Network infrastructure upgrade, Computer Networking

Assignment Help:

Network Infrastructure: This project will require replacement of major networking components throughout the office. Virtualization will result in increased speed and reliability for employees.

Current business needs revolve around making our company more efficient. Efficiency is currently held back due to aging and obsolete network components. These issues are highlighted by specific problems employees are experiencing such as slow network connections, spotty wi fi coverage within office building, and the fact that the current server has reached maximum capacity, no longer allowing any further users to authenticate with it.

Opportunities with this project are summarized by increased efficiency for employees which will result in greater productivity. These upgrades, if met with a successful implementation plan should translate to increased satisfaction with our customer base and the capacity to add to that base, making the company more profitable in the long run.

Details of the proposed infrastructure upgrade are as follows. Changing of  the current backbone wiring to fibre optic cable will improve data transfer speed capabilities. Replacing hubs with switches will allow each individual network card to transmit data simultaneously rather than waiting its turn. Improving wi-fi coverage through the use of higher spec routers will increase the coverage and significantly reduce the likelihood of dropped connections. By upgrading the current servers we will expand the capacity of our network, allowing more users to authenticate.

Problem:
Issues with implementing this project include the downtime endured while the network is upgraded.  When the components are being replaced the communications within the company will be significantly hindered.  Therefore it is imperative that we have backup systems in place so that we can still utilize effective communications.

Budget Information:
Cost: $100,000
Benefits: $290,000
Cashflow: $190,000
NPV: $153,435
Payback: Year 2
ROI: 163%


Related Discussions:- Network infrastructure upgrade

Distributed shared memory systems, Distributed Shared Memory (DSM) systems ...

Distributed Shared Memory (DSM) systems copy a shared memory abstraction on loosely coupled architectures in order to allow shared memory programming despite missing hardware suppo

Types of topologies, TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOL...

TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOLOGY:  It is described by the specific network technology. PHYSICL TOPOLOGY: It relays on the wiring scheme. NE

Hybrid of client server and p2p architecture, Hybrid  of Client Server and...

Hybrid  of Client Server and P2P Architecture Both of  the architecture  are  commonly used  architecture. However  many  applications  are organized as by brides of the  clie

Thin ethernet wiring, THIN ETHERNET WIRING: Thin Ethernet needs thin c...

THIN ETHERNET WIRING: Thin Ethernet needs thin coax cable that is cost effective and easier to install than thick Ethernet coax. In this case transceiver electronics are creat

Difference between multiprogramming and multithreading, Question: a) L...

Question: a) List three characteristics and two potential problems of a peer-to-peer environment. b) List three characteristics and two potential problems of a client/

Enumerate about the virtual private network, Enumerate about the Virtual Pr...

Enumerate about the Virtual Private Network (VPN) Even though, many firewalls also include the features of the virtual private network, the functionality and capabilities of V

A Comparative Study between MPLS VPN and the Public Internet, A Comparative...

A Comparative Study between MPLS VPN and the Public Internet which has intro. operation of tecnology, analysis, discussion, recommendation, conclusion.

Network control protocols ncp, Network  Control  protocols ( NCP) Th...

Network  Control  protocols ( NCP) The first  ARPANET  networking protocols  was named  simply the network  control protocols in 1970,and  was created by  created by  network

State the example of intranet security, State the example of intranet secur...

State the example of intranet security Imagine a situation when a company develops a major new product secretly using its Intranet. Hackers break the security and take away all

Define what is the mac address, When you move the NIC cards from one PC to ...

When you move the NIC cards from one PC to another PC, does the MAC address gets transferred as well? Yes, that's because MAC addresses are hard-wired into the NIC circuitry, n

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd