comprehensive-and-secure-solution-written
Assume you are a consultant for a local business that has asked you to propose an enterprise-wide solution that includes topology, network devices, IP infrastructure, and network security. The scenario is as follows:
A small accounting firm, ABC Accounting, Inc., landed a large account a year and a half ago that has already led the company to grow from five employees to 200 employees with expectations to employ 350 within a year’s time. In the face of continuing expansion, ABC plans to add offices in their current building that will span a total of three floors. At least one third of ABC employees have laptops and travel often.
All ABC employees have Windows 7 computers, which currently are not connected to the corporate Local Area Network (LAN).
You have been hired as a consultant to provide a detailed technical proposal that recommends a solution that addresses each of the detailed specifications that follow. Your solution regarding each specification should comprise a separate section of the body of your proposal.
Topology (type of network) and network devices
- ABC needs to set up a network and requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization.
- The company is looking for guidance regarding the type of network devices that will connect devices to the Local Area Network (LAN). Brand of device is not mandated. The company asks that you explain what internal and external networking components are required (explaining each and justifying WHY you chose the network devices you did).
- The network must have the capacity to:
- Connect all users to company resources (e.g. printers, scanners, and other items).
- Provide file sharing options.
- Manage these resources in a central location.
- Your proposal should include budgetary cost estimates for the chosen topology.
IP Infrastructure
- ABC has asked that you provide details regarding an IP structure (which includes static, DHCP, or the possibility of both, and proper IP Class assignment), which is mindful of the company’s expectation of continued growth.
Security
- Basic security has always been in place and now the company would like you to make this a more secure facility in hopes of protecting against internal and external security threats.
- Be sure to include details with respect to:
- Social engineering/internal threats
- Firewalls/switches
- VPN’s
- Authentication
- Security protocols
- Vulnerability assessment
Your submission should include each of the following sections, with each preceded by an appropriate heading:
- Introduction/Overview
- Table of Contents
- Body- Including a separate section for each numbered item in the specifications above
- Conclusion
- APA References
- Appendices- Any information you feel is appropriate to include
Your paper should be 8-10 pages in length and conform to CSU-Global Guide to Writing and APA Requirements. Include at least two scholarly references per section, as well as material from the Network Pro LabSim. The CSU-Global Library is a good place to find these references.
Note: Internet Explorer or Mozilla Firefox required for Labsim assignments. For more information and steps on how to access Labsim with Google Chrome, click here.