Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

he Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word and will be between 10-15 pages with graphics embedded within the document.

Background

You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP company, you recently made a persuasive presentation of your company's approach to designing networks at a large industry event. The CEO of Fiction Corporation, a large retail chain, was impressed by your presentation. It looks like you've finally got your break!

You have a small team of 10 technically proficient staffers with a strong background in project management, networking, and internetworking skills that include PMP, Network+, CCNP, and CISSP credentials.

You have been selected by Fiction Corporation to develop a network design document and plan without an RFP.

Overview

Fiction Corporation, a large national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.

The data in the center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hours a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation's operations and profitability. From the data processing viewpoint, the move includes 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.

The network consists of approximately 500 remote location retail stores connected via frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the entire organization. The retail operations also run WLANs that are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers also need to monitor the status of remote systems. The SNMP management system must be able to detect and report failure of the remote system or its communications link and the status of individual applications.

The company wishes a seamless migration that minimizes impact to its customers and employees. Any gaps in this background will require you to make sound technical and persuasive assumptions that satisfy the customer's goals that are within the budget guidelines.

You were selected in part due to your detailed analysis and agreement to an implementation cost that will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is the availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers.

Include the following in your assignment:

Title page
Table of contents
Executive summary
Project goal
Project scope

Design requirements:

Business goals
Technical goals
User communities and data stores
Network applications
Current state of the network
Logical design
Physical design
Results of network design testing
Implementation plan with a project schedule
Project budget with a return on investment calculation
Design document appendix

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Design a systematic network architecture plan in accordance with network design steps.

Summarize among scalability, availability, performance security, manageability, usability, adaptability, and affordability as they relate to internetworking product selection.

Design a network topology to include hierarchy, redundancy, modularity, and security.

Create a network security plan inclusive of identifying and analyzing network assets, security risks, security requirements, and security policy.

Develop network management strategies to include resource monitoring and data collection and interpretation.

Describe processes that address performance, faulty, configuration, security, and accounting management.

Compare and contrast the selection of technologies and devices for campus and enterprise networks that include remote access networks, WANs, service providers, end user remote access devices, central site remote access devices, VPN concentrators, and routers.

Develop network design testing procedures through services, tools, and testing scripts.

Describe optimal network design for critical business applications to include effective use of bandwidth and satisfying QoS requirements.

Develop a comprehensive network design document

Use technology and information resources to research issues in network architecture and analysis.

Write clearly and concisely about network architecture and analysis using proper writing mechanics and technical style conventions.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91784551
  • Price:- $35

Priced at Now at $35, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question resource security planning and risk management

Question: Resource: Security Planning and Risk Management Template The CIO of the organization you chose is ready for you to take a look at the organization's potential vulnerabilities and threats. Complete the 1.5- to 2 ...

Assume you have been selected to build a system for

Assume you have been selected to build a system for Oil&Gas company. Do you prefer to build a win-based system or a web-based system? Why?

Question in ruby as in java 8 or scala an interface mix-in

Question : In Ruby, as in Java 8 or Scala, an interface (mix-in) can provide method code as well as signatures. (It can't provide data members; that would be multiple inheritance.) Explain why dynamic typing makes this f ...

Draw supply and demand curve to illustrate the following

Draw supply and demand curve to illustrate the following sequences of events. Show changes in one graph. Assume upward sloping for supply curves and downward sloping for demand curves 1. In year 1, the rental apartment m ...

On a certain banking machine customers arrive at an average

On a certain banking machine customers arrive at an average of 15 per hour. a) What is the probability that 12 customers will use the machine in the next hour? b) What is the probability that there will be fewer than 3 c ...

Please discuss the design principles that guide the authors

Please discuss the design principles that guide the authors of instruction sets in making the right balance. Provide examples of application of each of the three design principles while designing instruction sets.

Enter probability as a fraction or as a decimal rounded to

Enter probability as a fraction or as a decimal rounded to nearest thousandth (three A basket contains six red and four blue marbles. Three marbles are drawn at random without replacement. (WITHOUT using combinations) de ...

Discuss how today the internet has brought millions of

Discuss how today, the internet has brought millions of unsecured computer networks into communication with each other.

Suppose you are given an undirected graph g with weighted

Suppose you are given an undirected graph G with weighted edges and a minimum spanning tree T of G. • Design an algorithm to update the minimum spanning tree when the weight of a single edge e is increased. • Design an a ...

Need a use case diagram for a case studythe case studypaul

Need a use case diagram for a case study: The case study Paul is the Director of IT Services for a consulting firm Avant. The firm has been growing fast since it was launched in 2010. With over 100 employees and hundreds ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As