Ask Question, Ask an Expert


Ask Computer Network & Security Expert


You are a small network design company known as Wide-IP that is looking for that big break. As CTO of the Wide-IP company, you recently made a persuasive presentation of your company's approach to designing networks at a large industry event. The CEO of Fiction Corporation, a big retail chain, was impressed by your presentation. It looks like you have finally got your break! You have a small team of 10 technically proficient staffers with a strong background in project management, networking and internetworking skills which comprise PMP, Network+, CCNP, and CISSP credentials.

You have been chosen by Fiction Corporation to develop a network design document and plan without an RFP.


Fiction Corporation, a big national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wants to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration can't exceed $500,000 and should not interrupt business operations. What follows is a short background which will serve as your foundation in developing the network design.

The data in center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hrs a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation' s operations and profitability. From the data processing view-point, the move comprises 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.

The network comprises of around 500 remote location retail stores connected through frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the whole organization. The retail operations as well run WLANs which are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers as well require to monitor the status of remote systems. The SNMP management system should be capable to detect and report failure of the remote system or its communications link and the status of individual applications.

The company wants a seamless migration which minimizes impact to its customers and employees. Any gaps in this background will need you to make sound technical and persuasive assumptions that satisfy the customer's goals that are within the budget guidelines.

You were chose in part due to your detailed analysis and agreement to an implementation cost which will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is the availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers.

Include the given in your assignment:

1. Title page

2. Table of contents

3. Executive summary

4. Project goal

5. Project scope

6. Design requirements:

a. Business goals
b. Technical goals
c. User communities and data stores
d. Network applications

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M915481

Have any Question? 

Related Questions in Computer Network & Security

Assignment identifying potential malicious attacks threats

Assignment: Identifying Potential Malicious Attacks, Threats and Vulnerabilities You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is ide ...

Summarize what pki is and how it works include the use of a

Summarize what PKI is and how it works. Include the use of a CA and also include why the backing up of these keys is so important. Directions: Your completed assignment should be at least 2 FULL double-spaced pages in le ...

Term paper security regulation compliancethis assignment

Term Paper: Security Regulation Compliance This assignment consists of two sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. L ...

Any encryption algorithm like caesar cipher algorithmshould

Any Encryption algorithm (like caesar cipher algorithm)should be used and implemented for the information given in the document. Cryptography Assignment Given the following S-Boxes: S1= [ 15        10            2        ...

Current security event researchselect a company that has

Current Security Event Research Select a company that has been in the news in the past two years that has had a significant security breach. Develop a 2- to 3-page paper covering the following: • Identify the event and t ...

A cipher can be created by using a keyword for example if

A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows: Method I. Write the word "statistic" without the repeated letters. Then complet ...

Performance architecture papercontinuing with a company you

Performance Architecture Paper Continuing with a company you selected in Week Two, evaluate network management components on a global scale. Write a 2- to 3-page paper that evaluates and discusses the following: • Impact ...

Introductionthis case study has been divided into six

Introduction This case study has been divided into six components. You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc), subnet the network using VLSM, an ...

Management is pleased with the progress that has been made

Management is pleased with the progress that has been made and likes the steps you have taken to set up a secured network environment. During the last status meeting, it was asked, has everything been done that is possib ...

Topic proposal for term paper - in order to show

Topic Proposal for Term Paper - In order to show understanding on network-related issues, each student is expected to complete a paper on a relevant network topic of the students choosing and interest. For this assignmen ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate