ICTICT401 Determine and confirm client business requirements

Assignment Help Computer Network Security
Reference no: EM132471393

ICTICT401 - Determine and confirm client business requirements - Academies Australasia

Assessment Task 1- Project Activity Report

In this assessment task, you are required to gather, determine and confirm client requirement and review available network technologies, devices and protocols to build WLAN (Wireless Local Area Network) for small office or home office network by choosing appropriate hardware and software in accordance to business and technical requirements including installation plan, network design and security.

Introduction:
Devon Education is a growing educational provider. It has been operating since 2010. Its main business is to provide vocational training and education for international students. With further growth in business, BEG has decided to open new office in Brisbane.

Key Project objectives:

Furthermore, after your meetings and interviews with Andre, Johnson and Angela, following information were collected.
• Each staff member will have complete desktop, access to printer, wireless and NAS
• Staff should be able to use the network securely.
• Data in Network Access Storage (NAS) should be able to share between all staff.
• Hardware and software should be of industry standards.
• Router and WAP must be regularly monitored and backed up.

Tasks:Prepare a Report

Research and prepare a report for Brisbane Education Group to satisfy the business requirements for BEG,
You report must contain:
• Cover page
• Table of Contents (Refer to sample Table of Content)
• Number all pages at the bottom centre of the page
• Include your course, name and student number as a header at the top of each page.
• Use 1.5 line spacing (other guides may prefer double spacing)
• Use the Times New Roman font at either 11pt or 12pt size
• Either have a line space between paragraphs or indent the first line of each Paragraph.1. Introduction:
This section should cover what the report is all about, and what are the main areas the report will cover that may include specifications, features, functionalities, prices etc.

2. Data Gathering Techniques:

Discuss your findings on the data gathering techniques used to gather critical business and systems requirements.This section must cover the following:
• List two different techniques/methods used in this information gathering and explain
• What are the questions?
• List the issues uncovered in this investigation
• What changes are required to the current infrastructure to implement new systems
Complete the attached Appendix 1.

3. Request System Access
Draft an email to be sent to IT manager requesting to be given access to server systems.

4. Network Infrastructure:
Create a hardware and software requirements details based on various data gathering techniques used. You should include all the required hardware (including WAN, LAN, Wireless and cabling), and software requirements. (including application software and Operating System).

5. Cabling Requirements:
The Brisbane office has 7 rooms al located on the first floor. The floor size for each room is shown in the below floor plan.

In this section you will need to answer the following:
• Type of cable to be used
• Approximate length of the cable
• List the OH&S issues that must be looked into
• List the building and government guidelines to consider during the cabling

6. Design Considerations:

The Brisbane office currently has an existing LAN network with 7 PC's. The infrastructure requirements must address the following:
• List the network design consideration which should be considered so that the existing network does not have any impact on the proposed new network.
• List the WAN design consideration based on organisational guidelines
• List the Wireless Network design consideration based on organisational guidelines

7. Hardware and Software Evaluation:
Based on the client requirements, compare and evaluate Two (2) each of the hardware recommended in terms of their:
• Performance
• Functionalities
• Cost
• Licencing

For costing, you must include quotation. Please see the Appendix 2provided.
You will need to contact vendors and refer to appropriate resources to obtain technical specifications and cost of the hardware and software required.

8. Network Diagram - (Should include Router/WAP, Clients, and Printers)

9. Topology:
In this section, you will need to provide information about the topology to be used in the scenario provided. 

10. Network Configuration (IP Addressing scheme)
In this section you will need to plan and answer the following:
• Class network address
• Network address
• Host address
• Subnet mask
• Services to be installed, for instance, File Service, Print Service, DHCP, DNS etc.
• Suitable protocols to be used with the capabilities and features, TCP/IP for instance

11. Internet (WAN) connection
In this section, you will need to provide recommendation about the Internet Service Providersas per the client's requirements. Include the following:
• Cost of service per month
• Download bandwidth per month
• Vendor
• Contractual agreements

12. Security Threat Detection and Testing
In this section, you will need to investigate on possible security issues the business might face in future and recommend on strategies to avoid such risks. You must include the following:
• List the risks
• Discuss on the strategies to implement to avoid those risks such as
o Intrusion Detection and penetration testing techniques
o Authentication methods
o Network protocols and data encryption

13. Backup Plan
In this section, you will need to recommend on the back up strategies as per the client requirements. Discuss on the recommendation such as Daily backup, Incremental backup, Differential backup, or Cloud backup etc.

14. Review and Sign off Form
In this task, you need to conduct a meeting with IT manager. Your trainer will act as an IT manager.
You need to present the prepared report to IT manager to collect feedback and update the report. Once the feedback has been collected, update the report.

Attachment:- ICTICT401 Determine and confirm client business requirements.rar

Reference no: EM132471393

Questions Cloud

Relationship between elasticity and total revenue : Does understanding the relationship between elasticity and total revenue help you understand why some goods go on sale and others don't? Share your thoughts.
What is fair market value accounting : What Is Fair Market Value Accounting? How the FASB is going to standardize the calculation of financial instruments by looking at their historical cost?
What do economists mean by diminishing returns to input : Have you ever observed this principle at work in a job you've had? Describe how you've experienced this concept in the real world.
What are the best ways of increasing revenue : What are the best ways of increasing your revenue and reducing your cost in the short run. Assume you are in highly competitive market.
ICTICT401 Determine and confirm client business requirements : ICTICT401 Determine and confirm client business requirements Assignment Help and Solution, Academies Australasia - Assessment Writing Service
Optimal long-run production-long-run profits : Determine the optimal long-run production, the long-run profits, and if the variable costs are cut by half, what is the maximum bonus that shareholders
Is the social security tax progressive-regressive : Is the Social Security tax progressive, regressive, or proportional? Are Social Security transfer payments designed to redistribute income from upper to lower
Supplier surplus and the deadweight loss modelled on diagram : If the government imposes a price floor on the market for, say cookies, and agrees to buy up all the excess supply and destroy it
How account for financial loss in order to maintain quality : How do you account for financial losses in order to maintain quality customer service, for example, a restaurant that gives a free meal to an upset customer

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd