Create a technical proposal for a network services

Assignment Help Computer Networking
Reference no: EM13755944

You will create a technical proposal for a Windows Server-based set of network services given the simplified RFP (Request for Proposal) provided below. The submission will be in a written format with a length of at least 1000 words (not counting diagrams, quoted passages, or other attachments) and with at least one diagram created by you. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course.

Proposal Requirements

Below are the requirements for the proposal itself. Details about the technical content that must be covered are in the RFPlater in this document.

Level of Detail for the Proposal

The proposal must leverage Windows Server 2008/2008 R2 for all of the components.

All of the topics listed below must be addressed. The solution must be a unified design.

The design should be detailed and specific. This is a technical proposal rather than a research paper.

All significant technical decisions should be explained - why was each decision made versus alternatives?

The proposal should focus on the technical aspects of the solution and the reasoning for those decisions. Any financial, scheduling, manpower or other similar content is allowed and optional, but it won't be counted towards the 1000-word minimum.

Even though it's not necessary to include financial content, decisions should still take into consideration that costs should be kept reasonable and that you should limit excessive waste. Please note that providing redundancy to support high availability is rarely considered wasteful.

The proposal must respond to the questions in the RFP.

Reference no: EM13755944

Questions Cloud

Department of homeland securitys mission : Interpret the Department of Homeland Security's mission, operations and responsibilities. Detail the Critical Infrastructure Protection (CIP) initiatives, what they protect, and the methods we use to protect our assets
Explain the effects in terms of the income effect : What type of agency problem is involved here and why would Marriott worry about the quality of hotels it doesn't own but franchises?
What decisions did roosevelt make at the yalta conference : What decisions did Roosevelt, Churchill, and Stalin make at the Yalta Conference?
Create a technical proposal for a network services : You will create a technical proposal for a Windows Server-based set of network services given the simplified RFP (Request for Proposal) provided below
Create a technical proposal for a network services : You will create a technical proposal for a Windows Server-based set of network services given the simplified RFP (Request for Proposal) provided below
How did reformers try to end government corruption : How did reformers try to end government corruption and limit the influence of big business?
Where in the line did rawlinson choose his attack and why : Where in the line did Rawlinson choose his attack and why?
Write the proper sequence of activities in the design : Write the proper sequence of activities in the design of a video rental database. The initial ERD is shown in above (or refer to textbook figure 9.9). The design must support all rental activities, customer payment tracking, and employee work sche..
Describe the organizational authentication technology : Identify and describe the organizational authentication technology and network security issues. Make a list of access points internal and external (remote)

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain why asynchronous i/o activity is a problem

Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem -

  Business processes ultimately drive type of cable media

Business processes and needs ultimately drive the type of cable media and hardware you select. What factors might determine how we select which ones are appropriate for our organization?

  Install backbone to connect four base-t ethernet lans

You have been hired by a small company to install backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub) and to give a connection to Internet. Develop simple backbone and determine total cost.

  Why is it critical to label patch cables-ports and data jack

What do you consider the single most important reason to pay attention to faulty terminations and excessive horizontal wiring spans? Why is it critical to label patch cables, ports, and data jacks?

  The irreducible polynomial is the one used

Compute in  GF (28): ( x 4+ x +1) / ( x 7+ x 6+ x 3+ x 2) , where the irreducible polynomial is the one used by AES, P ( x )= x 8+ x 4+ x 3+ x +1.

  Installing the nmap security scanner

Downloading and Installing the Nmap Security Scanner: Nmap is a port scanner. It sends packets to the target and monitors the responses to discover what network services are listening on that computer. It is a favorite tool for security profession..

  Implementation and emulate one of algorithms or protocols

Implement and emulate one of algorithms or protocols which is explained in textbook in Java or C (C++). Evaluate network performance of different protocols.

  Describe file system principles and interpret the system

Identify, and describe the advantages, disadvantages, organization and functions of the major components of a modern operating system.

  Mpls over ip solution or form of long-haul ethernet

What occurs if office in Baton Rouge, Louisiana, also should be connected to both Memphis and Laramie at a rate of 512 kbps? Which solution is cheaper now?

  A computer that can test 2^40 keys each second

Given a computer that can test 2^40 keys each second. What is the expected time to find a key by exhaustive search given a key space, say 2^88. How do you go about figuring this out? Is there a formula or standard equation that is used?

  Lan and wireless lan wiring considerations

Section 1: Network Consultation Proposal-Suggest LAN and Wireless LAN (WLAN) wiring considerations. Recommend hardware options and costs

  Volatility plugins and ida

Describe Volatility plugins and IDA

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd