Network infrastructure upgrade, Computer Networking

Assignment Help:

Network Infrastructure: This project will require replacement of major networking components throughout the office. Virtualization will result in increased speed and reliability for employees.

Current business needs revolve around making our company more efficient. Efficiency is currently held back due to aging and obsolete network components. These issues are highlighted by specific problems employees are experiencing such as slow network connections, spotty wi fi coverage within office building, and the fact that the current server has reached maximum capacity, no longer allowing any further users to authenticate with it.

Opportunities with this project are summarized by increased efficiency for employees which will result in greater productivity. These upgrades, if met with a successful implementation plan should translate to increased satisfaction with our customer base and the capacity to add to that base, making the company more profitable in the long run.

Details of the proposed infrastructure upgrade are as follows. Changing of  the current backbone wiring to fibre optic cable will improve data transfer speed capabilities. Replacing hubs with switches will allow each individual network card to transmit data simultaneously rather than waiting its turn. Improving wi-fi coverage through the use of higher spec routers will increase the coverage and significantly reduce the likelihood of dropped connections. By upgrading the current servers we will expand the capacity of our network, allowing more users to authenticate.

Problem:
Issues with implementing this project include the downtime endured while the network is upgraded.  When the components are being replaced the communications within the company will be significantly hindered.  Therefore it is imperative that we have backup systems in place so that we can still utilize effective communications.

Budget Information:
Cost: $100,000
Benefits: $290,000
Cashflow: $190,000
NPV: $153,435
Payback: Year 2
ROI: 163%


Related Discussions:- Network infrastructure upgrade

command saves the configuration stored in ram to nvram, Which command save...

Which command saves the configuration stored in RAM to NVRAM Ans) copy running-config startup-config is the command which saves the configuration stored in RAM to NVRAM

What is two types of errors, Q. What is Two Types of Errors? Single-Bi...

Q. What is Two Types of Errors? Single-Bit Errors: Merely one bit in the data unit has changed Burst Errors of length 'n': 2 or more bits in the data unit have changed (

Subnetting (EIGRP), #questiGE 1-A Objectives: • Consolidate EIGRP knowle...

#questiGE 1-A Objectives: • Consolidate EIGRP knowledge. • Introduce the Route Redistribution concept. • Introduce the EIGRP External Routes concept. • Introduce the Default Met

Illustrate the advantages of VLANs, Q. Illustrate the Advantages of VLANs? ...

Q. Illustrate the Advantages of VLANs? - Cost and time reduction in moving stations from one group to another - Creation of virtual workgroups - Security Position of

What are intrusion detection systems, Question : a) Give three example...

Question : a) Give three examples of vulnerable services which are among the overwhelming majority of successful attacks. b) Name the five outside sources which can be the

Explain multipoint connection, Explain multipoint connection. A multipo...

Explain multipoint connection. A multipoint connection is a link among three or more devices. Historically, multipoint connections were used to attach central CPs to distribute

Tcp-ip routing architecture, Q. Explain TCP-IP Routing Architecture? ...

Q. Explain TCP-IP Routing Architecture? The TCP/IP routing architecture looks extremely much like the OSI routing architecture. Hosts utilize a discovery protocol to o

Multimode for transmitting optical signals, Q. Multimode for transmitting o...

Q. Multimode for transmitting optical signals? - Multiple beams from light source travel through core at different paths - Multimode step-index fiber Density remains

Briefly describe three security requirements of an agent, QUESTION (a) ...

QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar

Show v.32 standard, Q. Show V.32 standard? - ITU-T's V.32 standard was ...

Q. Show V.32 standard? - ITU-T's V.32 standard was issued in 1991 for asynchronous and full-duplex operation at 14.4 Kbps. V.32bis - Is an extension of the V.32 technology?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd