Logo
Question DetailsNormal
$ 25.00
CIS 312 Week 10 Assignment 2
Question posted by
request

Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business based on the following information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building. The fourth floor is currently occupied by another tenant.

 

Write a two to four (2-4) page paper in which you:

 

  1. Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions.

  2. Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two (2) differing office space floors.

  3. Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

  4. Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length

  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

 

Your assignment must follow these formatting requirements:

 

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

  • The specific course learning outcomes associated with this assignment are:

  • Explain the complexities in an information technology environment by applying best practices and using appropriate technologies and methodologies.

  • Describe protocols for inter process communication for communication across networks.

  • Outline why the Information Assurance and Security perspective needs to pervade all aspects of information technology.

  • Use technology and information resources to research issues in information technology.

  • Write clearly and concisely about introductory information technology topics using proper writing mechanics and technical style conventions.

 

Click here to view the grading rubric for this assignment.

 

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

 

 

 

Points: 110

Assignment 2: Network Design

Criteria

 

Unacceptable

Below 60% F

Meets Minimum Expectations

60-69% D

 

Fair

70-79% C

 

Proficient

80-89% B

 

Exemplary

90-100% A

1. Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions.

Weight: 20%

Did not submit or incompletelysuggested the equipment that you would utilize to design and implement a network, based on the scenario. Did not submit or incompletelyjustified the need for your suggestions.

Insufficiently suggested the equipment that you would utilize to design and implement a network, based on the scenario. Insufficiently justified the need for your suggestions.

Partially suggested the equipment that you would utilize to design and implement a network, based on the scenario. Partially justified the need for your suggestions.

Satisfactorily suggested the equipment that you would utilize to design and implement a network, based on the scenario. Satisfactorily justified the need for your suggestions.

Thoroughly suggested the equipment that you would utilize to design and implement a network, based on the scenario. Thoroughly justified the need for your suggestions.

2. Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two (2) differing office space floors.

Weight: 20%

Did not submit or incompletelyrecommended the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Did not submit or incompletelysuggested a solution that includes the cabling / connecting of the two (2) differing office space floors.

Insufficiently recommended the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Insufficiently suggested a solution that includes the cabling / connecting of the two (2) differing office space floors.

Partially recommended the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Partially suggested a solution that includes the cabling / connecting of the two (2) differing office space floors.

Satisfactorily recommended the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Satisfactorily suggested a solution that includes the cabling / connecting of the two (2) differing office space floors.

Thoroughly recommended the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Thoroughly suggested a solution that includes the cabling / connecting of the two (2) differing office space floors.

3. Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns.

Weight: 20%

Did not submit or incompletelydetermined the primary security concerns regarding the scenario in question. Did not submit or incompletelyexplained the controls you would implement in order to lessen those concerns.

Insufficiently determined the primary security concerns regarding the scenario in question. Insufficiently explained the controls you would implement in order to lessen those concerns.

Partially determined the primary security concerns regarding the scenario in question. Partially explained the controls you would implement in order to lessen those concerns.

Satisfactorily determined the primary security concerns regarding the scenario in question. Satisfactorily explained the controls you would implement in order to lessen those concerns.

Thoroughly determined the primary security concerns regarding the scenario in question. Thoroughly explained the controls you would implement in order to lessen those concerns.

4. Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

Weight: 25%

Did not submit or incompletelydetailed the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

Insufficiently detailed the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

Partially detailed the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

Satisfactorily detailed the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

Thoroughly detailed the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia.

5. 3 references

Weight: 5%

No references provided

Does not meet the required number of references; all references poor quality choices.

Does not meet the required number of references; some references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

6. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 8 errors present

7-8 errors present

5-6 errors present

3-4 errors present

0-2 errors present

 

 

 

 Please do not give me someone elses work.

Available Solution
$ 25.00
CIS 312 Week 10 Assignment 2
  • This Solution has been Purchased 6 time
  • Submitted On 29 Aug, 2015 08:07:31
Solution posted by
solution
Imagine that you have been hired as a contractor by a local business that has recently purchased new office space for its growing business. Design a network for the local business based on the following information: The business has approximately fifty (50) employees, and the new office space will stretch across the third and fifth floors of a building. The fourth floor is currently occupied by another tenant. Write a two to four (2-4) page paper in which you: Suggest the equipment that you would utilize to design and implement a network, based on the scenario. Justify the need for your suggestions. Recommend the strategy that you would use to combat the design challenge of occupying non-adjacent floors. Suggest a solution that includes the cabling / connecting of the two (2) differing office space floors. Determine the primary security concerns regarding the scenario in question. Explain the controls you would implement in order to lessen those concerns. Detail the specifics of your network design through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Explain the complexities in an information technology environment by applying bes...
Buy now to view full solution.
closebutton

$ 629.35