Evaluate the whole organizations anticipated growth

Assignment Help Computer Networking
Reference no: EM131943891

Assignment: LASA: Wireless Needs Assessment Report

Description of LASA:

Many organizations will participate in a formal needs assessment before implementing a technological solution. For this assignment, you will identify an organization for research (it may be the one which you are already familiar with) and create a 10- to 12-page wireless needs assessment report for the same.

Tasks:

Create a 10- to 12-page wireless needs assessment report, by answering the following:

Part I: Overview of Organization (approximately 2-3 pages)

• Describe the organization chosen; include its name, size, and an existing illustration of its network diagram.

o Note: You can accomplish this by utilizing Microsoft PowerPoint, Microsoft Word, or Microsoft Visio. Then, copy it as a graphic into Microsoft

Word. If you prefer, you may choose to use Microsoft Visio entirely. However, you will need to upload your file in a PDF format for your instructor to review. If you choose Microsoft Word, you can copy the whole diagram after creating it using the flowchart tools.

o If you have trouble locating the organization's network diagram, ask the network administrator.

• If you still are unable to locate a network diagram for your chosen organization, locate another one from the Internet that you feel would be appropriate for your chosen organization.

• Explain how a network diagram can assist with the assessment of a network. If necessary, create a simple diagram for your client using fictitious data.

• Evaluate the whole organization's anticipated growth. Compare the growth to the daily job activities of employees in the different IT positions within the organization.

Part II: Assess Current Network (approximately 3 pages)

• Assess the current status of the preexisting network.

o Correlate anticipated human and technology growth and compare with the current network capacity.

o Evaluate the network based on the type of network that is currently in use, the current capacity, and whether it is sufficient for long-term growth of the organization.

• Evaluate the security requirements of the network depending on the type of organization involved.

• Determine if the security measures meet the needs of the organization. Determine if they currently have any security gaps and identify those. Consider all the elements of security that you have covered in this course, including mobile security.Note: Wireless technologies may be faster than already implemented wired network infrastructure, requiring an upgrade to physical cable to support the new speeds.

Part III: Create a Vendor Comparison Chart (approximately 2 pages in chart format)

• Describe the available hardware or software solutions from vendors. Explain how this can be gathered using a RFP form from the owners.

• Compare and contrast at least two different wireless technologies. For example, you can compare 2 and 5.4 GHz systems.

• In footnotes, discuss how special software can be utilized to help perform a proper site survey and note that these tools typically allow the inclusion of a floor plan.

• Analyze mobile requirements. Compare and contrast mobile requirements to what the company already has in place. Be sure that the end users' needs are taken into consideration for this component.

Part IV: Describe Site Surveys (approximately 2 pages)

• When testing a wireless network for the owners and IT personnel identify and describe how to perform a proper wireless site survey by measuring the strength and quality of signal and transmission speeds and throughput available.

• Explain what tools should be utilized when performing a site survey, such as an access point and a laptop.

• Provide a list of additional tools and additional considerations that the organization may wish to utilize when making its decision.

• List the considerations that should be addressed when performing a site survey, such as (these are some examples):

o Security features and policies
o Radio signal range
o Number of applications processors (APs) and channels required
o Throughput required
o Location of AP radios and antennas
o Location of fixed client devices
o Location of Ethernet cables for connecting APs
o Type of client adapters (wireless network interface cards [wireless NICs])

- Power

o Growth
o Potential interference sources
o Standards and frequencies to be implemented
o Requirements for integration with a company's wired network

Part V: Offer Recommendations (approximately 1 page)

Provide a recommendation to the organization on whether it should proceed with its wireless program.

Note: Your report should utilize at least three scholarly or professional sources (beyond your textbook). Your report should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., in APA format); and display accurate spelling, grammar, and punctuation.

Attachment:- APA-format.rar

Reference no: EM131943891

Questions Cloud

How should you not report computer crime : INFA 640 Cryptography and Data Protection - What piece of legislation allows computer records documenting criminal activity to be used in court
Determining the behavior and learning : When answering the question, be sure to address how an individual in a high-crime vs a low-crime area would learn through operant conditioning.
Discuss the types of psychometric assessments : What types of psychometric assessments (e.g., personality inventories, cognitive assessments, and integrity tests) are best to identify applicants.
Keeping a game window open : Lamont often keeps a game window open when he is doing classwork on his computer so that he can quickly navigate to the game whenever
Evaluate the whole organizations anticipated growth : Evaluate the whole organization's anticipated growth. Compare the growth to the daily job activities of employees in different IT positions within organization
Responsible for other avenues of the family : You are a marriage therapist and have just completed your intake assessment with a couple seeking counseling services. Maria and Steve have been
Drive states affect males and females differently : Some of the properties of sexual arousal vary across males and females. What other drive states affect males and females differently?
Identify the strengths and weaknesses of the code designed : Identify the strengths and weaknesses of code designed for a field other than information technology. Compare this code with a code for information technology.
Discussion of the two current peer-reviewed : Drawing from the discussion of the two current peer-reviewed articles you identified, support your argument with at least three key points.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd