Create a cost analysis and develop proposal for the company

Assignment Help Computer Networking
Reference no: EM13810723

Assignment: Network Consultation for DesignIT

This assignment contains two (2) Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to complete this assignment.

The owners of DesignIT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. DesignIT is a graphic arts company that, up until now, had contracted work out to temporary design services. The new space will allow them to hire two (2) full time designers and a receptionist.

Description of space purchased:

  • 4 Cubicles
  • 1 Office
  • 1 Server room
  • 1 Reception desk
  • 1 Conference room

Below is the design of the space purchased:

1188_space.png

If the design doesn't show it should be in the attachments.

Using the building layout, your role is to provide DesignIT with a network design that interconnects the following considerations:

  • DesignIT plans to relocate three (3) servers already configured as follows:
    • 1 Web Server - Microsoft IIS Server
    • 1 File Server - Microsoft Server 2008
    • 1 Server - Server 2008 Small Business Server
  • DesignIT has requested that the design include the following:
    • High speed Internet access
    • Firewall
    • Antivirus / malware protection
    • Six (6) computers
    • Three (3) color laser printers
    • Wireless access for portable devices
  • DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance.

Section 1: Network Consultation Proposal

Create a cost analysis, and develop a proposal for the company.

  1. Write an five to seven (5-7) page proposal in which you:
    1. Recommend one (1) suitable network design.
    2. Suggest one (1) network architecture.
    3. Suggest LAN and Wireless LAN (WLAN) wiring considerations.
    4. Recommend hardware options and costs.
    5. Suggest security considerations for:
      1. Firewall
      2. Antivirus software
    6. Recommend software options and costs.
    7. Outline the labor costs, equipment costs, and service costs for your suggested design in table format.
    8. Identify the single point of failure, and recommend potential mitigation strategies.
    9. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: Network Consultation Presentation

Use Microsoft PowerPoint or an open source alternative to present your findings to the client.

  1. Create a five to ten (5-10) slide presentation in which you: 
    1. Outline the recommendations from your written proposal in Section 1.
    2. Provide general speaking notes that you would use to highlight non-visual content.

Reference no: EM13810723

Questions Cloud

What were some of basquiat''s inspirations : 1) What were some of Basquiat's inspirations for his paintings? 2) How did Basquiat's paintings evolve during his short but prolific career? 3) What made Basquiat different from other artists of his generation? (Please cite evidence from the document..
The use of performance enhancing drugs : An opposition research paper on the use of performance enhancing drugs in major league baseball. How come they use it, what factors benefit ticket sales, what do crowds want to see in a game. need 5 resources APA citation.
Rationale for identified target population : Rationale for identified target population
Socially responsible investments in the northwest : Heres a bit of background information we didnt cover in our phone conversation KMS Financial Services, Inc. has been in business since 1971 and is one of the largest Northwest based independent investment firms we offer one of the widest selections o..
Create a cost analysis and develop proposal for the company : This assignment contains two (2) Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to complete this assignment. Create a cost analysis, and develop a proposal for..
Provide a tentative outline of the paper : Explain what the issue is with the topic and explain your stance on it, state the thesis statement ( a complete sentence ), provide a tentative outline of the paper, and an explanation of why the topic chosen.
Analyze marketing strategies in reaching markets : Analyze marketing strategies in reaching markets with their products or services - Continue with a detailed description of marketing management strategies used in the implementation of the marketing plan.
Define project management : Define project management and explain its importance to the business world. Explain project life-cycle management and the benefits of project management to an organization.
Determine strategies to resolve conflict within organization : Determine strategies to resolve conflict within organizations

Reviews

Write a Review

Computer Networking Questions & Answers

  Case study on ping sweeps and port scans

Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your asses..

  Find out rtcp bandwidth will sender be allocated

Let RTP session comprising of four users, all of which are sending and receiving packets to same multicast address. Find out RTCP bandwidth will each sender be allocated?

  Asymmetrical digital subscriber line and wi-fi

Describe the specific modulation techniques that are used in a 56K modem, Asymmetrical Digital Subscriber Line, and Wi-Fi.

  Design the network for this new building

Two server rooms have been allocated, one on the first floor and one on the second floor. Your task is to design the network for this new building with the following criteria: Student-accessed computers should be on separate network from the staff-ac..

  Hackers system

I believe the hackers were able to break into their systems online rather than the pos. It is probably more risky to go into a store and use some type of card or product to hack into the system.

  What logical topologies are supported on an ethernet network

What logical topologies are supported on an Ethernet network and What is the purpose of the backoff on Ethernet networks

  Describe how a user could discover that his isp is doing

Suppose further that this ISP is deliberately dropping 25% of the packets used in its competitors VOIP system when those packets are going through this ISP's routers. Describe how a user could discover that his ISP is doing this

  1how is a network layer protocol different from a transport

1.how is a network layer protocol different from a transport layer protocol?2.into which class of networks do the

  Define switched backbone networks

You are the network administrator for a small manufacturing firm that runs Ethernet. You are currently using hubs and repeaters for connectivity but have decided to upgrade to a Layer 2 (L2) switched infrastructure.

  What is the time spent in the listening

What is the time spent in the listening and learning states called? The time between each BPDU sent on a port is called which of the following

  Bob has a host computer with an ip address of 100110024

bob has a host computer with an ip address of 10.0.1.10024 with a default gateway of 10. host network is connected to

  Project descriptionsauthentic assessment you will be given

project descriptionsauthentic assessment you will be given a scenario-based project that will require you to provide

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd