Comprehensive and Secure Solution

profileSleek Solutions
 (Not rated)
 (Not rated)
Chat

Comprehensive and Secure Solution

Assume you are a consultant to a local business that has asked you to propose an enterprise-wide solution that includes topology, network devices, IP infrastructure, and network security. The scenario is as follows:

A small accounting firm, ABC Accounting, Inc., landed a large account a year and a half ago that has already led the company to grow from five employees to 200 employees and expectations to employ 350 within a year’s time.  In the face of continuing expansion, ABC plans to add offices in their current building that will span a total of three floors. At least one third of ABC employees have laptops and travel often.

All ABC employees have Windows 7 computers, which currently are not connected to each other.

You have been hired as a consultant to provide a detailed technical proposal that recommends a solution that addresses each of the detailed specifications that follow. Your solution regarding each specification should comprise a separate section of the body of your proposal.

1.    Topology (type of network) and network devices

a.     ABC needs to set up a network and requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization.

b.    The company is looking for guidance regarding the type of network devices that will connect the machines together. Brand is not mandated. The company asks that you explain what internal and external networking components are required (explaining each and justifying WHY you chose the network devices you did).

c.     The network must have the capacity to:

                                                          i.          Connect all users to company resources (e.g, printers, scanners, and other items).

                                                        ii.          Provide file sharing options.

                                                      iii.          Manage these resources in a central location.

d.    All proposals should include cost elements. 

2.    IP Infrastructure

a.     ABC has asked that you provide details regarding an IP structure (which includes static, DHCP, or the possibility of both, and proper IP Class assignment) that is mindful of the company’s expectation of continued growth.

3.    Security

a.     Basic security has always been in place and now the company would like you to make this a secure facility to protect against internal and external security threats.

b.    Be sure to include details with respect to:

                                                          i.          Social engineering/internal threats.

                                                        ii.          Firewalls/switches.

                                                      iii.          VPN’s.

                                                      iv.          Authentication.

                                                        v.          Security protocols.

                                                      vi.          Vulnerability assessment.

Your draft proposal should include each of the following sections, with each preceded by an appropriate heading:

          i.          Introduction/overview

        ii.          Table of Contents

      iii.          Body, including a separate section for each numbered item in the specifications above

      iv.          Conclusion

        v.          APA References

      vi.          Any appendices you feel appropriate

All Academic papers should include a cover page with your name, date, school name, section, course name, and instructor name.

Support each of your four proposed elements by citing at least one credible source, which may be ITS310 module content, material from the Network Pro LabSim, and/or any credible outside source.  Your paper should be 8-10 pages in length with document and citation formatting.

The document will provide a complete network solution that covers the following:

  • Topology
  • Media
  • Network devices
  • IP infrastructure
  • WAN considerations
  • Network security
  • Documentation
  • Suggested network monitoring and optimization practices

 

 

 

    • 8 years ago
    A++ ANSWER 7 PAGES
    NOT RATED

    Purchase the answer to view it

    blurred-text
    • attachment
      comprehensive_and_secure_solution.doc