Provide the detailed response to the network design request

Assignment Help Computer Networking
Reference no: EM13781127

The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word and will be between 10-15 pages with graphics embedded within the document.

Background

You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP company, you recently made a persuasive presentation of your company's approach to designing networks at a large industry event. The CEO of Fiction Corporation, a large retail chain, was impressed by your presentation. It looks like you've finally got your break! You have a small team of 10 technically proficient staffers with a strong background in project management, networking, and internetworking skills that include PMP, Network+, CCNP, and CISSP credentials.

You have been selected by Fiction Corporation to develop a network design document and plan without an RFP.

Overview

Fiction Corporation, a large national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.

The data in the center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hours a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation' s operations and profitability. From the data processing viewpoint, the move includes 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.

The network consists of approximately 500 remote location retail stores connected via frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the entire organization. The retail operations also run WLANs that are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers also need to monitor the status of remote systems. The SNMP management system must be able to detect and report failure of the remote system or its communications link and the status of individual applications.

The company wishes a seamless migration that minimizes impact to its customers and employees. Any gaps in this background will require you to make sound technical and persuasive assumptions that satisfy the customer's goals that are within the budget guidelines.

You were selected in part due to your detailed analysis and agreement to an implementation cost that will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is the availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers.

Include the following in your assignment:

1. Title page

2. Table of contents

3. Executive summary

4. Project goal

5. Project scope

6. Design requirements:

a. Business goals

b. Technical goals

c. User communities and data stores

d. Network applications

7. Current state of the network

8. Logical design

9. Physical design

10. Results of network design testing

11. Implementation plan with a project schedule

12. Project budget with a return on investment calculation

13. Design document appendix

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM13781127

Questions Cloud

Laaser understanding of sexual addiction : What does Laaser believe are some of the roots of sexual addiction? Explore how the dynamics of your family of origin and personal underlying beliefs about sex may affect your ability to treat persons with sex addiction.
Influence of learning in the classroom : what ways can the teacher use the data from assessments to influence learning in the classroom?
Management information systems : Management Information Systems.
Influence the processes of memory : How can damage to Broca's or Wernicke's area affect speech? From speech patterns, how can you differentiate between which area was affected? How can this affect the quality of life?
Provide the detailed response to the network design request : The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word and will be between 10-15 pages with graphics embedded within the document.
Write a book review on tony dungee''s the mentor leader : Write a Book review on Tony Dungee's The Mentor Leader- Secrets to building people and teams that win consistently.
Shortage situation and defend your recommendations : Butler Systems in your text Purchasing and Supply Chain Management - Propose what potential actions should be taken to mitigate the battery shortage situation and defend your recommendations.
Describe a situation in which a lower number for that ratio : 1. The lecture says that some ratios typically are better when they are higher and some of the ratios are better when they are lower. Pick a ratio for which a lower number typically would be preferred and describe a situation, in which a higher numbe..
Write an essay about how does advertising affect our lives : Write an argumentative essay on How does advertising affect our Lives and the world around us?

Reviews

Write a Review

Computer Networking Questions & Answers

  Compare the two tools encase and ftk

Compare the two tools EnCase and FTK. Discuss the advantage or disadvantage of each tool.

  Interested in social networks

Social Networks.Facebook has over one billion subscribers (The total population of the world is just over 7 Billion). Please think about the following questions and discuss them with your fellow students.

  Managing access to an active directory environment located

How do you plan to recover from these types of loss of current AD DS and other critical information. What utilities might you investigate to help accomplish your plan

  Question 1examine the concept of data information and

question 1examine the concept of data information and knowledge in information warfare.question 2the progression of

  Explain why you would propose connecting all current and

you are a recently hired consultant for a ncf the networking consulting firm and your first consulting assignment is at

  How you implement a firewall solution for organization

Describe how you implement a firewall solution for a large organization with only system (end point) firewalls (i.e., Microsoft XP firewall). Explain the challenges of not having a firewall which is centrally located at the network's core and not ..

  Explain the basic components and media of network systems

Explain the basic components and media of network systems and summarize current networking standards and how standards bodies and the standardization process impact networking technology.

  Why does keeping good records help in managing your network

Prepare a 350 to 1,050 word paper that answers fully discusses the topic questions: Why does keeping good records help in managing your network

  Electromycycle a manufacturer of a new electric motorcycle

electromycycle a manufacturer of a new electric motorcycle has chosen you to design a new network that will let the

  Difference between symmetric and public key system

What is the most important difference between a symmetric key system and a public key system and in what way does a hash function provide a better message integrity check than a checksum

  Computing successive values of congestion window

Determine successive values of congestion window in bytes?

  An organizations head office is connected to its branch

an organizations head office is connected to its branch office over the internet. the network connection works fine

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd