Demonstrate logical reasoning and decision-making skills

Assignment Help Computer Engineering
Reference no: EM133511724

Assignment: Project: Network Design and Plan

Purpose

This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation at various levels. You will play the role of an employee participating in network design and planning of a specific business situation.

The following tools and resources are needed to complete this project:

1. A web browser and access to the Internet to perform research for the project
2. (Optional) A tool for creating basic network diagrams, such as draw.io or Microsoft PowerPoint

Learning Objectives and Outcomes

1. Apply core competencies learned throughout the course to a single project.
2. Analyze and apply knowledge of firewalls, VPNs, and other network defense measures.
3. Demonstrate logical reasoning and decision-making skills.

Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs' services to solve problems involving malware removal,to manage data recovery and network issues, and to install hardware and software.

Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.

You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Task

The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the course Syllabus for submissiondates.

I. Project Part I: Network Design
II. Project Part II: Firewall Selection and Placement
III. Project Part III: Remote Access and VPNs
IV. Project Part IV: Network Design Report

Project Part I: Network Design

Scenario

The Corporation Techs' current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4).The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company's business goals and has determined the features and functions required to meet those goals.

The senior network architect has asked you to create a network design that includes the following components:

1. Current infrastructure elements
2. A logical topology that separates the Accounting and Sales departments
3. Redundant communications
4. Justification for continuing with IPv4 or upgrading to IPv6

Tasks

For this part of the project, perform the following tasks:

A. Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.

B. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.

C. Include a high-level plan that ensures communications are available 24/7.

D. Recommendwhether to continue using IPv4 or upgrade to IPv6, and explain why.

E. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network.The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.

F. Create a draft report detailing all information as supportive documentation.

G. Cite sources, where appropriate.

Project Part II: Firewall Selection and Placement

Scenario

The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.

Tasks

For this part of the project, perform the following tasks:

A. Research and select firewalls for the Corporation Techs network.

1. Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.

2. Address network, server, and workstation firewalls.

B. Describe a plan for creating a DMZ, and explain how it makes the network more secure.

C. Research network authentication and create a high-level plan for secure authentication to internal network resources.

D. Create a draft report detailing all information as supportive documentation.

E. Cite sources, where appropriate.

Project Part III: Remote Access and VPNs

Scenario

As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.

The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

Tasks

For this part of the project, perform the following tasks:

A. Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.

B. Recommend any other forms of remote access that are relevant and describe how they would be used.

C. Create a draft report detailing all information as supportive documentation.

D. Cite sources, where appropriate.

Project Part IV: Network Design Report

Scenario

You are ready to create and submit a final network design and plan to the senior network architect, who will present it to senior management and other decision makers.

Tasks

For this part of the project, perform the following tasks:

A. Create a final network diagram that includes the basic diagram and all relevant network enhancements.

B. Create a professional report that includes content from each draft report. Include detailsfor all relevant information, persuasive justification for your recommendations, and methods to measure the success of each major network enhancement. Include a 1- to 2-page executive summary.

C. Use simple, clear language that primary stakeholders (non-IT) can understand easily.

Reference no: EM133511724

Questions Cloud

How would you identify and manage stakeholders : A software development project has many stakeholders. How would you identify and manage stakeholders for your software development project?
Health disparities and inequities in the realm of psychiatry : What would you do differently in a patient with Alcohol Abuse Disorder? Reflect on one social determinant of health according to the HealthyPeople
Describe bounded rationality in the context of decision : How would you describe bounded rationality in the context of decision-making during a natural disaster or terrorist incident? Does limited time, incomplete
What are mediational processes that actualizes modelling : What are the four mediational processes that actualizes modelling? Be as clear as possible in your discussions.
Demonstrate logical reasoning and decision-making skills : ISOL 532- Analyze and apply knowledge of firewalls, VPNs, and other network defense measures. Demonstrate logical reasoning and decision-making skills.
Identify the moral concerns values or the moral issue : Identify the moral concerns/values or the moral issue. Important clues include conflicts between two or more values or ideals. Is there a question of trust?
Discuss how you plan to be involved in your state : Discuss how you plan to be involved in your states governance and/or advocacy for APRNs. Include at least two references from an official state or government
What systems would be your primary focus : order of priority for what systems would be your primary focus when this family is rescued from the collapsed apartment building in Florida
What role does interpol have in criminal intelligence : Do you believe it is important for the United States to continue to work with entities such as the United Nations to improve the effectiveness of intelligence

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd