diff_months: 21

Network Design Project Fremantle Consulting Services Case Study IT Assignment Help

Download Solution Now
Added on: 2022-08-20 00:00:00
Order Code: 11_21_21877_125
Question Task Id: 379886
Assignment Task
 


Task 1 – Network design project
Assessment activities can be completed either in real workplace environment or in a simulated environment such as your classroom. In both cases, appropriate evidence of the assessment activities must be provided.
ASSESSOR NOTE
These instructions must be followed when assessing the student in this unit. The checklist on the following page is to be completed for each student. Please refer to separate mapping document for specific details relating to alignment of this task to the unit requirements.
This competency is to be assessed using standard and authorised work practices, safety requirements and environmental constraints.
Assessment of essential underpinning knowledge will usually be conducted in an off-site context.
Assessment is to comply with relevant regulatory or Australian standards' requirements.
Resource implications for assessment include:
•an induction procedure and requirement
•realistic tasks or simulated tasks covering the mandatory task requirements
•relevant specifications and work instructions
•tools and equipment appropriate to applying safe work practices
•support materials appropriate to activity
•workplace instructions relating to safe work practices and addressing hazards and emergencies
•material safety data sheets
•research resources, including industry related systems information.


Scenario
Fremantle Consulting Services is a company that provides IT services to local businesses. It employs 75 people. At its main site (HQ) it has a small server room with five servers which provide authentication and directory services, resource sharing, printing and hosts two large database systems. The company wishes to upgrade the network to support a new IP telephony and video training system for users.At a recent review of IT security it was identified that some users have the opportunity to access information that is not appropriate to their job role. The company would like to implement security zones for the service desk users, technical support staff and the administration staff. The business is also concerned that the performance of servers has noticeably declined as more users have been added to the network. The service desk which has 45 staff is located on the third floor of the office while technical and administration staff are located on the second floor.All staff are authenticated to the network and find resources using Active Directory. All staff use email and calendaring which is provided byExchange Server in the server room.The service desk and technical support personnel enter all job requests into the ManageEngine® ServiceDesk Plus software package. This uses a database backend installed on the database server. Support personnel also use a knowledge base that is accessed on the same server and the internet for issue research. In quiet times, both service desk staff and technical support staff learn new technology by accessing the video training system which is located on the ‘Training server’ in the server room.Technical support personnel use remote desktop, http and SSH to remotely access servers and devices for configuration changes, troubleshooting and monitoring.Administration staff only use accounting system software. The backend of this system is located on the ‘Accounting server’ in the server room. Administration staff use the internet occasionally Fremantle Consulting Services will implement a 25-connection VPN service to enable authenticated staff to access company resources when offsite. Continuous internet connectivity has been identified as a priority goal.
Tasks
Identify and describe each functional segment of the network. Describe the user communities that will user the segment and describe the services and applications that they will require. Don’t forget about supporting services such as DNS.Create a functional matrix to map applications and services to user communities and network segments.Create a topology map showing the traffic flows in the network design.Research the size of content transferred over the links for the applications and services required in the network segments. Simulate the transfer and measure the flow using Wireshark® software. Consider the number of users in the community that will be using a traffic flow.Use sizing skills to make an accurate estimate of the traffic flow volumes on LAN trunk links, server access links and WAN links for internet access.Update the network functional matrix to include a priority column.Use the network functional matrix to determine the bandwidth requirement for the links and the through-put requirements for switches and routers.Write an email to your trainer describing factors in the physical environment which could impact on the performance of the network.Create a topology map based on modularised and hierarchal design principles to meet the business and functional requirements.Clearly show the types (not models) of infrastructure devices and indicate hosts and communities.Clearly indicate VLANs and VLAN scope.Create an addressing table for each LAN and WAN segment and label each segment with the network address and gateway addresses. Indicate on the topology map the capacity of trunk and WAN links. Create a costing sheet for the network topology.Include columns for the type of switch, the switch size in rack units, the number and speed of switchports, power supply type, feature set, capability (internal forwarding rates).For each type of switch and its associated features list vendor switch models and IOS that meet the requirements. Don’t forget to include extra switch modules required to support the number of switchports. Include costs for each item.Identify and describe the VPN segment of the network. Describe the user community that will use the segment and describe the services and applications that they will require. Don’t forget the supporting services such as DNS.Create a functional matrix to map applications and services to the VPN user community and network segment.Create a topology map showing the traffic flows in the network design.Research the size of content transferred over WAN links for the applications and services required in the VPN network segments. Simulate the transfer and measure the flow using Wireshark software. Consider the number of users in the community that will be using VPNs over the WAN link.Use sizing skills to make an accurate estimate of the traffic flow volumes on WAN links for VPN traffic. Use the network functional matrix to determine the bandwidth requirement for WAN links and the through-put requirements for the VPN server in the edge module.Write an email to your trainer describing factors in the physical environment which could impact on the performance of the VPN network. Research business plans with two different ISPs. Find a business plan that will best fit the WAN service and capacity required by the company. Don’t forget that the business will require a static IP for the VPN connections.Also research a cheaper plan as a back-up service which will provide enough capacity for essential services. (Size this service to provide enough connectivity for ten service desk personnel and two VPN connections.) Please make sure that you have the following documentation ready for submission.
 

 

 

    


This IT Assignment has been solved by our IT Experts at Exam Question Bank. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
    
Be it a used or new solution, the quality of the work submitted by our assignment Experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : Hritik
  • Posted on : December 06th, 2019
  • Downloads : 0
  • Views : 247

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more