Unit 10 Assignment Network Assessment Guidelines Identify the primary types of media employed. Be sure to include both how the computers individually co

Unit 10 Assignment Network Assessment Guidelines

Identify the primary types of media employed. Be sure to include both how the computers individually connect into the network devices as well as how network devices interconnect and how the connection to the Internet is achieved. Briefly explain the purpose in the network of each type of media employed.
Identify at least two specific points where you think noise or other signal integrity issues may be impacting the infrastructure. For each, identify at least one appropriate strategy for error prevention to address the issue.
Identify all network devices utilized, describe them, and explain the purpose of each in the network.
Identify all items (peripheral devices, data, applications, access points, etc.) being shared by users on the network. Explain how each is shared.
Identify the connection to the Internet WAN. Identify the media, devices, and service providers involved in establishing this connection. Describe what protocols/services are being implemented over this connection.
Identify the forms of security utilized. Be sure to consider physical as well as electronic security. For electronic security, be sure to include items like virus checks, firewalls, and encryption protocols employed in addition to any access controls. Explain how each helps to secure the network. IT 331 – Technology Infrastructure

Unit 10 Assignment

Your Name Here
Due Date Here

Information Infrastructure Network Project Scenario

Current Network

My cousin, Kyle Gavotte, owns and manages a speciality products manufacturing company, Gifts of Fortune Enterprises. The warehouse, a one-story 1200 sq. ft. building, is located in Midtown. He has 20 employees, five in the main office and 15 in the warehouse. His current network supports five desktop computers in the main office and one laptop and connected dot matrix printer in the warehouse. Each computer is running Windows 7 Pro. There is one laser printer that is connected to Kyle’s assistant’s computer. The other employees often email the assistant their print jobs. They usually get their printouts within four hours of the request.
 Kyle and his assistant’s computers are the only ones with Internet connection directly from the router switch provided by the ISP, Nation Online (NOL). There is an older (from 1999) 8-port switch that connects all of the workstations and laptop so that they can share files in a peer-to-peer network configuration. In terms of security, Kyle makes sure to lock the doors at night, other than that he has not considered security for his operations. He thinks there may be a firewall on the router supplied by the ISP, but is not sure what it does. He is very concerned that competitors might steal his customer and product information.

New Network Needs

Things are going very well for Gifts of Fortune Enterprises. Kyle wants to expand his business to include an e-commerce website and school fundraiser division. With the increase in sales he will need to find 14 more warehouse employees, two more office staff employees, and 3 field sales reps that can place order electronically. The school fundraiser division will need to have a separate warehouse/office location as space is tight now in the current location. It cannot be located next to the current location. Kyle is prepared to spend some money to bring his network into a high-performance state that will easily facilitate his employee’s efforts and all his business processes.
Kyle has a contract signed with an application development consultant in order to develop a CRM database/application that will be used to track customers and fulfill orders. He also plans to add an integrated central accounting application. He has been told that he will need new servers but is not sure what they are or how to build a network around them. Currently his applications are a combination of single user Access databases and Excel Spreadsheets. He is not sure about Cloud based services and SAAS but he feels that they lack security and so he is very hesitant to use them and definitely wants his own network including private email and access control features.
He needs your help in upgrading the company network. He looks forward to your complete analysis as well as a comprehensive proposal including some detailed cost breakdowns on equipment.
You decide to apply what you know about ITIL to ensure that your cousin gets the service he deserves.

For this assignment you will complete the following questions in an MS Word Document in APA format. Double space your work and use Sans-Serif Font. This worksheet is formatted in Arial 11-point font. You must include both a separate cover and reference page. Delete the yellow highlights for text and screenshot placement. They are for guidance only and should not be included in your finished document. Delete the question headings if they are adding significantly to the Turnitin Similarity score.

Using the following Information Infrastructure Network Project Scenario and the guidelines you will find below this scenario:
· Analyze this network and create an assessment of the current operation of the network – Keep security considerations at the forefront of your analysis. Suggested 2 pages.

· Use your assessment, to determine what changes should be made to the network, in order to better meet the needs of those who utilize that network.
· Use a problem/solution format table to highlight your findings.
· Suggested 1 table with at least five (5) problem solution combinations.

· How would you solve the problems of this network?
· Write a proposal to make three (3) or more changes to the network.
· Keep security considerations at the forefront of your proposal. Suggested 2 pages

Submit both the network assessment and the project proposal to the Dropbox in a single APA formatted Word document which includes both cover page and references.

Read the Scenario in the instructions.

Part A: Network Assessment

Your network assessment should compile, update, and synthesize the information that you have about the network. It should include details of the current usage and configuration (media, devices, addressing, and communications) for the network.

Network Assessment Guidelines

A.  The assessment compiles, updates, and synthesizes the information about the network. It includes details of the current usage and configuration (media, devices, addressing, and communications).

1. Identify the primary types of media employed. Be sure to include both how the computers individually connect into the network devices as well as how network devices interconnect and how the connection to the Internet is achieved. (Include the examples).

Place text here.

2. Identify at least two specific points where you think noise or other signal integrity issues may be impacting the infrastructure.

Place text here.

3. Identify all network devices utilized, describe them, and explain the purpose of each in the network.

Place text here.
4. Identify all items (peripheral devices, data, applications, access points, etc.) being shared by users on the network.
Place text here.

5. Identify the forms of security utilized. Be sure to consider physical as well as electronic security. For electronic security, be sure to include items like virus checks, firewalls, in addition to any access controls.

Place text here.

Part B: Problem/Solution Table

Your problem solution table should highlight the major deficiencies with the current network and provide a concise solution for each. Include future considerations in relation to the New Network Needs Section of the scenario in problem/solution format. Especially consider all aspects of security for the network and infrastructure.

a) Problem solution tables identify all major issues (see above) and propose reasonable solutions.

Place table here.

Part C: Proposal Document

The proposal should address the problems or deficiencies identified in the network assessment and should meet the specific, assessable project goals. The proposal should contain the following sections.

Project Justification – Explain why this project is important for best meeting user needs. Be sure to explain why the current infrastructure is inadequate to meet the user needs in addition to explaining the needs and their importance in general.

Place text here.
Project Goals – Be sure that each of your goals is specific. Explain how each relates to the overall need. Explain the success criteria for identifying if the goal is met.
Project Goals:
· Are specific.
· Relate directly to the overall needs identified for the network.
· Success criteria clearly identified.

Place text here.

Considerations – List factors such as cost, compatibility with other parts of the network infrastructure, availability of resources, usability, long-term supportability, etc. which will play into choosing the best solutions to meet each goal. Explain each factor and what limitations it presents. (Use a table)

Consideration
· Cost considerations addressed.
· Compatibility of network components addressed.
· Availability of resources addressed.
· Usability addressed.
· Long-term support explained and limitations listed.

Place text/Table here.(Example of Table)

Cost

Compatibility

Availability

Long-Term Support

Limitations

Goal options –

Goal 1 Options – Based on the infrastructure options that have been discussed in class, describe at least three possible options for meeting the first project goal. Include advantages and disadvantages of each, and relate these advantages to the goal itself and to the other considerations identified.
Place text here.

Goal 1 Proposed Solution – Explain what option you recommend for goal 1 and explain why.
Place text here.

Goal 2 Proposed Solution – Explain what option you recommend for goal 1 and explain why.

Place text here.

Goal 3 Proposed Solution – Explain what option you recommend for goal 1 and explain why.

Place text here.

Solution Summary – Briefly describe how the solutions for each of the goals fit together with one another and how they fit into the overall infrastructure. Also provide a cost estimate and project schedule estimate for implementing all of these solutions.
Solution Summary
· Each Goal Solution is clearly defined and explained.
· Summary reflects how solutions fit into overall infrastructure.
· Cost and schedule estimates presented.
· ITIL management practice identified and added

Place text here.

Impact – Describe how this infrastructure change will impact the network infrastructure overall as it relates to all user needs not just to the need specifically addressed by the goals of this project. Are there any additional benefits? Are there any areas where functionality is impaired or other issues may arise?
Impact
· Impact of infrastructure change is described.
· Impact of infrastructure change is described.
· Changes are related to the needs specifically described in the listed goals of the project.
· Additional benefits are listed.
· Any impairments are listed.

Place text here. (Optional Table)

References

The paper must be written in your own words. APA style formatting (sans serif fonts), a cover page, and a reference page are required. Cite all references used and include them on the reference page.

How to reference a website in APA style

Structure: Last Name, A. (Year, Month Date Published). Article title.
Site name URL

Example: Jones, A. (2018, March 25). More on operating systems.
https://www.os.com

How to Reference a Group in APA style 7th ed.

Structure: Group name. (Year, Month Date). Title of page. Site name. URL

Example:

American Society for the Prevention of Cruelty to Animals. (2019, November
21). Justice served: Case closed for over 40 dogfighting victims.
https://www.aspca.org/news/justice-served-case-closed-over-40- dogfighting-victims

How to reference a book in APA style

Structure: Last Name, B. (Year Published). Book Title. Publisher Name.
DOI (if available)
Example: Rathbone, A. (2018). Windows 10 for Dummies. John Wiley &
Sons. Hoboken, N.J.

How to cite a source in APA style in the body of your responses

Structure: (Last Name, Year Published).
Example: (Dean, 2017).

Sans Serif Fonts are included in the following text.

For more information on APA style formatting, go to APA Style Central under Academic Resources of this course or visit the Writing Center. (Georgia 11-point)

Review the university policy on plagiarism. (Times New Roman 12-point)

If you have any questions, please contact your professor. (Lucida Sans Unicode 10- point)

Examples of sans serif fonts: 11-point Calibri, 11-point Arial, and 10-point Lucida Sans Unicode as well as serif fonts such as 12-point Times New Roman, 11-point Georgia, 10-point Computer Modern.

References

Looking for this or a Similar Assignment? Click below to Place your Order