Network infrastructure upgrade, Computer Networking

Assignment Help:

Network Infrastructure: This project will require replacement of major networking components throughout the office. Virtualization will result in increased speed and reliability for employees.

Current business needs revolve around making our company more efficient. Efficiency is currently held back due to aging and obsolete network components. These issues are highlighted by specific problems employees are experiencing such as slow network connections, spotty wi fi coverage within office building, and the fact that the current server has reached maximum capacity, no longer allowing any further users to authenticate with it.

Opportunities with this project are summarized by increased efficiency for employees which will result in greater productivity. These upgrades, if met with a successful implementation plan should translate to increased satisfaction with our customer base and the capacity to add to that base, making the company more profitable in the long run.

Details of the proposed infrastructure upgrade are as follows. Changing of  the current backbone wiring to fibre optic cable will improve data transfer speed capabilities. Replacing hubs with switches will allow each individual network card to transmit data simultaneously rather than waiting its turn. Improving wi-fi coverage through the use of higher spec routers will increase the coverage and significantly reduce the likelihood of dropped connections. By upgrading the current servers we will expand the capacity of our network, allowing more users to authenticate.

Problem:
Issues with implementing this project include the downtime endured while the network is upgraded.  When the components are being replaced the communications within the company will be significantly hindered.  Therefore it is imperative that we have backup systems in place so that we can still utilize effective communications.

Budget Information:
Cost: $100,000
Benefits: $290,000
Cashflow: $190,000
NPV: $153,435
Payback: Year 2
ROI: 163%


Related Discussions:- Network infrastructure upgrade

Explain simple mail transfer protocol, Q. Explain Simple Mail Transfer Prot...

Q. Explain Simple Mail Transfer Protocol? Electronic Mail -Simple Mail Transfer Protocol (SMTP) is used to support email on the Internet -Addressing consists of two pa

State the security concerns, State the Security concerns The history of...

State the Security concerns The history of security concerns is not new. They have been of great worry to man and for many centuries man has been endeavouring to devise new tec

Packet sizes, Large data packets result in fewer load because a smaller par...

Large data packets result in fewer load because a smaller part of the packet is used for header information. Optimum networks use 4kB data packets or larger. Large data packets

Distinguish among client process and server process, QUESTION (a) Expla...

QUESTION (a) Explain briefly what is meant Client-server Computing? (b) Distinguish among client process and server process (c) What are the four basic characteristics of

Explain about gigabit ethernet, Gigabit Ethernet Data rate of 1000 ...

Gigabit Ethernet Data rate of 1000 Mbps or else 1 Gbps Typically implemented as full-duplex with no CSMA/CD 1000Base-X utilizes long-wave optical fiber (1000Base-

On which languages intranet works, On which languages Intranet works ...

On which languages Intranet works Language Support The Intranet works on the basis of scripts written in any of the following languages, viz., SGML, HTML, DHTML, XML, AS

Data alignment in processor arrangements, Data Alignment Arrays are ali...

Data Alignment Arrays are aligned to templates by the ALIGN directive. The ALIGN directive is used to align elements of different arrays with each other, indicating that they s

Give the description of security tools, Give the Description of security to...

Give the Description of security tools Software are coming up in which the user can select the kind of security measure required to be taken for encryption. One such example is

Transmission robustness and security, Transmission robustness and security ...

Transmission robustness and security Unless properly designed, a wireless LAN might be interference prone and simply eavesdropped. The design of a wireless LAN must allow relia

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd