Preview

Lan Consulting Plan

Powerful Essays
Open Document
Open Document
2879 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lan Consulting Plan
LAN Consulting Plan
Yesterday I was hired by Taylor and Sons Financial Consulting set up a local area network with a firewall for a Windows® network. Taylor and Sons Financial Consulting is a medium-sized company that is physically located on the first three floors of one building. Taylor and Sons Financial Consulting have approximately 100 employees. For this task I will use a traditional systems development life cycle (SDLC) that consist of planning, analysis, design, development,, testing, implementation, and maintenance.
During the planning phase I was notified that there are 100 users, and 80 of those users will extensively use10 applications, upon analysis Taylor and Sons Financial Consulting determined that 10 of the employees are clerks and should have read-only access to the databases, and due to security risk a firewall will be installed.
The analysis contains the hardware, software, and other equipment that needs to be installed. The hardware that I recommended was 91 personal computers, 9 laptops for the management Taylor and Sons Financial Consulting management buyers will have the exclusive use of the laptops. Each personal computer and laptop will be equipped with a network interface card, and the personal computers will have a standard keyboard and mouse, and a 17-inch CRT monitor. The computers will be equipped with a 2.8 MHz processor, 512 MB of RAM, a CD-RW drive, and an 80 GB hard drive. I recommended that Taylor and Sons Financial Consulting purchase an ink-jet printer for each computer. I also recommended to Taylor and Sons Financial Consulting to purchase three wireless routers, three DSL modems, nine servers, a firewall, and 24 switch’s, six wireless access point’s. I recommended that Taylor and Sons Financial Consulting use the Microsoft Small Business office productive suite (Microsoft Windows, 2009) to handle the need of word processing, and the preparing of presentations as well as preparing spreadsheets. The serves will run the



Links: Axia College. (2006). ). How wireless works. Retrieved August 25, 2009, from Axia College, Week Two, IT 241 intro to w-lan technologies. Axia College. (2006). ). WAN and remote access technologies. Retrieved August 25, 2009, from Axia College, Week Three, IT240 Intro to lan technologies Axia College Axia College. (2006). Networking Technologies. Retrieved August 28, 2009, from Axia College, Week Three, IT 240 Intro to LAN Technologies. Axia College Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies. Tiger direct Tiger direct. (n.d). Desktop computers. Retrieved August 25, 2009, from http://www.tigerdirect.com/applications/category/category_tlc.asp?CatId=6 Tiger direct Tiger direct. (n.d). Printers. Retrieved August 25, 2009, from http://www.tigerdirect.com/applications/Category/category_tlc.asp?CatId=21&name=Printers Tiger direct Tiger direct. (n.d). Switches. Retrieved August 25, 2009, from http://www.tigerdirect.com/applications/category/category_slc.asp?CatId=2787&name=Managed-Ethernet-Switch& Tiger direct

You May Also Find These Documents Helpful

  • Best Essays

    IEEE 802.11 – Wireless LAN • http://www2.rad.com/networks/2005/wirelesslan/main.htm • Up-to-date information on Wireless LANs. Technical/Magazines Articles…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    The purpose of this activity is to reinforce what you have learned so far about local area networks technologies.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    The purpose of this activity is to reinforce what you have learned so far about local area networks technologies.…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    The purpose of this activity is to reinforce what you have learned so far about local area networks technologies.…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    1. Bill’s business is already expanding. He thinks that in a few weeks, he will need to hire one or two employees to help him. He knows that new employees will need their own computer. He is also making the necessary changes so that the new employees will be working in a spare room in Bill’s house. Explain to Bill what networking options he has. Go through each type or configuration of network possible for him, making sure that you explain the pros and cons of each configuration. Finish with your suggestion for the network that he should set up and explain what new hardware will be required to do this.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Complete Case Projects 3-1, 3-2 and 3-3 of Guide to Networking Essentials. Substantively justify your choice in determining if client-based or client/server model will be used (Syllabus, IT240 Version 4, Intro to LAN Technologies, 2012).…

    • 874 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Network Technologies provides students with the fundamental concepts of data communications. This course teaches practical approaches when designing and implementing a network environment of varying sizes. It includes an analysis of the physical and logical aspects of the network infrastructure and the various industry standards and models available. The material also consists of the common tools and techniques utilized to optimize the performance and secure the core network components and resources. Throughout this course the students will develop and build their analytical and problem solving skills. Specific topics covered include: network architectures, topologies, media…

    • 2167 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Wireless Network Security

    • 6539 Words
    • 27 Pages

    Dept. of Computer Science and Engineering Fulton School of Engineering Arizona State University partha@asu.edu, tboyd@asu.edu Abstract…

    • 6539 Words
    • 27 Pages
    Powerful Essays
  • Powerful Essays

    Internet Technology

    • 1195 Words
    • 5 Pages

    Week 10 Tutorial Questions – Solutions Chapter 20 ed 4: Network Layer (Internet Protocol) Solutions – ECTE182 – Internet Technology 1 - Spring Session 2007/2012 Review Questions…

    • 1195 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Iyya

    • 6646 Words
    • 27 Pages

    This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Discovery: Networking for Homes and Small Businesses course as part of an official Cisco Networking Academy Program.…

    • 6646 Words
    • 27 Pages
    Good Essays
  • Powerful Essays

    Computer networks support applications such as access to the World Wide Web, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications. The remainder of this article discusses local area network technologies and classifies them according to the following characteristics: the physical media used to transmit signals, the communications protocols used to organize network traffic, along with the network's size, its topology and its organizational intent.…

    • 5143 Words
    • 21 Pages
    Powerful Essays