The document must be complete and demonstrate that you can

Assignment Help Computer Engineering
Reference no: EM13462251

This is an individual project. Using the case study below, develop a 3 - 5 page paper that is well organized and provides specific answers to each part of the assignment. The document must be complete and demonstrate that you can apply what you have learned in the course. The deliverable should also demonstrate that you can meet the course outcomes.

Case Study

You are a consultant working with an architectural firm that has just merged with another team of architects and construction project managers. The original New York office housed:

  • 5 architects,
  • 3 construction project managers,
  • 3 executives and business managers,
  • 3 administrative staff
  • 1 receptionist/office assistant

When merger is completed, there will be five  offices located in New York, Miami, San Diego, Seattle, and Las Vegas.

The combined offices will have:

  • 17 architects,
  • 13 construction project managers,
  • 7 executives and business managers,
  • 12 administrative (HR, Finance & Accounting, Sales & Marketing, etc.) staff
  • 5 receptionists/office assistants.

All of the managers and staff work in the various offices, but 25 architects and construction project managers also work remotely when they are at construction sites located throughout the United States and Canada.

When remote, the architects need to be able to access, download, and upload architectural drawings and the associated documents on a daily basis. The construction project managers must have real-time access to all financial and accounting documents, client records and daily schedules. The CIO has reminded you that they are required to meet Gramm-Leach-Bliley Act (GLB) and Right to Financial Privacy Act requirements for protecting client financial information.

You, as a telecommunications/communications consultant, have been asked to design the telecommunications network to support this new multi-location company. Others on the team will develop the applications and databases. Your task is to identify the requirements and design a network solution that will meet those requirements.

Define the requirements and then design an appropriate network that will support the merged architectural firm. Your paper should:

1. Analyze the given case and provide a clear set of requirements for the network solution

2. Identify the information that is to be protected and the related security requirements

3. Identify the types of network(s),components, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile architects and construction project managers

4. Provideanetworkdesigndiagramthatclearlyshowsanappropriatenetwork configuration to meet the requirements, with components and locations properly labeled

5. Explain the benefits of the proposed network solution

The paper is to be prepared using the APA format. At least three professionally and academically credible external sources must be used, and citations and references must be in the APA format. The online textbook, course models and other course materials should be used and referenced using the APA format. Information from your research should be appropriately incorporated into your written work in your own words. Extensive use of direct quotes is not permitted.

Reference no: EM13462251

Questions Cloud

You are not being given an instruction file with the code : to accomplish this task you will be utilizing the following java classes methods in the character class and
Computer security is not an issue for organizations alone : computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or
Prepare an 8-10-page report in word this report should : prepare an 8-10-page report in word. this report should include a project history of your recent trillo apparel
Analyzed and described whether the organization should : information technology evolves rapidly and businesses must stay abreast of that evolution in order to remain
The document must be complete and demonstrate that you can : this is an individual project. using the case study below develop a 3 - 5 page paper that is well organized and
Prepare a written review of an article from a recent : prepare a written review of an article from a recent business magazine. also prepare a powerpoint presentation as
Create the data dictionary for your complete data model : 1. indentify all entities that you would need to track data about for the business case people places things or events
Conduct research and provide a two page apa response : 1.conduct research and provide a two page apa response. describe and discuss the following topics regarding nonlinear
Choose an organization from the choices provided and : choose an organization from the choices provided and prepare an organization security plan that provides security

Reviews

Write a Review

Computer Engineering Questions & Answers

  Capability maturity model (cmm) is in software development

For each level in your model, desribe how toidentify the maturity level and what steps are necessary to move to the next level. For each level, specify needs for relevant quality standards and quality management.

  Give difference between testing and debugging

You have just been hired as the testing guru for the CatchAllBugs.com Company. Your first task is to write a set of test cases to debug a small VB program. Unfortunately, you do not have access to the code of program. All you have is the following ..

  Query using an update statement

Here is issue, a table namedPoints varchar(81) has values stored in a column named Point. There are two columns in the Points table, X and Y.

  Find out the length of the string

In the absence of three consecutive erroneous input attempts, your user should have the opportunity to continue running the program until directly deciding to terminate.

  Recovering passwords from protected files

Recognize the mismatched file headers to the extensions and discuss the techniques you may apply in order to recover the passwords from protected files.

  Questionconsider an adt called squarematrix the matrix can

questionconsider an adt called squarematrix. the matrix can be represented by a two-dimensional array of integers with

  Construct and make a list of potential entities

The Jefferson Dance Club teaches social dancing and offers both private and group lessons. Jefferson charges $45 per hour per student (or couple) for a private lesson and charges $6 per hour per student for a group lesson.

  Subnet mask and ip addresses

Which subnet mask would they utilize? How many IP addresses would they have per subnet?

  What happen if you did not break

When using Case statements, what would happen if you did not "Break?" Please give an example and explain. Where, in your everyday life, would you use all of the looping techniques.

  Contrast abstract classes and interfaces

evaluate and contrast abstract classes and interfaces

  Specify modifications that implemented to it infrastructure

Identify any modifications that should be implemented to the IT infrastructure in order to accommodate the requirements of the EHR.

  Evaluate the concept that it is becoming the new core of

evaluate the concept that it is becoming the new core of modern business. how might you justify or negate this

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd