Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Troubleshooting and Maintenance Plan

Use the same scenario from Assignment 1. In addition, XYZ Company is heavily invested in e-Commerce with all retail locations' Point of Sale systems connected so that it maintains a dynamic inventory and automatically generates restock orders. The XYZ Company engineers have configured the WAN-based Intranet using IPSec to support all of these locations via encrypted VPN links connected to the nearest regional distribution center.

XYZ Company has an enterprise network consisting of a core backbone, corporate campus, two (2) data centers, regional distribution centers, and Internet Edge with a DMZ. For better security, the retail Point of Sale systems does not have direct Internet access. At the corporate campus, the seven (7) departments in the company include Finance, Operations, Human Resources, Sales, Marketing, Technology, and the Corporate Executive Office. The company provides appropriate computing equipment to all of its employees. It also provides remote access for the system and network administrators using company-provided encrypted laptops and two (2) factor authentication to access the XYZ Company network in order to provide off-hours support.

Due to recent major security concerns in its campus network, XYZ Company redesigned the infrastructure so that it:

• Implements VLAN segments segregating servers, workstations, and printers on separate VLANs.
• Implements Port Security to protect against MAC layer attacks.
• Implements firewalls between VLANs to protect against VLAN attacks.
• Protects against spoofing attacks.
• Secures the network switches.

Based on your prior success in other networking endeavors, your supervisor has asked you to write a detailed troubleshooting and maintenance plan for your fellow network engineers for when they are on call. Additionally, this plan will be the template for the other system administrators to write troubleshooting and maintenance plans for their areas of expertise.

Write a six to ten (6-10) page paper in which you:

1. Describe the routing and switching infrastructure and the routing protocols used in the environment.

2. Illustrate the secure routing and switching infrastructure topology through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Include a depiction of all core elements of the routing and infrastructure topology using color-keyed symbols to indicate the functionality of each item. Note: The graphically depicted solution is not included in the required page length.

3. Suggest one (1) overall troubleshooting methodology that you would use for your troubleshooting and maintenance plan. Provide a rationale to support your suggestion.

4. Create the daily, weekly, and monthly maintenance processes that your fellow network engineers must follow in order to maintain the health of the network. Provide a rationale to support of your suggestion(s).

5. Analyze whether or not other system administrators can use the template of your plan to write troubleshooting and maintenance plans for their areas of expertise. Justify your response.

6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91573464

Have any Question?


Related Questions in Management Information System

Assignmentif you have not done so already please review the

Assignment If you have not done so already, please review the Module Overview, read the required readings, and watch the lectures/presentations. These are three short essay questions. Answers can be found in the text. (D ...

Your final research paper assignment is to write a research

Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen counterme ...

Research the it security policy used by your university or

Research the IT security policy used by your university or by some other organization you are associated with. Identify which of the topics listed in Section 14.2 this policy addresses. If possible, identify any legal or ...

Question 1 what aspect of display technology is unique and

Question : 1. What aspect of display technology is unique and potentially what drawbacks does this new technology eliminate? 2. Introducing traditional "non-disruptive products to market is facilitated with market studie ...

Review the key barriers to his implementation found in

Review the key barriers to HIS implementation found in Chapter 7 of Essentials of Health Information Systems and Technology. Discuss the key benefits and value of HIS, and of technology investments and implementations. W ...

Technical projects fail when they deliver significantly

Technical projects fail when they deliver significantly late, substantially over budget, and/or with significant features missing or unusable. Sponsors may lose patience and cancel stalled projects. Please respond to the ...

In this assignment students will review the risk management

In this assignment, students will review the risk management framework (RMF). Provide an overview of the framework in a visual graphic format of the six steps in the process and provide a brief description of what happen ...

Suppose that frames are 500 bytes long which includes 58

Suppose that frames are 500 bytes long which includes 58 bytes of overhead. Also assume that ACK frames are 64 bytes long. a) The transmission uses Stop-and-Wait ARQ. Let the transmission rate of the system be R where R= ...

In a three-page well-written page answer the following

In a three-page, well-written page answer the following question: You all work in or know of people who work in enterprise IT environments Maintaining the enterprise security posture, legal risk, and security is constant ...

Threats vulnerabilities security controls and

Threats, Vulnerabilities, Security Controls, and Countermeasures Description: The objective of this project is to create a comprehensive threat model on a software application of your choosing. This assignment will requi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As