Comprehensive authentic assessment plan

Assignment Help Computer Networking
Reference no: EM13847309

Comprehensive Authentic Assessment Plan Deliverables

For this course AAP is a response for customer's RFP or customer's design requirements and type of solution used in network design. Typically a customer's RFP includes following topics.

• Business goals for the project
• Scope of the project
• Information on existing network
• Information on new applications
• Technical requirements, including scalability, availability, network performance, security, manageability, usability, adaptability, and affordability
• Warranty requirements for products
• Environmental or architectural constraints
• Training and support requirements
• Preliminary schedule with milestones and deliverables
• Legal contractual terms and conditions

Your AAP should include responses to all of customer's RFP and should include logical and physical component pf the design, information on technologies used in design solution, and proposal to implementing the design.

Design Requirements

Network Requirements

• Design & configure enterprise campus model design
o State of the art VoIP and Data Network
o Modular, scalable network
o Provide faster Network services
- LAN speed minimum 100 MB and Internet speed minimum 54 MB
o Use appropriate Cisco switch models
o Integrate voice and data network to reduce cost
o 100% connectivity with a minimum number of outside lines for dialing outside numbers.
o Access layers switches
- One port for each device
- Provision for 100% growth
o Server farm switches
- Assume 6 NIC cards in each server and one NIC card uses one port of switch
- Dual processors and dual power supply
- Centralize services and servers
o Built-in redundancy at:
- building core layer and building distribution layer and access layer
- workstation level
- uplinks connection to Building Distribution layer for Building Access layer
o Aggregate routing protocols with hierarchal IP scheme
o TCP/IP protocols for the network
- Guest network must support AppleTalk protocol

• Fast and secure wireless services in the lobby and two large conference rooms
o minimum 54 Mbps of bandwidth

• Video conference and multicast services

• Extra switch capacity at for authorized users to attach their notebook PCs to the network
o Port Security, Sticky MAC, 802.1x protocols to ensure only authorized systems

• IP addressing redesign that optimizes IP addressing and IP routing with IPv6 migration provisions
o Internal/External DNS
o Dual stack, 6to4 tunnel capability or NAT-PT for IPv6 transition

• Site-to-site VPN must be mutually authenticated and utilize cryptographic protection

• PSTN dial-up
o must authenticate with username and OTP
o RADIUS/NAP

• Based on equipment inventory and other requirements:
o Access Layer port count:
- 94 ports for phones, but by utilizing network port on phone this number can be reduced in half to 47. 47 additional ports will be needed for the extra phone in offices.
- 107 ports for desktop/workstation. In most cases a workstation will connect to a phone using the trunking capability of the access switch and the phone.
o Distribution/datacenter
- 240 ports (6 ports per server; 40 servers total)

Security Requirements

• Multilayer security or defense-in-depth security
o Smart card w/ PIN

• Classified Network
o Data Separation from Unclassified network
o Physical Security
- Locks / Smart Cards to access area/systems (multi-factor authentication)
o IPSEC
o No Internet Access
o No USB/Removable Media/Printers/CD Burners (disabled by GPO)

• Encrypted network must use SSL

• Public Servers
o HTTPS (SSL)
- Provide secure means of customer purchase and payment over Internet
o Inside DMZ
o NAT
o Identity Check (User authentication/ Certificate)

• Secure key applications and servers without using encryption on all devices

• Security policies in place to stop sniffing and man-in-the-middle attacks

• Data transmitted on the classified network must be cryptographically protected throughout the network

• Data crossing wide-area links should undergo another layer of cryptographic protection

• All devices must be mutually authenticated and cryptographic protection should be provided.

• Users should undergo periodic user awareness training program on network threats and good security practices
o Acceptable Use Policy to define appropriate user behavior and security configuration settings

• Resolve current security audit problems

• Physical security

• Email protection to protect unclassified and sensitive business emails

Active Directory Requirements

• Servers
o Centralize all services and servers
o Implement Failover cluster services
o File classification infrastructure feature
o IP Address Management (IPAM)
o DHCP (for employee systems)
o Exchange/Outlook (Sending and receiving e-mail)
o Windows Deployment Services
o File Server
- FSRM (quota & file screening)

• OU Infrastructure
o Role-Based
o Department-based OUs
o Global/ Universal/ Local groups
- Utilize least privileged principle for membership
- (delegate group ownership for adding/removing users)

• GPOs
o Bitlocker
o Configure Netscape or Microsoft's Internet Explorer
o Block removable media on classified network
o Create appropriate GPO and GPO policies

• Bitlocker
o BitLocker encryption technology for devices (server and Work station) disc space and volume
o Enable a BitLocker system on a wired network to automatically unlock the system volume during boot
o GPO enforced Used Disk Space Only or Full Encryption is used when BitLocker is enabled

• Enable BranchCache

• Implement Cache Encryption to store encrypted data by default.

Attachment:- Assignment.rar

Reference no: EM13847309

Questions Cloud

Explore the capacity for growth in a certain market sector : You could propose your company adopt new technology or conduct research on the customer base. Perhaps you believe they should explore the capacity for growth in a certain market sector. Perhaps you would like to proposethey develop a new product
What are the basics of multinational diversification? : What are the basics of multinational diversification?
Describe racial profiling and racially biased policing : Describe racial profiling and racially biased policing and explain why these phenomena have become significant issues in policing.
Roles small businesses play in most economies? : What roles do you think small businesses play in most economies?
Comprehensive authentic assessment plan : Comprehensive Authentic Assessment Plan Deliverables- For this course AAP is a response for customer's RFP or customer's design requirements and type of solution used in network design
A positive online learning experience created : a positive online learning experience created
Implement client-server communication : Write a java program implementing Client-Server communication using Remote Method Invocation.
Prepare journal entries to assign the preceding costs to job : Prepare journal entries to assign the preceding costs to jobs. Show the appropriate entries debiting Finished Goods Inventory and Cost of Goods Sold.
Analyze the concepts of nurse leadership and management : Analyze the concepts of nurse leadership and management with specific reference

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe the major network security organizations

As a member of the Network Security group, you have been asked to serve on the committee and to take the initiative in the following: 1. Describe the major network security organizations. 2. Identify risks, threats, vulnerabilities and countermeasu..

  Program to compute employee-s weekly pay

Write down the program which reads the employee's number from keyboard, number of hours worked and the hourly rate of pay.

  Diane the consultant summary of case

Case study:Diane the consultant Summary of case : Construct a diagram using Rationale to map the arguments about a moral claim that you have identified in the article/case study:

  Study carefully the following network topology it is

study carefully the following network topology. it is required that the small business smart office services pty ltd

  Distinct canonical names are required in conference

Let N users participating in audio/video conference using IP multicasting. Each user is equipped with microphone, a camera, and speakers. How many distinct canonical names are required?

  Explain why network operating systems were phased

Explain why network operating systems were phased out when distributed operating systems gained popularity.

  What are some causes of the number of bytes

What are some causes of the number of bytes on the wire exceeding the number of bytes being captured. What are the source and destination MAC address in Frame 546

  Examine how the university might integrate at least two

scenario imagine that you have been hired as a consultant for a university that wants to leverage social media and

  Outline the design of a wireless network

Outline the design of a wireless network to support user mobility over a wide area. Include in your answer a discussion of addressing, routing and the used of fixed versus ad hoc network access nodes or base stations.

  Question 1awhat is your knowing for the term cyber weapon

question 1awhat is your knowing for the term cyber weapon? give an example of a cyber weapon.bhow was sony play station

  Describe network fundamental characteristics and component

Write a 2- to 4-page paper that includes the following based on your chosen Virtual Organization: Explain the network's fundamental characteristics and components

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd