Foundation in developing the network design

Assignment Help Computer Networking
Reference no: EM13188979

Fiction Corporation, a large national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.

The data in the center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hours a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation's operations and profitability. From the data processing viewpoint, the move includes 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.

The network consists of approximately 500 remote location retail stores connected via frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the entire organization. The retail operations also run WLANs that are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers also need to monitor the status of remote systems. The SNMP management system must be able to detect and report failure of the remote system or its communications link and the status of individual applications.The company wishes a seamless migration that minimizes impact to its customers and employees. Any gaps in this background will require you to make sound technical and persuasive assumptions that satisfy the customer's goals that are within the budget guidelines.

You were selected in part due to your detailed analysis and agreement to an implementation cost that will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is the availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers.

Include the following in your assignment:

1. Title page
2. Table of contents
3. Executive summary
4. Project goal
5. Project scope
6. Design requirements:
a. Business goals
b. Technical goals
c. User communities and data stores
d. Network applications

7. Current state of the network
8. Logical design
9. Physical design
10. Results of network design testing
11. Implementation plan with a project schedule
12. Project budget with a return on investment calculation
13. Design document appendix

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

1. Thoroughly developed a network design document and plan that includes title page.

2. Thoroughly developed a network design document and plan that includes table of contents.

3. Thoroughly developed a network design document and plan that includes executive summary.

4. Thoroughly developed a network design document and plan that includes project goal.

5. Thoroughly developed a network design document and plan that includes project scope.

6. Thoroughly developed a network design document and plan that includes design requirements:
a. business goals
b. technical goals
c. user communitiesand data stores
d. networkapplications

7. Thoroughly developed a network design document and plan that includes current state of thenetwork.

8. Thoroughly developed a network design document and plan that includes logical design.

9. Thoroughly developed a network design document and plan that includes physical design.

10. Thoroughly developed a network design document and plan that includes results of network design testing.

11. Thoroughly developed a network design document and plan that includes implementation plan with a project schedule.

12. Thoroughly developed a network design document and plan that includes project budget with a returnon investment calculation.

13. Thoroughly developed a network design document and plan that includes design document appendix.

Reference no: EM13188979

Questions Cloud

Leadership affect ethical environment within organization : How does leadership affect the ethical environment within an organization? What role do you think the personal morals of a CEO plays in the handling of an organization's ethical problems?
What is the expected value for the insurance policy : A 28-year-old man pays $157 for a one-year life insurance policy with coverage of $140,000. If the probability that he will live through the year is 0.9994, what is the expected value for the insurance policy?
What is the width of the frame : a picture frame measures 12 cm by 40 cm, and 288cm^2 of picture shows. what is the width of the frame?
Explain using economic concepts and terms how its occurring : Globalization and global trade have led to increased competition in world markets and increased allocation of scarce resources. Is it accurate to say that this is contributing to increased consumer surplus and reductions in inflationary pressures.
Foundation in developing the network design : The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.
Show that the fourier transform of the complex exponential : show that the fourier transform of the complex exponential signal e^(+jwt) is one peak in the positive spectrum at the angular frequency w use the inverse FT formula.
What is the cartesian product a b c : What is the Cartesian product A B C , where A is the set of all airlines and B and C are both the set of all cities in the United States?
What compounded annual increase in the cost of first-class : In 1885, first class postage for a one-ounce letter cost $0.02. The same postage in 2011 costs $0.46. What compounded annual increase in the cost of first-class postage has been experienced over this period of time
Why should businesses have continuity of operations plan : What impact-both negative and positive-did September 11th have on the private sector as it applies to preparedness, prevention, response, and recovery to catastrophes or security incidents? How did September 11th change organizational attitudes towar..

Reviews

Write a Review

Computer Networking Questions & Answers

  Find which domain name is available for company

Suppose the role of the IT consultant to new nonprofit organization, Free Flu, which provides flu shots to elderly. Organization requires a domain name. Use Internet resources to find out which domain name is available to company.

  Acknowledge technoogy-s polypotency

Richard Sclove argues that we must do more to acknowledge technoogy's 'polypotency.' What does this term mean, why does Sclove think that it is significant to acknowledge this characteristic of technology?

  Developing the network design

The Fiction CEO has informed you that the capital budget cannot exceed $500,000 and must not interrupt business operations. What follows is a brief overview that will serve as your foundation in developing the network design.

  How long does it take to send file over circuit-switched

How long does it take to send a file of 640,000 bits from host A to host B over a circuit-switched network? All links are 1.536 Mbps Each link uses FDM.

  Access control is handled during routing process

Access control is handled at ____ layer during routing processrouter consults a list of rules before forwarding incoming packet to determine whether a packet meeting certain criteria.

  Expected time to find passwords using dictionary attack

Determine the expected time to find all users' passwords using dictionary attack? suppose that eight more characters were added to password and that DES algorithm was changed so as to use all 16 password characters.

  How many times message m is modified before destination

When a message travels from source to destination through two routers, how many times the message M is modified before it reaches to the destination as M. Show your work to determine this number.

  Explaining multiple mono-alphabetic substitution ciphers

Consider improved version of Vigenere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic substitution ciphers are used.

  Wireless technologies to access various network resources

The following are the four main wireless technologies used to access various network resources: Radio wave, Infrared. Explain three advantages and three disadvantages of each of these wireless technologies.

  A rural medical centre in australia

A rural medical centre in Australia plans to improve its services to the community by providing telemedicine and healthcare. The centre has 4 doctors working at a given time and some patients travel over 100km to see a doctor.

  Intercepting the message in conversation

Provided that Alice and Bob both suppose that they have the correct public keys for the other party, and supposing that Eve may intercept any messages passed between Alice and Bob, Describe the steps Alice could take in order to ensure that the pub..

  Write a temperature conversion program usin constructor

Write a temperature conversion program. The GUI and event handling setup should be done in the constructor of the class that implements the GUI.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd