Explain the project plan to gain security clearance

Assignment Help Computer Networking
Reference no: EM133576379

Project 1

Scenario

Eastwood Secondary School is committed to providing its students with the education they will need to succeed in today's digitally connected world. Currently, they are learning about website development, sound editing, and creating complex videos.

A huge volume of information needs to pass through the network, and the school's existing10/100 megabit switches cannot handle all of this traffic. They need updated switches able to push a huge amount of data (Gb) out and have enough speed to image all the computers within the school and its geographically dispersed district. The switches must have modularity to accommodate connectivity for a 10 Gigabit fibre backbone between cable closets across the school, and to the network access storage cluster in the data cabinet. Every computer in the schools required a 1 Gigabit port to accommodate the variety of applications used by students.

Eastwood secondary contact Fibex for the project. Fibex, an authorised dealer for leading network switch manufacturers, also provides network solutions to many institutions. Fibex has given Kelly a chance to show his skills by leading this project. As per company policies, Kelly must create project documentation. Kelly also needs to collect & document the legislation & WHS/OHS codes related to the project.

Task 1:

In this task:
o The student will act as Kelly
o The student must research to check the latest codes of practices and legislation that apply to the project
o RTO /trainer will arrange the copy of the latest legislation.
o RTO must provide student access to a computer with an internet connection.
You are required to complete the following table to gather the information on legislation regarding your project plan

Task 2:
This task is in continuation of Task1
Instructions:
In this task:
• The student will act as Kelly
• The student must complete the access request form.
• The student must submit the completed access request to the trainer/assessor.
After reviewing the legislation, Kelly needs to visit the school campus to review the existing network inventory and to prepare a list of elements required for upgrading the existing network. As per Eastwood secondary procedures, every visitor needs permission to access the switch room.

Task 3:
This task is in continuation of Task 2
Instructions:
In this task
• The student will act as Kelly
• The assessor will act as the IT administrator from Eastwood Secondary
• The student will review the existing network design and asset Inventory
• The student must document the findings after reviewing the existing design and inventory
Kelly's request gained approval after two days by the IT administrator. Kelly visited the site and reviewed the existing inventory (mentioned below ) provided to him by the IT department. After conducting the review, Kelly discussed the issues they are facing at the moment. Kelly needs to document the meeting results and network elements required in a template for meeting minutes

Task 4:
This task is in continuation of Task 3
In this task
• The Student will act as Kelly
• An assessor will act as a store person of Fibex
• The student will interact with an assessor to confirm the availability and specification of the network equipment identified in task 2
• A student must complete the template to document the information
Eastwood Secondary school management is happy with the solution proposed by Kelly, and they are happy to go ahead. Management asked Kelly to create a detailed project plan for this project.
As Kelly started to prepare the project plan, the first step is to check the availability of the proposed network elements. His company Fibex is an authorised supplier of leading network switch manufacturers. He needs to make a call and document the specification & availability of network elements from stores in the template provided below.

Task 5:
This task is in continuation of Task 4
In this task
• The student must prepare a project plan
After documenting the confirmation from the store, you need to document a detailed project plan, including the following information and share it with your assessor. Your project plan needs to be 500-1000 words.
1. Scope of Project
2. Different phases of a project
3. Selecting internetworking devices
4. IP address Plan
5. Downtime costing
6. Budget of project

Task 6:
This task is in continuation of task 5

Part A
In this task:
• The student will act as Kelly
• The assessor will act as IT administrator
• The student must explain the Project Plan and technical terminology to IT administrator
• The student must answer the relevant questions
• The student must liaise with IT administrator for the approval of the project and request the security clearance
• The student must draft a mail for security clearance
After preparing the project plan, Kelly held a meeting with the IT administrator to explain the project plan to gain security clearance to access the server room of Eastwood.
As you are acting as Kelly, you must complete the meeting minutes template

Part B
As Kelly gained approval for the project plan now, he has to get the security clearance from the IT administrator to access the site. To gain security clearance, you are required to write an email to the IT administrator. Your email should include the following:
The answer may vary. A student must write an email to the IT administrator by including the following information
• Date
• Address
• Subject
• Greetings
• Main Body - Stating the reason
o Permission to access the server room
o Date and time of access
Closing

Project 2
This project is in continuation from project 1.

Task 1.1
In this task:
• The student will act as Kelly
• The assessor and other students act at team members
• The student must prepare the designs and explain the technical terminology used
In preparation for the commencement of the project, the student will need to prepare and document the following for the team:
1. Design of network segmentation based on the network available
2. A diagram for network traffic management based on the available network
3. A list of basic switching requirements based on the network they are working with.

Task 1.2
This task is in continuation of task 1.1
In this task:
• The student will act as Kelly
• The student must perform the initial configurations on the switch
• Student must identify and document the basic requirements to install the network switch

Part A
After the meeting, it is time for Kelly and the team to jump into action. As a first step, Kelly needs to perform the initial configurations of the switch according to organisational requirements. Eastwood Secondary also wants Kelly to document the configurations for their reference.
You are acting as Kelly and need to document the steps you will use to carry out the following activities for the initial switch configuration:
• Reset the switch to factory defaults
• Set IP address
• Set interface description
• Clear MAC address table
• Add static MAC address in CAM table
• Save the running configurations
• Backup configuration settings to the server
• Upgrade the firmware
Once you have completed the documentation, you need to organise a time with your trainer/assessor and show them how you can execute the initial configuration of a switch. Your assessor will provide a network switch with a speed of 10/100gbps to check your skills.

Setting up Switch to factory defaults

Setting up Eastwood IP address in the switch

Setting up Interface on a switch

Clearing mac address table

Adding static MAC address in CAM table

Saving running configuration in the switch

Back-Up switch configuration on a server

Upgrade the firmware on a switch using putty

Implement basic security settings

Part B
After performing the initial configurations on the network switch, Kelly needs to prepare a list of appropriate media, cables and ports required to connect the switch to other network devices. Using the template below, write down the requirements you will need.

Project 3
This task is in continuation with project 1 & 2.
In this task
• The student will act as Kelly
• The assessor will act as a technical support person of a switch manufacturing company
• The student must discuss the enhanced switching functions with assessor
• The student must determine the enhanced switching functions supported by a switch
• In this task, the student must answer the relevant questions asked

Task 1.1
In the previous activities, you have performed the initial configurations on the switch and identified the cables and ports required to connect the switch in the network. The next challenge for Kelly is to determine the enhanced switching technology supported by the switch. Kelly held a meeting with the technical support team of switch manufacturer to ensure the enhanced technologies supported by a switch
As you are acting as Kelly. You are supposed to complete the meeting minutes template.

Task 1.2
This task is in continuation of task 1.1
In this task:
• The student will act as Kelly
• The student must configure the switch using advanced switching functions
After determining the enhanced technologies supported by switch now, Kelly has to connect the switch to the other devices by using the advanced switching functions mentioned below;
1. Vlan
2. Trunk
3. Inter-Vlan Route
4. STP and RSTP
You will need to show your trainer/assessor how you complete these functions above according to the switch and the network available. Your trainer/assessor will provide you access to these.
As part of your assessment, you are required to provide to your trainer/assessor a document which provides the information regarding the steps you have used to execute the above functions.

Task 1.3

This task is in continuation of task 1.2

In this task:
• The student will act as Kelly
• The student must find the root cause of the problem
• The student must resolve the problem using basic utilities
• The assessor must create the problem in network connectivity to assess students' skills

Part A

After finalising the installation, Kelly needs to run some tests to confirm the working of the network. While checking the connectivity between the network switches, Kelly found that a newly installed switch and server were not communicating with each other.
Kelly now needs to identify and resolve the network issue by using any one of the following basic utilities suggested by your assessor

• Ping
• Secure shell (SSH)
• Telnet
• Traceroute
• ipconfig

Attachment:- Project Assignment.rar

Reference no: EM133576379

Questions Cloud

Financial consequences of personnel loss exposures : Describe the insurance agency's personnel loss exposures by exploring the financial consequences of personnel loss exposures.
How does the speaker suggest addressing procrastination : PSY 108- How does the speaker suggest addressing procrastination? How might being intrinsically or extrinsically motivated relate to procrastination?
Mark believes that individuals should follow the law : Mark believes that individuals should follow the law because it's essential for maintaining social order and preventing chaos.
Which companies buy pollution rights from each other : which companies buy pollution rights from each other (every firm is given the right to pollute a little bit, but a heavy polluter can buy more from another firm
Explain the project plan to gain security clearance : Explain the project plan to gain security clearance to access the server room of Eastwood. As you are acting as Kelly, you must complete the meeting minutes
Create backup electronic documentation : Why is it important for an administrative professional to also create backup electronic documentation when they take down written messages?
What value of knowing your grit level and personality traits : What is the value of knowing your grit level and personality traits? How does your champion contribute to your grit or motivation?
Discuss the terms balance of trade, trade deficit : Define and discuss the terms balance of trade, trade deficit, trade surplus, and balance of payments. Name some countries with whom the United States has trade
Ethical consequences of selling high sugar and fat foods : United States serves as an important backdrop for comprehending the ethical consequences of selling high sugar and fat foods.

Reviews

Write a Review

Computer Networking Questions & Answers

  Municipal wifi networks over the past few years

A number of U.S. cities have launched municipal WiFi networks over the past few years. Research three deployments, anywhere in the world, and compare the networks in terms of architecture, applications, cost to the consumer, and success.

  What is data transmission

What is Data transmission? - State the methods of data transmission on a network.-  State the factors to be considered while selecting a data transmission system.

  ICTNWK612 Plan and manage troubleshooting integrated IP

ICTNWK612 Plan and manage troubleshooting integrated IP networks -Identify and summarise three examples of troubleshooting tools/techniques that can be used

  How the host might receive a multicast destined for a group

IP must always check the destination addresses on incoming multicast datagrams and discard datagrams if the host is not in the specified multicast group.

  About connecting and disconnecting

Connecting and Disconnecting Online.You connect online multiple times a day from emails, social media, and instant messages (IM) to virtual business meetings and conference calls. Today you can work on projects with people from around the globe-so..

  Explain how this intellectual property is captured

How can a the team will communicate this process map with the support people that will be responsible for carrying out these processes.

  Develop a plan for the company network

ISY202 - Information Systems Networking Essentials - develop a plan for the Company network and provide a detailed Networking Plan

  Network consultation proposal

Recommend software options and costs.Outline the labor costs, equipment costs, and service costs for your suggested design in table format.Identify the single point of failure, and recommend potential mitigation strategies.

  Explain design of infrastructure that implement vlan segment

Explain the design of an infrastructure that Implements VLAN segments, protects against MAC layer attacks, protects against VLAN attacks, protects against spoofing attacks, and secures the network switches.

  Discuss why virtualization is gaining so much popularity

Discuss why virtualization is gaining so much popularity, and compare it with other types of networks that are currently available.

  Is arp susceptible to a cyberattack

In the Link Layer, discuss any possible weaknesses in the Address Resolution Protocol. Is ARP susceptible to a cyberattack?

  CNET network simulator - developing a simple protocol

CMPUT 313 - The CNET Simulation Environment - Explain the recorded value of delta given the default settings of the various parame- ters in the topology file

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd