ICTICT401 Determine and confirm client business requirements

Assignment Help Computer Network Security
Reference no: EM132471393

ICTICT401 - Determine and confirm client business requirements - Academies Australasia

Assessment Task 1- Project Activity Report

In this assessment task, you are required to gather, determine and confirm client requirement and review available network technologies, devices and protocols to build WLAN (Wireless Local Area Network) for small office or home office network by choosing appropriate hardware and software in accordance to business and technical requirements including installation plan, network design and security.

Introduction:
Devon Education is a growing educational provider. It has been operating since 2010. Its main business is to provide vocational training and education for international students. With further growth in business, BEG has decided to open new office in Brisbane.

Key Project objectives:

Furthermore, after your meetings and interviews with Andre, Johnson and Angela, following information were collected.
• Each staff member will have complete desktop, access to printer, wireless and NAS
• Staff should be able to use the network securely.
• Data in Network Access Storage (NAS) should be able to share between all staff.
• Hardware and software should be of industry standards.
• Router and WAP must be regularly monitored and backed up.

Tasks:Prepare a Report

Research and prepare a report for Brisbane Education Group to satisfy the business requirements for BEG,
You report must contain:
• Cover page
• Table of Contents (Refer to sample Table of Content)
• Number all pages at the bottom centre of the page
• Include your course, name and student number as a header at the top of each page.
• Use 1.5 line spacing (other guides may prefer double spacing)
• Use the Times New Roman font at either 11pt or 12pt size
• Either have a line space between paragraphs or indent the first line of each Paragraph.1. Introduction:
This section should cover what the report is all about, and what are the main areas the report will cover that may include specifications, features, functionalities, prices etc.

2. Data Gathering Techniques:

Discuss your findings on the data gathering techniques used to gather critical business and systems requirements.This section must cover the following:
• List two different techniques/methods used in this information gathering and explain
• What are the questions?
• List the issues uncovered in this investigation
• What changes are required to the current infrastructure to implement new systems
Complete the attached Appendix 1.

3. Request System Access
Draft an email to be sent to IT manager requesting to be given access to server systems.

4. Network Infrastructure:
Create a hardware and software requirements details based on various data gathering techniques used. You should include all the required hardware (including WAN, LAN, Wireless and cabling), and software requirements. (including application software and Operating System).

5. Cabling Requirements:
The Brisbane office has 7 rooms al located on the first floor. The floor size for each room is shown in the below floor plan.

In this section you will need to answer the following:
• Type of cable to be used
• Approximate length of the cable
• List the OH&S issues that must be looked into
• List the building and government guidelines to consider during the cabling

6. Design Considerations:

The Brisbane office currently has an existing LAN network with 7 PC's. The infrastructure requirements must address the following:
• List the network design consideration which should be considered so that the existing network does not have any impact on the proposed new network.
• List the WAN design consideration based on organisational guidelines
• List the Wireless Network design consideration based on organisational guidelines

7. Hardware and Software Evaluation:
Based on the client requirements, compare and evaluate Two (2) each of the hardware recommended in terms of their:
• Performance
• Functionalities
• Cost
• Licencing

For costing, you must include quotation. Please see the Appendix 2provided.
You will need to contact vendors and refer to appropriate resources to obtain technical specifications and cost of the hardware and software required.

8. Network Diagram - (Should include Router/WAP, Clients, and Printers)

9. Topology:
In this section, you will need to provide information about the topology to be used in the scenario provided. 

10. Network Configuration (IP Addressing scheme)
In this section you will need to plan and answer the following:
• Class network address
• Network address
• Host address
• Subnet mask
• Services to be installed, for instance, File Service, Print Service, DHCP, DNS etc.
• Suitable protocols to be used with the capabilities and features, TCP/IP for instance

11. Internet (WAN) connection
In this section, you will need to provide recommendation about the Internet Service Providersas per the client's requirements. Include the following:
• Cost of service per month
• Download bandwidth per month
• Vendor
• Contractual agreements

12. Security Threat Detection and Testing
In this section, you will need to investigate on possible security issues the business might face in future and recommend on strategies to avoid such risks. You must include the following:
• List the risks
• Discuss on the strategies to implement to avoid those risks such as
o Intrusion Detection and penetration testing techniques
o Authentication methods
o Network protocols and data encryption

13. Backup Plan
In this section, you will need to recommend on the back up strategies as per the client requirements. Discuss on the recommendation such as Daily backup, Incremental backup, Differential backup, or Cloud backup etc.

14. Review and Sign off Form
In this task, you need to conduct a meeting with IT manager. Your trainer will act as an IT manager.
You need to present the prepared report to IT manager to collect feedback and update the report. Once the feedback has been collected, update the report.

Attachment:- ICTICT401 Determine and confirm client business requirements.rar

Reference no: EM132471393

Questions Cloud

Relationship between elasticity and total revenue : Does understanding the relationship between elasticity and total revenue help you understand why some goods go on sale and others don't? Share your thoughts.
What is fair market value accounting : What Is Fair Market Value Accounting? How the FASB is going to standardize the calculation of financial instruments by looking at their historical cost?
What do economists mean by diminishing returns to input : Have you ever observed this principle at work in a job you've had? Describe how you've experienced this concept in the real world.
What are the best ways of increasing revenue : What are the best ways of increasing your revenue and reducing your cost in the short run. Assume you are in highly competitive market.
ICTICT401 Determine and confirm client business requirements : ICTICT401 Determine and confirm client business requirements Assignment Help and Solution, Academies Australasia - Assessment Writing Service
Optimal long-run production-long-run profits : Determine the optimal long-run production, the long-run profits, and if the variable costs are cut by half, what is the maximum bonus that shareholders
Is the social security tax progressive-regressive : Is the Social Security tax progressive, regressive, or proportional? Are Social Security transfer payments designed to redistribute income from upper to lower
Supplier surplus and the deadweight loss modelled on diagram : If the government imposes a price floor on the market for, say cookies, and agrees to buy up all the excess supply and destroy it
How account for financial loss in order to maintain quality : How do you account for financial losses in order to maintain quality customer service, for example, a restaurant that gives a free meal to an upset customer

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are the technical implications for business continuity

What are the technical, economic, and managerial implications for business continuity and disaster recovery plans in relation to cloud computing and SaaS?

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  Identify potential malicious attacks

identify potential malicious attacks and threats specific to your organization. She asked you to include a brief explanation of each item and the potential impact it could have on the organization.

  Identify data security measures to prevent security issues

Suppose you are also in charge of securing your organization's data. Identify at least two (2) data security measures that you believe are necessary to prevent data security issues. Justify your response.

  Compare viruses and worms and trojans

Compare and contrast viruses, worms, and Trojans, and indicate which of these you consider to be the greatest danger to computer users.

  Find the checksum at the sender site

This problem shows a special case in checksum handling. A sender has two data items to send: Ox4567 and OxBA98. What is the value of the checksum?

  Describe the three principles of ip security

Describe 'The Three Principles of IP Security'. Cite references as well as a detailed explanation for the same. Explain how you would as an employee of a company practice those principles

  Importance of reading changed from earlier eras

What does literature offer an individual How has the importance of reading changed from earlier eras (pre-digital/audio/visual media) to our present day?

  Determine the security risks with respect to phishing

Mobile banking features have added several advantages for customers. Determine the security risks with respect to phishing, smishing, vishing, cloning, and a lost or stolen Smartphone that have been experienced by the financial services industry ..

  Importance of presentation and content in presentation

There has been a discussion for years on which is more important, content or presentation. This is very important when thinking about creating a PowerPoint slideshow.

  Discuss about the symmetric and asymmetric encryption

Create a network diagram of a network and / or in a data flow where your real-world example would exist using a diagramming application such as Visio or Dia.

  Provide secure remote access solution that utilizes network

Provide secure remote access solution that utilizes Network Access Policy controls. Provide easy and manageable workstation image and software deployments. All workstations should be Window 8.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd