Design and applying a range of appropriate deployment method

Assignment Help Computer Networking
Reference no: EM13922255

Scenario

NEXT GEN.INC is a multinational company operating across the globe and serving multiple nationalities. The main business that is carried out by NEXT GEN.INC is to offer customer services for various industries such as telecom and banking to the local and remote vendors. The company owns the network infrastructure including basic devices to an advanced range of expensive hardware / complex software and services which are often seen in an enterprise network model.

You are an IT Specialist in the IT Team of the company and have been given a responsibility to educate the new joiners doing their internship by creating a nesting plan. This training should involve theory as well as practical approach in order to describe all hardware / software / services that are used currently or proposed in the plan of the company.

Task 1

1.1 Discuss the technologies and security resources that support and are available in network infrastructure management by demonstrating the practical and conceptual usage by preparing the design and applying a range of appropriate deployment method of the following:

I. Identification of Networked Devices

II. Domain Name System (DNS)

III. Active Directory

IV. IP address assignment methods

V. Resource Management (user access level / service access level)

VI. Virtual Private Network (VPN)
P1.1, P2.1, P2.2, P2.3, P3.1, M2

1.2 Server Systems technologies capable of supporting and securing network infrastructure management by giving details on:
I. Firewalls
II. Bounded Media
III. Unbounded Media
IV. Remote Workstations
V. Encryption
VI. Authentication
VII. Certificate Authorities.
P1.2, P1.3

Task 2

2.1 Test and evaluate the implemented infrastructure system by reviewing:
I. Availability of all resources.
II. Assurance of valid group and user level access.
2.2 Maintain Documentation to have an effective approach to handle complex problems by:
I. Test Plan.
II. Test Results.
III. Analysis of the results.
P4.1, P4.2, M1

Task 3

On completion of these task it is of benefit to review your own performance to evaluate the grade to which the investigation and specification of tasks have been successful.

Prepare a critical evaluation that shows an analysis of your own performance in completing this assignment. You should also evaluate the extent to which the completed tasks were successful and present an appropriate structure / approach to be used in order to do improvements.

Reference no: EM13922255

Questions Cloud

Research a current trend in area of telecommunications : You are only required to submit a final paper and presentation. However, during the previous six weeks, you will be assembling the research paper and presentation. Feel free to post questions or portions of the paper for review at any time as an e..
Discuss the subject matter in the article : Discuss the subject matter in the article and interpret the results and what the confidence interval and the margin of error mean as they apply to the specific subject matter.
What are the main benefits of a lean system : Contrast push and pull methods of moving goods and materials through production systems. What are the main benefits of a lean system? What are the benefits and risks of small lot sizes?
Build and execute two programs requiring decisions : You will code, build, and execute two programs requiring decisions. The first program will determine the smaller of two numbers input on the screen. The second program will calculate the shipping charge based on the purchase amount input on the sc..
Design and applying a range of appropriate deployment method : Discuss the technologies and security resources that support and are available in network infrastructure management by demonstrating the practical and conceptual usage by preparing the design and applying a range of appropriate deployment method
Advance to subsidiary : Checking account balance $939,320; certificate of deposit $1,445,300; cash advance to subsidiary of $982,280; utility deposit paid to gas company $198. what is the cash balance.
Statistics and advertising : In Week 4, you explored ttests, which allowed you to compare a sample to a population or compare twogroups to one another. You analyzed a study about how visualization techniquesimpact how long it takes people with insomnia to fall asleep. But wha..
Design logic by drawing a flowchart and writing pseudocode : Examine the pseudocode that follows the introductory comments, then find and correct all the bugs. Correct all bugs in the file and be sure to clearly highlight the corrections.
Dobson manufacturing company : Dobson Manufacturing Company uses a job order cost system with manufacturing overhead applied to products on the basis of direct labor dollars. At the beginning of the most recent period, the company estimated its total direct labor cost to be $59,60..

Reviews

Write a Review

Computer Networking Questions & Answers

  What are some causes of the number of bytes

What are some causes of the number of bytes on the wire exceeding the number of bytes being captured. What are the source and destination MAC address in Frame 546

  How recommendations at cfo site help efforts

How could the articles or recommendations at the CFO site help your efforts? Are these subjects where we should be looking to for future investments?

  A residential heat pump uses the ground as an energy source

a residential heat pump uses the ground as an energy source. at a particular operating condition the heat pump delivers

  Network protocol exchange well-defined messages

Create a list of messages that you think would be necessary during server-client and client-client interactions. Do not rely on the implicit acknowledgement of Transmission Control Protocol (TCP) but provide a mechanism for an explicit acknowledgm..

  What is the required bandwidth for the transmission

Calculate the Network ID/Subnet ID of the host having an IP address 192.32.24.70 with a subnet mask 255.255.255.224. What would be the IP address of the 1st host and the last host of the subnet?

  What is the type of block of the abbreviated ipv6 address

list the networking and communication devices required, including the IP addresses, product numbers, the cost of each and the approximate total cost.

  Describe the osi model and how it relates to a network

Describe the OSI model and how it relates to a network in 200 to 300 words. Your response must include answers to the following: On which layers of the OSI model do WAN protocols operate

  Describe threats to information security

Explain the relationship between privacy and IT. Describe some of the threats to information security and some of the measures you can take to protect information resources.

  Problem on subnet masking and designing small networks

Subnet masking and designing small networks for fictitious organizations - provides system administration and networking services to organizations

  Give an illustration of a software system for which

question 1 give an example of a software system for which developing a prototype would result in saving a significant

  Use private ip addresses and share a connection you are

question use private ip addresses and share a connection. you are hired as the network administrator of a small startup

  Implementation plan to explain topology of network

Implementation Plan describing how this network will be implemented. In paper, explain the topology (both logical and physical) of network, network operating system, creation of user accounts, and security concerns.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd