Sei sulla pagina 1di 2

NAME: Ted Amachree

DATE: 04/04/2017
PROFESSOR: Tim Culhane
COURSE TITLE: Network Design and Infrastructure
CODE: IT 512.51

CHAPTER 2 (DESIGN SCENERIO)

1. What investigation will you do with regard to the physical infrastructure of the
orchards, the orchards shacks, and the cold storage buildings?

ANSWER:
Investigate the physical design and document hardware and software components,
devices, features and services used. This will also capture information about service
providers selected and the kind of services installed.

2. Make a list of business goals for Hariets fruit and chocolate company. What are
some constraints that will affect these goals?
a. Increase revenue and profit
b. Expand into new markets
c. Offer new customer service
d. Offer new customer services
e. Build relationships and information accessibility to a new level
f. Modernize outdated technology

CONSTRAINTS
Budgetary and staffing constraints
Environmental constraints
Politics and policies

3. Make a list of technical goals for Harriets Fruit and Chocolate company.what
tradeoffs might you need to make to meet these goals?
Scalability
Disaster recovery
Network performance
Security
Manageability
Usability
Adaptability

Answer:
Environmental, weather and affordability challenges would be a tradeoff to meet
cost and budget requirements which will perfectly suit the business goals of the
organization and meet its market share.

4. Will a wireless solution support the low delay that will be needed to meet the needs
of the applications?
Yes; a wireless solution will certainly support the delay and meet the needs of the
applications by boosting the network with more repeaters to eliminate proximity and
transmission delays.

5. What security concerns should you bring up as you design the network upgrade
ANSWER:
I. Eavesdropping Threat: VOIP traffic be placed on a separate VLAN and ensure the
security of the VLANs themselves.
II. How a client without SSL able to connect to a secured server.
III. Issues with evolving from PBX (private branch exchange) telephony to VOIP
(Voice over IP) in the enterprise
IV. MALWARE/VIRUS

Potrebbero piacerti anche