I have already completed 2 week work. this is a addon question for 3rd week. please review the document and ans further.

User Generated

Nevf10

Writing

Description

The design of your research should now be completed, and you are ready for the execution phase. This is a key step in the research process and should result is meaningful, measurable, and useful information that you will use later for analysis purposes. Proper execution of your research plan will play a large role in the success of your project.

For this assignment, you will continue your work on the project with the execution of the research portion of the project. Research identified in Week 2 will be conducted, results will be gathered, and a summary of the research results will be presented as part of the submission for the week. You will also provide a summary of how well the research process achieved the desired goals for the project.

The project deliverables are the following:

  • New Content: Project Research Execution
    • Research Execution
      • Conduct the research identified in the research plan, and document the process as it is performed.
      • Gather the research results in an organized format that clearly identifies how the results relate to the identified problem(s) and the benefits that can be expected from solutions that have been found.
    • Research Results Summary
      • Summarize the results of the research.
      • ? Include a discussion of specific project objectives that can now be stated based upon the research. Each objective should be unique and not overlap with other objectives and each objective should be supported by information and measures identified via the research. For example, a potential problem could be a trend of reduced customer satisfaction that is correlated with reduced sales. Research concerning what causes this type of problem and research about solutions, may reveal many issues and solutions. For example, customer service could be slow due to an IT system that has a slow response time when customer service representatives access information. The online sales portal that the customers utilize (if there is one) could be too slow – it could also be confusing. It could be that it is needed to consider using Social Media as part of a new customer relations campaign that will place our company more in touch with each specific customer and allow the identification of trends in what customers want and what they think about our company.
      • ? Discuss how tangible and intangible measures are related to each objective and solution. For example, reductions in labor cost due to a proposed change accomplished via a specific IT project, is a tangible measure. An increase in customer satisfaction is less tangible. It can be measured by a validated survey. But what is the monetary value of an increase in customer satisfaction? Company data and other research can show there is a direct correlation between sales and satisfaction and that increases in customer satisfaction are associated with a predictable (within a range) increase in sales.
      • ? Provide a discussion of the relative effectiveness of the research and how it might be improved to gain better results. Was there further information that would be helpful that was not found?

Unformatted Attachment Preview

Project Overview City of Cripple Creek is small municipality with an employee count of 150 in the Colorado State. Under this Municipality there exist various locations which resides several departments of the municipality like public works. Hall of city, police and other transportation, heritage departments. The location city of Hall is one of the major one as it has seven sub departments under it and it is also considered as the main location for the network. The seven sub department sunder the city of Hall were like administration, Finance, Human resources, Development and marketing related departments and all these departments comprises of complete planning, building and historic preservation of the city . The data center is also hosted at the city of hall and it is taken care by the IT company which is a third party consulting firm which also look after the IT needs of the municipality , In total there exists four server inside the city of hall and were like finance related, water billing, web and data storage, and the last one is police department server which is used to store om confidential information and it accommodates the confidentiality requirements of the police department. All these four location were possess wireless connections. And all other external location will have access to the network through VPN connections. Now the main goals of the organization or municipality is to improvise the existing tourism industry with n the city by maintaining a historical background and according to the main goals of the organization, each department of the organization also have some specific goals and objectives to achieve. Thus the organization wants to improvise the existing infrastructure within the organization in two ways. They would lie enhance the architecture of the current network along with enhancement of the security of the network. it is also noticeable that since 5 years, the network underwent no improvements and thus network is now in condition to exhibit the signs of the distress. Project identification The organization is in a need of the upgrading of the current network for the purpose of including the security measures. The current and existing layout of the network in place with in the organization is not meeting the demands put on the network and it is also encountered that current network is not scalable for the threats which were upcoming with the emerging of the cloud computing technology; which Is currently implemented within the police department. Budgets in the past was not allocated in sufficient way required for the appropriate upgrades of the system and thus the current system in place is now became out dated and become more sluggish. The project team will now begin by performing the deep review of the network layout in its current state which will help them in identifying the loopholes with in the current system and also in identifying the various devices that are in place and can determine what are the improvements must be implemented for the purpose of improving the network and also which can help eliminate vulnerabilities ad threats. A deep review over the hardware and software will also help the team with necessary recommendations for the improvement. It is true that understanding what is in place currently and where the organization is going will definitely help the team in providing the appropriate and accurate recommendations. The second step next to the above will include a review of the security measures that is in place currently within the organization. These security measures includes security if the network, policies and procedures along with standards currently in usage. The team will consider this information during the process of identifying the changes in the network configuration. As a final step, the team will now consider all the information gathered so far form the above steps and use those data in researching regarding the alternatives and the upgrades to the existing system within the organization. The team will utilize their past experiences and knowledge gained for the improvement of the security issues in researching the various tools and techniques that are available and using their experiences with the different products to help in producing a layered defense for the organization. Final Topic The main and major areas to be focused by the team will includes management of the network and management of the security. Looking at the enterprise architecture , it can be determined whether there exists any configuration portion problem or not. A thorough review must be carried over the each and every devices and complete layout of the network to check if there are any single faults which can be eliminated and can produce a better network layout of the network which is in place. The aspect t related to the security will have major focus ad certain res were like application data security, operating system security and overall management of the security. This will helps to cover all the aspects of the business among with daily business activities sin detail. Coming to the security of the data which is gathered and stored, there exist several tools and techniques for different types of operating systems within the organization and also for reviewing of the overall security management of the organization. The project team is with enough confidence that by consuming enough time to understand the entire organization and the network currently in place, they can be able to yield a better plan which can helps the organization in all aspects like enhancing its security and increasing it scalability. Reviewing the needs and daily business activities will also provide the team with major insights for the prioritizing the risks within the organization. Project Plan In this step, the team is more focused and look deep towards the problem identified and also discuss regarding how to move forward and this entire process will incudes a plan of research along with a certain timeline for the problem. Thus, grant chart is provided by the team in order to represent the details of the project and also timeline of each phase involved in the project. Research methodology The research methodology of this project involves two hypothesis and the team involved will be responsible for reviewing about the what data to be collected and also involves regular review of the timelines and processes. Even certain discussions among them also conducted over the flow of tasks and also regarding the duration o each activity. Finally, this above process also involves a review of the risks associated with the project along with the suggested risk mitigation strategies. Hypothesis 1 The organization currently facing issues regarding the internal and external connectivity and it is because of the using the outdated network components. The above mentioned first hypothesis will kick started with a the step of collecting the data through surveys from both external and internal resources of the organization. The team will collect the required information from the management of the organization, employees of the organization and also from the consumers of the organization in order to get clearly understand where the actual problem is starting and also for the purpose of coming up with any alternative means to fix the problem . The data collected from above mentioned resources of the organization will actually involves and focuses on what exactly ae the issues these individuals faced in using the system, the general frequency if those recorded issues, and also duration of the each issues resulting in down time. The team will finish the complete layout diagram of the current network to understand how it is configured and working. Even inventory of all the network devices and cables is also carried by the team. Tus network architecture of the organization will become familiar to the team members. Next to the above steps the team will now gather all the data collected from different surveys and will compare this o the current system situation and also about the reasonable expectation for the system. Hypothesis 2 The current network has some security issues because of the degrades network devices and the entire network architecture. The research for the above hypothesis will definitely work in conjunction with the first mentioned hypothesis statement. The data which is collected before formulating the hypothesis will be served as the starting point for this hypothesis, but more focus is laid over the network devices, polices, procedures and the standards of the organization. Feedback from the management about the issues faced in regarding to the security concerns will be recorded and documented by the team members. All the devices used in the network were listed out by the team and also determines regarding the actual security measures currently in place within the network. Even with this step, the employed software programs like anti-virus, anti-malware and certain monitoring systems like IDS or IPS. Risk resulting policies and procedures were also observed primarily by the team. Timelines and Resources The team will next discuss regarding the time line of the entire project for the purpose of including the phases of the project. One year is allocated time to the team by the management for this project and taking this in to consideration, below mentioned is the time breakdown table required for completing the each task to ensure completion of the project in 1 year: The historical data and feedback from the management will plays a key role in successful completion of this project . without clearly understanding the issues facing by the users of the system and also regarding the historical risks associated and occurred in the past , the team cannot contribute towards the enhancement of the systems which in turn reflects over the success of the project negatively. Once after having all the data related to the above mentioned aspects, the team will now research about the tools and products available in the market for enhancing the system’s performance. Tis research of the team will includes internet searching, and trusting the other website and search engines in order to know regarding the latest available technologies in the market. Roles exists in the team being carrying out the above research project will be like network architect, Network engineer, software engineer , programmer and finally a project manager. In order to update the current network devices, the team will be researching over the CISCO and the HP devices available in the market with latest technologies and even look for the cabling replacing with top end and higher efficiency cables available in the market. Even by implementing a proxy server solution by replacing the entire switches, hubs and routers will also provide the tam a opportunity for coming with the solution to the above mentioned two hypothesis. Coming to software solution, Wireshark for network monitoring centrally, and other Microsoft security related programs must also be installed within the system by replacing the old existing software program as the step of improving the current network.’ Risk Management Risk management is one of the key aspect that ne dot considered by each and every project manager as identify9ng the risks that can be encountered and associated with the project will definitely help in the achieving the success of the project. The project team will comes to an realization that each and every project will involves with certain risks and thus involving the risk management and mitigation Plan were mandatory in our project. Thus, some risks associated with the project were document by the team after performing and undergoing barnstorming sessions and thus below mentioned is the partial risk and these were not final risk and each change in the project or existing system may give birth to new risks and it is the responsibility of the team to mitigate and avoid them.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Individual Project assignment 3

Network design and architecture upgrade

Student’s name:
Institutional affiliation:

1

Individual Project assignment 3
Table of Contents
Project Overview ....................................................................................................................... 3
Project identification .................................................................................................................. 4
Final Topic ............................................................................................................................. 5
Project Plan ................................................................................................................................ 6
Research methodology ........................................................................................................... 6
Hypothesis 1 ........................................................................................................................... 6
Hypothesis 2 ........................................................................................................................... 7
Timelines and Resources ........................................................................................................ 7
Risk Management ................................................................................................................... 9
Project Execution ..................................................................................................................... 11
Research Execution .............................................................................................................. 11
Results of the Research ........................................................................................................ 13
Summary of the Research Results ........................................................................................ 17
Proposed Solution .................................................................................................................... 18
Project plan .............................................................................................................................. 20
Cost benefits analysis ............................................................................................................... 21
References ................................................................................................................................ 22

2

Individual Project assignment 3
Project Overview
City of Cripple Creek is small municipality with an employee count of 150 in the Colorado
State. Under this Municipality there exist various locations which resides several departments
of the municipality like public works. The location city of Hall is one of the major one as it
has seven sub departments under it and it is also considered as the main location for the
network. The seven sub department sunder the city of Hall were like administration, Finance,
Human resources, Development and marketing related departments and all these departments
comprises of complete planning, building and historic preservation of the city . The data
center is also hosted at the city of hall and it is taken care by the IT company which is a third
party consulting firm which also look after the IT needs of the municipality.
In total there exists four server inside the city of hall and were like finance related, water
billing, web and data storage, and the last one is police department server which is used to
store om confidential information and it accommodates the confidentiality requirements of
the police department. All these four locations were possess wireless connections. And all
other external location will have access to the network through VPN connections.
Now the main goals of the organization or municipality is to improvise the existing tourism
industry with n the city by maintaining a historical background and according to the main
goals of the organization, each department of the organization also have some specific goals
and objectives to achieve.
Thus the organization wants to improvise the existing infrastructure within the organization
in two ways. They would lie enhance the architecture of the current network along with
enhancement of the security of the network. it is also noticeable that in the last 5 years, the
network underwent no improvements and thus network is now in condition to exhibit the
signs of the distress.

3

Individual Project assignment 3
Project identification
The organization is in a need of the upgrading of the current network for the purpose of
including the security measures. The current and existing layout of the network in place with
in the organization is not meeting the demands put on the network and it is also encountered
that current network is not scalable for the threats which were upcoming with the emerging of
the cloud computing technology; which Is currently implemented within the police
department.
Budgets in the past was not allocated in sufficient way required for the appropriate upgrades
of the system and thus the current system in place is now became out dated and become more
sluggish.
The project team will now begin by performing the deep review of the network layout in its
current state which will help them in identifying the loopholes with in the current system and
also in identifying the various devices that are in place and can determine what are the
improvements must be implemented for the purpose of improving the network and also
which can help eliminate vulnerabilities ad threats. A deep review over the hardware and
software will also help the team with necessary recommendations for the improvement. It is
true that understanding what is in place currently and where the organization is going will
definitely help the team in providing the appropriate and accurate recommendations.
The second step next to the above will include a review of the security measures that is in
place currently within the organization. These security measures includes security if the
network, policies and procedures along with standards currently in usage. The team will
consider this information during the process of identifying the changes in the network
configuration.
As a final step, the team will now consider all the information gathered so far form the above
steps and use those data in researching regarding the alternatives and the upgrades to the
4

Individual Project assignment 3
existing system within the organization. The team will utilize their past experiences and
knowledge gained for the improvement of the security issues in researching the various tools
and techniques that are available and using their experiences with the different products to
help in producing a layered defense for the organization.

Final Topic

The main and major areas to be focused by the team will include management of the network
and management of the security. Looking at the enterprise architecture, it can be determined
whether there exists any configuration portion problem or not. A thorough review must be
carried over the each and every devices and complete layout of the network to check if there
are any single faults which can be eliminated and can produce a better network layout of the
network which is in place. The aspect t related to the security will have major focus ad certain
res were like application data security, operating system security and overall management of
the security.
This will helps to cover all the aspects of the business among with daily business activities
sin detail. Coming to the security of the data which is gathered and stored, there exist several
tools and techniques for different types of operating systems within the organization and also
for reviewing of the overall security management of the organization.
The project team is with enough confidence that by consuming enough time to understand the
entire organization and the network currently in place, they can be able to yield a better plan
which can helps the organization in all aspects like enhancing its security and increasing it
scalability. Reviewing the needs and daily business activities will also provide the team with
major insights for the prioritizing the risks within the organization.

5

Individual Project assignment 3
Project Plan

In this step, the team is more focused and look deep towards the problem identified and also
discuss regarding how to move forward and this entire process will incudes a plan of research
along with a certain timeline for the problem. Thus, grant chart is provided by the team in
order to represent the details of the project and also timeline of each phase involved in the
project.
Research methodology
The research methodology of this project involves two hypothesis and the team involved will
be responsible for reviewing about the what data to be collected and also involves regular
review of the timelines and processes. Even certain discussions among them also conducted
over the flow of tasks and also regarding the duration o each activity.

Finally,

this

above process also involves a review of the risks associated with the project along with the
suggested risk mitigation strategies.
Hypothesis 1
The organization currently facing issues regarding the internal and external connectivity and
it is because of the using the outdated network components.
The above mentioned first hypothesis will kick started with a the step of collecting the data
through surveys from both external and internal resources of the organization. The team will
collect the required information from the management of the organization, employees of the
organization and also from the consumers of the organization in order to get clearly
understand where the actual problem is starting and also for the purpose of coming up with
any alternative means to fix the problem . The data collected from above mentioned resources
of the organization will actually involves and focuses on what exactly ae the issues these
individuals faced in using the system, the general frequency if those recorded issues, and also
6

Individual Project assignment 3
duration of the each issues resulting in down time. The team will finish the complete layout
diagram of the current network to understand how it is configured and working. Even
inventory of all the network devices and cables is also carried by the team. Tus network
architecture of the organization will become familiar to the team members.
Next to the above steps the team will now gather all the data collected from different surveys
and will compare this o the current system situation and also about the reasonable expectation
for the system.
Hypothesis 2
The current network has some security issues because of the degrades network devices and
the entire network architecture.
The research for the above hypothesis will definitely work in conjunction with the first
mentioned hypothesis statement. The data which is collected before formulating the
hypothesis will be served as the starting point for this hypothesis, but more focus is laid over
the network devices, policies, procedures and the standards of the organization. Feedback
from the management about the issues faced in regarding to the security concerns will be
recorded and documented by the team members. All the devices used in the network were
listed out by the team and also determines regarding the actual security measures currently in
place within the network. Even with this step, the employed software programs like antivirus, anti-malware and certain monitoring systems like IDS or IPS. Risk resulting policies
and procedures were also observed primarily by the team.
Timelines and Resources
The team will next discuss regarding the time line of the entire project for the purpose of
including the phases of the project. One year is allocat...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags