Identify five specific business requirements

Assignment Help Management Information Sys
Reference no: EM132240954

Introduction

This is an individual project. The target audience will be the organization's senior leadership, the founders. The Case Study deliverable is an MS Word document.

Case Study

Company Overview

FractalApps is a software development start-up. It was founded by three friends who went to undergrad school together at the University of Maryland. They founded their startup recently and set up headquarters at the condo of the two founders in Washington, DC. They have focused their attention on mobile app development and have developed and successfully marketed a popular app for job seekers. Now they are expanding their company into a full-fledged software development house.

They have recently received a cash infusion from an angel investor in Silicon Valley and are ready to build out their business. Their plan is to have three locations: a small headquarters in DC where the founders and senior staff reside, a sales office based in NYC (Brooklyn), and a development house in San Francisco where the bulk of the developers live and work.

They are looking for you to develop a network design for their business. They are seeking a standardized LAN design (using consistent hardware/software) for the three offices, and a cost-effective WAN design that allows all of their staff to communicate and collaborate quickly, efficiently, without a lot of network delay. The network should support both their voice and data needs.

Further, they require a secure way for mobile workers to remote in to the network and participate as if they were in the office. Many of the sales staff are in the field, as well as the development staff who want to be able to work practically anywhere. A VPN solution is what they are seeking but need guidance on what the hardware/software requirements are.

The Deliverable

Using this case study, you are to identify a minimum of five (5) requirements, analyze them, and offer a proposal that provides FractalApps with a converged network solution and explains how the components of the solution, and the solution as a whole, meet the identified requirements.

The proposed solution must address each of the requirements identified. At least one networkdiagrammust be incorporated to illustrate your proposed solution.

You should do some research to address the cost issues and defend the proposed solution from a cost-benefit perspective. This is to be a general analysis of the benefits versus the cost of a converged network, not a full cost-benefit analysis with cost data.

1. Identify five specific business requirements that relate to the design and implementation of the network.

2. Define the cabling for the local area network(s); define the network components in the local area network and explain your reasoning for selecting each of these.

3. Define the wide area network infrastructure (technology); define the network components in the wide area network and explain your reasoning for selecting each of these.

4. Define the VPN components (hardware/software) for the organization. Explain what components go where, and what is required on the mobile devices. Justify your recommendation.

Your deliverable will be a 4 - 5-page Microsoft Word document. The page count includes the diagram(s), but does not count the cover page and references page.

At least two (2) external sources (other than the assigned readings and other course materials) must be used, and citations and references must be in APA format.

Reference no: EM132240954

Questions Cloud

Discuss culturally inappropriate leadership behavior : Discuss culturally inappropriate leadership behavior that might be counterproductive. Your response should be at least 200 words in length.
Opportunity cost of a year of college : What was her opportunity cost of a year of college? How does it compare to your opportunity cost of a year of college?
Ignorant moralism is more or less objectionable : Might we have ethical reasons to suspect that economically ignorant moralism is more or less objectionable than morally callous economism?
Describe two reasons why perfectly competitive markets : Describe two reasons why perfectly competitive markets maximize economic efficiency.
Identify five specific business requirements : Identify five specific business requirements that relate to the design and implementation of the network.
Why some people have suggested that the shift of investment : Why some people have suggested that the shift of investment firms from being partnership to being corporations contributed to the financial crisis?
Distinguish between a market economy and a command economy : Distinguish between a market economy and a command economy and discuss 1 policy implemented by China to move from a command to a market economy.
Create a spreadsheet that takes eight values : Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate.
Emotional aspect to question four : Yes, there is an emotional aspect to question four. For example, if people see a little inflation instead of deflation

Reviews

Write a Review

Management Information Sys Questions & Answers

  Applying information security and sdlc to business

Applying Information Security and SDLC to Business

  The differences exist between men and women in negotiation

Explain fully and clearly from academic journal article research what types of differences exist between men and women in negotiation?

  Explain a policy monitoring and enforcement strategy

Explain a policy monitoring and enforcement strategy for organization. Describe legal implication of ISS policy enforcement after modified policies are adapted.

  The solution to supply chainmanufacturers have to establish

the solution to supply chainmanufacturers have to establish parameters for what is to be produced and in what quantity

  Demonstrate the successful creation of a simple web database

Demonstrate the successful creation of a simple web database application using your choice AWS databases, and free tier web application servers.

  Recognize potential security breaches and computer crimes

Appraise the individual and organizational consequences of the use of information technology, and recognize potential security breaches and computer crimes.

  Spread of surveillance technology threaten privacy

Technology and Privacy and With this thought in mind: "Does the Spread of Surveillance Technology Threaten Privacy?"

  Evaluate the effectiveness of is professionals

CIS 502 : Analyze the way in which CIP has or has not advanced between the releases of the DHS' NIPP and the NIST's Framework for Improving Critical Infrastructure Cybersecurity. Justify your response.Describe the vulnerabilities that should conce..

  What are some security concerns when using mobile code

Explain the following terms: boot sector virus, meme virus, stealth virus, multipartite, macro virus, script virus, and tunneling virus

  Design a program for a state university

Design a program for a state university. The university needs a website design that will enable students to order books online.

  Explain the prison population trends in the united states

Identify the different types of offenders in the corrections system. Explain the prison population trends in the United States.

  Select a system-software development life cycle

Select a System/Software Development Life Cycle (SDLC) model and methodology then apply this model and methodology to an Information Technology (IT) project. You can choose a project you have worked on while working or a project that you worked ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd