StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Assignment 1: Network Consultation for DesignIT - Coursework Example

Cite this document
Summary
The document presents design and architecture of computer network to be deployed as per the requirements provided by the DesignIT. The document suggests the hardware and software applications to be deployed and implemented in the DesignIT, along with the associated costs of the hardware and software. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Assignment 1: Network Consultation for DesignIT
Read Text Preview

Extract of sample "Assignment 1: Network Consultation for DesignIT"

Introduction The document presents design and architecture of computer network to be deployed as per the requirements provided by the DesignIT. The document suggests the hardware and software applications to be deployed and implemented in the DesignIT, along with the associated costs of the hardware and software. Moreover, the human resources required to deploy the network along with their costs and service cost. The wiring considerations (guidelines) are provided in the document for developing the Local Area Network (LAN) and Wireless Local Area Network (WLAN). The document contains the guidelines to be considered for implementation of the security (including Firewall and Antivius Software) while the deployment of the LAN. In the end, the document identifies the single point of failure and recommends the strategies to be utilized for the failure mitigation. Wiring Consideration The network design given below shows that the topology of the network is Star. Therefore, the cables from all the devices (computers, servers, wireless access points, etc.) would be terminated into the switch. The size of the space undertaken by the DesignIT is 56’ x 36’, therefore, after analysis it is determined that a roll of cable would be enough for connecting the computers, printers, servers, routers and wireless access points to the Switch. Moreover, it is recommended that the Design utilizes the cable of Category Five (Cat 5) for connecting the devices to the switch utilizing RJ45 connector. The following diagram shows the network design and architecture to be deployed in the DesignIT. Network Design and Architecture Hardware Options and Costs The following table shows the hardware already procured and configured by the DesignIT, but require re-location only. S # Hardware Software Quantity 1. Web Server Operating System: MS Server 2008, MS IIS Server 1 2. File Server Operating System: MS Server 2008 1 3. Application Server Operating System: MS Server 2008 1 The following hardware is required to purchase as per the requirements of the DesignIT. S. # Hardware Quantity Unit Price Total Price 1. Computer System 6 $700 $4,200 2. Wireless Access Point 1 $350 $350 3. Managed Switch (12 ports) 1 $1,800 $1,800 4. Firewall 1 $350 $350 5. Color Printers 3 $300 $900 6. Cable Roll 1 $300 $300 From the above table, it is evident that an amount of $7,900 is required for the required hardware equipment. Security Considerations In order to prevent the network and digital information either from an unauthorized access from the intruders or viruses and malware, there are various hardware and software required to be implemented. For instance, in terms of hardware, the Firewall and Intrusion Detection System (IDS) are used disallow the unauthorized persons to access information available over the network and sniff the network to detect the abnormal content trying to enter the network. However, on the other hand, it is recommended for the DesignIT to install the antivirus software applications to prevent the viruses to enter into the network. From the many available antivirus software applications, it is suggested that the DesignIT should install Symentic Endpoint Protection. Moreover, it is suggested that the company would implement a strong password policy. Software Options and Costs A wide range of software applications are available to install on the computer systems, however, it is suggested that the DesignIT may install only the required applications to avoid the cost overrun. As the document pertains to the network design, therefore, apart from the Operating Systems and Antivirus software applications, the DesignIT should install Microsoft Network Monitoring tool. The Micosoft monitoring tool would facilitate the DesignIT company to view, manage, analyze and capture the traffic on the network. Moreover, in order to monitor the internet speed, the DesignIT is recommended to install the BandWidthD tool (Tabana, 2013). It is pertinent to mention here that the document does not suggest any personalized and utility applications, therefore, the DesignIT can install them as per its requirements. An amount of $900 is required for software, The cost breakup of the software applications is as follows: S. # Software Quantity Unit Price Total Price 1. Operating Systems: MS Windows 7 6 $100 $600 2. Symantec Endpoint Protection, Antivirus Software (Licenses) 6 $50 $300 3. MS Network Monitor 1 Free 0 4. BandWidthD 1 Free 0 Costing There are mainly four (4) types of cost involved in the project include: hardware cost, software cost, human resource cost and service cost. The hardware and software costs are already illustrated above in the document. The labor (HR) cost is given below: S # Designation Consultation Fee 1. Network Manager $1,000/- 2. Network Administrator $800/- 3. Assistant Network Administrator (ANA) $500/- 4. Help Desk Assistance $300/- Total Cost Summary S # Cost Head Cost 1. Hardware / Equipement Cost $7,900/- 2. Software Cost $900/- 3. Human Resource Cost $2,600/- 4. Service / Operating Cost (internet access) $300/- Total $11,500/- Single Point of Failure It is evident from the design and architecture of the network that the Star topology is used for deployment of the network. And in the Star topology, the biggest issue is the single point of failure i-e if the central device (Hub / Switch / Router, however, the ‘Switch’ in our case) fails, the whole network does not work. Therefore, in our case, as the ‘Switch’ is utilized to connect all the devices over the network, therefore, if the switch fails (central device) the network of the DesignIT fails to work. The single point of failure can be mitigated by implementation of redundancy. The redundancy refers to the provision of replica or using redundant software / hardware (or both) components. For instance, as the switch is the single point of failure, therefore, in order to mitigate, the DesignIT is required to install redundant Switches and upon failure, the other Switch starts to operationalize. In this regard, disadvantage of the Star topology can be mitigated, but it is pertinent to mention here that the cost would increase (Oracle, 2011). References Tabana, A. Z. (2013). The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins. Retrieved from: http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/ Oracle. (2011). Oracle Server Deployment. Retrieved from: http://docs.oracle.com/cd/E20295_01/html/821-1217/fjdch.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assignment 1: Network Consultation for DesignIT Coursework”, n.d.)
Assignment 1: Network Consultation for DesignIT Coursework. Retrieved from https://studentshare.org/information-technology/1649239-assignment-1-network-consultation-for-designit
(Assignment 1: Network Consultation for DesignIT Coursework)
Assignment 1: Network Consultation for DesignIT Coursework. https://studentshare.org/information-technology/1649239-assignment-1-network-consultation-for-designit.
“Assignment 1: Network Consultation for DesignIT Coursework”, n.d. https://studentshare.org/information-technology/1649239-assignment-1-network-consultation-for-designit.
  • Cited: 0 times

CHECK THESE SAMPLES OF Assignment 1: Network Consultation for DesignIT

Windows 7 Workgroup Consultation for Sally Chu

… Windows 7 Workgroup consultation for Sally Chu.... Keywords: UAC, user access controls, administrative users, users, Windows 7, workgroup, network Windows 7 Workgroup consultation for Sally Chu In order for Sally to grant all six of her administrative staff members the same computer-access privileges, to allow them to run applications and use network printers, but not be able to make any accidental changes that can adversely affect their computers, the most effective and efficient way to create user accounts for these employees would be as follows....
4 Pages (1000 words) Assignment

Network Management

The paper "network Management" tells us about ProPrint PLC.... It is a company engaged in providing full-service color printing.... It operates nationally and currently employs staff with diverse needs.... hellip; The CEO.... Ian Kruger is aware that the company must invest and exploit IT to remain competitive and to expand its customer base....
9 Pages (2250 words) Assignment

Network Topology Design

This is a tremendous growth rate which is a pointer to effective management, security, and integrity of the network that the technology oriented company has employed so far.... Additionally, the company projects a… This requires a network topology that is stable, secure, and integral. For the first ten employees of the company, a ring topology proves to be very effective; this topology holds all the employees equal thereby allowing them equal network Topology Design The company has grown from ten to a hundred employees in one year....
1 Pages (250 words) Assignment

Network Topology Design

In the current speedy and constantly advancing technological world, designing of a high quality network topology is always a very crucial subject of concern (Karris, 2009).... In essence, a quality network topology design results into in a computer network configuration that… On this regard, this paper lays major emphasis on designing quality network topologies via an account of an account of a company that has been experiencing aggressive expansion every year. It is vital to note network Topology Design Executive Summary In the current speedy and constantly advancing technological world, designing of a high quality network topology is always a very crucial subject of concern (Karris, 2009)....
1 Pages (250 words) Assignment

Network Design for non-adjacent Floors

A paper "network Design for non-adjacent Floors" reports that the equipment required is one router, two switches, cat5 twisted cable, servers, six servers and a firewall....  … In the design of this network, many considerations are put into place to avoid interfering with the tenant on floor four while minimizing the costs of the system.... The junction of the network wire from the fifth floor is vertically in line to that on the third floor....
4 Pages (1000 words) Assignment

Network Management Structure

network ManagementDefinition: network management consists of different aspects of network monitoring and control.... A network management system performs among other things the task/service of configuration of the network, guaranteeing its proper network ManagementDefinition: network management consists of different aspects of network monitoring and control....
6 Pages (1500 words) Assignment

Computer Networking Analysis

… 12/04/2008IntroductionA computer network is a connection of more than one computer; this is done in order to share the files.... Any device that is connected to the network is called a node.... Networks are categorized depending on its purposes and 12/04/2008IntroductionA computer network is a connection of more than one computer; this is done in order to share the files.... Any device that is connected to the network is called a node....
7 Pages (1750 words) Assignment

Network Access Control

network access controlWith growth of technology, it is almost impossible today for business enterprises to face real system threats via malicious access, poor configuration or misuse.... It is estimated that 20% of systems that are managed are already network access controlWith growth of technology, it is almost impossible today for business enterprises to face real system threats via malicious access, poor configuration or misuse.... network access control is a security solution designed to curb security threats and ensure compliance by putting in place IT security protocols prior to network access....
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us