Preview

It331 Documentation

Powerful Essays
Open Document
Open Document
4913 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It331 Documentation
CNS Capstone

A COMPREHENSIVE NETWORK DEVELOPMENT PROJECT

SUBMITTED TO THE

IT / COMPUTER NETWORKS SYSTEMS PROGRAM

IN PARTIAL FULFILLMENT OF THE REQUIREMENTS

FOR THE ASSOCIATE DEGREE

by

¬¬¬¬¬¬¬¬¬¬¬___________________________
___________________________
___________________________
___________________________

ADVISOR – ______________

ITT TECHNICAL INSTITUTE

MURRAY, UTAH

AUGUST, 2006

Table of Contents

Introduction to Infinet…………………………………………………................... 3

TTI’s Proposal Overview……………………………………………….................. 4

Executive Summary………………………………………………………………... 6

Assumptions and Constraints………………………………………………………. 7

Deliverables………………………………………………………………………... 8

Project Details

Implementation and Timeline……………………………………………… 9 Network Topology........................................................................................ 12 IP Schema…………………………………………………………………. 16 Security…………………………………………………………………….. 17

Active Directory Structure…………………………………………………………. 18

Maintenance and Training Plan …………………………………………………… 19

Risk Analysis………………………………………………………………………. 20

Backup Plan…………………………………………………………………………21

Cost Analysis………………………………………………………………………. 22

Appendix…………………………………………………………………………… 23

Appendix A: Cost Analysis…………………………………………………24 Appendix B: Hardware…………………………………………………….. 27

Introduction to Infinet

Infinet is a company that has been providing networking and data communications solutions for companies since 1994. Infinet has throughout the years stayed on top of current networking trends and technologies to ensure reliability and extensive network lifetimes for Infinet’s customers.

Our clients range all across the southern and southwestern states of the U.S. Infinet’s mission to its customers is to provide them a network resolution that suits their needs and budget with the highest reliability that current technology can

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8.1 Summary

    • 346 Words
    • 2 Pages

    The final device is an Arduino-based ball sorter that uses a two-stage approach to sorting the balls. The device starts by isolating a single ball and measuring its weight. Afterwards, the device categorizes the ball based on the measured weight and deposits it in the appropriate receptacle.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Summary

    • 734 Words
    • 3 Pages

    Although Zigbee implements a wide assortment of security measures, there are still a variety of vulnerabilities and attack methods that can be used. These attacks and how they can be carried out will be described in this Section.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Is3110 Unit 4

    • 406 Words
    • 2 Pages

    If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IT321 Labs 1.1 - 1.7

    • 2018 Words
    • 38 Pages

    Lab 1.1 KL>en Password: Password: Password: KL#show running config ^ % Invalid input detected at '^' marker. KL#show run Building configuration... Current configuration : 762 bytes ! version 12.4 no service timestamps log datetime msec no service timestamps debug datetime msec no service password-encryption !…

    • 2018 Words
    • 38 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT210 R5 appendix b

    • 191 Words
    • 2 Pages

    The following example explains how to write a program that calculates the cost of painting a room. If the user provides the price of a gallon of paint; the number of square feet one gallon of paint covers; and the length, height, and width of the room, you can calculate the total cost of painting the room.…

    • 191 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    TrueCrypt is loaded with powerful features that users concerned with protecting data from prying eyes will find robust and comprehensive. It has 11 algorithms for encrypting your private files in a password-protected volume. You can store your encrypted data in files (containers) or partitions (devices). TrueCrypt works offers powerful data protection, recommending complex passwords, explaining the benefits of hidden volumes, and erasing telltale signs of the encryption process, including mouse movements and keystrokes. Though the interface may not be intuitive, its powerful, on-the-fly encryption for no cost still earns the freeware security tool a top rating.…

    • 515 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Da 348 Instructions

    • 1502 Words
    • 7 Pages

    Block 10: Type (Pencil Entry/Entries). Enter the type OF 346 permit (that is, standard, limited, and so forth).…

    • 1502 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Configuration management documentation is important in any large organization or business, so understanding the types of documentation are important. I am going to go over the various types of documents and schematics you will have to be familiar with. I will try and explain the differences between a wiring schematic, physical network diagram, logical network diagram, policy, procedure, configuration, regulation, acceptable use policy, and the security policy.…

    • 518 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Is317 Lab #3 Questions

    • 430 Words
    • 2 Pages

    1. Which reconnaissance tool comes with Microsoft Windows that can provide and can be initiated from the DOS command prompt? What useful information does this query provide?…

    • 430 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It240 Appendix F

    • 1093 Words
    • 5 Pages

    |Drives |A device that reads data from and often writes data onto a storage medium, such |…

    • 1093 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 It273

    • 299 Words
    • 2 Pages

    d. True or False: A common way to share resources on a client/server network is by modifying the file-sharing controls via the computer’s operating system.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3120 Full Review

    • 4277 Words
    • 18 Pages

    Increase organizational revenue (and the bottom line) –increase the customer base and retain new and existing customers to increase overall revenue…

    • 4277 Words
    • 18 Pages
    Good Essays
  • Better Essays

    Unit 333.1

    • 1674 Words
    • 7 Pages

    Independent safeguarding authority (ISA) was given a wider role in checking new workers, poor practice etc.…

    • 1674 Words
    • 7 Pages
    Better Essays
  • Good Essays

    IS3350

    • 588 Words
    • 3 Pages

    The potential user groups and users of WLAN in a school environment would be District office and administration can streamline procedures. Classroom applications can track each student’s progress to facilitate reporting, provide up-to-date student information on hand held computers, respond to emergency situations, and handle disciplinary incidents, security enforcement, and parent communications. IT department can optimize performance and cost savings. WLANs can accommodate rapid expansion, which is particularly important for schools using mobile classrooms, which can make wiring very challenging. WLANs are also more economical than traditional wired connections, especially where wired connections would be prohibitively difficult like, schools that have no space for computer labs or that anticipate future renovations that would require rewiring in classrooms. Teachers can be more proactive and accessible. WLAN access increase interaction between teacher and students; complement classroom instructions with online applications including digital whiteboards and online testing; real time access to administrative resources and design curricula that better meets individual learning styles Students can learn more efficiently. WLAN provides the opportunity for more free flowing collaboration among peers, with teachers and digital resources and the Internet. While higher education deployments focus broadly on delivering high-performance, pervasive wireless coverage across large campus environments, K-12 schools with tighter budgets and limited IT resources tend to deploy wireless to support specific mobility applications, such as mobile carts, wireless IP telephony, video surveillance, mobile classrooms, and so on. In order to support these and other emerging wireless applications for example, educational videos, location tracking, and cafeteria point-of-sales systems, schools need a wireless infrastructure that can deliver reliable performance in dynamic, high-density…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Violating my copyright privileges is definitely not a good thing. I am all for sharing music. If music was not shared, some of the smaller acts would never be recognized. As for my scenario my employment and income is based off of music sales. In this case I am not okay with it.…

    • 250 Words
    • 1 Page
    Satisfactory Essays