Justification of network management plan

Assignment Help Computer Networking
Reference no: EM132318872

Assignment case study: HandMade Furniture Ltd.

An initial analysis has found the following:

1. It is a single site company with a factory and office on site.

a. There are 80 employees in total, 60 in the factory and 20 in the office.

b. Each office worker has their own PC. There is a mixture of Windows 7, Windows 8 and Windows 10 computers installed, together with various versions of Microsoft Office.

c. There are 8 PCs in the factory, all running Windows 7 and Microsoft Office 2010.

d. There is no central subscription to anti-virus software. Staff are left to do this themselves.

2. The network is completely wired and they have not yet started to explore the use of WiFi. If staff bring their own devices to work, they need to make their own provision for Internet access (3G/ 4G etc.)

3. The network runs on a single Windows Server 2012 server. There is an additional NAS (Network Attached Storage) storage device that will store up 10TB of data. There is no formal backup plan; again staff (and individual teams) are expected to manage their own data. Some do this better than others. For example, the design team have their own NAS storage and additionally copy designs to backup DVD on a weekly basis.

4. Internet access is provided through an ADSL account with a local Internet provider. This gives a maximum of 10 Mbit/s of bandwidth. They have found that this is not sufficient for their needs.

a. The company does not have a Web site.

b. There is a single email address for the company that the MD (Managing Director) and her PA (Personal Assistant) have access to.

c. Other staff have set up ‘unofficial' company emails for their requirements, for example, the finance team have a shared email address with a Gmail account that they use for ordering.

5. No single person has responsibility for managing the network. A previous office manager (who has now left) had some IT experience and supported the network as part of his job. There have been some serious incidents recently, most notably a serious virus infection that was dealt with by bringing in a local IT technician to clean a number of PCs.

6. The arrangements for printing are as follows:a. There is a single inkjet printer in the factory shared between the factory PCs. This printer is networked.

b. In the office, there is a high volume laser printer connected directly to one of the admin support team's PCs. This is connected via Windows printer sharing to the other PCs in the admin team but no-one else has access (in the past, if anyone else needed a large number of documents printing they had to email it to a member of the support team).

c. The remainder of the office use 22 inkjet printers, from a variety of manufacturers. Some of these are connected to individual PCs and some are shared between workgroups.

Network Management Justification

You are a self-employed Network Consultant and you have been approached by a small furniture manufacturer (Handmade Furniture Ltd.) to examine their network.

Your initial findings have determined that the network is currently working within acceptable parameters, but you can see that there will be problems in the future unless they implement some additional infrastructure and a management plan in the very near future.

Based on their past experiences, your client has also determined that the current arrangements for supporting their IT systems are not suitable. They have asked you to additionally consider how they can best support their IT function moving into the future. They understand that there are two basic approaches:

- Completely outsource all IT support.

- Employ their own IT support staff and completely manage and maintain IT support in-house.

They are unsure which approach is most suitable (or whether there are alternatives) and are asking for your advice. Part of this report will ask you to suggest and evaluate appropriate IT support options.

The Managing Director has asked you to produce a briefing paper to be presented to the Board.

This should be written as a fully referenced formal report, written in academic style. The purpose of this paper is to:

- Justify why the company should implement a network management plan.

- Describe and explain elements of a network management plan suitable for this organisation.

- Explain and justify options for improving IT support.

Your report MUST include the following sections:

- Introduction and terms of reference.

- Justification of network management plan.

- Suggested elements of network management plan and a detailed description of why these are appropriate.

- Options for IT support (minimum of two options, maximum of three).

- Conclusion and recommendations.

NOTE: For this assignment, you are being asked to justify, then describe and explain, the network management plan. Note also, that for the next assignment, you are required to expand on this, and (in Assignment 2) actually produce the plan.

Coursework Component

Title: Devising a Network Management Plan and Security Plan for HandMade Furniture Ltd. Assignment

This assignment requires you to create a network management plan and a security plan for HandMade Furniture Ltd. that will include both local and cloud-based services.

This is based on the same company case study that you used for assignment 1, but with the following additional information:

• A decision has been made to upgrade the company Internet connection. Your advice will be appreciated on how this should be done.

• The company have decided to upgrade all PCs to the latest versions of Microsoft Office and Windows.

• Email addresses will be provided for all staff via a cloud provider (such as Google Apps for Business or Microsoft Office 365).

• WiFi will be added to the network and team leaders in the factory will be issued with a WiFi enabled laptop.

• Staff will be able to bring their own devices to work and connect to the work WiFi network. Advice on how to do this will be appreciated.

• The company are considering moving away from individual printers to networked ‘pull' printing. They would appreciate your advice on the implications of this.

• The company has decided to move their accounting and stock control systems to a cloud based service, managed and maintained by another company. The provider has a good international reputation, however the board would appreciate your advice on this.

Attachment:- Network Assignment Brief.rar

Reference no: EM132318872

Questions Cloud

Position to respond to large franchises or chains : Why local restaurants might not be in the position to respond to large franchises or chains?
Discuss specific challenges you expect to face personally : Looking ahead to your future career, discuss the specific challenges you expect to face personally and how you plan to overcome those challenges.
Create a diverse team of employees with different strengths : Developing Your Team - Explain how you could create a diverse team of employees with different strengths. Use scenarios to convey your idea
What would be their customer value propostiion : When looking at a warehouse bulk item store, like Costco, what would be their customer value propostiion, profit formula, key resources, and key processes.
Justification of network management plan : Describe and explain the network management plan - Describe and explain elements of a network management plan suitable for this organisation
Acquired in business policy and strategy : Identify a strategic management skill that you learned or acquired in business policy and strategy
Tuckman five stages of team development : What do you know about Tuckman's five stages of team development?
Impact operation car wash had on business operations : Briefly explain the impact operation car wash had on business operations in brazil. Did it strengthened or weakened business in Brazil? (text below)
What information privacy principals have been breached : Based on the video, your readings this week and the case study please respond to the following questions: What information privacy principals have been breached

Reviews

inf2318872

7/23/2019 4:37:13 AM

Experts Mind services are very good and you have excellent customer service team. I was not disappointed once after getting my finished solution from you. I am glad that services like your company are there to help us out. Thank you. I am happy with the work and revision that you guys made for me. Ecerything eas done in time and with perfect accuracy. I would like to thank Eric who really helped me a lot for all the revision work that I asked for. Thanks a lot.

len2318872

6/9/2019 9:59:54 PM

Hello, Please note, there are two assignment combined as one. they both should be treated separately but please note, assignment 2 is the continuation of assignment 1

len2318872

6/9/2019 9:59:30 PM

Marking Scheme Subject Element Weighting Introduction and terms of reference 10% Network management plan 35% Network security plan 35% Costing implications 10% Conclusion and recommendations 10%

len2318872

6/9/2019 9:59:23 PM

No hand-drawn diagrams or tables. Accuracy in spelling, punctuation and grammar are very important. Errors in these areas make it more difficult to convey your ideas. You will lose marks for mistakes. The use of direct quotes is very strongly discouraged; it is always better to write in your own words, citing the source in the normal way. Provide evidence of good background research. You can demonstrate (if appropriate to theassignment) that you have found adequate sources of material.?Where you have found relevant and suitable sources, you should reference them properly and consistently using a recognised referencing system, such as the Harvard system. Cutting and pasting of text from any other source (with or without citation) will generally lead to verylow marks, and may constitute an academic offence. Repeating back only what has been provided in the course materials will lead to lower marks. Asignificant amount of reading / research is expected at this level.

len2318872

6/9/2019 9:59:16 PM

Report Guidance Your work should focus specifically on the assignment question and not divert from that question / case study. The report should be well structured (see section titles above). It should be professionally presented, and the use of fonts must be consistent and professional. The report should have a table of contents, page numbers, and be properly structured. All diagrams, figures and tables must be labelled (e.g. Figure 1, Table 1, etc.). If not self-produced, these must have an appropriate citation to the source.

len2318872

6/9/2019 9:57:37 PM

3. Evidence of wider reading/Research: This aspect covers the amount, range and quality of widerreading - as evidenced by the citations and references - plus your summary and evaluation of how that new-found knowledge aligns with (or maybe contradicts) the ideas presented in this unit. The quality of Harvard referencing will also be a factor. In order to gain a good mark, try and go beyond simple web searches. It is fine to use (good-quality) websites but also incorporate high-quality textbooks and more academic sources such as journal articles and conference papers. Seek advice from the library if needed. Also obtain a guide to Harvard referencing. (25 Marks) 4. Coherence: This means that the ideas presented in the reports are smoothly joined together andthe whole report looks like a one coherent document. (10 Marks)

len2318872

6/9/2019 9:57:30 PM

Marking scheme This report will be marked against four distinct criteria: 1. Subject Matter Knowledge: This aspect covers the depth, clarity and quality of your technicalexplanations – which can be drawn from the material in this unit but should be expressed in your own words and using your own examples. Only students showing clear and strong evidence of going beyond the unit materials will get very high marks (see next criterion). The inclusion of good-quality, well-annotated diagrams to support your technical narrative will gain bonus marks. (25 Marks) 2. Critical Analysis: This aspect covers the level to which you go beyond simple explanation (‘what itdoes’ issues) and move into evaluation and analysis (‘why/why not and when to use’ issues). Highermarks will be awarded for detailed insights into the strengths and weaknesses of each technique, plus comments upon the most suitable situations in which to apply these techniques (and conversely situations in which particular techniques should not be used). (30 Marks)

len2318872

6/9/2019 9:57:18 PM

NOTE: For this assignment, you are being asked to justify, then describe and explain, the networkmanagement plan. Note also, that for the next assignment, you are required to expand on this, and (in Assignment 2) actually produce the plan. Hence, it may be beneficial to read Assignment Part 2 NOW! Report Structure Subject Element Weighting Introduction and terms of reference 10% Network management plan justification 30% described in detail Elements of a network management plan 30% described in detail IT Support options 20% Conclusion and recommendations 10%

Write a Review

Computer Networking Questions & Answers

  Principal organizations responsible for internet governance

Explain how FTTH works.- What are some future technologies that might change how we access the Internet?- Explain how WiMax works.

  Describe the gui and command line utilities

Describe the GUI and command line utilities that you might use in creating and managing users, assigning them to global groups, assigning the global groups to domain local groups and granting domain local groups permissions, should Habibi's grow t..

  Multi-step protocols

Often a multi-step protocols the pipeline concept is applied. What does this mean? give an example, Explain it pictorially.

  Identify and propose the required servers and server roles

MN506 - System Management - Melbourne Institute of Technology - Design, Installation and Configure Enterprise Network Servers

  Discuss four different types of wireless technologies

Discuss four different types of wireless technologies in a 350- to 700-word paper in APA format. Describe the characteristics and properties of each signal type, and how each can be used

  Envision that you are a network administrator for a company

q1. suggest the best way to use the terminal services gateway and authorization policies in different enterprise

  Encapsulate ftp datagram into tcp datagram

Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload section of an FTP datagram. Encapsulate the FTP datagram into TCP datagram (generation of TCP packets)

  You are the network engineer contracted to established a

you are the network engineer contracted to established a wan connectivity between two office locations for a local

  Define the concept of the term mac address

Viewing Your MAC Address Time Required: 10 minutes Objective: Use different methods to view your MAC address.

  Your response should be at least 200 words in length you

1. describe the functions of an isp. what is a modem? describe the different methods to connect to the internet.your

  How long does it take for the counter to wrap around

The control field in a TCP segment is 6 bits. We can have 64 different combinations of bits. How long does it take for the counter to wrap around?

  Compare and contrast the bluetooth and wifi technologies

Compare and contrast the Bluetooth and WiFi technologies. Describe the application areas supported by Bluetooth.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd