Comprehensive and secure solution

Assignment Help Other Subject
Reference no: EM13863329

Comprehensive and Secure Solution

Assume you are a consultant to a local business that has asked you to propose an enterprise-wide solution that includes topology, network devices, IP infrastructure, and network security. The scenario is as follows:

A small accounting firm, ABC Accounting, Inc., landed a large account a year and a half ago that has already led the company to grow from five employees to 200 employees and expectations to employ 350 within a year's time. In the face of continuing expansion, ABC plans to add offices in their current building that will span a total of three floors. At least one third of ABC employees have laptops and travel often.

All ABC employees have Windows 7 computers, which currently are not connected to each other.

You have been hired as a consultant to provide a detailed technical proposal that recommends a solution that addresses each of the detailed specifications that follow. Your solution regarding each specification should comprise a separate section of the body of your proposal.

1. Topology (type of network) and network devices

a. ABC needs to set up a network and requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization.

b. The company is looking for guidance regarding the type of network devices that will connect the machines together. Brand is not mandated. The company asks that you explain what internal and external networking components are required (explaining each and justifying WHY you chose the network devices you did).

c. The network must have the capacity to:

i. Connect all users to company resources (e.g, printers, scanners, and other items).

ii. Provide file sharing options.

iii. Manage these resources in a central location.

d. All proposals should include cost elements.

2. IP Infrastructure

a. ABC has asked that you provide details regarding an IP structure (which includes static, DHCP, or the possibility of both, and proper IP Class assignment) that is mindful of the company's expectation of continued growth.

3. Security

a. Basic security has always been in place and now the company would like you to make this a secure facility to protect against

internal and external security threats.

b. Be sure to include details with respect to:

i. Social engineering/internal threats.

ii. Firewalls/switches.

iii. VPN's.

iv. Authentication.

v. Security protocols.

vi. Vulnerability assessment.

Your draft proposal should include each of the following sections, with each preceded by an appropriate heading:

i. Introduction/overview

ii. Table of Contents

iii. Body, including a separate section for each numbered item in the specifications above

iv. Conclusion

v. APA References

vi. Any appendices you feel appropriate

All Academic papers should include a cover page with your name, date, school name, section, course name, and instructor name.
Support each of your four proposed elements by citing at least one credible source, which may be ITS310 module content, material from the Network Pro LabSim, and/or any credible outside source. Your paper should be 8-10 pages in length with document and citation formatting.

The document will provide a complete network solution that covers the following:

Topology

Media

Network devices

IP infrastructure

WAN considerations

Network security

Documentation

Suggested network monitoring and optimization practices

Reference no: EM13863329

Questions Cloud

How to find out your style of leadership assessment : How to Find Out Your Style of Leadership Assessment
How people experience a limited effect from media : Theory explains how people experience a limited effect from media. Individuals are thought to be actively seeking specific types of media to generate specific needs.
Investigate the firms problem : A succinct statement of the problem/ dilemma/ issue should be stated here. Be careful to identify the real problem and not the symptoms of the problem.
Discuss two things the document tells you about life : Why do you think this document was written. What evidence in the document helps you know why it was written. Quote from the document, then footnote and cite the source
Comprehensive and secure solution : Comprehensive and Secure Solution
Research to find out about careers in database design : Do a little research to find out about careers in database design, administration, or management. What education is needed for these careers?
Explains everything socrates does by body : In what way did Anaxagoras' book disappoint Socrates? What did 1-Pe hope to find that wasn't there? How  to Anaxagoras' like a man who says Socrates' life is ruled by mind but explains everything Socrates does by body (muscles contracting, vocal co..
What is the total market value of its equity : What is the price of Consolidated stock and what is the total market value of its equity? (Enter your answer in millions.)
Recognize the elements and correct use of a thesis statement : Recognize the elements and correct use of a thesis statement.

Reviews

Write a Review

Other Subject Questions & Answers

  What is the definition of assimilation

What is the definition of assimilation

  Concepts of working memory-stm-ltm

Explain how STM is transferred to LTM is mentioned, and how this can be prevented is described.

  Identify common ms access database terms

Identify common MS Access database terms. How would you explain them to various Access users with little database knowledge?

  Measuring safety performance

Investigate how your current organization, or an organization with which you are familiar, measures safety performance.

  Family services regarding the issue of child endangerment

A recent policy was implemented by Anytown's Department of Job and Family Services regarding the issue of child endangerment. Any household that has one or more documented offense of domestic violence, child abuse, or drug or alcohol related offenses..

  The various interest groups and governmental entities

The influence of the various interest groups and governmental entities

  Specific contributions of loeb-washburn-small

What were the specific contributions of Loeb, Washburn, Small, and Turner to animal psychology?

  Analysis of the rhetorical definitions

Then offer an analysis of the rhetorical definitions in the article and explain if these terms assisted or inhibited the understanding of the author's position and suggest how the author might have crafted more concise language in these instances.

  Who wrote the book of acts according to acts 18 write

who wrote the book of acts? according to acts 18 what are the three regions of growth that the church would expand

  Revenue expenditures-capital expenditures

A 350- to 700-word summary explaining the differences between revenue expenditures and capital expenditures during a useful life and identifying any similarities. Briefly explain the entries of revenue expenditures and capital expenditures.

  Historical and political conditions of the cold war era

Describe the historical and political conditions of the Cold War era. Explain the specific threats to American citizens. Describe the preparations you would make to protect your family

  Obtain a custody order

Ted and Ursula Jackson have one child, Sam. Sam was born on March 13, 2000, in state A, where everyone has lived since the beginning of 2000. Upon discovering that Ted is having an affair with an officer worker, Ursula on May 1, 2000, takes Sam to st..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd