Example of logical wide area network

Assignment Help Management Information Sys
Reference no: EM133652551

Assignment:

Draw diagrams that reasonably depict a network infrastructure that will enable Coffee Retailer to achieve the company's strategic goal of offering customers public wireless Internet access. Make sure to list any assumptions regarding the company or your design that you need to make in order to design and draw a realistic diagram.

Make sure to do the following:

  1. An example of logical wide area network (WAN) diagram showing major enterprise locations including the corporate headquarters, one typical retail location, and a cloud service provider.
  2. A physical WAN diagram that places core and distribution-layer routers and switches in locations that optimize network performance. Justify your choices.
  3. A physical local area network (LAN) and wireless LAN (WLAN) diagram for a typical retail location.
  4. Explain how well one of your diagrams depicts a working cloud-based solution for Coffee Retailer. What are the most important criteria?

Coffee Retailer is a company that operates 300 cafés nationwide.

Each location offers customer access to Internet connectivity via a cloud-managed wireless local area network (WLAN). Customer authentication to the WLAN requires a one-time use password that is generated at checkout and printed on the customer's receipt. Each password authorizes WLAN access and Internet connectivity that expires after twenty minutes, which is a feature designed to keep customers from lingering too long.

Customers who need extended Internet access need to make another purchase to authenticate an additional network session. The authentication scheme is also part of a broader information security initiative designed to tie all network activity to specific users, either via bank card transaction records or via in-shop surveillance camera data for cash purchases.

Local switches and wireless access points in each Coffee Retailer shop are controlled via a cloud-hosted centralized management platform. Local switching and wireless access point (AP) configurations and policies are available to devices via site-to-site virtual private network (VPN) tunnels to a public cloud service provider.

Currently, all sales data generated by the point-of-sale (POS) system in each shop are uploaded to on-premises database servers located at Coffee Retailer's corporate headquarters. The company is planning a project to enable each local POS system to also upload approximately two gigabytes of daily sales data to cloud-based storage provided by a public cloud service provider.

Coffee Retailer is a publicly traded company that generates bank card transactions and, consequently, needs to comply with both Sarbanes-Oxley (SOX) regulations and the Payment Card Industry Data Security Standard (PCI DSS).

Please feel free to make and state any reasonable assumptions you make about additional details related to Coffee Retailer as you work through the related course assignments.

Reference no: EM133652551

Questions Cloud

Examples of covered accounts are credit card accounts : Examples of covered accounts are credit card accounts, mortgage loans, automobile loans, checking accounts, and savings accounts, among others.
Write specifics about the service-the languages to support : Word document to explain how you would create and maintain a translation service for your customers of IT when they call the Global Service Desk.
Analyze the security risks inherent to these inputs : Your primary objective is to identify various types of user inputs within the new system, analyze the security risks inherent to these inputs.
Compare the low-medium and high levels of sp800-53 : Compare the low, medium, and high levels of SP800-53. How are they alike? What makes them different?
Example of logical wide area network : An example of logical wide area network (WAN) diagram showing major enterprise locations including the corporate headquarters.
How will an erp system impact a new business : How will an ERP system impact a new business, transformation, innovations, competitive responses, organizational, supply chain, and human resources?
What happened to cause the 2016 gyeongju earthquake : What happened to cause the 2016 Gyeongju earthquake and why? Please describe the chain of events from a science concept and geologic standpoint.
Explain pleistocene epoch of southwestern europe : Based on this article, explain Pleistocene Epoch of Southwestern Europe.
Determine the magnitude of an actual earthquake event : You will evaluate seismogram data to determine the epicenter and the magnitude of an actual earthquake event.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How does active directory support application security

Provide an explanation of if/where/how does Active Directory support application security.

  What voluntary professional certification industry recognize

To position yourself in the best possible way to succeed in your career field, you need to start researching your professional development now.

  Important information about decision support system

Important information about Decision Support System - Explain Provide a decision support system (DSS) function which would be applicable to the automotive manufacturing industry.

  How all four components are used in industry

Considering the four components of security documentation policies, discuss and give an example of how all four components are used in industry.

  Define ongoing system maintenance roles and responsibilities

Define ongoing system maintenance roles and responsibilities. Describe procedures for evaluating and prioritizing system enhancements proposed by stakeholders.

  The name and url of the video

You are to watch five videos from TED.com, different from the ones watched in class. You are to provide a half a page write up on each video (Thus a minimum of five paragraphs) . You are to cover the following topics: The name and URL of the vide..

  How would you evaluate the effectiveness of your activities

What Sector-Specific Agency would be responsible for providing institutional knowledge / and specialized expertise for your CIKR? Conduct a risk assessment by identifying the threat (natural and manmade), vulnerabilities and consequence to your CIK..

  Develop an outline of the project plan for the testing

You have been asked to test the disaster recovery plan for a small business in your area . The company has a backup plan that is well documented.

  Execution of the pm seminar contacting the main speaker

MGT158 / IS186 : Create a general concept for this undertaking using AOA format.Enter activities in the Task Name column in MS Project, possiblyin chronological order. Estimate duration for every activity (in days) - no question marks like in "1day?"..

  Identify potential benefits and risks that may be unique

Research 3 Platform as a Service (PaaS) providers, and identify why they may be considered as potential PaaS providers for the current supply chain program.

  When a valuable resource becomes a detriment

When a Valuable Resource Becomes a Detriment. How things have changed! Now that GM is selling only 18.6% of the cars in the U.S., the dealers are a millstone.

  Identify the main functions of proposed information system

You've just left an all-hands meeting at your company*. The CEO was very upset at the rise of shadow IT projects - a major indicator that the company's.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd