Fiction corporation a large national retail chain of 10000

Assignment Help Computer Networking
Reference no: EM13380123

Fiction Corporation, a large national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.

The data in the center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hours a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation's operations and profitability. From the data processing viewpoint, the move includes 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.

The network consists of approximately 500 remote location retail stores connected via frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the entire organization. The retail operations also run WLANs that are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers also need to monitor the status of remote systems. The SNMP management system must be able to detect and report failure of the remote system or its communications link and the status of individual applications.The company wishes a seamless migration that minimizes impact to its customers and employees. Any gaps in this background will require you to make sound technical and persuasive assumptions that satisfy the customer's goals that are within the budget guidelines.

You were selected in part due to your detailed analysis and agreement to an implementation cost that will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is the availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers.

Include the following in your assignment:

1. Title page
2. Table of contents
3. Executive summary
4. Project goal
5. Project scope
6. Design requirements:
a. Business goals
b. Technical goals
c. User communities and data stores
d. Network applications

7. Current state of the network
8. Logical design
9. Physical design
10. Results of network design testing
11. Implementation plan with a project schedule
12. Project budget with a return on investment calculation
13. Design document appendix

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

1. Thoroughly developed a network design document and plan that includes title page.

2. Thoroughly developed a network design document and plan that includes table of contents.

3. Thoroughly developed a network design document and plan that includes executive summary.

4. Thoroughly developed a network design document and plan that includes project goal.

5. Thoroughly developed a network design document and plan that includes project scope.

6. Thoroughly developed a network design document and plan that includes design requirements:
a. business goals
b. technical goals
c. user communitiesand data stores
d. networkapplications

7. Thoroughly developed a network design document and plan that includes current state of thenetwork.

8. Thoroughly developed a network design document and plan that includes logical design.

9. Thoroughly developed a network design document and plan that includes physical design.

10. Thoroughly developed a network design document and plan that includes results of network design testing.

11. Thoroughly developed a network design document and plan that includes implementation plan with a project schedule.

12. Thoroughly developed a network design document and plan that includes project budget with a returnon investment calculation.

13. Thoroughly developed a network design document and plan that includes design document appendix.

Reference no: EM13380123

Questions Cloud

Part cstate chart diagram draw a state chart that models : part cstate chart diagram draw a state chart that models the operation of the tape recorder which is described below.a
Draw a uml class diagram that models the aspects of a real : draw a uml class diagram that models the aspects of a real estate agents business that are described below.bullthe
1give reasons why the process of requirements elicitation : 1.give reasons why the process of requirements elicitation and validation is an iterative one?2.what roles does the
1 whenever a thread references a part of the virtual : 1 whenever a thread references a part of the virtual address space that is not currently loaded in the primary memory
Fiction corporation a large national retail chain of 10000 : fiction corporation a large national retail chain of 10000 employees and 500 retail outlets is migrating its one
You have been asked to be the project manager for the : you have been asked to be the project manager for the development of an information technology it project. the system
You have been asked to be the project manager for the : you have been asked to be the project manager for the development of an information technology it project. the system
Describe the network management software components side : describe the network management software components. side server components middleware components and northbound
As part of the auditing team in capacity of a digital : as part of the auditing team in capacity of a digital forensics expert your task is to prepare a report explaining the

Reviews

Write a Review

Computer Networking Questions & Answers

  Analyse four security procedures that are recommended to

analyse four security procedures that are recommended to protect computer software from corruption and

  Describe different networks which you access average day

Describe at least three different networks (computer or data communications) which you access or interact with on an average day.

  Case studythe ip version we are all using nowadays in our

case studythe ip version we are all using nowadays in our corporate networks and in the internet is ip version 4 short

  Determine mean time to spend frame to another station

Determine the mean time to spend frame of 1000 bits to another station, measured from beginning of transmission to end of reception? Suppose propagation speed of 100 m/μs.

  Assume there are n nodes

Assume there are N nodes connected to a wireless access point (AP) operating on IEEE 802.11b, and every node has at least one packet to send at a given time.

  Adoption of an enterprise security framework

How is the adoption of an enterprise security framework helpful for developing an enterprise security policy and how does Donn Parker's model compare with the X.805 framework?

  Dissect an email you have received first get the original

dissect an email you have received. first get the original ascii text of the email including the headers and the blank

  Computing ip addresses per subnet

How many IP addresses would they have per subnet?

  What are the characteristics of tcp-ip- http protocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols?

  Describe the features and benefits of csma-cd

For the purposes of this question you do not need to know about the token access method. You just want to explain the features and benefits of CSMA/CD.

  What is the type of block of the abbreviated ipv6 address

list the networking and communication devices required, including the IP addresses, product numbers, the cost of each and the approximate total cost.

  Find finish actual packet completion-order of transmission

Arrival at time t = 1, length 3; arrival at t = 2, length 1. Buffer 3: arrival at time t = 3, length 5. You need to find out the finish tag, order of transmission and actual packet completion times for each packet arrival.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd