Enterprise-wide solution that includes topology

Assignment Help Computer Networking
Reference no: EM131679404

Assume you are a consultant for a local business that has asked you to propose an enterprise-wide solution that includes topology, network devices, IP infrastructure, and network security. The scenario is as follows:

A small accounting firm, ABC Accounting, Inc., landed a large account a year and a half ago that has already led the company to grow from five employees to 200 employees with expectations to employ 350 within a year's time.  In the face of continuing expansion, ABC plans to add offices in their current building that will span a total of three floors. At least one third of ABC employees have laptops and travel often.

All ABC employees have Windows 7 computers, which currently are not connected to the corporate Local Area Network (LAN).

You have been hired as a consultant to provide a detailed technical proposal that recommends a solution that addresses each of the detailed specifications that follow. Your solution regarding each specification should comprise a separate section of the body of your proposal.

Topology (type of network) and network devices

  • ABC needs to set up a network and requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization.
  • The company is looking for guidance regarding the type of network devices that will connect devices to the Local Area Network (LAN). Brand of device is not mandated. The company asks that you explain what internal and external networking components are required (explaining each and justifying WHY you chose the network devices you did).
  • The network must have the capacity to:
    • Connect all users to company resources (e.g. printers, scanners, and other items).
    • Provide file sharing options.
    • Manage these resources in a central location.
  • Your proposal should include budgetary cost estimates for the chosen topology.

IP Infrastructure

  • ABC has asked that you provide details regarding an IP structure (which includes static, DHCP, or the possibility of both, and proper IP Class assignment), which is mindful of the company's expectation of continued growth.

Security

  • Basic security has always been in place and now the company would like you to make this a more secure facility in hopes of protecting against internal and external security threats.
  • Be sure to include details with respect to:
    • Social engineering/internal threats
    • Firewalls/switches
    • VPN's
    • Authentication
    • Security protocols
    • Vulnerability assessment

Your submission should include each of the following sections, with each preceded by an appropriate heading:

  • Introduction/Overview
  • Table of Contents
  • Body- Including a separate section for each numbered item in the specifications above
  • Conclusion
  • APA References
  • Appendices- Any information you feel is appropriate to include

Your paper should be 8-10 pages in length and conform to CSU-Global Guide to Writing and APA Requirements. Include at least two scholarly references per section, as well as material from the Network Pro LabSim.  The CSU-Global Library is a good place to find these references.

Note: Internet Explorer or Mozilla Firefox required for Labsim assignments. For more information and steps on how to access Labsim with Google Chrome, click here.

Reference no: EM131679404

Questions Cloud

Identify a risk and choose a physical asset or social group : Write a two-page essay of 500 words in APA style. Identify a risk and choose a physical asset or social group(s) that is vulnerable to the risk.
Difficulties companies might have in converting to ipv6 : Explain the difficulties companies might have in converting to IPv6. Be sure to discuss why a company might covert to IPv6 and the benefits of converting.
Discuss bilingual education in the united states : How do these political debates over language compare with those of bilingual education in the United States
What are the main conclusions or inferences made : What are the main conclusions or inferences made by your classmate? Explain your analysis/answer in five or more sentences.
Enterprise-wide solution that includes topology : Assume you are a consultant for a local business that has asked you to propose an enterprise-wide solution that includes topology, network devices
Discuss the hans rosling video : Begin your post by writing down your thoughts on World Population before you watched the Hans Rosling video. Then follow those thoughts, with your views
Identify one of the theories as the most plausible : There have been many theories regarding how the pyramids at Giza were constructed. Most experts agree that they were constructed.
Construct and build a topology for voice over : a) Construct and Build a topology for voice over IP phone for remote server using Cisco Packet tracer.
Discuss the soviet union and contemporary russia : Explain the political geography of the alphabet in the Soviet Union and contemporary Russia

Reviews

Write a Review

Computer Networking Questions & Answers

  Routing and switching selection criteria

Routing and Switching Selection Criteria.

  Calculate number of ccs that is equivalent to two erlangs

Calculate the number of CCS that is equivalent to 2 Erlangs. What is the name of the gateway interface/port that faces an analog phone?

  How ips anomaly detection differ from misuse detection

How does IPS anomaly detection differ from misuse detection? - What is computer forensics? - What is a honey pot? - What is desktop management?

  What is the next hop address for fast ethernet port one

What is the next hop address for the Fast Ethernet port 2, Router C in Figure?

  Implement the random midpoint displacement algorithm

Implement the random midpoint displacement algorithm in 3D and generate some fractal landscapes. Study the influence of H on the landscapes generated.

  Describe at least three types of servers

Discuss why it is important for organizations to enforce policies restricting use of employee-owned hardware and software and unauthorized copies of software?

  Justify the need of the ieee standard used in networking

Justify the need of the IEEE 802 standard used in networking. Take a position on the need for a federal standards agency such as NIST.

  Define a dmz implementation and justify the decision

Define a DMZ implementation and justify the decision. Select physical security measures for each of the new academic buildings and justify the decision.

  Describe the characteristics of the worst reports

Describe the characteristics of the worst reports. Consider different aspects of the report that could go wrong such as format, layout and content, and describe what could go wrong with them under different categories

  Describe various network media and how they are changing

Describe various network media and how they are changing. Explain the differences among LANS, WANS, CANS, and MANS.

  Determine the rightness or wrongness of actions

Conduct to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein - Analyse ethical dilemma in the following case using the Australian Computer Society.

  Understand about compatibility in network architecture

What you understand about 'Compatibility' in network architecture and explain which topology suits the client-server network environment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd