Provide the instructor with a short (8-12 sentence) reflection on the progress your group has made so far. What do you like about the way the final proje
Follow PDF
attached are part 1 and 2 I need part 3 done
when you complete it please answer the following question
Provide the instructor with a short (8-12 sentence) reflection on the progress your group has made so far.
- What do you like about the way the final project is going?
- What are you unsure about?
- What have you learned during this process that will be useful to you in your career?
This is a chance to ask direct questions to your instructor before submitting your final project in Unit 7.
Sheet1
Cost Analysis | |||||
Tangible Costs | |||||
Item | Units | Cost ea. | Total Cost | URL (click link to view) | Labor ets. |
HP File/Print Server LH 3000 | 6 | [$USD] 5,199.00 | $31,194.00 | http://www.hp.com/ecomcat/hpcatalog/specs/P1796A.htm | Labor (Maintaining the System) per hour ($75*450) = $33,750 |
RJ45 Plugs *Packs of 50 | 8 | [$USD] 5,199.01 | $400.00 | https://www.amazon.com/s?k=rj45+cat5+connectors&adgrpid=81256237173&hvadid=585362630133&hvdev=c&hvlocphy=9070333&hvnetw=g&hvqmt=b&hvrand=14283888003997472702&hvtargid=kwd-378320033468&hydadcr=20776_13331643&tag=hydglogoo-20&ref=pd_sl_8i7r2kycgj_b | |
EtherFast II 24-Port 10/100 Switch | 4 | [$USD] 5,199.02 | $2,160.00 | https://www.google.com/aclk?sa=L&ai=DChcSEwjMy-GDrob3AhV3kGgJHccpD4wYABAHGgJ3Zg&ae=2&sig=AOD64_1ylABUy17KC1SMozhyAvsgHesD-w&q&adurl&ved=2ahUKEwi-0dGDrob3AhWmS_EDHdBmAnEQ0Qx6BAgFEAE | |
IntelliFax-4750 Commercial Laser Fax | 3 | [$USD] 599.00 | $1,797.00 | https://www.googleadservices.com/pagead/aclk?sa=L&ai=DChcSEwjcvqKnrob3AhVB4ncKHe-qCbEYABADGgJlZg&ohost=www.google.com&cid=CAESauD2_Q7qmAM1KQPF7fGdqVlcvlKzAEiDmp6F-OppvAxetm2oi697wE7MSclRDt3FEZEOeZ0fpICnMKXK9n9rTw3LtlJ23qs5te39LLF8dJXKhhNnRZK3Ku57eHEHzXuSDknP72WgFtnBHOw&sig=AOD64_0Sqqd34zPLeQaH_3uqgnG_sebpHA&q&adurl&ved=2ahUKEwiM2panrob3AhXqRfEDHdzwC0wQ0Qx6BAgCEAE | |
HP NetServer Hard Drive | 5 | [$USD] 389.00 | $1,945.00 | https://www.googleadservices.com/pagead/aclk?sa=L&ai=DChcSEwi74OW5rob3AhVHiNUKHbZ6A5IYABABGgJ3cw&ae=2&ohost=www.google.com&cid=CAESauD2uImVeDCkx3Wv9WGn_jgfAMV8zq6HTZT10Yjpe5KU_C8lXJgmmZr563ltrrVS6kj9SWzE9_yIF8aHDimQaNUKbq12N3S4njmbe6DBseJtl_6BqzG69kTYVkQ0WoNgawV01dt99G8SzYM&sig=AOD64_0l3kFPFZKomBGuOqgLgnv4uKvBDA&q&adurl&ved=2ahUKEwj53NW5rob3AhWsSvEDHb2LCf8Q0Qx6BAgCEAE | |
CAT 5 Cable (1,000 feet) | 4 | [$USD] 150.00 | $900.00 | https://www.googleadservices.com/pagead/aclk?sa=L&ai=DChcSEwiZz_zJrob3AhUUw9UKHWhsAdkYABACGgJ3cw&ae=2&ohost=www.google.com&cid=CAESauD2zg6DPlVpZaFm483br5uDnIXG-hPHYI_yJVsiaSsIXz02Z8dTzlr6qtW42LidqOcpgjqzQlvfF4i0c3TXrf9es0DMwYBR6UMUDWl1VMbxaaquQ7DvQ16STl4Bsu9GOcQrnIRErD2MjTM&sig=AOD64_1jEvtp_QIliYZ18qZo_TtFKGy1Ug&q&adurl&ved=2ahUKEwjsku_Jrob3AhUtSPEDHdJKCNQQ0Qx6BAgGEAE | |
Ultimate Tool Kit | 1 | [$USD] 540.00 | $540 | https://theultimatetoolkit.com/ | |
Grand total | [$USD] 51,025.03 | ||||
http://www.hp.com/ecomcat/hpcatalog/specs/P1796A.htm https://www.amazon.com/s?k=rj45+cat5+connectors&adgrpid=81256237173&hvadid=585362630133&hvdev=c&hvlocphy=9070333&hvnetw=g&hvqmt=b&hvrand=14283888003997472702&hvtargid=kwd-378320033468&hydadcr=20776_13331643&tag=hydglogoo-20&ref=pd_sl_8i7r2kycgj_b https://www.google.com/aclk?sa=L&ai=DChcSEwjMy-GDrob3AhV3kGgJHccpD4wYABAHGgJ3Zg&ae=2&sig=AOD64_1ylABUy17KC1SMozhyAvsgHesD-w&q&adurl&ved=2ahUKEwi-0dGDrob3AhWmS_EDHdBmAnEQ0Qx6BAgFEAE https://theultimatetoolkit.com/
,
Planning the network
Alejandro Vivero
Post University
CIS 337
4/3/2022
Stakeholders
The organization is expanding nationally and internationally
It requires careful planning to achieve the full potential (Yang et al., 2019).
It is complex operation
These stakeholders will include:
The head of networks
The CIO
The security team
Financial department
The organization is expanding nationally and internationally, which will assist in increased responsiveness and flexibility. When implementing the Wide Area Network, it requires careful planning to achieve the full potential (Yang et al., 2019). This will involve selecting more stakeholders since it is complex operation. These stakeholders will include the head of networks, the CIO, the security team, and financial department.
2
Internal and external networking components
The WAN topology will be made up of several components.
A router and modem will be effective in connecting LAN
Fiber optic cables (Rai, 2016).
Enterprise grade routers CPEs) to provide last-mile interface.
The WAN topology will be made up of several internal and external components to necessitate sharing of data among different computer devices or systems. A router and modem will be effective in connecting local area network to the designed network. Also, fiber optic cables will assist in connecting the LANs (Rai, 2016). Enterprise grade routers will be used as CPEs to provide the WAN connection’s last-mile interface.
3
Security recommendation
The computer network will span a large geographical area.
It is essential to ensure a tight security
It will involve connecting via Virtual Private Network (VPN) (Mazhar, n.d.).
It will create a secure tunnel that will protect the data
All devices must be part of the network.
The computer network will span a large geographical area. Therefore, ensuring a tight security will be essential. The security will be best kept by connecting via Virtual Private Network (VPN) (Mazhar, n.d.). This will create a secure tunnel that will protect the data while allowing voice and traffic to pass through the WAN as it would in a LAN. Also, all devices must be part of the network.
4
Network protocols
Protocols are standards that define ways of transferring data
These will involve:
Point-to-Point Protocol (PPP)
Integrated Services Digital Networks (ISDN)
PPP will connect one computer to another (Rai, 2016).
It will help communicate over the Internet or the telephone network.
ISDN will access packet-switched networks
The network protocols are standards that define ways of transferring data from one system to another. The protocols that will be used are Point-to-Point Protocol (PPP) and Integrated Services Digital Networks (ISDN). PPP will help in connecting one computer to another (Rai, 2016). It will be used by computers to communicate over the Internet or the telephone network. Also, the ISDN will assist in accessing packet-switched networks for easier digital data and voice transmission.
5
Conclusion
Network planning involves a complex work
The initial cost of purchasing equipment and components may pause a threat
Through this project, I hope to:
Learn about the working of various networks
Learn how to set various networks
The project help reflect what was taught in class
The outcomes are therefore clear
When planning a network for a big organization, it involves a complex operation. Although there may lack challenges, the issue of purchasing the components and equipment may pause a threat. Through the project, I am hoping to learn on how different networks work, and the strategies to follow when setting a desired network. Also, It is easier to reflect on what was covered in class through the project. Therefore, the outcomes are clear to me.
6
References
Mazhar, M. S. Comparative Study of WAN Services and Technologies in Enterprise Business Networks. https://www.ijcst.org/Volume10/Issue3/p1_10_3.pdf
Rai, S. (2016). -Computer Network: Basic Principles. In Distributed Sensor Networks (pp. 104-131). Chapman and Hall/CRC. https://www.taylorfrancis.com/chapters/edit/10.1201/b12988-9/computer-network-basic-principles-suresh-rai
Yang, Z., Cui, Y., Li, B., Liu, Y., & Xu, Y. (2019, July). Software-defined wide area network (SD-WAN): Architecture, advances and opportunities. In 2019 28th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-9). IEEE. 10.1109/ICCCN.2019.8847124
Mazhar, M. S. Comparative Study of WAN Services and Technologies in Enterprise Business Networks. https://www.ijcst.org/Volume10/Issue3/p1_10_3.pdf
Rai, S. (2016). -Computer Network: Basic Principles. In Distributed Sensor Networks (pp. 104-131). Chapman and Hall/CRC. https://www.taylorfrancis.com/chapters/edit/10.1201/b12988-9/computer-network-basic-principles-suresh-rai
Yang, Z., Cui, Y., Li, B., Liu, Y., & Xu, Y. (2019, July). Software-defined wide area network (SD-WAN): Architecture, advances and opportunities. In 2019 28th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-9). IEEE. 10.1109/ICCCN.2019.8847124
7
,
3
Network Design Proposal
Alejandro Vivero
Post University
337CIS
10 Apr 2022
Network Design Proposal
Recommendations for Reducing Network Errors
Network errors can prevent an individual from connecting to the internet properly. They can cause frustration among the users. However, it is possible to reduce most of the network errors. First off, a Domain Name System (DNS) can have errors when its records are not configured correctly. DNS servers are crucial to using the internet since they allow the browser to load a page. However, network errors can occur when DNS fails to enter the correct IP addresses of the records (Rees, 2021). Hence, the problem can be solved by temporarily disabling the antivirus and firewall software. This does not put the network devices to risk since the disabling is done for a short period. If the fix works, the software is the issue, and the customer needs to consider using different software. Similarly, the user can also consider updating their existing browser or switching it. Lastly, restarting the router and reconnecting also work sometimes.
Another standard network error is the conflict of IP address. Two devices on the same network can often share the same IP address. IP addresses are supposed to be unique. Therefore, when they are not unique can cause network issues and frustrations. One way to prevent this is by switching to an automatic or dynamic IP. This fix works since it changes the IP addresses and makes them unique. Removing the static IP addresses is essential since they are entered manually.
Similarly, when the router is connected to several devices to the internet, it puts the network at the risk of high bandwidth usage issues. Therefore, the network error is characterized by one or more devices using a significant amount of bandwidth. It can be prevented by keeping the software of the router updated. It can be done by downloading the required firmware update from the website of the router’s manufacturing.
Plans for Remote Access
Remote access means allowing individuals to access the organization’s communication technologies and its application even when they are not directly connected to its network. For example, remote access allows the workers to log in to the customer database from home. The critical plan to enable remote access is by offering the workers access to the systems to accomplish their roles effectively (Remote access to your network, n.d.). Hence, the first step is to ensure security is in place. The employees will be responsible for setting up passwords to access the system remotely. Therefore, the staff can be guided appropriately to create hard to crack passwords. In particular, the employees need to be made aware of their role in keeping things safe to avoid exploitation by malicious attackers.
An organization with a server can provide remote access through a virtual private network (VPN). It is crucial since it protects the network and the employee’s devices across the internet by establishing a secure link. Consequently, a VPN encrypts the messages sent between the network systems such that no one can intercept them. Hence, the staff can access the organization’s resources as though they were in the office. The organization also needs to take security precautions since VPN allows broad access to the company systems. Lastly, adopting cloud computing services will enable employees to access their files and software remotely. Alternatively, remote desktop connection software can be used instead of cloud computing. The staff can remotely log in to the main computer and access their files and software. It provides the employees with a familiar interface to access the computer system.
Visual Network Diagram
LAN cabling is 100BaseT CAT5
Figure 1: Visual Network Diagram (Sample Network Design Proposal, n.d.)
References
Rees, K. (2021, December 3). 5 common network errors & how to fix them. MUO. https://www.makeuseof.com/common-network-errors-how-to-fix/
Remote access to your network. (n.d.). Retrieved April 9, 2022, from https://www.techdonut.co.uk/communications/networks/remote-access-to-your-network
Sample Network Design Proposal. (n.d.). Retrieved April 9, 2022, from https://people.uwec.edu/hiltonts/101/CBAsample/projectsample.htm
,
CIS337– Networking in Business
Unit 6 Assignment: Final Project Part III: Securing & Maintaining the Network
Copyright 2022 Post University, ALL RIGHTS RESERVED
Due Date: 11:59 pm EST Sunday of Unit 6 Points: 20
Overview: Your medium-sized organization is expanding both nationally and internationally and you have been tasked to implement a Wide Area Network (WAN) topology. The organization has expanded to 5 different geographical locations and has directed you to design the WAN. In essence, you need to submit a plan to your Executive board and get approval to install the WAN. Background Information:
• Your Executive Board consists of the CEO, CFO, CIO.
• Your IT/Security Team consists of CISO, Security Manager, Data Center
manager, IT Manager.
• Employees of the organization will expand from 20 to 60 (globally)
• Currently, there are 20 employees at Location A. There will be another location of
30 employees at Location B and 10 new employees in France. Some new
employees at Location B will be remote users.
• Your new network must be scalable for future growth.
Instructions: For this section, you will work in a group. One person will be assigned to submit the PowerPoint and paper for the entire group. You will need to ensure security is in place to protect from internal and external threats to the network. In a PowerPoint Presentation present the following to the Executive Board:
• Create a plan for secure access for both internal and external users to include
password complexity.
o Should multi-layer authentication be used? Why or why not?
Copyright 2022 Post University, ALL RIGHTS RESERVED
o Make sure your network topology includes awareness training to make
users aware of the various malware and phishing attempts employed by
attackers.
• Provide a detailed budget needed to build and sustain your network based on
costs of the previous 3-5 years. You will research and submit a cost requirement.
o You will provide a 1-page rationale for your budget and justify if the needs
of the new network exceed the budgeted amount.
Requirements:
• PowerPoint Presentation compromised of 4- 6 slides, excluding the budget, 1- page budget rationale, Title, and Reference pages.
• Provide supporting notes representing each slide. • APA format, including an in-text citation for referenced work.
• Be sure to include the names of each person in your group at the bottom of each slide.
• A 1-page paper minimum including a rationale for your budget and justifying if the needs of the new network exceed the budgeted amount.
• At least two resources.
Be sure to read the criteria below by which your work will be evaluated before you write and again after you write.
Evaluation Rubric for Unit 6: Final Project Part III Assignment
CRITERIA Needs Improvement
Proficient Exemplary
0-1 Points 1-2 Points 2-3 Points
Security Plan Plan for security against threats is not present or is poorly presented.
Plan for security against threats is present but is missing minor details.
Plan for security against threats is clearly defined and presented, including all details.
Multi-layer authenticatio n Rationale
Rationale is not present or is poorly presented.
Rationale is present but is missing minor details.
Rationale is clearly defined and presented, including all
Copyright 2022 Post University, ALL RIGHTS RESERVED
CRITERIA Needs Improvement
Proficient Exemplary
details.
Awareness Training
Awareness training is not present or is poorly presented.
Awareness training is present but is missing minor details.
Awareness training is clearly defined and presented; including all details.
Budget Budget is poorly presented.
Budget is somewhat organized and well presented.
Budget is organized and well presented.
Budget Rationale
There is no rationale provided for budgetary decisions made and budget is not in alignment with goals/objective s of network.
Rationale provided for budgetary decisions made; budget is somewhat in alignment with goals/objective s of network.
Rationale provided for budgetary decisions made; budget in alignment with goals/objective s of network.
0-1 Points 2-2 Points 3-4 Points
Notes Section The Notes sections are scarce/empty.
The Notes sections contains some supporting notes.
The Notes section is complete with robust and meaningful supporting notes.
0 Points 0-1 Points 1 Point
Paper Length Less than 1 page
n/a 1 page or more
Slide Length Less than 4 slides
n/a 4 or more slides
Resources 0-1 resource n/a 2 resources or more
Clear and Professional Writing and APA 7 Format
Errors impede professional presentation; APA 7
Few errors that do not impede professional presentation.
Writing and format are clear, professional, APA 7
Copyright 2022 Post University, ALL RIGHTS RESERVED
CRITERIA Needs Improvement
Proficient Exemplary
guidelines not followed.
compliant, and error-free.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.