Network infrastructure upgrade, Computer Networking

Assignment Help:

Network Infrastructure: This project will require replacement of major networking components throughout the office. Virtualization will result in increased speed and reliability for employees.

Current business needs revolve around making our company more efficient. Efficiency is currently held back due to aging and obsolete network components. These issues are highlighted by specific problems employees are experiencing such as slow network connections, spotty wi fi coverage within office building, and the fact that the current server has reached maximum capacity, no longer allowing any further users to authenticate with it.

Opportunities with this project are summarized by increased efficiency for employees which will result in greater productivity. These upgrades, if met with a successful implementation plan should translate to increased satisfaction with our customer base and the capacity to add to that base, making the company more profitable in the long run.

Details of the proposed infrastructure upgrade are as follows. Changing of  the current backbone wiring to fibre optic cable will improve data transfer speed capabilities. Replacing hubs with switches will allow each individual network card to transmit data simultaneously rather than waiting its turn. Improving wi-fi coverage through the use of higher spec routers will increase the coverage and significantly reduce the likelihood of dropped connections. By upgrading the current servers we will expand the capacity of our network, allowing more users to authenticate.

Problem:
Issues with implementing this project include the downtime endured while the network is upgraded.  When the components are being replaced the communications within the company will be significantly hindered.  Therefore it is imperative that we have backup systems in place so that we can still utilize effective communications.

Budget Information:
Cost: $100,000
Benefits: $290,000
Cashflow: $190,000
NPV: $153,435
Payback: Year 2
ROI: 163%


Related Discussions:- Network infrastructure upgrade

Methods of reliability prediction, I NTRODUCTION Reliability  predicti...

I NTRODUCTION Reliability  prediction  is  an  important  method  for  evaluating  a  system design, right from its conceptual stage through development and manufacture and al

Diffrence between network vs internet layers, Q. Diffrence between Network ...

Q. Diffrence between Network vs Internet Layers? - Similar to all the other OSI Layers the network layer provides both connectionless and connection-oriented services. From th

Set up to use pvm run and complie, PVM uses two environment variables when ...

PVM uses two environment variables when starting and running. Every PVM user needs to set these two variables to use PVM. The initial variable is PVM_ROOT, which is set to the loca

Describe about the term- network, Describe about the term- network If n...

Describe about the term- network If network tends to lose the packets, it is better to acknowledge each one of them separately, so the lost packets could be retransmitted. On t

What is forest, The term "forest" is used to explain a collection of AD dom...

The term "forest" is used to explain a collection of AD domains that share a one schema for the AD. All DC's in the forest share this schema and it is replicated in a hierarchical

Virtual private network, Virtual Private Network (VPN) adds the features of...

Virtual Private Network (VPN) adds the features of both public and private  networks. It is fixed to single organization and needs public network for connectivity. These connect

Name the strategies devised by ietf, Question: a) Show the shortest for...

Question: a) Show the shortest form of the following IPv6 address: 2340:0000:0000:000F:7000:119A:A001:0000 b) The IPv6 header includes a Class field and a Flow ID field. Bri

How does a token-passing protocol works, How does a Token-Passing Protocol ...

How does a Token-Passing Protocol works? The token-passing protocol relies on a control signal known as the token. A token is a 24-bit packet that circulates throughout the net

Research, I have a research in this topic " Mitigating DoS Attacks against ...

I have a research in this topic " Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks " with simulation

Perfect shuffle permutation-concept of permutation network, Perfect Shuffle...

Perfect Shuffle Permutation This was advised by Harold Stone (1971). Consider N objects each characterized by n bit number say  X n-1, X n-2, X 0    (N is chosen such that N

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd