than one page and should be directed at key decision maker of the project who will decide whether to accept your design. The ES can have minimum technical information but NO technical details. The technical information should be summarized and organized in order of the customer's highest-priority objectives for the design project. The ES should be organized customer top requirements.

B: Project Goal

This section should state the primary goal for the network design. The goal should be business oriented and related to an overall objective that organization has to become more successful in core business. Your objective is to make it clear to decision maker that you understand the primary purpose and importance of the network design project. Below is an example of project goal was written for an actual design.

"The goal of this project is to develop a wide area network (WAN) that will support new high bandwidth and low-delay multimedia applications. The new applications are key to the successful implementation of new training programs for the sales force. The new WAN facilitate of increasing sales in the USA by 50% in the next fiscal year."

C: Project Scope

The project scope section provides information on extent of the project, including a summary of departments, field offices networks that will be affected by the project. The project scope section specifies whether the project is new network or modifications to an existing network. It indicates whether the design is for a single network segment, a set of LANs, a building or campus network, or a set of WAN or remote access network, VoIP, or enhancing security

D: Design Requirements

In this section, you provide major business and technical requirements of the network in priority order. In business goal explain the role network design will play in helping an organization provide better products and services.

The technical requirement section explains in general term how propose technical improvement is better than or meet the customer requirement.

Network Application: This section lists and characterizes the new and existing network applications.

E: Design Solution:

This section includes:

• Logical Network topology which include high level one or more drawings to illustrate logical architecture of the proposed network
• Recommended LAN and Wireless design to implement Client's key requirements.
• Recommended Voice over IP solution,
• Recommend solution to implement client's key security requirements.
• Recommend solution to implement client's key Active Directory requirements

F: Implementation Plan:

The implementation plan includes your recommendations for deploying the network design. The design implementation description should be detailed as possible. Implementation of a network design consists of several phases (buy and install hardware, configure system, test system and so forth). Each phase consists of several steps, and documentation for each step should contain the following:

• A project schedule
• Plans with vendors or service providers for installation of links, equipment or services
• Plan or recommendations for outsourcing the implementation or management of the network
• A plan for communicating the design to end users, network administrators, and management
• A training plan for network administrators and end users
• A plan for measuring the effectiveness of the design after it has been implemented
• A list of known risks that could delay the project
• A fallback plan if the network implementation fails
• A plan for evolving the network design as new application requirements goals arise.

G: Project Budget

This section should contain the funds the customer needs for equipment purchases, maintenance, and support agreements, service contracts, software licenses, training, and staffing. The budget can also include consulting fees and outsourcing expenses.

H: Design Document Appendix

Most design documents include one or more appendixes that present supplemental information about the design and implementation. Supplemental information can include detailed topology drawings, device configurations, network addressing and naming details and comprehensive results from the testing of the network design. You can include business information such as list of contact name, numbers and e-mail addresses. The appendix can include warranty on devices, legal agreement, and any information which is not critical for design, but you have noted in your gathering information process.

Writing Instructions

Paper must have a minimum of 40 pages and a maximum of 45 pages of text excluding the required title page and bibliography and appendixes. Text must be Times New Roman, 12 fonts, 1" margin on all sides, and double spaced.

Students must follow "Publication Manual of the American Psychological Association, Sixth Edition (APA- 6)", also known as APA style or format. Only a Microsoft Word file will be accepted as the final submission; no HTML or PDF files allowed.

All sources must be properly cited and must be credible. At least two sources must be Internet sources.

Attachment:- Attachments.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92407395

Have any Question?


Related Questions in Computer Network & Security

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

Suppose that third national bank has reserves of 20000 and

Suppose that Third National Bank has reserves of $20,000 and check able deposits of $200,000. The reserve ratio is 10 percent. The bank sells $20,000 in securities to the Federal Reserve Bank in its district, receiving a ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: What is the network mask used by the router? (in dotted decim ...

Assignment - network implementationbackgroundwidgets and

Assignment - Network Implementation Background Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actu ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Rsa internet securitywhy is rsa believed to be hard to

RSA, Internet security Why is RSA believed to be hard to break? I. E. The complexity of what computational problem leads to the belief that it is secure? RSA can be used to authenticate messages by concatenateing to the ...

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

Design and implementation of secure enterprise wireless

Design and implementation of secure enterprise wireless network Purpose of the assessment  (with ULO Mapping) The purpose of this assignment is to design and implement a secure enterprise wireless network, considering th ...

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

It networking assignment -major lab scenario -assessment

IT Networking Assignment - Major Lab Scenario - Assessment Requirements: Subnet an address space with given requirements. Assign appropriate addresses to interfaces and document them in the address table. Build the netwo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As