Design the elements of network servers storage and security

Assignment Help Computer Network Security
Reference no: EM131905223

Assignment

Board of Directors, has approved the ITS department to develop the next generation data center for future growth at SMU. This initiative will provide the next level of services to SMU students through a new expanded and upgraded data center in the future STEM building.

They have approved an initial 10-million-dollar investment for this data center to expand the the current infrastructure to accommodate 2,000 more students and to validate performance of future technologies. As a senior data center design team consisting of a Network Engineer, Server Architect, Storage Engineer, and Security Expert, you are task with doing the following:

Design the elements of network, servers, storage, and security that will support key solutions. Design should incorporte backup, and failover services. There will be connections from the new data center to O-Grady Library (ITS main datacenter), WAN links to JBLM (both Stone Ed & McChord Ed Center Bldg) using high speed WAN links. Including in this design a cost/benefit analysis of your design showing why you used certain equipment and bandwidth. Show a rough timeline needed to complete the project and main phases. Develop the overall project and equipment/infrastructure costs for approval.

Key Deliverables:

Write up a PoC proposal in MS Word documenting the following:

- Local Area Network/Wide Area Network links and vendors used

- Computing designs for network, server, storage, and security (include elements of the Cloud as well)

- Virtualized server design for supported application environment

- Infrastructure support services based off an enterprise management system

- Performance metrics gathering and design

- Showcase concepts of uptime requirements, redundancy as needed with power, network, server, and storage infrastructure.

Detail the costs of the PoC in a Bill of Materials (BOM) Excel spreadsheet

Present a PowerPoint of your findings to the Saint Martin's Board for project approval

</pclass="msonormal">.

Reference no: EM131905223

Questions Cloud

What is the current price or value per share : What is the current price or value per share if its equity cost of capital is 10% per year and the dividends will increase or grow.
How much of your earnings will be interest on interest : You deposit $10,000 in your bank account. If the bank pays 2% compound interest, how much of your earnings will be interest on interest after 10 years?
What are the advantages to having a larger smartphone : Conduct a web search to learn more about the larger smartphones and tablet options. What are the advantages to having a larger smartphone?
Determine the current value of your total investment : Provide your opinion / assessment of your investments. Evaluate the results of your current investment. Are you happy with the result and the trend?
Design the elements of network servers storage and security : Design the elements of network, servers, storage, and security that will support key solutions. Design should incorporte backup, and failover services.
When does a check become stale under the ucc : What are some of the practical limitations concerning the writing evidencing a negotiable instrument and the substance on which it is placed?
What is the new par value per share : The company with the common equity accounts shown here has declared a 5-for-one stock split when the market value of its stock is $32 per share.
Explain what operations can be performed on a stack : What exactly is a stack and explain what operations can be performed on a stack? Exactly how is a stack implemented using the program stack1.java?
Write the constructor accessor mutator and tostring methods : Write a client class to test creating Trivia objects. Write the constructor, accessor, mutator and toString methods.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Create a multiprotocol operational network using eigrp

Create a multiprotocol operational network using EIGRP, OSPF, and RIPv2 protocol. Implement a secure update of OSPF and EIGRP protocol. Implement virtual link in one segment of the network

  Describe the legal and ethical issues inherent

Describe the legal and ethical issues inherent in information security

  What are advantages of using a file integrity checking tool

What are the advantages and disadvantages of using a file integrity checking tool. how much work monitoring its responses imposes on the administrator.

  Explain the necessary components within a security policy

Using or textbooks, internet and other resources, identify the necessary components / sections within a security policy and then craft the actual policy for XYZ Healthcare and address the risks within policy that are prevalent with Remote Access.

  What is stated in security policy or policies and standards

Develop the practices that will be used to ensure the business enforces what is stated in the security policy or policies and standards.

  Availability of the organizations information assets

Your plan must be in nontechnical terms to the user population that incorporates the confidentiality, integrity, and availability of the organization's information assets.

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  Create a security matrix spreadsheet and security strategy

Create a security matrix spreadsheet and security strategy summary. Include the user roles and matching security rights that would be expected to be created for the Akron site.

  How should the companys security be improved

How should the company's security be improved and strengthen - What should its short-term priorities and long term plans be?

  Case study-the ethical hacker

Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and ..

  Discuss the terms confidentiality and integrity

Discuss the terms confidentiality, integrity, and availability as they relate to information systems. Why are they important

  Which one best meets the requirements of the core virtues

which one best meets the requirements of the core virtues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd