Wan to connect all of their government buildings

Assignment Help Basic Computer Science
Reference no: EM13926708

CNT4704 Final Project

A. The city of Hastings, KY wants to set up a secure WAN to connect all of their government buildings. They also want to provide free and secure wireless access to the residents that live within the downtown city limits (the free wireless access should provide access to the residents of local government services and general Internet access). The city currently uses leased lines through the local phone company to connect the 10 government buildings. They also want to provide access to the schools in the city; 5 elementary schools, 2 middle schools, and 2 high schools. The total student population is approximately 9,600. By setting up their own WAN they expect to save at least 50% over the cost of the leased lines that they currently utilize. Below is a map of the city with the government building locations, and the schools. The T1 lines, there is only 1 line that connects the buildings in the sequence shown (blue lines), cost $347 per month per connection (each building has at least 1 connection, some have 2 - each in and out is one connection). When you recommend a new solution, consider redundancy/fault tolerance, cost, and suitability for the city.

B. Below is a list of the hardware and software that is currently installed in their network:
a. City Hall is the "hub" for the network. It has 2 CISCO Layer 3 Switches that support 96 users (48 ports per switch), and 2 CISCO 5900 Routers, one is a backup.
b. The other sites have3 CISCO 24 port switches that supports approximately 50 users per site. Each site also has a CSU/DSU for the T1 line, and a CISCO 2900 router.
c. The city has 10 Dell Rack Mount Servers at City Hall, running Windows 2003 Server with Active Directory.
d. The other sites have 2 Dell Rack Mount Servers that each are running their own Active Directory Tree. The A.D. structure is NOT integrated across the network.
e. All offices are running Windows XP on the machines (total of 550 computers). They have held off on upgrading to Windows 7, but realized that they may need to upgrade the systems.
f. The city does not have wireless access except for inside City Hall, and it is restricted to employees only (uses WAP and each employee has a unique employee ID to login).

C. The WAN relies on the Internet provider (Comcast) for all of the TCP/IP configuration and uses DHCP servers to assign local addresses to the computers.

D. Your job, is to determine the following:
a. What type of media (cable, could be wireless) could the city use to connect the sites. The sites are no more than ½ mile away from each other.
b. What hardware upgrades would they need, and would you suggest to the network (both at the LAN and WAN level).
c. What would you recommend that the city uses for its Wireless WAN access across the 10 mile radius of the city center (which encompasses all of the buildings in the diagram)? Make sure to show the coverage, including a site survey (once again, you will have to investigate coverage of each wireless router).
d. When recommending equipment for the wireless public network, what type of configuration would you recommend?
e. Come up with a price list for the project. Assume that consulting costs are $150 per hour, and installation and configuration costs are $100 per hour. Estimate the number of hours (you will need to guess) that it would take to implement your solution, be very specific on the number of hours for each task, including planning.
f. Write up your recommendations in report format, with diagrams of the changes and recommendations. Include equipment lists, software upgrades that you recommend, etc. Your report MUST include a Gantt chart, complete expense report (with ROI, payback, etc), and alternatives (don't just list 1 solution).
g. The final report should be about 10 pages long (plus or minus 2 pages).
h. You may work in groups NO larger than 3! I will let you pick your groups, but if you don't decide quickly, then I will randomly assign you to a group by the end of the second week.

Reference no: EM13926708

Questions Cloud

Crafting a compensation and benefits plan : Now that you have considered how to recruit and retain the employees you want in your organization, create a compensation and benefits package using this business proposal format. The package must be consistent with the objectives of job satisfact..
What are the similarities between options and warrants : What are the similarities and differences between options and warrants? What variables are important in determining call option prices?
Are the alternatives truly distinguishable : These costs will normally include hardware, software, and labor costs not already identified as capital costs.
What is the food problem that the author is addressing : What is the title of your article and who is the author? What FOLDER in the Unit 3 readings folder did your article come from?
Wan to connect all of their government buildings : The city of Hastings, KY wants to set up a secure WAN to connect all of their government buildings. They also want to provide free and secure wireless access to the residents that live within the downtown city limits (the free wireless access shou..
Calculate the conversion value of the bonds : Calculate the conversion value of the bonds if Bradford's common stock is selling for $35 per share. Calculate the straight-bond value, assuming that straight debt of equivalent risk and maturity is yielding 11 percent.
Sources of strength for an analytics competitor : How can a company become and prosper as an analytics competitor? What are the sources of strength for an analytics competitor?
What is a dollar and percentage annualized gain : Shares to T rise to $44; B stays at $30. A sells 1.5 B short for $45 and goes long on T at $44. One month later the deal is completed with B at $30 and T at $45. What is A's dollar and percentage annualized gain, assuming a required 50% margin and..
Comprehensive juvenile justice strategy : What are the benefits of a comprehensive juvenile justice strategy? What aspects of a comprehensive strategy contribute to those benefits? What are the drawbacks to implementing a comprehensive juvenile justice?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  A graph is two-connected iff

A graph is two-connected iff, removal of any single vertex and the edges adjacent to that vertex, leaves the graph connected. How can we tell if a graph is two-connected? Explain your algorithm in English

  What are the instruction format

What are the instruction format and the equivalent assembly instruction of 0x21080040(with steps)?

  What is the output of the following oddstuff method

What is the output of the following oddStuff method?

  Explain compiler assign subcomputations

How would you have compiler assign 14 subcomputations to 15 cores? Describe briefly. (Symmetry means there is no unique answer).

  Explaining relationship of strategic and tactical plans

Descriibe in scholarly detail relationship of strategic, tactical, and operational plans,

  Research the tcp protocol and choose one tcp

TCP is a reliable transport protocol. Research the TCP protocol and choose one TCP topic and write a tutorial, detailed instructions on the use of an IP related topic .  If the topic you have chosen has already been discussed in CSEC640 Module1, enha..

  Explaining it acquisition issued request for proposal

A federal agency that does not use IT acquisition best practices issued a request for proposal that requires the contractor selected to use such practices, including certification at CMMI Level 3 or above.

  Communication links on the telephone network

The time delay of a long-distance call can be determined by multiplying a small fixed constant by the number of communication links on the telephone network between the caller and callee. Suppose the telephone network of a company named RT&T is a fre..

  What are some of the unique features that become available

What are some of the unique features that become available when either the forest or the domain is changed to the 2008 functional level? What about 2008 R2? What features are lost when moving to either of the 2008 functional levels?

  How lseek call makes a seek to file

Where lseek call makes a seek to byte 3 of file. What does buffer comprise after the read has completed?

  How to make the mail secure

How to make the mail secure As introduced in the proposal instruction, a proposal should include the following parts (more details see: https://people.ok.ubc.ca/rlawrenc/teaching/writingProposal.html):

  Process of preparing the truth table

After the fourth clock pulse, the machine has to be again in the reset state, ready for the next sequence. Minimize the number of states needed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd