Provide the detailed response to the network design request

Assignment Help Computer Networking
Reference no: EM13781127

The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word and will be between 10-15 pages with graphics embedded within the document.

Background

You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP company, you recently made a persuasive presentation of your company's approach to designing networks at a large industry event. The CEO of Fiction Corporation, a large retail chain, was impressed by your presentation. It looks like you've finally got your break! You have a small team of 10 technically proficient staffers with a strong background in project management, networking, and internetworking skills that include PMP, Network+, CCNP, and CISSP credentials.

You have been selected by Fiction Corporation to develop a network design document and plan without an RFP.

Overview

Fiction Corporation, a large national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.

The data in the center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hours a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation' s operations and profitability. From the data processing viewpoint, the move includes 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.

The network consists of approximately 500 remote location retail stores connected via frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the entire organization. The retail operations also run WLANs that are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers also need to monitor the status of remote systems. The SNMP management system must be able to detect and report failure of the remote system or its communications link and the status of individual applications.

The company wishes a seamless migration that minimizes impact to its customers and employees. Any gaps in this background will require you to make sound technical and persuasive assumptions that satisfy the customer's goals that are within the budget guidelines.

You were selected in part due to your detailed analysis and agreement to an implementation cost that will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is the availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers.

Include the following in your assignment:

1. Title page

2. Table of contents

3. Executive summary

4. Project goal

5. Project scope

6. Design requirements:

a. Business goals

b. Technical goals

c. User communities and data stores

d. Network applications

7. Current state of the network

8. Logical design

9. Physical design

10. Results of network design testing

11. Implementation plan with a project schedule

12. Project budget with a return on investment calculation

13. Design document appendix

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM13781127

Questions Cloud

Laaser understanding of sexual addiction : What does Laaser believe are some of the roots of sexual addiction? Explore how the dynamics of your family of origin and personal underlying beliefs about sex may affect your ability to treat persons with sex addiction.
Influence of learning in the classroom : what ways can the teacher use the data from assessments to influence learning in the classroom?
Management information systems : Management Information Systems.
Influence the processes of memory : How can damage to Broca's or Wernicke's area affect speech? From speech patterns, how can you differentiate between which area was affected? How can this affect the quality of life?
Provide the detailed response to the network design request : The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word and will be between 10-15 pages with graphics embedded within the document.
Write a book review on tony dungee''s the mentor leader : Write a Book review on Tony Dungee's The Mentor Leader- Secrets to building people and teams that win consistently.
Shortage situation and defend your recommendations : Butler Systems in your text Purchasing and Supply Chain Management - Propose what potential actions should be taken to mitigate the battery shortage situation and defend your recommendations.
Describe a situation in which a lower number for that ratio : 1. The lecture says that some ratios typically are better when they are higher and some of the ratios are better when they are lower. Pick a ratio for which a lower number typically would be preferred and describe a situation, in which a higher numbe..
Write an essay about how does advertising affect our lives : Write an argumentative essay on How does advertising affect our Lives and the world around us?

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the impact of mobile devices on cybersecurity

The impact of the Internet on research methods of students and plagiarism in student papers. The impact of The No Child Left Behind (NCLB) Act on primary school education. The impact of mobile devices on cybersecurity.

  1 write a six to eight 6-8 page wireless deployment plan

1. write a six to eight 6-8 page wireless deployment plan for an education institution with a single campus but with

  Distinguish between local area networks wireless technologie

Identify hardware and software needed to secure your choice of networks against all electronic threats. Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies.

  Discuss the timestamp ordering protocol for concurrency

Discuss the timestamp ordering protocol for concurrency control. How does strict timestamp ordering differ from basic timestamp ordering

  Voip beneficial to an organization

Conduct Internet search to locate case study which illustrates how VoIP was beneficial to the organization. Why did organization need a VoIP solution?

  Explain why you would propose connecting all current and

you are a recently hired consultant for a ncf the networking consulting firm and your first consulting assignment is at

  Evolution of computer technology

Describe how concepts such as RISC, pipelining, cache memory, and virtual memory have evolved over the past 25 years to improve system performance.

  Information systems securitysuppose you are the it

information systems securitysuppose you are the it professional in charge of security for a small pharmacy that has

  Address type certification certification issue with company

Type-1 certification (TOP SECRET) focuses on Development Methodology. How would you address this certification issue with your hypothetical company (make up one for this problem) for your system

  Explain why asynchronous io activity is a problem with many

explain why asynchronous io activity is a problem with many memory protection schemes including basebounds and paging.

  Write ip range and network sizes in the subject line

Please write your IP range and network sizes in the subject Line. Or at least, write them in the first lines of your posting. This way we will not have to go back to the top of the discussion thread to see if your calculations were done correctly.

  Attacks on servers on one of company-s departments

After reading about attacks on servers like to ones used in one of company's departments, the CIO has asked you to come up with a report as to what.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd