Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Background:

You are a small network design company known as Wide-IP that is looking for that big break. As CTO of the Wide-IP company, you recently made a persuasive presentation of your company's approach to designing networks at a large industry event. The CEO of Fiction Corporation, a big retail chain, was impressed by your presentation. It looks like you have finally got your break! You have a small team of 10 technically proficient staffers with a strong background in project management, networking and internetworking skills which comprise PMP, Network+, CCNP, and CISSP credentials.

You have been chosen by Fiction Corporation to develop a network design document and plan without an RFP.

Overview:

Fiction Corporation, a big national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wants to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration can't exceed $500,000 and should not interrupt business operations. What follows is a short background which will serve as your foundation in developing the network design.

The data in center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hrs a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation' s operations and profitability. From the data processing view-point, the move comprises 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.

The network comprises of around 500 remote location retail stores connected through frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the whole organization. The retail operations as well run WLANs which are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers as well require to monitor the status of remote systems. The SNMP management system should be capable to detect and report failure of the remote system or its communications link and the status of individual applications.

The company wants a seamless migration which minimizes impact to its customers and employees. Any gaps in this background will need you to make sound technical and persuasive assumptions that satisfy the customer's goals that are within the budget guidelines.

You were chose in part due to your detailed analysis and agreement to an implementation cost which will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is the availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers.

Include the given in your assignment:

1. Title page

2. Table of contents

3. Executive summary

4. Project goal

5. Project scope

6. Design requirements:

a. Business goals
b. Technical goals
c. User communities and data stores
d. Network applications

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M915481

Have any Question? 


Related Questions in Computer Network & Security

Assignment standards researchthe following website may be

Assignment: Standards Research The following Website may be used for reference to complete this assignment. The Website represents an electronic document titled "Standards Organizations" written by William Stallings (200 ...

Select one of the following topics in which you will base

Select one of the following topics in which you will base your responses in the form of a term paper: • Network Neutrality • Web2.0 • Wireless Technology • Broadband Convergence • U.S. Telecommunication Policy • Internet ...

Technical paper project disseminating organizational it

Technical Paper Project: Disseminating Organizational IT Security and Troubleshooting Best Practices Part 1 Write a ten to fifteen page paper in which you analyze and solve the following issues: Imagine you are a senior ...

Securritypost for elprofessoripart 1based on your teams

Securrity Post for elprofessori Part 1 Based on your team's Week Five Learning Team Collaborative discussion, write the Network Security Policy section of the Information Security Policy. Include the following: • Network ...

Computer securitycryptography is the practice and study of

Computer Security Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries, and it is about constructing and analyzing protocols that prevent third ...

Cloud networking and service provisioning - standard

Cloud Networking and Service Provisioning - Standard project: Auction System in the Cloud 1. Introduction The project consists of designing and implementing an auction system (AS) which offers its services as SaaS to end ...

Security frameworks or policy paperwrite one to two pages

Security Frameworks or Policy Paper Write one to two pages on ONE of the following topics: Security Framework • How does a security framework assist or affect in the design and implementation of a security infrastructure ...

Write one paragraph only for each questions1- can a

Write one paragraph only for each questions. 1- Can a business survive in today's world without a website or a poorly maintained website? Why or Why not? 2- What's your biggest fear about using the Internet? Why? Can you ...

Assignment descriptionassignment overviewfor this

Assignment Description Assignment Overview For this assignment you will evaluate a Network Security Software. Marks will be awarded based on the sophistication and the difficulties the demonstration explored. Your task i ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro