The owners of designit

Assignment Help Basic Computer Science
Reference no: EM13758762

The owners of DesignIT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. DesignIT is a graphic arts company that, up until now, had contracted work out to temporary design services. The new space will allow them to hire two (2) full time designers and a receptionist.


Description of space purchased:

4 Cubicles
1 Office
1 Server room
1 Reception desk
1 Conference room
Using the building layout, your role is to provide DesignIT with a network design that interconnects the following considerations:

DesignIT plans to relocate three (3) servers already configured as follows:
1 Web Server - Microsoft IIS Server
1 File Server - Microsoft Server 2008
1 Server - Server 2008 Small Business Server
DesignIT has requested that the design include the following:
High speed Internet access
Firewall
Antivirus / malware protection
Six (6) computers
Three (3) color laser printers
Wireless access for portable devices
DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance.


Section 1: Network Consultation Proposal
(Microsoft Word)

Create a cost analysis, and develop a proposal for the company.

Write an five to seven (5-7) page proposal in which you:
Recommend one (1) suitable network design.
Suggest one (1) network architecture.
Suggest LAN and Wireless LAN (WLAN) wiring considerations.
Recommend hardware options and costs.
Suggest security considerations for:
Firewall
Antivirus software
Recommend software options and costs.
Outline the labor costs, equipment costs, and service costs for your suggested design in table format.
Identify the single point of failure, and recommend potential mitigation strategies.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.


Section 1 of your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.


Section 2: Network Consultation Presentation
(Microsoft PowerPoint or equivalent)
Use Microsoft PowerPoint or an open source alternative to present your findings to the client.

Create a five to ten (5-10) slide presentation in which you: 
Outline the recommendations from your written proposal in Section 1.
Provide general speaking notes that you would use to highlight non-visual content. 


The specific course learning outcomes associated with this assignment are:

Explain the basic components and media of network systems and distinguish between LANs, MANs, and WANs.
Summarize current networking standards and how standards bodies and the standardization process impact networking technology.
Describe the TCP / IP protocols and various functions among the application layer.
Contrast why different technologies are deployed in different contexts of networking, such as topology, bandwidth, distance, and number of users.
Explain and differentiate among network hardware devices and components.
Compare and contrast among network operating systems.
Describe security policy, practices, encryption techniques, and design considerations in support of business operations in a networked environment.
Explain the role of integrity and availability in a networked environment.
Use technology and information resources to research issues in computing networks.
Write clearly and concisely about introductory networking topics using proper writing mechanics and technical style conventions. 

Reference no: EM13758762

Questions Cloud

Biometric data : With probable cause, police are allowed to take a person's fingerprints and photograph, and record and maintain records of them
Do you have any hardware compatibility concerns : Discuss any concerns relating to installation process of vCenter and ESXi. Do you have any hardware compatibility concerns? Explain.
Unipolar disorder and bipolar disorder : The use of pharmaceuticals to treat these disorders enough to return persons into the community to function normally
Write a program that displays a text field : Write a program that displays a text field and two buttons labeled "uppercase" and "lowercase." When the user clicks on the uppercase button, the text changes to uppercase. When the user clicks on the lowercase button, the text then changes to lowerc..
The owners of designit : The owners of DesignIT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. DesignIT is a graphic arts company that, up until now, had contracted work out to temporary design services...
Find the average number of customers waiting : A small town with one hospital has 2 ambulances to supply ambulance service. Requests for ambulances during non holiday weekends average .50 per hour and tend to be Poisson-distributed. Travel and assistance time averages 2 hours per call and follows..
Rate is poisson-distributed : A vending machine dispenses hot chocolate or coffee. service time is 30 seconds per cup and is constant. Customers arrive at a mean rate of 72 per hour, and this rate is poisson-distributed.
What is the highest sigma rating : Acme (NC) has long used a central telephone/Internet customer support center based in Jamaica. Data collected by the center show that last year, all but five (5) of every 100,000 calls/accesses received by the center were satisfactorily (to the custo..
Examine a query written against the database : Examine a query written against the database. You will examine the entity/relationship diagram (ERD) and in writing explain what information the database is holding (not the specific data, but in words what the business application is and how that ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd