Design an appropriate network

Assignment Help Management Information Sys
Reference no: EM13997259

Introduction

Use the below case study to develop 3-5 page paper that is well organized.

The paper should answer each question which is mentioned below, specifically, provides specific answers to each part of the assignment.

Case Study

You area outsourced Network Management Specialist and are working for an intellectual property rights law firm that has just merged another law firm that specializes in filing and defending patents.  The original office housed 10 attorneys, 7 support staff, and 1 receptionist in one location.  With the merger, there are now three (3) offices located in different parts of the city, 23 attorneys, 12 support staff, and 3 receptionists.  All of the attorneys work in the offices, but also are mobile in that they provide onsite legal services to businesses and must often travel to government Patent Offices to file and defend patents.  The attorneys need to be able to send and receive legal and patent documents and update client records while they are out of the office.  All the attorneys and support staff must have real-time access to alldocuments, client records and daily schedules.  The Managing Partner reminds you that they are required by law to secure and control client company and personal identifiable information. 

You, as a Network Management Specialist, have been asked to design the telecommunications network to support this new multi-location practice.  Others on the team will develop the applications and databases.  Your task is to identify the requirements and design a network solution that will meet those requirements (including security and privacy requirements).

The Deliverable

Define the requirements and then design an appropriate network that would support this merged law firm.  Your paper should:

  1. Analyze the case given and must provide a clear set of requirements for the network solution
  1. Identify the information that is to be protected and the related security requirements 
  1. Identify the types of network(s), components, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile attorneys
  1. Provide a network design diagram that clearly shows an appropriate network configuration to meet the requirements, with components properly labeled
  1. Explain the benefits of the proposed network solution

Your deliverable will be a 3 - 5page paper. The page requirement includes illustrations or diagrams, but does not count the cover page and references page.

The paper is to be prepared using the APA format and to include at least three (3) academically credible references beyond the assigned readings and other course materials.  Information from your research should be appropriately incorporated into your written work in your own words and properly cited.  Extensive use of direct quotes is not permitted.  Use the Scoring Rubric below to ensure all aspects of the assignment have been adequately covered.  The bolded attributes in the Scoring Rubric must be used as the major section headings in the document. 

Verified Expert

Reference no: EM13997259

Questions Cloud

How many different binary search trees : How many different binary search trees can store the keys {1,2,3,4}?
What are the risks associated with securing confidentiality : What are the risks associated with securing confidentiality, integrity, and availability of electronic information systems?  How are these three elements inter-related?
Prepare the intangible asset section of the december : Prepare year-end adjusting journal entries to record amortization expense on the intangibles at December 31, 2011.
Use to keep ventilation holes clear of dust : What can you use to keep ventilation holes clear of dust? [Choose all that apply.]
Design an appropriate network : Define the requirements and then design an appropriate network that would support this merged law firm.  Your paper should:Analyze the case given and must provide a clear set of requirements for the network solution Identify the information that is t..
Prepare the journal entry to record the sale of machine : Prepare the journal entry to record the sale of machine 102. Also prepare the journal entry to record 2011 depreciation on machine 102 up to the date of sale.
Discuss some secure coding efforts : Discuss some secure coding efforts and practices under way to mitigate the vulnerabilities exposed by the Stuxnet viru
Describe some of the common vulnerabilities : Describe some of the common vulnerabilities to utility companies with a virus such as Stuxnet.
Wireless home network : From the e-activity, identify the key reasons for selecting your wirless home router. Discuss the type of encryption it uses and explain the reason(s) why you believe this method of encryption is more superior than its contemporaries.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analyze potential concerns for data loss

Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network. Explicate the potential impact of the three (3) selected concerns for data loss and data theft

  Create a brochure advertising

Brochure In this writing assignment, you will create a brochure advertising your services as a data repository. Research commercial data repositories

  Discuss the effective application of standard human

discuss the effective application of standard human resource practices in small to mid-sized manufacturing enterprises

  Explain the role of sensitivity analysis

Explain the role of sensitivity analysis in terms of understanding the properties of a model. In particular, address the issue of how variation in model inputs can be assessed, and why this is important.

  Strategic planning helpcomplete the strategic toolkit as it

strategic planning helpcomplete the strategic toolkit as it relate specifically to strategy implementation of the

  Analysis of a topic of information systems management

Description: Write a 5 page description and analysis of a topic of information systems management in an organization. Objectives: Identify a topic or issue of current interest related to the course. Learn how to search Library Catalogs, Databases and..

  Explain java program to print personal detailsdeliverable

explain java program to print personal detailsdeliverable length java code with comments and the class file.details

  Create query that will show members who have same address

Project Description: Matt Davis is a retired baseball player who runs the Baseball Academy, an indoor baseball facility for middle school, high school, and college players

  Effect on the security concerns surrounding personal data

The proliferation of mobile devices to create or access data has had a significant effect on the security concerns surrounding personal and corporate data

  Describe the privacy concerns with internet service provider

From the first e-Activity, describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand ISPs to take more of a proactive approach in detecting and protecting ag..

  How kudler could benefit from internet purchasing

Prepare a 3-5 page paper on how Kudler could benefit from Internet purchasing and how this new system and process would be potentially implemented

  Why are shares a source of system vulnerabilities

How does Microsoft Baseline Security Analyzer (MBSA) differ from Windows Update? Why are Shares a source of system vulnerabilities

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd