Computer Science
Colorado State University Network topology and proposal for RMDC Project

Colorado State University Global Campus

Question Description

I don’t know how to handle this Computer Science question and need guidance.

Note to All writer, l'm requesting for this help because I don't want no plagiarism. There is an answer to my questions on this platform which I don't want to use. I need a fresh and new write up for the Assignment. So Please and please DON NOT COPY AND PASTE what is on this platform and send to me.



Question Description

Scenario

Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.

You have been hired to secure the RMC network and ensure that the company has a properly designed network that allows for future growth (500 users in 12 months) and for the highest levels of security to protect against internal and external attacks.

RMC has scheduled a meeting with its key executives and you in order to provide you with any additional information you may need.

Instructions

In an 8- to 10-page proposal, address the following three sections and their action items to provide a comprehensive secure environment:

Section 1: Topology (type of network) and Network Devices

RMC needs to set up a network; it requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization. The company is looking for guidance regarding the type of network devices that will connect devices to the local area network (LAN).

  • The company asks that you explain what internal and external networking components are required (explain each and justify why you chose the network devices you did).
  • Provide a cryptography method that will ensure vital data is encrypted. Provide an explanation of what network protocols will be used on the LAN and why.
  • Ensure that the network has the capacity to:
    • Connect all users to company resources (e.g. printers, scanners, and other items);
    • Provide file sharing options;
    • Manage these resources in a central location;
    • Allow for internal users to access the internet; and,
    • Allow external users and vendors to access the LAN remotely.
  • Your proposal should include budgetary cost estimates for the chosen topology.

Section 2: IP Infrastructure

RMC has asked that you provide details regarding an IP structure (which includes static, DHCP—or the possibility of both—and proper IP class assignment), which is mindful of the company’s expectation of continued growth.

  • Provide a remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner.

Section 3: Security

Basic security has been in place and now the company would like you to make this a more secure facility in hopes of protecting against internal and external security threats.

  • Generate a plan to provide secure access control methods for all internal-user access including a viable password policy, which includes complexity, duration, and history requirements.
  • Provide a thorough plan to protect the network from malware and various types of malicious attacks.

Submission Requirements

Your proposal should include all of the bulleted elements in the three sections above, with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with outside sources.

  1. Your paper must be 8-10 pages in length, not including the required cover and references pages.
  2. Include a minimum of six sources. (For each of the three sections, include at least two scholarly references as well as material from the Network Pro LabSim.) The CSU-Global Library is a great place to find your sources.
    • You cannot use your textbook as your primary source of information. You must draw on other sources such as books, websites, business and trade journals, legal and compliance journals, government agencies, professional associations, and industry standards, for example.
    • Visit the Library’s special research guide (Links to an external site.)Links to an external site. for this discipline.
    • If you have questions about the format or content of references, discuss it with your instructor.
  3. Ensure your entire document, including citations of sources, is in conformity with the CSU-Global Guide to Writing and APA (Links to an external site.)Links to an external site.. Visit the CSU Global Writing Center (Links to an external site.)Links to an external site. to find numerous guides on how to write and research papers including an APA template paper (Links to an external site.)Links to an external site..
  4. Your submission should include the following (title each portion accordingly):
    • Cover page.
    • Abstract: The abstract is an “executive overview” of your paper. It must be a 50- to 100-word summary that would be appropriate to present to a manager. The abstract provides the reader with the essence of your project without reading the paper in its entirety.
    • Table of Contents: This lists the sections of your paper with corresponding page numbers. Include tables and figures (if you have more than two in your paper), and any appendices.
    • Introduction: In this section, state the basis of the Detailed Technical Proposal—Comprehensive and Secure Solution example that you will be presenting. Discuss how this analysis will be based upon the concepts studied in the course.
    • Body of the paper: Include discussion, implications, and conclusion/recommendations. Provide a thorough discussion of your findings and the implications of your study. Use as headings each of the three sections under Instructions.
    • References.

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Here you go. In case of any further inputs please let me know! Please let me know!All the best! I appreciate working with you!

Running Head: NETWORK TOPOLOGY

1

Network Topology and Proposal for RMC
Name
Course
Tutor
Date

Network TOPOLOGY

2

Contents
Network Topology Proposal for RMC ..........................................Error! Bookmark not defined.
Abstract…………………………………………………………………………………………3
Introduction………………………………………………………………………………………..5
Star Topology Implementation for RMC ...................................Error! Bookmark not defined.
Networking Components of a Star Topology .........................Error! Bookmark not defined.
Cryptography Method for Encryption ....................................Error! Bookmark not defined.
IP Infrastructure ......................................................................Error! Bookmark not defined.
Network Security ....................................................................Error! Bookmark not defined.
Budgetary Cost Estimates .......................................................Error! Bookmark not defined.
References ......................................................................................Error! Bookmark not defined.

Network TOPOLOGY

3
Network Topology and Proposal for RMC
Abstract

The type of network that a company adopts depends on a variety of factors, including its
location, users, and the available resources for use. On a similar vein, a company’s network
topology affects its ability to carry out its responsibility and defines employee processes and
communication. Maximum effort, therefore, is necessary for the establishment of an effective
network topology for RMC as part of its change process to reestablish in its operations, a new
network that assures more efficiency, security, and convenience for the stakeholders. The
proposal introduces the scope of the network, the recommended network type, and
comprehensively details its components, their definitions, and the responsibilities associated with
their presence in the network. It also explores the network’s infrastructural integrity and
composition and the security system that the network adapts. In all this, the proposal relies on
expert statements and research and includes approximate financial estimates for project
completion. The purpose of this proposal is to inform the company’s top management of a brief
outline of the requested change in the network system and its abilities and vulnerabilities and
provide its members for a chance to provide adequate and informed feedback on the matter along
with the necessary technical, financial and physical backing for the project completion.

Network TOPOLOGY

4

Introduction
Rocky Mountain Corporation is moving its headquarters, a process that also means that
the company has to relocate its server and client-based network system, which boasts of 50 users.
However, a change in location requires a corresponding change in the network type and
infrastructure in both its logical and physical perspectives. Logically, the new network ought to
be operable and guarantee efficacy in the performance of everyday activities associated with
networks. The communication process between devices in the network used by employees ought
to remain effective and protected and cover a similar or greater geographical extent for
classification as a success. However, the environment and physical conditions of the new
network system are different from the previous locale, and therefore, sustaining the network’s
efficacy depends on creating a new topology altogether and modifying it to increase its security.
As currently situated, the system has a wireless network that primarily relies on its
default security, which is inadequate according to all Information security experts of note.
The new network, however, has to connect all users to company de...

CASIMIR (26358)
UC Berkeley

Anonymous
The tutor managed to follow the requirements for my assignment and helped me understand the concepts on it.

Anonymous
The tutor was knowledgeable, will be using the service again.

Anonymous
Awesome quality of the tutor. They were helpful and accommodating given my needs.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags