Network Infrastructure

Masters
Assignment
Technology
Pages 12 (3012 words)
Download 0
The top management of the company is not sure about all the networking functionality they might need either now or in future. Therefore, your task is to identify the main needs in functionality and present them in your report. The estimated total budget for this project is 95,000…

Introduction

The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both headquarters have an urge in establishing reliable and cost-effective printing solutions.
The purpose of the needs analysis is to analyze the business objectives and produce requirements for a network infrastructure to be used in the proposed network infrastructure solution. The proposed network infrastructure solution follows in Section 3.
The best type of connection between offices and points of sales for a geographically spread retail company is by using a broadband internet connection technology and implementing an outsourced virtual private network (VPN) solution hosted in an outsourced dedicated host server located in the host company premises.
According to Wikipedia contributors (2007), wireless broadband internet access, often shortened to "broadband internet" or just "broadband", is a high data-transmission rate Internet connection. ...
Download paper
Not exactly what you need?

Related papers

Networking Security and administration
Network Equipment - List of all current network equipment such as routers, switches, encryptors, their current operating system (if any) and version number, their current IP addresses, their physical location, and their logical (network) location.…
Network Infrastructure Assignment
The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both…
Network Management
There does not appear to be a comprehensive IT strategy in place with emphasis on driving the business forward and creating a positive impact on the bottom line. This is reflected in the current network architecture, which is somewhat piecemeal reflecting a 'fire-fighting' approach in its design.…
Wireless Network System for an IT Training Centre
This information is then transmitted through air with the help of a transmitter and received at the other end through a receiver and demodulated. Since both transmission and reception of the signals has to be carried out at the same point, therefore a device known as an 'Access Point' (AP) is used which is a simple transmitter/receiver or transceiver. By assigning different frequencies to…
Telecommunication infrastructure
Ring topology: All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it. Ring topologies are relatively expensive and difficult to install, but they offer high bandwidth and can span large distances.…
Data communications and Network Fundamental
The existing situation in the company's network infrastructure does not allow achieving best performance and security that are necessary at current stage of its development.…
Network Infrastructure
The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both…