For this assignment, you will apply telecommunication and network technical knowledge in the creation of a network upgrade plan. To create this plan you will assess your leadership role as the IT Project Manager in the design and implementation phases of this network upgrade project.
For this project, you will assume the role of one of the Senior IT Project Managers for Mont Saint Michelle Consulting Company (MSMCC) working in the IT professional services arm of the company. Your firm has been hired by an existing company to assist them in upgrading their current network. The existing company has three office locations: New York, NY, Denver, CO, and Palo Alto, CA. Each location consists of a two-story building that includes local wired and wireless access to about 50 employees. The current wireless setup is insufficient in terms of protocols, security, and encryption levels. All three sites are connected via a wide area network (WAN) to help carry data, voice, and video. The throughput on this current environment is T1. The firm is looking at MSMCC for your expert skills in this type of network upgrade and wants the best value solutions in order to make the most financially responsible and sustainable decision. As the senior IT project manager on this project, you need to work with your team to come up with a network upgrade plan to solve their outdated technology issues.
You must use the ISM640 Network Upgrade Plan Template Download ISM640 Network Upgrade Plan Templatein the creation of your assignment. For each section of the template, include the content required as listed below.
Document History
The information in this section will be pre-populated in the template. The only required content will be your name and date.
Executive Summary
Summarize the project parameters including a short description of each of the following sections: Requirements, Milestones, Budget, and Risks. (There is a sample of an Executive SummaryLinks to an external site. on the Writing Center website.)
Requirements
Evaluate the current telecommunication and network capabilities of the existing company and propose solutions for their outdated technology issues. The individual requirements must include the scope of hardware solutions, software solutions, network protocols, security options, and encryption levels. Provide a rationale for each of the choices made using information from a minimum of two scholarly or professional sources in addition to the course text to support your statements.
Create a network diagram of the proposed solution using applied standard principles of design.
Milestones
Create a high-level table of milestones involved in the implementation of the upgrade including a sequence of realistic completion dates and expected accomplishments.
Budget Create a budget that provides a realistic estimate of the cost of the upgrade plan. Utilize the table in the template, as well as conduct online research for estimated costs.
Risks
Explain a minimum of three potential risks related to your network upgrade plan as well as the corresponding opportunities that would mitigate these risks.
Guide On Rating System
Vote
Executive Summary:
The network upgrade project for the existing company involves assessing and improving their current telecommunication and network capabilities. The project aims to address outdated technology issues by implementing hardware and software solutions, improving network protocols, enhancing security options, and increasing encryption levels. The project milestones include planning, implementation, testing, and final deployment. A budget has been allocated for the upgrade plan, considering the costs of equipment, software, labor, and any additional expenses. Potential risks include network disruption, compatibility issues, and data security breaches, which can be mitigated through proper planning, testing, and training.
Requirements:
1. Telecommunication and Network Capabilities Evaluation:
- Assess the existing company's telecommunication infrastructure, including wired and wireless access.
- Identify hardware and software solutions to replace outdated equipment and improve network performance.
- Propose network protocols that align with industry standards and meet the company's communication requirements.
- Evaluate security options, including firewalls, intrusion detection systems, and authentication mechanisms.
- Determine appropriate encryption levels to protect data transmission.
2. Proposed Solutions Rationale:
- Hardware Solutions: Replace outdated routers, switches, and access points to improve network performance and reliability. The chosen hardware should support the required network protocols and encryption standards.
- Software Solutions: Upgrade network management software and security software to enhance network monitoring and protect against potential threats. The selected software should integrate well with the proposed hardware solutions.
- Network Protocols: Recommend the adoption of modern protocols such as TCP/IP, IPv6, and MPLS to enable efficient and secure data, voice, and video transmission.
- Security Options: Implement firewalls, intrusion detection systems, and virtual private networks (VPNs) to safeguard network traffic from unauthorized access and potential attacks.
- Encryption Levels: Utilize advanced encryption algorithms such as AES (Advanced Encryption Standard) to ensure secure communication across the network.
3. Network Diagram:
- Create a visually appealing and accurate network diagram representing the proposed solution.
- Include all relevant network components, such as routers, switches, access points, and their connections.
- Clearly depict the logical and physical layout of the network, highlighting the proposed upgrades and their interconnections.
Milestones:
1. Planning Phase:
- Define project scope, goals, and objectives.
- Identify stakeholders and establish communication channels.
- Conduct a detailed assessment of the existing network infrastructure.
- Develop the network upgrade plan, including hardware and software specifications.
2. Implementation Phase:
- Procure necessary equipment and software.
- Install and configure new hardware components, including routers, switches, and access points.
- Upgrade network management software and security software.
- Configure network protocols and encryption settings.
- Test the new network setup for functionality and compatibility.
3. Testing Phase:
- Conduct network performance tests to ensure optimal functioning.
- Verify the effectiveness of security measures and encryption levels.
- Test data, voice, and video transmission across the network.
- Address any issues or discrepancies identified during testing.
4. Deployment Phase:
- Train employees on the new network infrastructure and security protocols.
- Implement the upgraded network in the New York, NY, Denver, CO, and Palo Alto, CA office locations.
- Monitor the network for any issues and provide post-deployment support.
Budget:
The estimated cost of the network upgrade plan is as follows:
- Hardware: $X (includes routers, switches, access points)
- Software: $X (network management software, security software)
- Labor: $X (installation, configuration, testing, training)
- Additional expenses: $X (wiring, cabling, miscellaneous)
Total Budget: $X
Risks:
1. Network Disruption:
Risk: The implementation of the network upgrade may cause temporary network disruptions, leading to productivity losses.
Mitigation Opportunity: Plan the upgrade during off-peak hours to minimize the impact on regular business operations. Conduct thorough testing to identify and address any potential issues before deployment.
2. Compatibility Issues:
Risk: The new hardware or software solutions may face compatibility issues with the existing network infrastructure, resulting in integration challenges.
Mitigation Opportunity: Conduct extensive compatibility testing before the implementation phase. Work closely with vendors and manufacturers to ensure seamless integration of new components with the existing network.
3. Data Security Breaches:
Risk: Inadequate security measures or misconfigured settings may expose the network to potential data breaches and unauthorized access.
Mitigation Opportunity: Implement robust security measures, including firewalls, intrusion detection systems, and employee training on data security practices. Regularly monitor network traffic and perform vulnerability assessments to identify and address any potential security vulnerabilities.