For more classes visit
www.snaptutorial.com
Assignment 2: XYZ Company Troubleshooting and Maintenance Plan
Due Week 10 and worth 170 points
Use the same scenario from Assignment 1. In addition, XYZ Company is heavily invested in e-Commerce with
Cis 436 Enthusiastic Study / snaptutorial.comStephenson03
Assignment 2: XYZ Company Troubleshooting and Maintenance Plan
Due Week 10 and worth 170 points
Use the same scenario from Assignment 1. In addition, XYZ Company is heavily invested in e-Commerce with all retail locations’ Point of Sale systems connected so that it maintains a dynamic inventory and automatically generates restock orders. The XYZ Company engineers have configured the WAN-based Intranet using IPSec to support all of these locations via encrypted VPN links connected to the nearest regional distribution center.
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxrosemariebrayshaw
Assignment 5: Technical Term Paper
The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word and will be between 10-15 pages with graphics embedded within the document.
Background
You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP company, you recently made a persuasive presentation of your company's approach to designing networks at a large industry event. The CEO of Fiction Corporation, a large retail chain, was impressed by your presentation. It looks like you've finally got your break! You have a small team of 10 technically proficient staffers with a strong background in project management, networking, and internetworking skills that include PMP, Network+, CCNP, and CISSP credentials.
You have been selected by Fiction Corporation to develop a network design document and plan without an RFP.
Overview
Fiction Corporation, a large national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.
The data in the center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hours a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation's operations and profitability. From the data processing viewpoint, the move includes 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.
The network consists of approximately 500 remote location retail stores connected via frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the entire organization. The retail operations also run WLANs that are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers also need to monitor the status of remote systems. The SNMP management system must be able to detect and report failure of the remote system or its communications link and the status of individual applications.
The company wishes a seamless migration that minimizes impact to its customers and employees. Any gaps in this background will require you to make sound technical and persuasive assumptions that satisfy the customer's goals that are within the budget guidelines.
You were selected in part due to your detailed analysis and agreement to an implementation cost that will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is th.
1- How does the transport layer use stop and wait to control flow .docxdorishigh
1- How does the transport layer use stop and wait to control flow of data?
2-How does Exponential backoff work?
3- What is DES, and what is its purpose?
4- Discuss TCP's congestion control mechanism?
5- What are the differences between CSMA/CD and CSMA/CA?
Graded Scoring Rubric
Attribute
Comments
Possible Points
Points Earned
Requirements analysis Analysis covers five requirements, defining them and providing explanations of each; and demonstrates understanding of course concepts, analysis, and critical thinking.
Excellent summary of FEI and its environment. Not totally clear on which 5 requirements you planned to address; perhaps bullets or explicitly identifying them would help.
3
2.5
Technology solution An appropriate technology solution is provided and thoroughly explained. It addresses all identified requirements.
Cloud storage, VoIP, videoconferencing, network management tools are all excellent components of a converged solution, but how do you plan to implement it. What network technology is required? Will FEI build the network themselves or lease it? I see the network in the diagram, but not explained in the text.
3
2
Converged solution An effective converged network is proposed; work demonstrates understanding of course concepts, analysis, and critical thinking.
Very good.
2
2
Cost-benefit analysis The benefits of the converged solution are fully discussed in terms of relative cost of implementing multiple solutions.
You mentioned a low cost solution that will lower the cost of operations, but without understanding the network infrastructure I’m not clear how this will be achieved. Again is FEI building a network or leasing it?
2
1.5
External research At least two sources other than the textbook (and other course material) are incorporated and used effectively
You must provide in-text citations so that the reader knows how you used the sources. Also, to avoid plagiarism be careful to use quotation marks appropriately when quoting directly.
1
.25
Document format The document reflects effective organization and correct sentence structure, grammar, and spelling; it is presented in a professional format; it incorporates illustrations or diagrams; and references are appropriately incorporated and cited, using APA style.
Section headers may help to organize the paper to ensure that all of the required topics are addressed.
1
1
Total Points
12
9.25
Page 1 of 2
Architectural Diagram Instructions
Introduction
This is an individual project. This project is related to the Case Study project. Each student must complete an Architectural Diagram that illustrates the placement of security and other technologies within the converged network solution. The foundation for this project is the requirements analysis and proposal document that you completed for the Case Study project. The target audience will be the organization’s Chief Information Officer (CIO). The Architectural Diagram deliverable is an MS Word document.
The comple ...
Strayer CIS 408 Week 10 Technical Paper: Planning an Application Server Migration NEW
To purchase this material click below link
http://www.assignmentcloud.com/cis-408-strayer/cis-408-week-10-technical-paper-planning-an-application-server-migration
For more classes visit
www.assignmentcloud.com
CIS 408 Week 10 Technical Paper: Planning an Application Server Migration NEW
How your very large databases can work in the cloud computing world?Moshe Kaplan
How your very large databases can work in the cloud computing world?
Presented by Moshe Kaplan from RockeTier, a performance expert and scale out architect at the IGT Cloud Computing work group at April 20, 2009
Cloud computing is famous for its flexibility, dynamic nature and ability to infinite growth. However, infinite growth means very large databases with billions of records in it. This leads us to a paradox: "How can weak servers support very large databases which usually require several CPUs and dedicated hardware?"
The Internet industry proved it can be done. These days many of the Internet giants, processing billions of events every day, are based on cloud computing architecture such and sharding. What is Sharding ? What kinds of Sharding can you implement? What are the best practices?
RockeTier specializes in analyzing and boosting existing software
performance and developing efficient high-load systems
You can contact Mr. Kaplan at moshe.kaplan at rocketier.com, read his blog at http://top-performance.blogspot.com and visit RockeTier site at www.rocketier.com
Techwave started working with the client in 2014 by taking the SAP AMS and
other areas to support the transition from IBM with just two weeks of transition.
Techwave supported 65 countries' rollout for MDM, GPC, and SAP BI-BW areas.
We are now part of one of their known run support programs, again one of the
essential tracks in the company. We became key partners in strategic initiatives
related to upgrades/Migrations etc.
Techwave has also enhanced partnerships by focusing on platform efficiencies
and redefining data strategy. From support, just a service provider initially, we
expanded to get engaged in projects, and now we are focusing on driving
business value to the company.
1 IT 340 Final Project Guidelines and Rubric O.docxhoney725342
1
IT 340 Final Project Guidelines and Rubric
Overview
A computer network is the foundation of every organization’s information technology (IT) infrastructure. Computing networks provide the backbone and
framework for running business applications, sharing content, communication, and collaboration. In your assessment in this course you will take on the role of a
junior network administrator, with responsibility for managing, supporting, and recommending networking solutions. Within this role, you will create a report
for the senior administrators, based on the scenario provided in which the organization is looking to expand to a new location. While writing your report you will
apply networking concepts, fundamentals, and troubleshooting skills in developing recommendations to a real-world scenario. This report provides an
opportunity for you to illustrate critical thinking in evaluating and solving networking business requirements that would assist in meeting organizational goals
and objectives.
The Project in Context: Course Learning Objectives and the Newton Ad Agency: There are two key contexts that should help to guide your work in this project.
The first is the function of this project in the organizational culture and business drivers of your imagined employer, Newton Ad Agency. Be sure to carefully
review the scenario below to help you formulate your recommendations.
The second key context is your learning in the whole of this course. This project has been selected and developed in part because it allows you to directly
address the following course outcomes:
Analyze standard network designs and infrastructures for informing optimal support practices
Explain troubleshooting approaches to network problems for informing potential solutions to network errors and ensuring rapid resolution
Explain network technology suggestions based on how they support business goals and objectives
Apply networking concepts to real-world situations for informing management and upgrade suggestions
As you can see, these outcomes ask you to relate your scholarly engagement with networking theory and practice to specific business cases. In your final project,
this connection comes to life in your recommendations for networking a new office for Newton Ad Agency.
You will work toward a successful final project throughout the course, most notably through the completion of two milestones, which will be submitted at
various points throughout the course to scaffold learning and ensure quality final submissions. In Milestone One, due in Module Three, you will draft the
introduction of the project and the first section of the body. This milestone will address key considerations for network design and local area network (LAN)
topology. In Milestone Two, due in Module Five, you will draft additional sections of the project. These sections are on the selection of an internet service
provider and networking consideration ...
For more classes visit
www.snaptutorial.com
Assignment 2: XYZ Company Troubleshooting and Maintenance Plan
Due Week 10 and worth 170 points
Use the same scenario from Assignment 1. In addition, XYZ Company is heavily invested in e-Commerce with
Cis 436 Enthusiastic Study / snaptutorial.comStephenson03
Assignment 2: XYZ Company Troubleshooting and Maintenance Plan
Due Week 10 and worth 170 points
Use the same scenario from Assignment 1. In addition, XYZ Company is heavily invested in e-Commerce with all retail locations’ Point of Sale systems connected so that it maintains a dynamic inventory and automatically generates restock orders. The XYZ Company engineers have configured the WAN-based Intranet using IPSec to support all of these locations via encrypted VPN links connected to the nearest regional distribution center.
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxrosemariebrayshaw
Assignment 5: Technical Term Paper
The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word and will be between 10-15 pages with graphics embedded within the document.
Background
You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP company, you recently made a persuasive presentation of your company's approach to designing networks at a large industry event. The CEO of Fiction Corporation, a large retail chain, was impressed by your presentation. It looks like you've finally got your break! You have a small team of 10 technically proficient staffers with a strong background in project management, networking, and internetworking skills that include PMP, Network+, CCNP, and CISSP credentials.
You have been selected by Fiction Corporation to develop a network design document and plan without an RFP.
Overview
Fiction Corporation, a large national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.
The data in the center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hours a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation's operations and profitability. From the data processing viewpoint, the move includes 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.
The network consists of approximately 500 remote location retail stores connected via frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the entire organization. The retail operations also run WLANs that are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers also need to monitor the status of remote systems. The SNMP management system must be able to detect and report failure of the remote system or its communications link and the status of individual applications.
The company wishes a seamless migration that minimizes impact to its customers and employees. Any gaps in this background will require you to make sound technical and persuasive assumptions that satisfy the customer's goals that are within the budget guidelines.
You were selected in part due to your detailed analysis and agreement to an implementation cost that will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is th.
1- How does the transport layer use stop and wait to control flow .docxdorishigh
1- How does the transport layer use stop and wait to control flow of data?
2-How does Exponential backoff work?
3- What is DES, and what is its purpose?
4- Discuss TCP's congestion control mechanism?
5- What are the differences between CSMA/CD and CSMA/CA?
Graded Scoring Rubric
Attribute
Comments
Possible Points
Points Earned
Requirements analysis Analysis covers five requirements, defining them and providing explanations of each; and demonstrates understanding of course concepts, analysis, and critical thinking.
Excellent summary of FEI and its environment. Not totally clear on which 5 requirements you planned to address; perhaps bullets or explicitly identifying them would help.
3
2.5
Technology solution An appropriate technology solution is provided and thoroughly explained. It addresses all identified requirements.
Cloud storage, VoIP, videoconferencing, network management tools are all excellent components of a converged solution, but how do you plan to implement it. What network technology is required? Will FEI build the network themselves or lease it? I see the network in the diagram, but not explained in the text.
3
2
Converged solution An effective converged network is proposed; work demonstrates understanding of course concepts, analysis, and critical thinking.
Very good.
2
2
Cost-benefit analysis The benefits of the converged solution are fully discussed in terms of relative cost of implementing multiple solutions.
You mentioned a low cost solution that will lower the cost of operations, but without understanding the network infrastructure I’m not clear how this will be achieved. Again is FEI building a network or leasing it?
2
1.5
External research At least two sources other than the textbook (and other course material) are incorporated and used effectively
You must provide in-text citations so that the reader knows how you used the sources. Also, to avoid plagiarism be careful to use quotation marks appropriately when quoting directly.
1
.25
Document format The document reflects effective organization and correct sentence structure, grammar, and spelling; it is presented in a professional format; it incorporates illustrations or diagrams; and references are appropriately incorporated and cited, using APA style.
Section headers may help to organize the paper to ensure that all of the required topics are addressed.
1
1
Total Points
12
9.25
Page 1 of 2
Architectural Diagram Instructions
Introduction
This is an individual project. This project is related to the Case Study project. Each student must complete an Architectural Diagram that illustrates the placement of security and other technologies within the converged network solution. The foundation for this project is the requirements analysis and proposal document that you completed for the Case Study project. The target audience will be the organization’s Chief Information Officer (CIO). The Architectural Diagram deliverable is an MS Word document.
The comple ...
Strayer CIS 408 Week 10 Technical Paper: Planning an Application Server Migration NEW
To purchase this material click below link
http://www.assignmentcloud.com/cis-408-strayer/cis-408-week-10-technical-paper-planning-an-application-server-migration
For more classes visit
www.assignmentcloud.com
CIS 408 Week 10 Technical Paper: Planning an Application Server Migration NEW
How your very large databases can work in the cloud computing world?Moshe Kaplan
How your very large databases can work in the cloud computing world?
Presented by Moshe Kaplan from RockeTier, a performance expert and scale out architect at the IGT Cloud Computing work group at April 20, 2009
Cloud computing is famous for its flexibility, dynamic nature and ability to infinite growth. However, infinite growth means very large databases with billions of records in it. This leads us to a paradox: "How can weak servers support very large databases which usually require several CPUs and dedicated hardware?"
The Internet industry proved it can be done. These days many of the Internet giants, processing billions of events every day, are based on cloud computing architecture such and sharding. What is Sharding ? What kinds of Sharding can you implement? What are the best practices?
RockeTier specializes in analyzing and boosting existing software
performance and developing efficient high-load systems
You can contact Mr. Kaplan at moshe.kaplan at rocketier.com, read his blog at http://top-performance.blogspot.com and visit RockeTier site at www.rocketier.com
Techwave started working with the client in 2014 by taking the SAP AMS and
other areas to support the transition from IBM with just two weeks of transition.
Techwave supported 65 countries' rollout for MDM, GPC, and SAP BI-BW areas.
We are now part of one of their known run support programs, again one of the
essential tracks in the company. We became key partners in strategic initiatives
related to upgrades/Migrations etc.
Techwave has also enhanced partnerships by focusing on platform efficiencies
and redefining data strategy. From support, just a service provider initially, we
expanded to get engaged in projects, and now we are focusing on driving
business value to the company.
1 IT 340 Final Project Guidelines and Rubric O.docxhoney725342
1
IT 340 Final Project Guidelines and Rubric
Overview
A computer network is the foundation of every organization’s information technology (IT) infrastructure. Computing networks provide the backbone and
framework for running business applications, sharing content, communication, and collaboration. In your assessment in this course you will take on the role of a
junior network administrator, with responsibility for managing, supporting, and recommending networking solutions. Within this role, you will create a report
for the senior administrators, based on the scenario provided in which the organization is looking to expand to a new location. While writing your report you will
apply networking concepts, fundamentals, and troubleshooting skills in developing recommendations to a real-world scenario. This report provides an
opportunity for you to illustrate critical thinking in evaluating and solving networking business requirements that would assist in meeting organizational goals
and objectives.
The Project in Context: Course Learning Objectives and the Newton Ad Agency: There are two key contexts that should help to guide your work in this project.
The first is the function of this project in the organizational culture and business drivers of your imagined employer, Newton Ad Agency. Be sure to carefully
review the scenario below to help you formulate your recommendations.
The second key context is your learning in the whole of this course. This project has been selected and developed in part because it allows you to directly
address the following course outcomes:
Analyze standard network designs and infrastructures for informing optimal support practices
Explain troubleshooting approaches to network problems for informing potential solutions to network errors and ensuring rapid resolution
Explain network technology suggestions based on how they support business goals and objectives
Apply networking concepts to real-world situations for informing management and upgrade suggestions
As you can see, these outcomes ask you to relate your scholarly engagement with networking theory and practice to specific business cases. In your final project,
this connection comes to life in your recommendations for networking a new office for Newton Ad Agency.
You will work toward a successful final project throughout the course, most notably through the completion of two milestones, which will be submitted at
various points throughout the course to scaffold learning and ensure quality final submissions. In Milestone One, due in Module Three, you will draft the
introduction of the project and the first section of the body. This milestone will address key considerations for network design and local area network (LAN)
topology. In Milestone Two, due in Module Five, you will draft additional sections of the project. These sections are on the selection of an internet service
provider and networking consideration ...
Chamberlain college of nursing nr 351 week 6 assignment professional paper in...ElijahEthaan
nr 351 week 6 discussion use of informatics in professional nursing new,nr 351 week 6 assignment professional paper informatics and technology new,nr 351 week 6 assignment professional paper professionalism in nursing new,nr 351 week 6 assignment professional paper teamwork and collaboration new,nr 351,chamberlain college of nursing nr 351 week 6 tutorial,nr 351 week 6 assignment,chamberlain college of nursing nr 351 week 6 help
law 421,uop law 421,uop law 421 complete course,uop law 421 entire course,uop law 421 final exam,uop law 421 week 1,uop law 421 week 2,uop law 421 week 3,uop law 421 week 4,uop law 421 week 5,uop law 421 tutorials,law 421 assignments,law 421 help
devry sbe 330 week 4 course project development of a new product or service,sbe 330 week 4 case study chapter,sbe 330 week 4 case study 1 timing and positioning,devry sbe 330 week 4,sbe 330 week 4,devry sbe 330 week 4 tutorial,devry sbe 330 week 4 assignment,devry sbe 330 week 4 help
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
1. STAYER CIS 413 Week 10 Assignment 2: Big Switch Network
Design NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-413-stayer/cis-
413-week-10-assignment-2-big-switch-network-design-
new
For more classes visit
http://www.assignmentcloud.com
Due Week 10 and worth 175 points
Big Switch is a medium-sized sales organization with 100
employees with annual revenue of $10 million. Big Switch has a
central office of 30 employees that supports a sales force
consisting of 70 employees across 10 regional offices in the
United States. Approximately 20% of the Big Switch sales are
transacted from customers over the Web and 80% are from
face-to-face sales interactions. The company expects a greater
Web presence in the near future.
The Big Switch enterprise network consists of a core backbone,
campus, data center, Branch / WAN, and Internet Edge. The
seven (7) departments in the company include Finance,
Operations, Human Resources, Sales, Marketing, Technology,
and the corporate office. Computing equipment is provided to
all employees of Big Switch. The company also uses 20
independent sales contractors that are assigned a specific
territory and use their own computing and home office
equipment to access the Big Switch network.
Due to recent major security breaches in its campus network,
Big Switch has hired you to design an infrastructure that:
Implements VLAN segments.
Protects against MAC layer attacks.
Protects against VLAN attacks.
2. Protects against spoofing attacks.
Secures the network switches.
As the network analyst hired to model this infrastructure, you
are to provide an implementation solution that considers
redundancy and secure strategies across the enterprise
network and the Big Switch seven departments. The CEO has
informed you that the capital budget for this migration cannot
exceed $400,000 and must not interrupt business operations.
The company wishes a seamless migration that minimizes
impact to its customers and employees. Any gaps in this
background will require you to make sound technical and
persuasive assumptions that satisfy the customer’s goals that
are within the budget guidelines.
Your network migration plan will be in phases with noted
milestones and graphic topologies that support your approach.
Write a five to eight (5-8) page paper in which you:
Explain the design of an infrastructure that Implements VLAN
segments, protects against MAC layer attacks, protects against
VLAN attacks, protects against spoofing attacks, and secures the
network switches.
Describe the deployment approach and design that you would
use in the enterprise network that consists of core backbone,
campus, data center, Branch / WAN, and Internet edge. Defend
your decision.
Describe the deployment approach and design that you would
use in the seven (7) departments of the company, which include
Finance, Operations, Human Resources, Sales, Marketing,
Technology, and the Corporate Office. Defend your decision.
Using Microsoft Visio or an open source alternative such as Dia,
graphically illustrate the infrastructure design that implements
VLAN segments, protects against MAC layer attacks, protects
against VLAN attacks, protects against spoofing attacks, and
secures the network switches. Next, graphically illustrate the
3. deployment approach for the seven (7) departments and
design of the infrastructure. Note: The graphically depicted
solution is not included in the required page length.
Propose the way in which your overall solution will promote a
secure environment for Big Switch. Justify your response.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check
with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Configure and implement VLANs in a Campus network
environment.
Describe and implement high availability in a campus
infrastructure.
Understand and implement a secure campus switching
environment.
Use technology and information resources to research issues in
internetworking switching.
Write clearly and concisely about internetworking switching
using proper writing mechanics.