Preview

Lan Consulting Plan

Powerful Essays
Open Document
Open Document
2879 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lan Consulting Plan
LAN Consulting Plan
Yesterday I was hired by Taylor and Sons Financial Consulting set up a local area network with a firewall for a Windows® network. Taylor and Sons Financial Consulting is a medium-sized company that is physically located on the first three floors of one building. Taylor and Sons Financial Consulting have approximately 100 employees. For this task I will use a traditional systems development life cycle (SDLC) that consist of planning, analysis, design, development,, testing, implementation, and maintenance.
During the planning phase I was notified that there are 100 users, and 80 of those users will extensively use10 applications, upon analysis Taylor and Sons Financial Consulting determined that 10 of the employees are clerks and should have read-only access to the databases, and due to security risk a firewall will be installed.
The analysis contains the hardware, software, and other equipment that needs to be installed. The hardware that I recommended was 91 personal computers, 9 laptops for the management Taylor and Sons Financial Consulting management buyers will have the exclusive use of the laptops. Each personal computer and laptop will be equipped with a network interface card, and the personal computers will have a standard keyboard and mouse, and a 17-inch CRT monitor. The computers will be equipped with a 2.8 MHz processor, 512 MB of RAM, a CD-RW drive, and an 80 GB hard drive. I recommended that Taylor and Sons Financial Consulting purchase an ink-jet printer for each computer. I also recommended to Taylor and Sons Financial Consulting to purchase three wireless routers, three DSL modems, nine servers, a firewall, and 24 switch’s, six wireless access point’s. I recommended that Taylor and Sons Financial Consulting use the Microsoft Small Business office productive suite (Microsoft Windows, 2009) to handle the need of word processing, and the preparing of presentations as well as preparing spreadsheets. The serves will run the



Links: Axia College. (2006). ). How wireless works. Retrieved August 25, 2009, from Axia College, Week Two, IT 241 intro to w-lan technologies. Axia College. (2006). ). WAN and remote access technologies. Retrieved August 25, 2009, from Axia College, Week Three, IT240 Intro to lan technologies Axia College Axia College. (2006). Networking Technologies. Retrieved August 28, 2009, from Axia College, Week Three, IT 240 Intro to LAN Technologies. Axia College Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies. Tiger direct Tiger direct. (n.d). Desktop computers. Retrieved August 25, 2009, from http://www.tigerdirect.com/applications/category/category_tlc.asp?CatId=6 Tiger direct Tiger direct. (n.d). Printers. Retrieved August 25, 2009, from http://www.tigerdirect.com/applications/Category/category_tlc.asp?CatId=21&name=Printers Tiger direct Tiger direct. (n.d). Switches. Retrieved August 25, 2009, from http://www.tigerdirect.com/applications/category/category_slc.asp?CatId=2787&name=Managed-Ethernet-Switch& Tiger direct

You May Also Find These Documents Helpful

  • Best Essays

    Trulove, J. (2005). “Designing LAN Wiring Systems.” LAN wiring (3rd ed.). McGraw-Hill Professional. P. 23. ISBN 0-07-145975-8.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    3. Provide at least 3 examples of Network Architecture Controls that help enforce data access policies at the LAN-to-WAN Domain level.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The purpose of this activity is to reinforce what you have learned so far about local area networks technologies.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    The purpose of this activity is to reinforce what you have learned so far about local area networks technologies.…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    The purpose of this activity is to reinforce what you have learned so far about local area networks technologies.…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 1

    • 2250 Words
    • 13 Pages

    User name: Eidson Jr, Jerry Eidson Jr, Jerry Book: Introduction to Networking Lab Manual Page: 5. No part of any book may be reproduced or transmitted by any means without the…

    • 2250 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    Mansfield, k. and atonakos, j., 2009.computer networking from lans to wans hardware, software, and security. (online). USA: Cengage Learning…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    This Proposal is to assess the situation at the Richman Investments Company. The offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices. There is a mix of computers running Windows XP, Windows Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry devices for instant communication, and all employees are provided cell phones. A Windows Active Directory forest with domains is set up for each office, and seven file and print servers are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization. The majority of applications are Web-based and hosted from the Phoenix office.…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Complete Case Projects 3-1, 3-2 and 3-3 of Guide to Networking Essentials. Substantively justify your choice in determining if client-based or client/server model will be used (Syllabus, IT240 Version 4, Intro to LAN Technologies, 2012).…

    • 874 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Network Technologies provides students with the fundamental concepts of data communications. This course teaches practical approaches when designing and implementing a network environment of varying sizes. It includes an analysis of the physical and logical aspects of the network infrastructure and the various industry standards and models available. The material also consists of the common tools and techniques utilized to optimize the performance and secure the core network components and resources. Throughout this course the students will develop and build their analytical and problem solving skills. Specific topics covered include: network architectures, topologies, media…

    • 2167 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Wireless Network Security

    • 6539 Words
    • 27 Pages

    Dept. of Computer Science and Engineering Fulton School of Engineering Arizona State University partha@asu.edu, tboyd@asu.edu Abstract…

    • 6539 Words
    • 27 Pages
    Powerful Essays
  • Powerful Essays

    Computer networks support applications such as access to the World Wide Web, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications. The remainder of this article discusses local area network technologies and classifies them according to the following characteristics: the physical media used to transmit signals, the communications protocols used to organize network traffic, along with the network's size, its topology and its organizational intent.…

    • 5143 Words
    • 21 Pages
    Powerful Essays