Expert Answer:Draft Report Review?

  

Solved by verified expert:Deliverable length: 400-600 wordsReview draft report, and provide meaningful feedback. Refrain from generic feedback, such as simply stating “good job.”Your feedback to other students will be most helpful if you not only point out weak areas but also offer suggestions for improvement.The best feedback takes a 3-stage approach to identify the following: What was done well, Weaknesses and Areas for improvementMy Rational behind updating the hubs to switches is that hubs are out dated and switches provide a direction connection line between the data being shared between the two items. I also recommended VLANs for the workgroups because of the many benefits I found, which include added security, breathing room on the network and easy handling for the network administrator. I also recommended updating the AS400 Mainframe to the IBM iSeries because it is what has replaced the AS400 but can still run legacy AS400 data. I look forward to your review as I am not entirely sure I am doing this right (YIKES).
individual_projects.docx

project_rational.docx

Don't use plagiarized sources. Get Your Custom Essay on
Expert Answer:Draft Report Review?
Just from $10/Page
Order Essay

Unformatted Attachment Preview

Unit 1 Individual Project
The retail store has hired you to assist in resolving the recent networking problems that have
been occurring. The new owner needs you to address the issues so that his company can
accomplish its mission and goals. He thinks that the network needs to expand (or at least be
fixed), but at this point, he has no idea what the current network has or what it needs. The owner
needs you to assess the current network, come up with some conclusions about next steps, and
report the results to him. He wants to make sure that you have a good understanding of his goals
and objectives as well as the presenting problems. You have been asked to develop a solution in
the form of a Network Design and Implementation Plan for your retail store. The project
deliverables for this week are as follows:

Network Architecture Assessment (4–5 pages)
o Describe the general business environment for the case study organization.
o Include a network goals and objectives statement.
o Include a narrative that provides an assessment about the general current state of
the network architecture.
o Include a narrative that details your conclusions about the extent to which the
current network supports the stated business goals and objectives.
o Include a narrative that articulates each of the networking problems that the owner
has presented.
o Provide an analysis as to how this part of the project fulfills the mission and 1 or
more goals of the case study organization.
Unit 2 Individual Project
The retail store has informed you that no documentation of the current network exists. There are
numerous types of data communications that occur in a retail company, and the employees are
willing to explain to you what information they work with and the steps that are involved to
process the daily business transaction paperwork. Assume that the retail store is currently using
open systems interconnection (OSI) and transmission control protocol/Internet protocol (TCP/IP)
in a dual-stacked environment. This has proven to be memory-intensive and has caused an
inability for application internetworking to occur. The project deliverables for this week are as
follows:




Create a network reference model diagram of the current network that describes the role
of each layer for both OSI and TCP/IP that are used to transmit data between the devices
and applications specifically in your retail store.
Create a revised network reference model diagram of the proposed network solution
(using OSI or TCP/IP) that describes the hardware and software that are used to transmit
data between the devices and applications in your retail stores.
Based on the current dual-stacked network environment, create a data flow diagram for
both OSI and TCP/IP that shows at least 4 typical network connections that are made by
users in your retail store. Show how the data and information flow from the user
workstation to the application using both the OSI and TCP/IP network models and the
impact of encapsulation.
Create a revised data flow diagram based on the proposed network solution that shows at
least 4 typical network connections that are made by users in your retail store. Show how



the data and information flow from the user workstation to the application using the
chosen network model (using OSI or TCP/IP) and the impact of encapsulation.
Provide an analysis as to how this part of the project fulfills the mission and 1 or more
goals of the case study organization.
Note: Use Microsoft Visio or equivalent to create the network reference model (current
and revised) and data flow (current and revised) diagrams. You will embed the diagrams
in the Word document and also provide them as attachments. See your Web resources for
additional diagramming tools.
All sources should be cited both in-text and in References using APA format.
Unit 3 Individual Project
The retail store knows that the current network model is not reliable, and the idea of adding a
Web server to host its Web site seems unfeasible. To the best of his ability, Matt (the information
technology [IT] support person) has shared with you that there is an AS/400 mainframe, 15
workstations, a router, several hubs to support 3 workgroups of 5 nodes each, a database, and a
file server. It is hoped that the company will grow and that it will need to hire more employees in
the near future. Internet access is sporadic, but it is supposed to work (according to the cable
company). The project deliverables for this week are as follows:





Create a local area network (LAN) design diagram of the current network that describes
the hardware and software resources that Matt described.
Create a revised LAN design diagram of your proposed network that describes the
hardware and software resources that you recommend be implemented.
o Provide a rationale for your network design.
In support of your revised LAN diagram, provide a specific narrative that details the
specific changes that you are recommending and why you feel that those changes should
be made.
Provide an analysis as to how this part of the project fulfills the mission and 1 or more
goals of the case study organization.
Note: Use Microsoft Visio or equivalent to create the LAN design diagrams (current and
revised). You will embed the diagrams in the Word document and also provide them as
attachments.
Table of Contents
Network Architecture Assessment ………………………………………………………………………………………………… 2
Business Environment………………………………………………………………………………………………………………. 2
Network Goals & Objectives ……………………………………………………………………………………………………… 2
Current Network Architecture …………………………………………………………………………………………………… 4
Conclusions & Analysis……………………………………………………………………………………………………………… 5
Network Reference Model Comparison …………………………………………………………………………………………. 7
Current Network Reference Model Diagram ……………………………………………………………………………….. 7
Current Data Flow Diagram …………………………………………………………………………………………………….. 10
Revised Network Reference Model Diagram ……………………………………………………………………………… 10
Revised Data Flow Diagram …………………………………………………………………………………………………….. 11
Revision Analysis ……………………………………………………………………………………………………………………. 11
Network Design Diagram ……………………………………………………………………………………………………………. 13
Current Local Area Network Design Diagram …………………………………………………………………………….. 13
Revised Local Area Network Design Diagram …………………………………………………………………………….. 14
Rational ………………………………………………………………………………………………………………………………… 15
Analysis ………………………………………………………………………………………………………………………………… 16
Telecommunications Plan …………………………………………………………………………………………………………… 17
Remote Network Implementation Plan ………………………………………………………………………………………… 18
References ……………………………………………………………………………………………………………………………….. 19
Network Architecture Assessment
This section will review the network architecture of the Kohl’s Corporation store that is
located in Lexington Park Maryland. The following sections will describe the general business
environment for the case study organization. Network goals and objectives will be identified as
well as an assessment of the current state of the network architecture. My conclusions about the
extent to which the current network supports the stated business goals and objectives will be
included as well as a review of the networking problems that the owner of this Kohl’s store has
presented. An analysis will also be provided as to how this work fulfills the mission of the new
owner and his organizational goals as well.
Business Environment
The retail store that has hired me to assist in resolving the recent networking problems
that have been occurring with their company is Kohls. Kohls mission is to be the leading familyfocused, value-oriented, specialty department store that offers quality and exclusive national
brand merchandise to their customers in an environment that is convenient, friendly and exciting,
Reference for Business, N.D. Kohls has more than 730 outlets spanning over 41 states in the
United States, Reference for Business, N.D. Kohls opened to the public in 1992 and began
offering online shopping in 2000, Reference for Business, N.D.
Network Goals & Objectives
Kohls is a medium sized retail store that provides an amplitude of home, beauty and
clothing products to the community. The store located in Lexington Park Maryland has 30
employees and is under new management. An issue that has been identified by Michael the new
owner of the Lexington Park location is that the network is running extremely slow. The
company has lost clients due to how slow the network is with processing transactions, linking
customer rewards cards and points as well as printing Kohls cash. Michaels goals are to fix the
network latency issues and increase the Lexington park stores customer base by 10% with the
use of the company’s website and processing paperwork in real-time. This is anything from
return receipts, Kohls Cash printing, Points being deducted, applications for Kohls cards being
handled and processed right at the register.
Michael would also like to see an increase in orders by 5% on a monthly basis. Michael
had an audit conducted on the phone bill for the traditional private branch exchange (PBX) voice
and fax lines. What he discovered was that a significant amount of expense was incurred in the
area of telecommunications. Michael would like for sales representatives to be able to log into
the network remotely and securely but isn’t quite sure how this needs to be accomplished since
the IT technician that is currently working for the company has no network experience.
Michael wants to see fast results which is why he has decided to reach out to a third party
to conduct the network architecture assessment and implement the fixes. In the mean time he is
willing to send the IT Technician, Matt, to a networking class so he can earn a networking
certification. This will benefit the company in the long run. Michael is steadily losing his
customer base to other stores that are in the area such as JC Penny, Macy’s and Belk’s. The last
thing Michael wants is to take over a store and have failed numbers in the first few months of
ownership.
Current Network Architecture
Conducting an analysis on the networks architecture will provide an inventory of the
network devices that are running on the network, identification of network devices to identify
obsolete devices, and needed upgrades, network performance (bottlenecks, TCP issues), single
point of failure identification and a security assessment of network devices, including security
compliant configurations, bugs and vulnerabilities, Intense School, (02 Dec 2014). Looking into
TCP issues will review the upper levels of the OSI model application, presentation and session
all into one process called the Process/Application model, MUSE. FAQ: Internet and TCP/IP
Protocol (2019).
When a site survey is conducted by a network engineer a review of the existing drawing
and documentation of how the network is set up is reviewed, McKenzie, M. (01 June 2012). A
company’s architecture includes the hardware, software, connectivity, communication protocols,
and the mode of transmission of the messages on the network, McKenzie, M. (01 June 2012).
Based off of the site survey drawings that were collected, it appears a virtual private network was
envisioned for the network when the network was set up but the vision wasn’t carried through.
VPN’s need high-speed connections like DSL or cable modems, if asynchronous dial-up is used
then the performance throughput is going to be poor.
To set up the VPN configuration you would need point-to-point (PPTP) or layer two
tunneling protocol (L2TP), MUSE. Virtual Private Network (VPN) Concepts (2019). Layer two
tunneling protocol has it’s advantages, it can handle multiple protocol support, no special drivers
are necessary and it permits access by users who have unregistered IP addresses, MUSE. Virtual
Private Network (VPN) Concepts (2019). It is important to always remember security and the
future vision of the network when working with VPN’s. Who do you want to have access to this
network, what do you want them to have access to on this network?
Conclusions & Analysis
After using SolarWinds to discover the network devices running in the organization,
Wireshark was used to assess the performance of the network. Nessus was used to perform a
security assessment on the network devices as well. A review of the Network File System will be
conducted as well, this is a file-sharing protocol that allows to dissimilar file systems to
interoperate. There may be a lag here or an update that may need to be made to improve network
speeds. Currently, the online system was launched in 2000, but the Lexington park store opened
in 2010.
Since this store opened there have been no new patches or updates to the network. The
firewall blocks access to the network but it looks like the control access should be updated to
enforce their security policies. There seems to be an issue with the direction control access. This
access is responsible for determining the direction in which a particular service request is
initiated and allowed to flow through the firewall, MUSE. Firewalls. (2019).
Currently, I don’t believe the network will be able to boost orders by 5% on a monthly
basis. The customer flow needs to be generated first in the store before the orders can go up for
additional merchandise. To increase the company’s customer base by 10% through the use of the
company’s website Michael will need to move quickly with a decision for the new network
design. Offering a Kiosk in the store that allows customers to order the item they are looking for
in their size was implemented but unfortunately not many customers know about this feature. If
Michael were to offer VPN access for his employees’, they could walk around the store and help
customers order the items they wanted on these Kiosks that link directly to the store’s inventory
ordering system. This would be a way to increase sales.
Providing a faster network will also increase sales. It may be wise to for Michael to hire a
database administrator because a database administrator can make sure that items from the
network are being placed in the correct area on the network. There are sales databases, customer
databases, inventory databases, payroll databases, returns databases, Kohl’s card databases and
more that will need to be managed by this person.
Network Reference Model Comparison
The following sections will provide an overview of the current network model being used
by Kohl’s and the revised network model that Kohl’s wishes to move to.
Current Network Reference Model Diagram
Dual Stacked TCP/IP/ OSI Model
Image Credit: FS.COM (November 3, 2017)
The image above represents the current network reference model for the OSI and TCP/IP
layers that are being used to transmit data between the devices and applications located in the
Kohl’s department store. As you can see the OSI model has seven layers, while the TCP/IP
Model only has four layers that encompass all seven of the OSI model’s layers. The first layer in
the OSI model is the Physical layer. This layer defines specifications directly related to the
electrical and physical specifications of the data connection, FS.COM, (3 Nov 2017). The Data
Link layer is there to provide a link between two nodes that are directly connected, FS.COM, (3
Nov 2017). These are both encompassed under the TCP/IP’s Network Access Layer because that
layer is responsible for placing the TCP/IP packets on the network and receiving packets off the
same network, FS.COM, (3 Nov 2017).
The reason why these layers are directly related is because they all have to do with the data
connection of the network. For the Kohls department store this means that cables that are used to
transfer the messages between the inventory and sales register can be slower or faster depending
on the bit rate of the optical fiber cable, the frequency used for wireless devices or the voltage of
the electrical cables being used in the store, FS.COM, (3 Nov 2017).
The Network Layer, or layer three of the OSI model, handles packet routing using addressing
and switching functions, FS.COM, (3 Nov 2017). Any given network has nodes that can be
connected, each of these nodes has a physical IP address, FS.COM, (3 Nov 2017). When a node
is directed to transfer a message to another node, it is able to send the message and the address of
the node it is talking to over the network, FS.COM, (3 Nov 2017). In simple terms, many people
can relate this to the TCP/IP’s internet layer. The reasoning for this is because the internet layer’s
job is to host addressing, packaging and routing functions, FS.COM, (3 Nov 2017). Nodes
transfer messages much like the protocols in the Internet layer transfer messages through IP
addresses. An example of this would be when a store employee is scanning new merchandise
into the stores inventory via the wireless scanner, it must transmit the data nodes to the correct
node in the inventory network.
The fourth layer of the OSI model and the TCP/IP model is known as the Transport layer. In
the OSI model this layer is responsible for transferring data sequences from one destination from
one host on more than one network, and still maintaining quality of service functions to ensure
the delivery of the data is completed, FS.COM, (3 Nov 2017). It is important to note here that the
protocols that are used in this layer are the TCP and UDP protocols, FS.COM, (3 Nov 2017).
These functions are so similar to the TCP/IP’s transport layer, it’s no wonder they are linked up.
The TCP/IP transport layer is responsible for providing the application layer with session and
communication services. It is here that TCP and UDP are used as the core protocols, just like
with the transport layer in the OSI model.
The fifth layer of the OSI model is the session layer. This layer controls the connections
between computers, FS.COM, (3 Nov 2017). It is here that authentication and authorization
functions take place, FS.COM, (3 Nov 2017). This is considered part of the Application layer of
the TCP/IP model because the application layer provides access to the other layers and provides
the means for data to be exchanged, FS.COM, (3 Nov 2017). This means that when an employee
tries to login to a register with their credentials the application layer/session layer is where the
authentication takes place. It …
Purchase answer to see full
attachment

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code ESSAYSHELP