Project Development Life Cycle presentation

User Generated

fuevlna

Business Finance

Description

I need presentation of 15 slides about the above topic.



Acme Corporation is a new startup

wishes to sale: their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government.



Unformatted Attachment Preview

 What is a Network  Network Types ◦ LAN, WAN  Topology ◦ Ring , Star , Bus  Network Risks ◦ Vulnerability is a weak spot in your network that might be exploited by a security threat.  Firewalls ◦ firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. ◦ Firewalls are often categorized as:  Network firewalls: filter traffic between two or more networks and run on network hardware.  Host-based firewalls: run on host computers and control network traffic in and out of those machines.  Virtual Private Network (VPN): ◦ extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. ◦ Applications running across the VPN may therefore benefit from the functionality, security, and management of the private network. * ◦ *Mason, Andrew G. (2002). Cisco Secure Virtual Private Network. Cisco Press. p. 7.  The key model behind the network design process is known as the network development life cycle (NDLC)  Project Analysis  Design  Implementation  Testing   ◦ Information gathering—scope, Requirement. ◦ Flow charts, Flow Diagram, Mock-up, etc… ◦ Purchasing decisions—which switches, routers, firewalls, servers and so on are needed ◦ Ordering equipment ◦ Configuring and installing the servers and network equipment, and testing connectivity and functionality ◦ Monitoring Management Documentation ◦ Creating your document, document your resources, etc..   Think of your presentation as a verbal executive summary. Your presentation should be in the form of Power Point Presentation (PPP). Your presentation should include a minimum of 15 slides (not including title slide).  Remember, you are presenting the good knowledge of your work and should include the merit of your ideas and knowledge. In order to achieve these goals, at the end of the presentation your audience should: ◦ Understand the initial requirement and why it is worth addressing. ◦ Understand how you are addressing your project. ◦ Know what features have you implemented. ◦ Be confident of your knowledge.  Your slides should include the following sections (everything you need is in the Telecommunications Case Assignment document): ◦ Introduction: In this section, you will introduce the project and the objectives of the project including executive summary. ◦ Requirement Analysis: In this section, you will discuss the requirement. ◦ Design: You need diagrams, charts, pics, etc.. ◦ Implementation: diagrams, charts, and possibly screen shots. ◦ Testing (optional): You can present your data testing in this section. ◦ Cost analysis: Estimated cost (you can use the internet to get pricing). Make sure to include labor cost in your analysis. ◦ Conclusion: Summary, lesson learned, future work, etc..  Miscellaneous: ◦ You can assume that your audience has a similar level of technical background to yours, although they know nothing about your project. ◦ Use this presentation as an opportunity to highlight the strengths of your project; i.e. make sure to point out any particularly unusual or creative features.  Power Point Presentation (PPP) additional Instructions: ◦ In order to be most effective, here are some general design guidelines: ◦ Include visual items (diagrams, charts, screen shots). ◦ Use larger font than you would use for a written paper (i.e. don’t use 12 point!).  Acme Corporation is a new startup  wishes to sale: ◦ their new phone to the public called Acmephone, ◦ a more secure version of the phone to business organizations, called the Acmephone B+, and ◦ highly secure version of the phone, called the Acmephone G+, to the government.   Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati  based upon the following specifications: ◦ 1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data. ◦ 2. Each facility has three floors. The buildings are rectangular with each floor being 350’x350’. ◦ 3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building. ◦ 4. The primary data center will be located at the Atlanta location. ◦ 5. There will be a failover* data center at the Cincinnati location.  * Failover is a method of protecting computer systems from failure, in which standby equipment automatically takes over when the main system fails. ◦ 6. Each location should be protected from intrusions that are not limited to state change attacks. ◦ 7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well. ◦ 8. There will be database servers located at the Cincinnati site. ◦ 9. The servers must have redundancy. ◦ 10. The solution must have a plan to verify security measures.  Your job is to develop a network design to meet the requirements above. ◦ 1.You should submit a network drawing listing the network’s topology including any necessary hardware. ◦ 2.You should list any recommended cable. ◦ 3.You can recommend wiring closets wherever you need them. ◦ 4.You should recommend ways to assure that you are not getting attacked. ◦ 5.You should build traps to stop attackers. ◦ 6.You should recommend any WAN or wireless technologies. ◦ 7.You should recommend any technology needed in the data center for high availability. ◦ 8. Justify your recommendations.  Include the following sections: ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ Abstract: Describe the problem and the solution you presenting (few lines) Introduction: In this section, you will introduce the project and the objectives of the project including executive summary. Requirement Analysis: In this section, you will discuss the requirement Design: You need diagrams, charts, pics, etc.. Implementation: diagrams, charts, and possibly screen shots Testing (optional): You can present your data testing in this section Cost analysis: Estimated cost (you can use the internet to get pricing). Make sure to include labor cost in your analysis. Conclusion: Summary, lesson learned, future work, etc.. References        Computer Networking Network Security, Firewalls and VPNs Project Development Life Cycle Network Development Life Cycle ◦ ◦ ◦ ◦ ◦ ◦ Requirement Analysis Design Implementation Testing Management Documentation Project – Case Study Project – Case Study Presentation Project – Case Study Documentation
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Network
Student’s Name
Institutional Affiliation

Abstract
• Acme is striving to have a niche is the telecommunication market through
the sale of their new phone version.

• There are two phone versions; one for business organizations and the other
one for governments.

• In the quest to address security concerns, Acme is designing a secure
network infrastructure between their two campuses.

Introduction
• Both wireless and wired connections are vulnerable to attacks from
unauthorized parties.

• Organizations have to brace themselves with the right arsenals to mitigate
any security threats.

• When designing a secure infrastructure system, organizations must take into
considerations all aspects of the network that may serve as a loophole to
potential attackers or hackers.

Objectives
• The objectives of this project are as follows:
• 1. To establish a secure connection between the Atlanta and Cincinnati
campuses.

• 2. To ensure that each point is connected to the main network
• 3. To determine the most appropriate...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags