Comprehensive authentic assessment plan

Assignment Help Computer Networking
Reference no: EM13847309

Comprehensive Authentic Assessment Plan Deliverables

For this course AAP is a response for customer's RFP or customer's design requirements and type of solution used in network design. Typically a customer's RFP includes following topics.

• Business goals for the project
• Scope of the project
• Information on existing network
• Information on new applications
• Technical requirements, including scalability, availability, network performance, security, manageability, usability, adaptability, and affordability
• Warranty requirements for products
• Environmental or architectural constraints
• Training and support requirements
• Preliminary schedule with milestones and deliverables
• Legal contractual terms and conditions

Your AAP should include responses to all of customer's RFP and should include logical and physical component pf the design, information on technologies used in design solution, and proposal to implementing the design.

Design Requirements

Network Requirements

• Design & configure enterprise campus model design
o State of the art VoIP and Data Network
o Modular, scalable network
o Provide faster Network services
- LAN speed minimum 100 MB and Internet speed minimum 54 MB
o Use appropriate Cisco switch models
o Integrate voice and data network to reduce cost
o 100% connectivity with a minimum number of outside lines for dialing outside numbers.
o Access layers switches
- One port for each device
- Provision for 100% growth
o Server farm switches
- Assume 6 NIC cards in each server and one NIC card uses one port of switch
- Dual processors and dual power supply
- Centralize services and servers
o Built-in redundancy at:
- building core layer and building distribution layer and access layer
- workstation level
- uplinks connection to Building Distribution layer for Building Access layer
o Aggregate routing protocols with hierarchal IP scheme
o TCP/IP protocols for the network
- Guest network must support AppleTalk protocol

• Fast and secure wireless services in the lobby and two large conference rooms
o minimum 54 Mbps of bandwidth

• Video conference and multicast services

• Extra switch capacity at for authorized users to attach their notebook PCs to the network
o Port Security, Sticky MAC, 802.1x protocols to ensure only authorized systems

• IP addressing redesign that optimizes IP addressing and IP routing with IPv6 migration provisions
o Internal/External DNS
o Dual stack, 6to4 tunnel capability or NAT-PT for IPv6 transition

• Site-to-site VPN must be mutually authenticated and utilize cryptographic protection

• PSTN dial-up
o must authenticate with username and OTP
o RADIUS/NAP

• Based on equipment inventory and other requirements:
o Access Layer port count:
- 94 ports for phones, but by utilizing network port on phone this number can be reduced in half to 47. 47 additional ports will be needed for the extra phone in offices.
- 107 ports for desktop/workstation. In most cases a workstation will connect to a phone using the trunking capability of the access switch and the phone.
o Distribution/datacenter
- 240 ports (6 ports per server; 40 servers total)

Security Requirements

• Multilayer security or defense-in-depth security
o Smart card w/ PIN

• Classified Network
o Data Separation from Unclassified network
o Physical Security
- Locks / Smart Cards to access area/systems (multi-factor authentication)
o IPSEC
o No Internet Access
o No USB/Removable Media/Printers/CD Burners (disabled by GPO)

• Encrypted network must use SSL

• Public Servers
o HTTPS (SSL)
- Provide secure means of customer purchase and payment over Internet
o Inside DMZ
o NAT
o Identity Check (User authentication/ Certificate)

• Secure key applications and servers without using encryption on all devices

• Security policies in place to stop sniffing and man-in-the-middle attacks

• Data transmitted on the classified network must be cryptographically protected throughout the network

• Data crossing wide-area links should undergo another layer of cryptographic protection

• All devices must be mutually authenticated and cryptographic protection should be provided.

• Users should undergo periodic user awareness training program on network threats and good security practices
o Acceptable Use Policy to define appropriate user behavior and security configuration settings

• Resolve current security audit problems

• Physical security

• Email protection to protect unclassified and sensitive business emails

Active Directory Requirements

• Servers
o Centralize all services and servers
o Implement Failover cluster services
o File classification infrastructure feature
o IP Address Management (IPAM)
o DHCP (for employee systems)
o Exchange/Outlook (Sending and receiving e-mail)
o Windows Deployment Services
o File Server
- FSRM (quota & file screening)

• OU Infrastructure
o Role-Based
o Department-based OUs
o Global/ Universal/ Local groups
- Utilize least privileged principle for membership
- (delegate group ownership for adding/removing users)

• GPOs
o Bitlocker
o Configure Netscape or Microsoft's Internet Explorer
o Block removable media on classified network
o Create appropriate GPO and GPO policies

• Bitlocker
o BitLocker encryption technology for devices (server and Work station) disc space and volume
o Enable a BitLocker system on a wired network to automatically unlock the system volume during boot
o GPO enforced Used Disk Space Only or Full Encryption is used when BitLocker is enabled

• Enable BranchCache

• Implement Cache Encryption to store encrypted data by default.

Attachment:- Assignment.rar

Reference no: EM13847309

Questions Cloud

Explore the capacity for growth in a certain market sector : You could propose your company adopt new technology or conduct research on the customer base. Perhaps you believe they should explore the capacity for growth in a certain market sector. Perhaps you would like to proposethey develop a new product
What are the basics of multinational diversification? : What are the basics of multinational diversification?
Describe racial profiling and racially biased policing : Describe racial profiling and racially biased policing and explain why these phenomena have become significant issues in policing.
Roles small businesses play in most economies? : What roles do you think small businesses play in most economies?
Comprehensive authentic assessment plan : Comprehensive Authentic Assessment Plan Deliverables- For this course AAP is a response for customer's RFP or customer's design requirements and type of solution used in network design
A positive online learning experience created : a positive online learning experience created
Implement client-server communication : Write a java program implementing Client-Server communication using Remote Method Invocation.
Prepare journal entries to assign the preceding costs to job : Prepare journal entries to assign the preceding costs to jobs. Show the appropriate entries debiting Finished Goods Inventory and Cost of Goods Sold.
Analyze the concepts of nurse leadership and management : Analyze the concepts of nurse leadership and management with specific reference

Reviews

Write a Review

Computer Networking Questions & Answers

  Vpn access for employees to remotely access

Explain best option for VPN access for employees to remotely access the Ocper, Inc. network and describe your reasoning.

  Why do we pursue technologies

Why do we pursue technologies, such as those associated with virtual reality? Going back to one of our definitions of technology, what problem are we trying to solve? What are the risks associated with these technologies?

  Portable internet access and mobile internet access

xplain the difference between portable Internet access and mobile Internet access. Explain what VoIP is and how it works

  Two hosts, a and b, are separated by 20,000

two hosts, A and B, are separated by 20,000 kilometers and are connected by a link of R=2 Mbps, and there are 4 routers between A and B. Suppose the propagation speed over the link is 2.5*108 meters/sec, average queueing time is 2ms,

  Explain systems security certifications consortium web site

What are the areas addressed in CBK? Was policy explicitly listed? If not, where do you feel it is addressed in the CBK?

  How rtsp vary from http in-band-out-of-band traffic

Describe how does RTSP vary from HTTP (a) in sustaining client state information; (b) in terms of in-band, out-of-band traffic?

  What is a lan

A metropolitan area network, or MAN, is a network that's smaller than a typical WAN but larger than a LAN. Typically, a MAN connects two or more LANs within a same city but are far enough apart that the networks can't be connected using a simple c..

  Assume that you are an administrator for a growing company

imagine you are an administrator for a growing company. your company decides to purchase another company that designs

  Describe original classful address scheme

In original classful address scheme, was it possible to find out the class of the address from address itself? Describe.

  What should the subnet mask

How would you implement availability in this network? From an efficiency perspective, what should the subnet mask be for the connection between R1 and R2

  Securing the network

Securing the Network

  Telnet connection for remote use

Telnet connection for remote use-Describe specifically why you believe each of the items would be placed with the OSI reference model layer that you specified

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd