Compare and contrast among network operating systems

Assignment Help Computer Networking
Reference no: EM131434737

Homework: Network Consultation for Design IT

This assignment contains two Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to complete this assignment.

The owners of Design IT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. Design IT is a graphic arts company that, up until now, had contracted work out to temporary design services. The new space will allow them to hire two full time designers and a receptionist.

Description of space purchased:

- 4 Cubicles
- 1 Office
- 1 Server room
- 1 Reception desk
- 1 Conference room

Below is the design of the space purchased

895_Network_Diagram.jpg

Using the building layout, your role is to provide Design IT with a network design that interconnects the following considerations:

- Design IT plans to relocate three servers already configured as follows:

o 1 Web Server - Microsoft IIS Server
o 1 File Server - Microsoft Server 2008
o 1 Server - Server 2008 Small Business Server

Design IT has requested that the design include the following:

o High speed Internet access
o Firewall
o Antivirus / malware protection
o Six computers
o Three color laser printers
o Wireless access for portable devices

Design IT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance.

Section 1: Network Consultation Proposal

(Microsoft Word)

Create a cost analysis, and develop a proposal for the company.

1. Write a five to seven page proposal in which you:

a. Recommend one suitable network design.
b. Suggest one network architecture.
c. Suggest LAN and Wireless LAN (WLAN) wiring considerations.
d. Recommend hardware options and costs.
e. Suggest security considerations for:

i. Firewall
ii. Antivirus software
f. Recommend software options and costs.

g. Outline the labor costs, equipment costs, and service costs for your suggested design in table format.

h. Identify the single point of failure, and recommend potential mitigation strategies.

i. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 1 of your assignment must follow these formatting requirements:

- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

- Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: Network Consultation Presentation

(Microsoft PowerPoint or equivalent)

Use Microsoft PowerPoint or an open source alternative to present your findings to the client.

2. Create a five to ten slide presentation in which you:

a. Outline the recommendations from your written proposal in Section 1.
b. Provide general speaking notes that you would use to highlight non-visual content.

The specific course learning outcomes associated with this assignment are:

- Explain the basic components and media of network systems and distinguish between LANs, MANs, and WANs.

- Summarize current networking standards and how standards bodies and the standardization process impact networking technology.

- Describe the TCP / IP protocols and various functions among the application layer.

- Contrast why different technologies are deployed in different contexts of networking, such as topology, bandwidth, distance, and number of users.

- Explain and differentiate among network hardware devices and components.

- Compare and contrast among network operating systems.

- Describe security policy, practices, encryption techniques, and design considerations in support of business operations in a networked environment.

- Explain the role of integrity and availability in a networked environment.

- Use technology and information resources to research issues in computing networks.

- Write clearly and concisely about introductory networking topics using proper writing mechanics and technical style conventions.

Reference no: EM131434737

Questions Cloud

Identify events surrounding the native american assimilation : In this unit, you have learned many things regarding the Gilded Age while also getting a quick peek into the Progressive Age. Based on this knowledge from the lesson and readings, identify the events introduced in this post-Civil War era that you ..
Ethically defensible to outsource production to developing : Under what conditions is it ethically defensible to outsource production to the developing world where labor costs are lower when such actions also involve laying off long-term employees in the firm's home country?
Calculate the after-tax cost of debt : Calculate the after-tax cost of debt if an interest rate is 5 percent and the tax rate is 34 percent. Express your answer in percentage (without the % sign) and round it to two decimal places.
Explore the legal rights and responsibilities of the tenant : Larry Landlord has recently renovated an apartment and has put it on the market to be rented for $800.00 a month. Larry Landlord has been in business for approximately five (5) years and has had both positive and negative experiences with tenants...
Compare and contrast among network operating systems : Compare and contrast among network operating systems. Describe security policy, practices, encryption techniques, and design considerations in support of business operations in a networked environment.
To grow a culture of creative confidence in an organization : To grow a culture of creative confidence in an organization, you need to create a culture of innovation. What role do you see Systems Thinking playing in a healthcare organization’s drive to create a culture of innovation? And what outcomes might you..
Preferred stock required rate of return : Columbus Pet Products has preferred stock outstanding which pays a dividend of $3 at the end of each year. The preferred stock sells for $41.05 a share. What is the preferred stock's required rate of return? Answer in a percentage and round it to ..
Compute the breakeven quantity and contribution margin : abyGap.com is considering how to increase demand for its line of infant clothes. One proposal is to buy a mailing list with? 100,000 names of recent parents who have household incomes greater than? $40,000 and send them each a coupon for? $5 for purc..
What is the value per share of the company stock : Fly High Co. is expected to pay a $1.6 per share dividend at the end of the year (i.e.,D1). The dividend is expected to grow at a constant rate of 5% a year. The required rate of return on the stock, r, is 8%. What is the value per share of the co..

Reviews

Write a Review

Computer Networking Questions & Answers

  Write a research paper about erp systems in the cloud

Write a research paper about ERP Systems in the Cloud. ERP Systems vendors are offering cloud based versions of ERP Systems. Companies are faced with increasing pressure to investigate the potential of these cloud based offerings.

  Describe how symmetric encryption and decryption work

Explain how a Trojan horse works.- Compare and contrast symmetric and asymmetric encryption.- Describe how symmetric encryption and decryption work.

  Summarize the benefits of application-level gateways

xplain how a worm propagates itself. Summarize the benefits of application-level gateways. Explain why intrusion detection is necessary in terms of the known good state

  Explain process of diagnosing and troubleshooting errors

How do third-party plug-ins change process of diagnosing and troubleshooting errors in the application? What steps would you take in diagnosing the application which has been changed from its original state?

  Which protocol is used to avoid defeat

You and Luke Sky Walker are commanders in rebel army preparing to attack Darth Vader and his Death Star. Is there protocol which you and Luke can use to avoid defeat? If not, describe why not.

  Describe how sites must be interconnected

Describe how the sites must be interconnected, where main data store will be located, how sites will connect to it, and what security measures will be implemented.

  Explain the role of antennas in the transmission of radio

describe the role of antennas in the transmission of radio waves. what type of antenna is typically used in a wireless

  Explaining how networks can be safe from hacking

Explain/propose a new/possible idea on how these networks can be kept safe from hacking.

  Assignment on 4g wireless networks

Assignment 4G Wireless Networks

  Explain networking concepts by using osi model as framework

Explain networking concepts by using OSI Model as framework. Explain protocols at different layers of the OSI model and describe their functionality.

  Determine the topology

Network topologies are defined both physically and logically. Suppose you had to implement either a full-mesh topology or start topology network on a university campus that has ten (10) buildings. Determine the topology that would you select. Prov..

  Distinguish local area networks and wide area network

Identify hardware and software needed to secure your choice of networks against all electronic threats. Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd