Create a cost analysis

Assignment Help Management Information Sys
Reference no: EM131518449

This assignment contains two (2) Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to complete this assignment.

The owners of DesignIT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. DesignIT is a graphic arts company that, up until now, had contracted work out to temporary design services. The new space will allow them to hire two (2) full time designers and a receptionist.

Description of space purchased:

4 Cubicles

1 Office

1 Server room

1 Reception desk

1 Conference room

Below is the design of the space purchased:

Click here if you are having trouble viewing the above image.

Using the building layout, your role is to provide DesignIT with a network design that interconnects the following considerations:

DesignIT plans to relocate three (3) servers already configured as follows:

1 Web Server - Microsoft IIS Server

1 File Server - Microsoft Server 2008

1 Server - Server 2008 Small Business Server

DesignIT has requested that the design include the following:

High speed Internet access

Firewall

Antivirus / malware protection

Six (6) computers

Three (3) color laser printers

Wireless access for portable devices

DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance.

Section 1: Network Consultation Proposal

(Microsoft Word)

Create a cost analysis, and develop a proposal for the company.

Write an five to seven (5-7) page proposal in which you:

Recommend one (1) suitable network design.

Suggest one (1) network architecture.

Suggest LAN and Wireless LAN (WLAN) wiring considerations.

Recommend hardware options and costs.

Suggest security considerations for:

Firewall

Antivirus software

Recommend software options and costs.

Outline the labor costs, equipment costs, and service costs for your suggested design in table format.

Identify the single point of failure, and recommend potential mitigation strategies.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 1 of your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

Section 2: Network Consultation Presentation

(Microsoft PowerPoint or equivalent)

Use Microsoft PowerPoint or an open source alternative to present your findings to the client.

Create a five to ten (5-10) slide presentation in which you:

Outline the recommendations from your written proposal in Section 1.

Provide general speaking notes that you would use to highlight non-visual content.

The specific course learning outcomes associated with this assignment are:

Explain the basic components and media of network systems and distinguish between LANs, MANs, and WANs.

Summarize current networking standards and how standards bodies and the standardization process impact networking technology.

Describe the TCP / IP protocols and various functions among the application layer.

Contrast why different technologies are deployed in different contexts of networking, such as topology, bandwidth, distance, and number of users.

Explain and differentiate among network hardware devices and components.

Compare and contrast among network operating systems.

Describe security policy, practices, encryption techniques, and design considerations in support of business operations in a networked environment.

Explain the role of integrity and availability in a networked environment.

Use technology and information resources to research issues in computing networks.

Write clearly and concisely about introductory networking topics using proper writing mechanics and technical style conventions.

Reference no: EM131518449

Questions Cloud

Why did you spin counterclockwise rather than clockwise : Why did you spin counterclockwise rather than clockwise? Describe exactly when a lunar and solar eclipse would occur within your model
Securing cloud computing : What techniques are recommended for securing cloud computing? Do you agree with these recommended techniques? Why or why not?
Revenue from selling products is generally recognized by : The revenue recognition principle states that revenue is recognized when:
Identify the potential threats to the organic foods industry : Assignment: Conducting an Environmental Analysis- Identify the opportunities and potential threats to the organic foods industry by completing a SWOT analysis.
Create a cost analysis : Create a cost analysis, and develop a proposal for the company.Identify the single point of failure.
What advantages do vlans offer to the client : What advantages do VLANs offer to the client's network? Why not just subnet the network instead of using VLANs?
Identify key ways that apple’s progress report has changed : Summarize Apple's Supplier Responsibility information. Identify the key ways that Apple’s Progress Report has changed since last year.
How should employees report phishing attacks : How should employees report phishing attacks? Why is immediate reporting critical to stopping the attackers?
Research a recent or historic flood : Research a recent or historic flood. Write one paragraph that describes when/where it happened, factors that led to flooding and any measures

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss how the different systems used in the first question

Discuss how the different systems used in the first question are being handled and identify the systems being used in terms.

  When choosing a store or business

When choosing a store or business, select a medium or large operation as it will be easier to complete the assignment. Look at the information the store or business uses in their daily business operations and identity four (4) key security risks to t..

  What is denormalization

Explain how attributes are transformed into columns. What column properties do you take into account when making the transformations? The attributes become the columns of the relation and the identifier of the entity becomes the primary key of the r..

  What types of media are they using and who is their audience

What types of media are they using? Who is their audience? Briefly introduce the company you have chosen to research.

  What are the responsibilities of a chief information

1 write a 200- to 300-word response that addresses the followingwhat are the responsibilities of a chief information

  Write a paper which provides a description of the technology

Due to increasing concerns about data and system security, there are a number of emerging technologies addressing information assurance within an enterprise. The security officer in an enterprise must be aware of these new tools to ensure adequat..

  Measure success of it systems infrastructure-centric

measure success of it systems infrastructure-centric web-centric call center metricsin this module we focused on

  Cincinnatti software scheduling techniquecincinnatti

cincinnatti software scheduling techniquecincinnatti software which currently specializes in the installation of

  How it is possible for someone at minitrex to call customer

Explain how it is possible for someone at Minitrex to call a customer and not know (a) that this is a customer and (b) that this is the third time this week that they had been called?

  How changing business environment has affected the decisions

Explain how the changing business environment has affected the decisions team members' organizations have made in their use of information technology.

  Discuss functionality and efficiency of the complaint push

Compare and contrast the functionality and efficiency of the complaint-push model and data-pull model within the process of health care service delivery. Recommend a strategy improving the effectiveness of each method for delivering patient care.

  All companies have transaction processing systems

All companies have Transaction Processing Systems(TPS) . TPS serve many functions including order entry, inventory control, payroll and others. Most TPS work with large amount of data on a daily basis. The data provides the basis for future strate..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd