Assume you are a consultant for a local business that has asked you to propose an enterprise-wide solution that includes topology, network devices, IP infrastructure, and network security. The scenario is as follows:
A small accounting firm, ABC Accounting, Inc., landed a large account a year and a half ago that has already led the company to grow from five employees to 200 employees with expectations to employ 350 within a yearâ€™s time. In the face of continuing expansion, ABC plans to add offices in their current building that will span a total of three floors. At least one third of ABC employees have laptops and travel often.
All ABC employees have Windows 7 computers, which currently are not connected to the corporate Local Area Network (LAN).
You have been hired as a consultant to provide a detailed technical proposal that recommends a solution that addresses each of the detailed specifications that follow. Your solution regarding each specification should comprise a separate section of the body of your proposal.
Topology (type of network) and network devices
- ABC needs to set up a network and requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization.
- The company is looking for guidance regarding the type of network devices that will connect devices to the Local Area Network (LAN). Brand of device is not mandated. The company asks that you explain what internal and external networking components are required (explaining each and justifying WHY you chose the network devices you did).
- The network must have the capacity to:
- Connect all users to company resources (e.g. printers, scanners, and other items).
- Provide file sharing options.
- Manage these resources in a central location.
- Your proposal should include budgetary cost estimates for the chosen topology.
- ABC has asked that you provide details regarding an IP structure (which includes static, DHCP, or the possibility of both, and proper IP Class assignment), which is mindful of the companyâ€™s expectation of continued growth.
- Basic security has always been in place and now the company would like you to make this a more secure facility in hopes of protecting against internal and external security threats.
- Be sure to include details with respect to:
- Social engineering/internal threats
- Security protocols
- Vulnerability assessment
Your submission should include each of the following sections, with each preceded by an appropriate heading:
- Table of Contents
- Body- Including a separate section for each numbered item in the specifications above
- APA References
- Appendices- Any information you feel is appropriate to include
Outline part 1
Your outline should include potential sources and introduction discussions. Be sure to follow APA style.
Outline Part 2
This Milestone requires the submission of your portfolio â€œdraftâ€ for review and comments. Include your outline, sources, and preliminary discussions for each section. To do this, you must carefully review the Portfolio Project Option #1 in the Module 8 folder so that you understand the project overall. Read it carefully and take note of the instructions there. You are to use the major headings in the Portfolio Project as sections of your final paper.