Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Using the building layout, your role is to provide DesignIT with a network design that interconnects the following considerations:

DesignIT plans to relocate three (3) servers already configured as follows:

1 Web Server - Microsoft IIS Server
1 File Server - Microsoft Server 2008
1 Server - Server 2008 Small Business Server

DesignIT has requested that the design include the following:

High speed Internet access
Firewall
Antivirus / malware protection
Six (6) computers
Three (3) color laser printers
Wireless access for portable devices

DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance.

Section 1: Network Consultation Proposal

(Microsoft Word)

Create a cost analysis, and develop a proposal for the company.

Write an five to seven (5-7) page proposal in which you:

Recommend one (1) suitable network design.

Suggest one (1) network architecture.

Suggest LAN and Wireless LAN (WLAN) wiring considerations.

Recommend hardware options and costs.

Suggest security considerations for:

Firewall
Antivirus software

Recommend software options and costs.

Outline the labor costs, equipment costs, and service costs for your suggested design in table format.

Identify the single point of failure, and recommend potential mitigation strategies.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 1 of your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: Network Consultation Presentation

(Microsoft PowerPoint or equivalent)

Use Microsoft PowerPoint or an open source alternative to present your findings to the client.

Create a five to ten (5-10) slide presentation in which you:

Outline the recommendations from your written proposal in Section 1.

Provide general speaking notes that you would use to highlight non-visual content.

The specific course learning outcomes associated with this assignment are:

Explain the basic components and media of network systems and distinguish between LANs, MANs, and WANs.

Summarize current networking standards and how standards bodies and the standardization process impact networking technology.

Describe the TCP / IP protocols and various functions among the application layer.

Contrast why different technologies are deployed in different contexts of networking, such as topology, bandwidth, distance, and number of users.

Explain and differentiate among network hardware devices and components.

Compare and contrast among network operating systems.

Describe security policy, practices, encryption techniques, and design considerations in support of business operations in a networked environment.

Explain the role of integrity and availability in a networked environment.

Use technology and information resources to research issues in computing networks.

Write clearly and concisely about introductory networking topics using proper writing mechanics and technical style conventions.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91964281
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question?


Related Questions in Management Information System

Question in roughly 200 words - explain what social

Question : In roughly 200 words - Explain what social engineering is, and discuss how organizations can recognize social engineering and reduce the risks associated with it. The response must be typed, single spaced, mus ...

Summaryusing an organization of your choicedevelop a

Summary: Using an organization of your choice: Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company. Please note that this is a formal writing, all references (peer-reviewed) m ...

Instructionsrecently a terminated employee used his mobile

Instructions Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your ...

The less concrete and measurable goals areselect one a the

The less concrete and measurable goals are: Select one: a. the harder it is to communicate to the other party what we want b. the easier it is to understand what your opponent wants c. the easier it is to determine wheth ...

You will want to keep an archive of all your academic work

You will want to keep an archive of all your academic work so you can develop the best possible e-portfolio at graduation. Which type of portable hard drive is best suited to your needs? What size? Do you need built-in W ...

Discussion 1 1why would someone shop on the internet buy an

Discussion 1: 1. Why would someone shop on the Internet? Buy an iPod? Eat at TGI Friday's frequently? 2. a. Why would someone else not make those purchases? 3. b. How would you choose one outlet, brand, or model over the ...

Question 1 please post the hyperlink to one federal statute

Question : 1. Please post the hyperlink to one federal statute which discusses cybercrime on the internet and summarize in not less than 100 words what that statute accomplishes. 2. Please post the hyperlink to one feder ...

Essay question 1state and explain the main useful

Essay Question 1: State and explain the main useful approaches employed to assess future markets for emerging technologies. Essay Question 2: Explain some of the emerging technologies with relevant examples as discussed ...

Defining risk management threats mitigation policythreats

Defining Risk Management: Threats, Mitigation, Policy Threats to company IT assets come from both external and internal sources. Based on the resources and discussions you have completed in the first two units, write a p ...

Please answer all 5 questions instructor will use

Please answer all 5 questions. Instructor will use turnitin. NOTE: Answers should generally be about 1½- 3 double spaced pages for each number. Of course, questions with multiple parts will be longer as will more complex ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As