Preview

It331 Documentation

Powerful Essays
Open Document
Open Document
4913 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It331 Documentation
CNS Capstone

A COMPREHENSIVE NETWORK DEVELOPMENT PROJECT

SUBMITTED TO THE

IT / COMPUTER NETWORKS SYSTEMS PROGRAM

IN PARTIAL FULFILLMENT OF THE REQUIREMENTS

FOR THE ASSOCIATE DEGREE

by

¬¬¬¬¬¬¬¬¬¬¬___________________________
___________________________
___________________________
___________________________

ADVISOR – ______________

ITT TECHNICAL INSTITUTE

MURRAY, UTAH

AUGUST, 2006

Table of Contents

Introduction to Infinet…………………………………………………................... 3

TTI’s Proposal Overview……………………………………………….................. 4

Executive Summary………………………………………………………………... 6

Assumptions and Constraints………………………………………………………. 7

Deliverables………………………………………………………………………... 8

Project Details

Implementation and Timeline……………………………………………… 9 Network Topology........................................................................................ 12 IP Schema…………………………………………………………………. 16 Security…………………………………………………………………….. 17

Active Directory Structure…………………………………………………………. 18

Maintenance and Training Plan …………………………………………………… 19

Risk Analysis………………………………………………………………………. 20

Backup Plan…………………………………………………………………………21

Cost Analysis………………………………………………………………………. 22

Appendix…………………………………………………………………………… 23

Appendix A: Cost Analysis…………………………………………………24 Appendix B: Hardware…………………………………………………….. 27

Introduction to Infinet

Infinet is a company that has been providing networking and data communications solutions for companies since 1994. Infinet has throughout the years stayed on top of current networking trends and technologies to ensure reliability and extensive network lifetimes for Infinet’s customers.

Our clients range all across the southern and southwestern states of the U.S. Infinet’s mission to its customers is to provide them a network resolution that suits their needs and budget with the highest reliability that current technology can

You May Also Find These Documents Helpful

  • Good Essays

    It240 Appendix F

    • 1093 Words
    • 5 Pages

    |Drives |A device that reads data from and often writes data onto a storage medium, such |…

    • 1093 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    It 210 Checkpoint

    • 374 Words
    • 2 Pages

    In one of the week 3 discussion questions we discussed the algorithm that would be required to make a peanut butter sandwich. In this CheckPoint you will need to take that one step further and create a program design to make a peanut butter sandwiches. Below you will find a partial program design; you need to complete it by adding the pseudocode in the required areas. You need to add one repetition (loop) control structure and one decision control to complete the program design. The user will decide how many sandwiches are made; this is where the loop will be used. The user will decide if the sandwich includes jelly, and, if it does, what flavor of jelly; to keep it simple we are only allowing grape or strawberry jelly.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is3110 Unit 4

    • 406 Words
    • 2 Pages

    If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Unit 333.1

    • 1674 Words
    • 7 Pages

    Independent safeguarding authority (ISA) was given a wider role in checking new workers, poor practice etc.…

    • 1674 Words
    • 7 Pages
    Better Essays
  • Good Essays

    IS3120 Full Review

    • 4277 Words
    • 18 Pages

    Increase organizational revenue (and the bottom line) –increase the customer base and retain new and existing customers to increase overall revenue…

    • 4277 Words
    • 18 Pages
    Good Essays
  • Satisfactory Essays

    Violating my copyright privileges is definitely not a good thing. I am all for sharing music. If music was not shared, some of the smaller acts would never be recognized. As for my scenario my employment and income is based off of music sales. In this case I am not okay with it.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3120 Unit 3

    • 650 Words
    • 2 Pages

    speeds of at least 100 megabits per second and actual upload speeds of at least 50…

    • 650 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT140 Ip1

    • 1028 Words
    • 5 Pages

    Windows 7 operating system was produced for personal computers, business desktops, laptops, netbooks, tablet PCs, and media center PCs. This version was released on October 22, 2009, which was less than three years that Windows Vista was released. Windows 7 upgraded design worked with Windows Vista applications and its hardware. A few of Windows 7 new features are the advances in touch and handwriting recognition. It supports RAW image format with the addition of Windows Imaging Component. This enables previewing and metadata display in Internet explorer. Also full size viewing for slideshows in Windows Photo Viewer.…

    • 1028 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    IS3350

    • 588 Words
    • 3 Pages

    The potential user groups and users of WLAN in a school environment would be District office and administration can streamline procedures. Classroom applications can track each student’s progress to facilitate reporting, provide up-to-date student information on hand held computers, respond to emergency situations, and handle disciplinary incidents, security enforcement, and parent communications. IT department can optimize performance and cost savings. WLANs can accommodate rapid expansion, which is particularly important for schools using mobile classrooms, which can make wiring very challenging. WLANs are also more economical than traditional wired connections, especially where wired connections would be prohibitively difficult like, schools that have no space for computer labs or that anticipate future renovations that would require rewiring in classrooms. Teachers can be more proactive and accessible. WLAN access increase interaction between teacher and students; complement classroom instructions with online applications including digital whiteboards and online testing; real time access to administrative resources and design curricula that better meets individual learning styles Students can learn more efficiently. WLAN provides the opportunity for more free flowing collaboration among peers, with teachers and digital resources and the Internet. While higher education deployments focus broadly on delivering high-performance, pervasive wireless coverage across large campus environments, K-12 schools with tighter budgets and limited IT resources tend to deploy wireless to support specific mobility applications, such as mobile carts, wireless IP telephony, video surveillance, mobile classrooms, and so on. In order to support these and other emerging wireless applications for example, educational videos, location tracking, and cafeteria point-of-sales systems, schools need a wireless infrastructure that can deliver reliable performance in dynamic, high-density…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Is317 Lab #3 Questions

    • 430 Words
    • 2 Pages

    1. Which reconnaissance tool comes with Microsoft Windows that can provide and can be initiated from the DOS command prompt? What useful information does this query provide?…

    • 430 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 It273

    • 299 Words
    • 2 Pages

    d. True or False: A common way to share resources on a client/server network is by modifying the file-sharing controls via the computer’s operating system.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    TrueCrypt is loaded with powerful features that users concerned with protecting data from prying eyes will find robust and comprehensive. It has 11 algorithms for encrypting your private files in a password-protected volume. You can store your encrypted data in files (containers) or partitions (devices). TrueCrypt works offers powerful data protection, recommending complex passwords, explaining the benefits of hidden volumes, and erasing telltale signs of the encryption process, including mouse movements and keystrokes. Though the interface may not be intuitive, its powerful, on-the-fly encryption for no cost still earns the freeware security tool a top rating.…

    • 515 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT210 R5 appendix b

    • 191 Words
    • 2 Pages

    The following example explains how to write a program that calculates the cost of painting a room. If the user provides the price of a gallon of paint; the number of square feet one gallon of paint covers; and the length, height, and width of the room, you can calculate the total cost of painting the room.…

    • 191 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT321 Labs 1.1 - 1.7

    • 2018 Words
    • 38 Pages

    Lab 1.1 KL>en Password: Password: Password: KL#show running config ^ % Invalid input detected at '^' marker. KL#show run Building configuration... Current configuration : 762 bytes ! version 12.4 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption !…

    • 2018 Words
    • 38 Pages
    Satisfactory Essays