Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

Background:

You are a small network design company known as Wide-IP that is looking for that big break. As CTO of the Wide-IP company, you recently made a persuasive presentation of your company's approach to designing networks at a large industry event. The CEO of Fiction Corporation, a big retail chain, was impressed by your presentation. It looks like you have finally got your break! You have a small team of 10 technically proficient staffers with a strong background in project management, networking and internetworking skills which comprise PMP, Network+, CCNP, and CISSP credentials.

You have been chosen by Fiction Corporation to develop a network design document and plan without an RFP.

Overview:

Fiction Corporation, a big national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wants to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration can't exceed $500,000 and should not interrupt business operations. What follows is a short background which will serve as your foundation in developing the network design.

The data in center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hrs a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation' s operations and profitability. From the data processing view-point, the move comprises 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.

The network comprises of around 500 remote location retail stores connected through frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the whole organization. The retail operations as well run WLANs which are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers as well require to monitor the status of remote systems. The SNMP management system should be capable to detect and report failure of the remote system or its communications link and the status of individual applications.

The company wants a seamless migration which minimizes impact to its customers and employees. Any gaps in this background will need you to make sound technical and persuasive assumptions that satisfy the customer's goals that are within the budget guidelines.

You were chose in part due to your detailed analysis and agreement to an implementation cost which will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is the availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers.

Include the given in your assignment:

1. Title page

2. Table of contents

3. Executive summary

4. Project goal

5. Project scope

6. Design requirements:

a. Business goals
b. Technical goals
c. User communities and data stores
d. Network applications

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M915481

Have any Question? 


Related Questions in Computer Network & Security

Using power flow analysis for network Using Power Flow Analysis for Network

Using Power Flow Analysis for Network Reconfiguration Electricity distribution networks connect the high-voltage transmission system to users. Conventional distribution networks have been developed over the last 50 years ...

Network analysis reportassignment- a coversheet with your

Network Analysis report Assignment - A coversheet with your name and student id must be included. - All references should be appropriately cited using the Harvard style - Submit your report as one PDF file - Save your fi ...

Term paper the rookie chief information security

Term Paper: The Rookie Chief Information Security Officer This assignment consists of five parts: Part 1: Organization Chart Part 2: Request for Proposal (RFP) Plan Part 3: Physical Security Plan Part 4: Enterprise Infor ...

You are to write your own connectionless udp client print

You are to write your own connectionless (UDP) client. Print out everything. You can start with any open-source UDP client as a template and may want to include some parts of the template from Program 1. UDP packets will ...

Assignment overviewpurpose of the assessmentthe purpose of

Assignment Overview Purpose of the assessment: The purpose of this assignment is to develop skills to identify appropriate network security tools for various operating systems. Students will also have opportunity to expl ...

Summarize what pki is and how it works include the use of a

Summarize what PKI is and how it works. Include the use of a CA and also include why the backing up of these keys is so important. Directions: Your completed assignment should be at least 2 FULL double-spaced pages in le ...

Exercise sheet1 let l be a 9 bit lfsr with connection

Exercise Sheet 1. Let L be a 9 bit LFSR with connection polynomial c(x) = x 8 + x 4 + x + 1 and seed s = [1, 0, 1, 1, 1, 0, 0, 1, 0] (i.e. the last bit of s, 0, is the next keystream bit). Compute 10 bits of the keystrea ...

Instructionsresponses to each question are expected to be

Instructions: Responses to each question are expected to be between 100 and 200 words. Will not be penalized for exceeding 200 words, but they should strive to reach a minimum of 100 words when constructing the response ...

1 why is the top-down approach to information security

1. Why is the top-down approach to information security superior to the bottom-up approach? 2. What is the difference between a threat agent and a threat? 3. What was important about Rand Report R-609? 4. What type of se ...

Assignment xyz company troubleshooting and maintenance

Assignment: XYZ Company Troubleshooting and Maintenance Plan In XYZ Company is heavily invested in e-Commerce with all retail locations' Point of Sale systems connected so that it maintains a dynamic inventory and automa ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate