Sie sind auf Seite 1von 36

CIS 532 Network Architecture and Analysis Student Course Guide Prerequisite: CIS 175 Quarter: Winter 1012

2 Meeting Days/Time: Online Instructor: Nelson Stewart, PhD Instructor Phone: 412-252-2485 Instructor E-mail: Nelson.Stewart@strayer.edu Instructor Office Hours/Location AOL IM: NelStewart06 - Wednesday 8:00-9:00 pm and Friday 8:30-9:30 ET Academic Office Phone Number Strayer Technical Support INSTRUCTIONAL MATERIAL Required Oppenheimer, P. (2011). Top-down network design (3rd ed.). Indianapolis, IN: Pearson Education, Cisco Press. Microsoft Office, Microsoft Visio, and Microsoft Project or their equivalents such as Open Project, Dia, and OpenOffice are required. INSTRUCTIONAL MATERIAL Supporting The following resources provide additional background and supporting information for this course. There is no need to purchase these items for the course. Cisco- http://www.cisco.com/ IEEE - http://www.ieee.org/index.html Sourceforge - http://sourceforge.net/ Internet Engineering Task Force - http://www.ietf.org/ COURSE DESCRIPTION This course focuses on network architecture development concepts and components, including architecture functions and use. It provides the student with the skills required for developing, managing, and sizing architectures in large organizations. Topics include topologies, protocols, connectivity, transactions, and performance.
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

1-877-642-2999

CIS532 Student Version 201103 [1112 03/04/11]

Page 1 of 36

COURSE OUTCOMES Upon the successful completion of this course, the student will be able to: 1. Design a systematic network architecture plan in accordance with network design steps. 2. Summarize among scalability, availability, performance security, manageability, usability, adaptability, and affordability as they relate to internetworking product selection. 3. Evaluate existing Internet work in terms of its infrastructure, logical structure, physical structure, addressing and naming, wiring and media, architectural and environmental constraints, and health. 4. Evaluate the flow, load, behavior, and Quality of Service (QoS) requirements of network traffic. 5. Design a network topology to include hierarchy, redundancy, modularity, and security. 6. Assign and design models for addressing and naming to include a central or distributed authority, public or private addressing, and static or dynamic addressing. 7. Compare and contrast the selection of switching and routing protocols to include interior versus exterior protocols, RIP, RIP2, EIGRP, OSPR, and BGP. 8. Create a network security plan inclusive of identifying and analyzing network assets, security risks, security requirements, and security policy. 9. Develop network management strategies to include resource monitoring and data collection and interpretation. 10. Describe processes that address performance, fault, configuration, security, and accounting management. 11. Summarize network management architecture and monitoring strategies to include management protocols and tools. 12. Compare and contrast the selection of technologies and devices for campus and enterprise networks that include remote access networks, WANs, service providers, end user remote access devices, central site remote access devices, VPN concentrators, and routers. 13. Develop network design testing procedures through services, tools, and testing scripts. 14. Describe optimal network design for critical business applications to include effective use of bandwidth and satisfying Quality of Service (QoS) requirements. 15. Develop a comprehensive network design document. 16. Use technology and information resources to research issues in network architecture and analysis. 17. Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics. Writing Assignments The objective of the School of Information Systems writing assignments is to promote attitudes and skills that will improve a students ability to communicate in writing, develop research skills and documentation techniques, and encourage critical analysis of data and conclusions specific to the course learning outcomes in the information systems and technology domain. COURSE EXPECTATIONS
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 2 of 36

To obtain the most benefit from this class: Follow Strayer Universitys policies and procedures as well as those specific to this class o Class specific information can be found within the Class Information section within the Student Center. WEEKLY COURSE SCHEDULE The weekly schedule describes the learning activities that will help you achieve the course outcomes and the assignments that will be used to measure your mastery of the outcomes. Each week is divided into sections consisting of readings, lectures, discussions, and assignments. For selected assignments, a grading rubric is included in this Course Guide and will be used to evaluate your performance. Assignments are due by midnight of the day posted in the table below. Week 1 2 3 4 5 6 7 8 9 10 11 Assignments Assignment 1: Request for Proposal Response Case Study 1: Harriets Fruit and Chocolate Company Assignment 2: Network Topology Design Midterm Exam Case Study 2: Genome4U? Assignment 3: Network Security Planning Assignment 4: Network Design Executive Plan Case Study 3: Design Scenario, Klamath Paper Products Assignment 5: Technical Term Paper Final Exam Due Date 01-15-12 01-22-12 01-29-12 02-05-12 02-12-12 02-19-12 02-26-12 03-04-12 03-11-12 03-18-12

Course Schedule: (The course schedule to follow provides the start and end dates of the eleven weeks of the course. Note that the schedule requirements for discussion postings does not align with the course schedule. Please review the discussion start day, (Friday) and the end of the discussion week, (Thursday) as noted in the Weekly Discussion Criteria above.) Start Date Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Jan 2 Jan 9 Jan 16 Jan 23 Jan 30 Feb 6 Feb 13 Feb 20 Feb 27 End Date Jan 8 Jan 15 Jan 22 Jan 29 Feb 5 Feb 12 Feb 19 Feb 26 March 4

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 3 of 36

Week 10 Week 11

March 5 March 12

March 11 March 18

Graded Course Components The course will include weekly readings and lectures, discussions, assignments, case studies, a technical term paper, and mid-term and final examinations. Assignments: o Due Dates: Sunday 11:59 pm in the week in which they are assigned and/or as noted in the assignment o Late assignments (submitted after the due date) are subject to up to a 20% point deduction. o Assignments submitted beyond one week after the due date are not accepted (unless previously arranged with professor to submit late) o Submit assignments by clicking on the Assignment link under the appropriate weekly unit and attach your work as a Word 2007-2010 or other acceptable file formats o Refer to the grading requirements and the rubric for individual assignments, case studies, and term paper. Discussions o Due Dates: Sunday 11:59 pm o Minimum Postings: An initial response to each discussion question Respond to classmates: two additional postings (miminum) are required in total to classmates each week. The additional postings can be on one or more discussion threads. Tests: Mid-Term and Final Exams Due Dates: as noted in the course

Point Values for Graded Course Components Refer to the Assignment Outline and Grading table in the Course Guide The Assignment Outline and Grading table provides o specific point values and percentage values for discussions, activities, assignments, and examinations for each weeks components o point values and percentages of overall course evaluation for all course points File Formating Requirements Files should be submitted in MS Word 2007-2010 documents as noted in assignments (MS Office 2007 for other formats as required) Document Naming Protocols Provide files submitted to the dropbox based on the protocol example to follow Format: FirstName_LastName_Assignment
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 4 of 36

Example: Nelson_Stewart_Assignment1

Plagiarism Policy: The following actions constitute plagiarism: Using someones words and ideas and presenting them as your own original thoughts Using someones exact words and ideas without placing them inside quotation marks, using in in-text citations, and including a reference page Using someones words or ideas without citing them in in-text references (parenthetical references) and on a reference page Using someones words or ideas, changing the wording (paraphrasing), and failing to cite them in in-text references and on a reference page Submitting the same assignment for two different classes (self-plagiarism) without the professors knowledge Plagiarism may be intentional (purposely passing over anothers ideas as ones own) or unintentional (inadvertently failing to cite someones ideas and/ or words). Unintentional plagiarism usually occurs because a writer is unfamiliar with the idea that he or she has to give a source credit for his or her ideas by using in-text references and a reference page. All cases of plagiarism will result in a written warning and notification to Student Affairs. APA requirements: Assignments must comply with APA formatting. Two resources to review APA formatting: http://owl.english.purdue.edu/owl/resource/560/01 http://www.apastyle.org/ WEEK 1 Course outcomes in focus: Design a systematic network architecture plan in accordance with network design steps. Summarize among scalability, availability, performance security, manageability, usability, adaptability, and affordability as they relate to internetworking product selection. Activities: Readings: Read Chapter 1: Analyze Business Goals and Constraints Read Chapter 2: Analyze Technical Goal and Tradeoffs Supporting Topics: Lecture 1 Topics: Using a top-down network design methodology Lecture 2 Topics: Scalability Availability

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 5 of 36

Using a structured network design process The system development life cycle Analyzing business goals Analyzing business constraints

Network performance Response time Security Manageability, usability, adaptability, and affordability

Lectures and Discussions: Faculty introduction, course overview, and expectations. Review course philosophy, expectations, assignments, late policy, grading, academic integrity, APA use if appropriate, and attendance policy. Student introductions: please briefly introduce yourself and describe your academic, professional and personal interests. This is a non-graded discussion. Lecture on using a top-down network design methodology, using a structured network design process, the system development life cycle, analyzing business goals, and analyzing business constraints. Discussion 1: Business Goals and Constraints. Students will respond to the following: o Discuss some of the key considerations in designing a network design strategy. What approaches have worked for you in your present role or would you propose in a future systems planning role for an organization? Lecture on scalability, availability, network performance, response time, security, and manageability, usability, adaptability, and affordability. Discussion 2: Technical Goals and Tradeoffs. Students will respond to the following: o Describe how technical goals can be coupled with information assurance and security considerations in a network design project. WEEK 2 Course outcomes in focus: Evaluate existing Internet work in terms of its infrastructure, logical structure, physical structure, addressing and naming, wiring and media, architectural and environmental constrains, and health. Evaluate the flow, load, behavior, and Quality of Service (QoS) requirements of network traffic. Activities:
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 6 of 36

Readings: Read Chapter 3: Characterizing the Existing Internetwork Read Chapter 4: Characterizing Network Traffic e-Activity: Research cloud computing to determine whether or not cloud computing fits into the types of traffic flow discussed in the book. Supporting Topics: Lecture 1 Topics: Characterizing the network infrastructure Developing a network map Characterizing network addressing and naming Characterizing wiring and media Checking architectural and environmental constraints Checking the health of the existing network Analyzing network availability and efficiency Checking the status of major routers, switches, and firewalls Lecture 2 Topics: Characterizing traffic flow Characterizing types of traffic flow for new network applications Documenting traffic flow on new and existing network applications Calculating theoretical traffic load Characterizing traffic behavior Characterizing Quality of Service (QoS) requirements

Lectures/Discussions: Lecture on characterizing the network infrastructure, developing a network map, characterizing network addressing and naming, characterizing wiring and media, checking architectural and environmental constraints, checking the health of the existing network, analyzing network availability and efficiency, and checking the status of major routers, switches, and firewalls. Discussion 1: Characterizing the Existing Internetwork. Students will respond to the following: o Explain the process of characterizing a new internetwork using the OSI model as its foundation. What tools would you use to assist in your planning efforts? Lecture on characterizing traffic flow, characterizing types of traffic flow for new network applications, documenting traffic flow on new and existing network applications, calculating theoretical traffic load, characterizing traffic behavior, and characterizing Quality of Service (QoS) requirements. Discussion 2: Characterizing Network Traffic. Students will respond to the following:

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 7 of 36

o From your research on cloud computing, explain how cloud computing fits the types of traffic flow discussed in the textbook (terminal/host, client/server, peer to peer, server/server, and distributed computing) or explain whether it is a new type of traffic flow. Defend your answer. Assignment 1: Request for Proposal Response This assignment is due for online students by midnight on Sunday of Week 2 and for onground students before Week 3s class meeting. Submit your assignment to the course shell. You are a $10 million consulting company responding to a Request for Proposal for a prospective client. The client seeks an analysis of its existing network in anticipation of a large merger. This engagement would be worth over $5 million in revenue to your $10 million company. The client seeks to ensure that your small organization has the technical acumen to prepare, guide, and assess merging the two company networks. Write a two to three (2-3) page paper in which you: 1. Prepare an opening statement that specifies your organizations capabilities to manage a deployment of this size. 2. Graphically depict and effectively promote your companys structured development and services. 3. Explain what the client can expect from your services. The format of the paper is to be as follows: o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format. o Type the question followed by your answer to the question. o In addition to the two to three (2-3) pages required, a title page is to be included. The title page is to contain the title of the assignment, your name, the instructors name, the course title, and the date. Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills. The assignment will be graded using the following rubric:
Design a systematic network architecture plan in accordance with network design steps. Summarize among scalability, availability, performance security, manageability, usability, adaptability, and affordability as they relate to internetworking product selection. Outcomes Assessed Use technology and information resources to research issues in network architecture and analysis. Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics. Grading Rubric for Assignment 1 Request for Proposal Response

Criteria 1. Prepare an opening statement

Unacceptable Did not complete the assignment or did

Developing Partially prepared an opening statement

Competent Sufficiently prepared an opening

Exemplary Fully prepared an opening statement

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 8 of 36

that specifies your organizations capabilities to manage a deployment of this size.

2. Graphically depict and effectively promote your companys structured development and services.

3. Explain what the client can expect from your services.

4. Clarity

5. Writing Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

not prepare an opening statement that specifies your organizations capabilities to manage a deployment of this size; omitted key information and/or included irrelevant information. 0-9 points Did not complete the assignment or did not graphically depict and effectively promote your companys structured development and services; omitted key information and/or included irrelevant information. 0-9 points Did not complete the assignment or did not explain what the client can expect from your services; omitted key information and/or included irrelevant information. 0-5 points Did not complete the assignment, or explanations are unclear and not organized, (Major issues) 0-2 points Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues) 0-2 points

that specifies your organizations capabilities to manage a deployment of this size; omitted some key information.

statement that specifies your organizations capabilities to manage a deployment of this size.

that specifies your organizations capabilities to manage a deployment of this size.

11 points Partially graphically depicted and effectively promoted your companys structured development and services; omitted some key information.

13 points Sufficiently graphically depicted and effectively promoted your companys structured development and services.

15 points Fully graphically depicted and effectively promoted your companys structured development and services.

11 points Partially explained what the client can expect from your services; omitted some key information.

13 points Sufficiently explained what the client can expect from your services.

15 points Fully explained what the client can expect from your services.

7 points Explanations generally unclear and not well organized. (Many issues) 3 points Had 67 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues)

8 points Explanations generally clear and/or organized. (Minor issues) 4 points Had 45 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues) 4 points

10 points Explanations very clear and well organized. (Added helpful details) 5 points Had 03 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

3 points

5 points

WEEK 3
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 9 of 36

Course outcome in focus: Design a network topology to include hierarchy, redundancy, modularity, and security. Activities: Readings: Read Chapter 5: Designing a Network Topology Supporting Topics: Lecture 1 Topics: Microsoft Project Microsoft Visio Other open source alternatives Lecture 2 Topics: Hierarchal network design The classical three-layer hierarchical model Guidelines for hierarchical network design Redundant network design topologies Modular network design Designing a campus network design topology Virtual and wireless LANs Secure network design topologies

Lectures/Discussions: Lecture on using Microsoft Project, Microsoft Visio, and other open source alternatives. Present a live workshop demonstrating how to use the software. Lecture on hierarchical network design, the classical three-layer hierarchical model, guidelines for hierarchical network design, redundant network design topologies, modular network design, designing a campus network design topology, virtual and wireless LANs, and secure network design topologies. Discussion 1: Designing a Network Topology. Students will respond to the following: o Present real-world examples that describe the significance of designing modular, redundant, and secure network architectures. Defend your answer from a technical perspective. Discussion 2: Network Hierarchy. Students will respond to the following: o Contrast the various types of servers or services that can be placed at the access, distribution, and core layers. Case Study 1: Harriets Fruit and Chocolate Company This assignment is due for online students by midnight on Sunday of Week 3 and for onground students before Week 4s class meeting. Submit your assignment to the course shell.
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 10 of 36

Read the Harriets Fruit and Chocolate Company case study found in Chapter 2 of the textbook. Then, answer the questions below. Each response should be one (1) paragraph in length submitted in MS Word and the submission is not to exceed two (2) pages. Write a one to two (1-2) page paper that addresses: 1. What investigation will you do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building? 2. Make a list of business goals for Harriets Fruit and Chocolate Company. What are some constraints that will affect these goals? 3. Make a list of technical goals for Harriets Fruit and Chocolate Company. What tradeoffs might you need to make to meet these goals? 4. Will a wireless solution support the low delay that will be needed to meet the needs of the applications? Defend your answer. 5. What security concerns should you bring up as you design the network upgrade? The format of the paper is to be as follows: o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format. o Type the question followed by your answer to the question. o In addition to the one to two (1-2) pages required, a title page is to be included. The title page is to contain the title of the assignment, your name, the instructors name, the course title, and the date. Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills. The assignment will be graded using the following rubric:
Summarize among scalability, availability, performance security, manageability, usability, adaptability, and affordability as they relate to internetworking product selection. Outcomes Assessed Use technology and information resources to research issues in network architecture and analysis. Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics. Grading Rubric for Case Study 1 Harriets Fruit and Chocolate Company

Criteria 1. Determine what investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building.

Unacceptable Did not complete the assignment or did not determine what investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building;

Developing Partially determined what investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building; omitted some key

Competent Sufficiently determined what investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building.

Exemplary Fully determined what investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building.

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 11 of 36

2. Make a list of business goals for Harriets Fruit and Chocolate Company and determine some constraints that will affect these goals.

3. Make a list of technical goals for Harriets Fruit and Chocolate Company and determine what tradeoffs you might need to make to meet these goals.

4. Determine if a wireless solution will support the low delay that will be needed to meet the needs of the applications. Defend your answer.

5. Determine what security concerns you should bring up as you design the network upgrade.

omitted key information and/or included irrelevant information. 0-6 points Did not complete the assignment or did not make a list of business goals for Harriets Fruit and Chocolate Company and determine some constraints that will affect these goals; omitted key information and/or included irrelevant information. 0-9 points Did not complete the assignment or did not make a list of technical goals for Harriets Fruit and Chocolate Company and determine what tradeoffs you might need to make to meet these goals; omitted key information and/or included irrelevant information. 0-9 points Did not complete the assignment or did not determine if a wireless solution will support the low delay that will be needed to meet the needs of the applications. Did not defend your answer; omitted key information and/or included irrelevant information. 0-6 points Did not complete the assignment or did not determine what security concerns you should bring up as you design the network upgrade;

information.

7 points Partially made a list of business goals for Harriets Fruit and Chocolate Company and determined some constraints that will affect these goals; omitted some key information.

8 points Sufficiently made a list of business goals for Harriets Fruit and Chocolate Company and determined some constraints that will affect these goals.

10 points Fully made a list of business goals for Harriets Fruit and Chocolate Company and determined some constraints that will affect these goals.

11 points Partially made a list of technical goals for Harriets Fruit and Chocolate Company and determined what tradeoffs you might need to make to meet these goals; omitted some key information.

12 points Sufficiently made a list of technical goals for Harriets Fruit and Chocolate Company and determined what tradeoffs you might need to make to meet these goals.

15 points Fully made a list of technical goals for Harriets Fruit and Chocolate Company and determined what tradeoffs you might need to make to meet these goals.

11 points Partially determined if a wireless solution will support the low delay that will be needed to meet the needs of the applications and defended your answer; omitted some key information.

12 points Sufficiently determined if a wireless solution will support the low delay that will be needed to meet the needs of the applications and defended your answer.

15 points Fully determined if a wireless solution will support the low delay that will be needed to meet the needs of the applications and defended your answer.

7 points Partially determined what security concerns you should bring up as you design the network upgrade; omitted some key

8 points Sufficiently determined what security concerns you should bring up as you design the network upgrade.

10 points Fully determined what security concerns you should bring up as you design the network upgrade.

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 12 of 36

6. Clarity

7. Writing Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

omitted key information and/or included irrelevant information. 0-6 points Did not complete the assignment, or explanations are unclear and not organized. (Major issues) 0-2.5 points Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues) 0-2.5 points

information.

7 points Explanations generally unclear and not well organized. (Many issues) 3.5 points Had 67 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues)

8 points Explanations generally clear and/or organized. (Minor issues) 4 points Had 45 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues) 4 points

10 points Explanations very clear and well organized. (Added helpful details) 5 points Had 03 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

3.5 points

5 points

WEEK 4 Course outcome in focus: Assign and design models for addressing and naming to include a central or distributed authority, public or private addressing, and static or dynamic addressing. Activities: Readings: Read Chapter 6: Designing Models for Addressing and Numbering Supporting Topics: Lecture Topics: Guidelines for assigning network layer addresses Using hierarchical model for assigning addresses Classless routing versus classful routing Designing a model for naming Lectures/Discussions: Lecture on guidelines for assigning network layer addresses, using hierarchical model for assigning addresses, classless routing versus classful routing, and designing a model for naming. Discussion 1: Addressing and Numbering. Students will respond to the following: o Discuss how you would develop an addressing and naming model in an environment that has 10 departments in a 1000 employee organization, are equally separated by geography, and use a common data center of 20 backend
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 13 of 36

enterprise servers. How would you utilize hierarchical addressing in this scenario? Discussion 2: Routing Protocols. Students will respond to the following: o Compare and contrast classless with classful routing. Support and cite your response with real-world examples. Assignment 2: Network Topology Design This assignment is due for online students by midnight on Sunday of Week 4 and for onground students before Week 5s class meeting. Submit your assignment to the course shell. You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no offsite disaster recovery services or servers. The network design remains a non-redundant, flat topology. Your assignment must consider the three-layer hierarchical model. You are free to make supported assumptions of the applications and services that this organization uses. Write a two to three (2-3) page paper that is supported by a Visio or similar graphic model in which you: 1. Depict a network topology graphical model of the initial environment of 10 employees. 2. Depict a network topology graphical model of the current 100 employees. 3. Depict a network topology graphical model for future growth to 200 employees. 4. Create a two-paragraph executive summary. The format of the paper is to be as follows: o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format. o Type the question followed by your answer to the question. o In addition to the two to three (2-3) pages required, a title page is to be included. The title page is to contain the title of the assignment, your name, the instructors name, the course title, and the date. Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills. The assignment will be graded using the following rubric:
Outcomes Assessed Design a network topology to include hierarchy, redundancy, modularity, and security. Use technology and information resources to research issues in network architecture and analysis.

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 14 of 36

Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics. Grading Rubric for Assignment 2 Network Topology Design

Criteria 1. Depict a network topology graphical model of the initial environment of 10 employees.

2. Depict a network topology graphical model of the current 100 employees.

3. Depict a network topology graphical model for future growth to 200 employees.

Unacceptable Did not complete the assignment or did not depict a network topology graphical model of the initial environment of 10 employees; omitted key information and/or included irrelevant information. 0-9 points Did not complete the assignment or did not depict a network topology graphical model of the current 100 employees; omitted key information and/or included irrelevant information. 0-9 points Did not complete the assignment or did not depict a network topology graphical model for future growth to 200 employees; omitted key information and/or included irrelevant information. 0-5 points Did not complete the assignment or did not create a twoparagraph executive summary; omitted key information and/or included irrelevant information. 0-2 points Did not complete the assignment, or explanations are

Developing Partially depicted a network topology graphical model of the initial environment of 10 employees; omitted some key information.

Competent Sufficiently depicted a network topology graphical model of the initial environment of 10 employees.

Exemplary Fully depicted a network topology graphical model of the initial environment of 10 employees.

11 points Partially depicted a network topology graphical model of the current 100 employees; omitted some key information.

13 points Sufficiently depicted a network topology graphical model of the current 100 employees.

15 points Fully depicted a network topology graphical model of the current 100 employees.

11 points Partially depicted a network topology graphical model for future growth to 200 employees; omitted some key information.

13 points Sufficiently depicted a network topology graphical model for future growth to 200 employees.

15 points Fully depicted a network topology graphical model for future growth to 200 employees.

4. Create a twoparagraph executive summary

7 points Partially created a two-paragraph executive summary; omitted some key information.

8 points Sufficiently created a two-paragraph executive summary.

10 points Fully created a twoparagraph executive summary.

5. Clarity, writing, grammar, sentence structure, paragraph

3 points Explanations generally unclear and not well

4 points Explanations generally clear and/or organized;

5 points Explanations very clear and well organized.

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 15 of 36

structure, spelling, punctuation, APA usage.

unclear and not organized; had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues). 0-2 points

organized; had 67 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues). 3 points

had 45 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues). 4 points

(Added helpful details.) Had 03 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. 5 points

WEEK 5 Course outcomes in focus: Compare and contrast the selection of switching and routing protocols to include interior versus exterior protocols, RIP, RIP2, EIGRP, OSPR, and BGP. Develop a comprehensive network design document. Activities: Readings: Read Chapter 7: Selecting Switching and Routing Protocols Read Chapter 14: Documenting Your Network Design e-Activity: Search the Web for business or government computing organizations that have used a request for proposal (RFP) Supporting Topics: Lecture 1 Topics: Selecting switching protocols Selecting routing protocols Using multiple routing protocols in an internetwork Lecture 2 Topics: Responding to a request for proposals (RFP) Contents of a network design document: o Executive summary o Project goal o Project scope o Design requirements (business goals, technical goals, user communities and data stores, and network applications) o Current state of the network o Logical design o Physical design o Results of network design testing o Implementation plan (project schedule) o Project budget (return on investment)

Lectures/Discussions: Lecture on the selecting switching protocols, selecting routing protocols, and using
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 16 of 36

multiple routing protocols in an internetwork. Discussion 1: Routing and Switching Selection Criteria. Students will respond to the following: o Compare and contrast distance-vector and link-state routing. If you were designing a new routing protocol, which would you use and why? Lecture on responding to a request for proposals, contents of a network design document, including: executive summary, project goal, project scope, design requirements (business goals, technical goals, user communities and data stores, network applications) current state of the network, logical design, physical design, results of network design testing, implementation plan (project schedule), and project budget (return on investment). Discussion 2: Documenting Your Network Design. Students will respond to the following: o Describe the process you used (or will use) to derive the budget and project schedule for your technical term paper. What recommendation would you offer your colleagues when developing a network design plan? Midterm Exam: The exam is available in the course shell under Week 5. There are 2.5 hours allocated to take the exam and it is worth 200 points. Online students must complete the exam before midnight Sunday of Week 5 and onground students must complete the exam before the Week 6 class. WEEK 6 Course outcomes in focus: Compare and contrast the selection of switching and routing protocols to include interior versus exterior protocols, RIP, RIP2, EIGRP, OSPR, and BGP. Create a network security plan inclusive of identifying and analyzing network assets, security risks, security requirements, and security policy. Activities: Readings: Read Chapter 8: Developing Network Security Strategies e-Activity: Research security issues pertaining to routing protocols and be ready to discuss in class Supporting Topics: Lecture Topics: Network security design Security mechanisms
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 17 of 36

Modularizing security design Securing remote access and VPNs Securing wireless services

Lectures/Discussions: Lecture on network security design, security mechanisms, modularizing security design, securing remote access and VPNs, and securing wireless services. Discussion 1: Selecting Switching and Routing Protocols. Students will respond to the following: o Select a routing protocol that interests you, whether its RIP vs. OSPF, EIGRP, BGP, or a different routing protocol. Research any security issues associated with this routing protocol. Discussion 2: Developing Network Security Strategies. Students will respond to the following: o Describe the modular approach to security design. Find a recent computing security breach in the news and present how a modular approach may have been used to prevent the security breach. Case Study 2: Genome4U? This assignment is due for online students by midnight on Sunday of Week 6 and for on-ground students before Week 7s class meeting. Submit your assignment to the course shell. Read the Genome4U case study found in Chapter 7 of the textbook. Write a two to four (2-4) page paper in which you: 1. Design a plan to integrate the different routing protocols into a new network design for Genome4Us lab. 2. What information will you redistribute between routing protocols? 3. Identify the problems you expect to encounter (with different metrics, security, etc.) when you redistribute. 4. Explain how you will overcome the problems. 5. Explain how you will provide Internet access. The format of the paper is to be as follows: o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format. o Type the question followed by your answer to the question. o In addition to the two to four (2-4) pages required, a title page is to be included. The title page is to contain the title of the assignment, your name, the instructors name, the course title, and the date.
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 18 of 36

Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills. The assignment will be graded using the following rubric:
Outcomes Assessed Compare and contrast the selection of switching and routing protocols to include interior versus exterior protocols, RIP, RIP2, EIGRP, OSPR, and BGP. Use technology and information resources to research issues in network architecture and analysis. Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics. Grading Rubric for Case Study 2 Genome4U?

Criteria 1. Present a plan to integrate the different routing protocols into a new network design for Genome4Us lab.

2. Describe the information that you will need to redistribute among routing protocols.

3. Identify the problems you expect to encounter (with different metrics, security, etc.) when you redistribute.

Unacceptable Did not complete the assignment or did not present a plan to integrate the different routing protocols into a new network design for Genome4Us lab; omitted key information and/or included irrelevant information. 0-6 points Did not complete the assignment or did not describe the information that you will need to redistribute among routing protocols; omitted key information and/or included irrelevant information. 0-9 points Did not complete the assignment or did not identify the problems you expect to encounter (with different metrics, security, and etc.) when you redistribute; omitted key information and/or included irrelevant information.

Developing Partially presented a plan to integrate the different routing protocols into a new network design for Genome4Us lab; omitted some key information.

Competent Sufficiently presented a plan to integrate the different routing protocols into a new network design for Genome4Us lab.

Exemplary Fully presented a plan to integrate the different routing protocols into a new network design for Genome4Us lab.

7 points Partially described the information that you will need to redistribute among routing protocols; omitted some key information.

8 points Sufficiently described the information that you will need to redistribute among routing protocols.

10 points Fully described the information that you will need to redistribute among routing protocols.

11 points Partially identified the problems you expect to encounter (with different metrics, security, etc.) when you redistribute; omitted some key information.

12 points Sufficiently identified the problems you expect to encounter (with different metrics, security, etc.) when you redistribute.

15 points Fully identified the problems you expect to encounter (with different metrics, security, etc.) when you redistribute.

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 19 of 36

4. Explain how you will overcome the problems.

5. Explain how you will provide Internet access.

6. Clarity

7. Writing Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

0-9 points Did not complete the assignment or did not explain how you will overcome the problems; omitted key information and/or included irrelevant information. 0-6 points Did not complete the assignment or did not explain how you will provide Internet access; omitted key information and/or included irrelevant information. 0-6 points Did not complete the assignment, or explanations are unclear and not organized. (Major issues) 2.5 points Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues) 0-2.5 points

11 points Partially explained how you will overcome the problems; omitted some key information.

12 points Sufficiently explained how you will overcome the problems.

15 points Fully explained how you will overcome the problems.

7 points Partially explained how you will provide Internet access; omitted some key information.

8 points Sufficiently explained how you will provide Internet access.

10 points Fully explained how you will provide Internet access.

7 points Explanations generally unclear and not well organized. (Many issues) 3.5 points Had 67 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues). 3.5 points

8 points Explanations generally clear and/or organized. (Minor issues) 4 points Had 45 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues) 4 points

10 points Explanations very clear and well organized. (Added helpful details) 5 points Had 03 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. 5 points

WEEK 7 Course outcomes in focus: Develop network management strategies to include resource monitoring and data collection and interpretation. Describe processes that address performance, fault, configuration, security, and accounting management. Summarize network management architecture and monitoring strategies to include management protocols and tools. Activities: Readings: Read Chapter 9: Developing Network Management Strategies Supporting Topics:
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 20 of 36

Lecture Topics: Network management design Network management processes to include: o Fault o Configuration o Accounting o Performance o Security Network managements tools and protocols Lectures/Discussions: Lecture on network management design, network management processes to include: fault, configuration, accounting, performance and security; and network management tools and protocols. Discussion 1: Developing Network Management Strategies. Students will respond to the following: o Select and describe one (1) of the five (5) network management processes. Search the Web for tools that support your selected process. How is this product or tool used? Please be sure to cite your sources. Discussion 2: Network Security. Students will respond to the following: o When designing network management for your customer, what security concerns will you be addressing? Support your response. Assignment 3: Network Security Planning This assignment is due for online students by midnight on Sunday of Week 7 and for onground students before Week 8s class meeting. Submit your assignment to the course shell. Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture, review the modules that afford an organization the foremost protection in evolving technologies and media. Write a two to three (2-3) page paper in which you: 1. Determine if the SAFE architecture has any limitations. 2. Defend and support your response with at least three (3) professional references. The format of the paper is to be as follows: o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format. o Type the question followed by your answer to the question.
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 21 of 36

o In addition to the two to three (2-3) pages required, a title page is to be included. The title page is to contain the title of the assignment, your name, the instructors name, the course title, and the date. Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills. The assignment will be graded using the following rubric:
Create a network security plan inclusive of identifying and analyzing network assets, security risks, security requirements, and security policy. Develop network management strategies to include resource monitoring and data collection and interpretation. Use technology and information resources to research issues in network architecture and analysis. Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics. Grading Rubric for Assignment 3 Network Security Planning

Outcomes Assessed

Criteria 1. Determine if the SAFE architecture has any limitations.

2. Include three (3) references to peerreviewed journals in support of your answer. 3. Clarity

Unacceptable Did not complete the assignment or did not determine if the SAFE architecture has any limitations; omitted key information and/or included irrelevant information. 0-9 points Included no references to peerreviewed journals in support of your answer.

Developing Partially determined if the SAFE architecture has any limitations; omitted some key information.

Competent Sufficiently determined if the SAFE architecture has any limitations.

Exemplary Fully determined if the SAFE architecture has any limitations.

11 points Included one (1) reference to peerreviewed journals in support of your answer.

13 points Included two (2) references to peerreviewed journals in support of your answer.

15 points Included three (3) or more references to peer- reviewed journals in support of your answer.

0-9 points 11 points 13 points 15 points Did not complete the Explanations Explanations Explanations very assignment, or generally unclear generally clear clear and well explanations are and not well and/or organized. organized. unclear and not organized. (Minor issues) (Added helpful organized. (Many issues) details) (Major issues) 0-5 points 7 points 8 points 10 points 4. Writing Did not complete the Had 67 different Had 45 different Had 03 different Grammar, sentence assignment or had 8 errors in grammar, errors in grammar, errors in grammar, structure, paragraph or more different sentence structure, sentence structure, sentence structure, structure, spelling, errors in grammar, paragraph structure, paragraph structure, paragraph structure, punctuation, APA sentence structure, spelling, spelling, spelling, usage. paragraph structure, punctuation, or APA punctuation, or APA punctuation, or APA spelling, usage. (Many issues) usage. (Minor usage. punctuation, or APA issues) usage. (Major issues) 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 22 of 36

0-4 points

6 points

8 points

10 points

WEEK 8 Course outcome in focus: Compare and contrast the selection of technologies and devices for campus and enterprise networks that include remote access networks, WANs, service providers, end user remote access devices, central site remote access devices, VPN concentrators, and routers. Activities: Readings: Read Chapter 10: Selecting Technologies and Devices for Campus Networks Read Chapter 11: Selecting Technologies and Enterprise Networks Supporting Topics: Lecture 1 Topics: LAN cabling plant design, including: o Cabling topographies o Types of cables LAN technologies Selecting internetworking devices Lecture 2 Topics: Remote access technologies to include: o Point-to-point protocols o Cable modems o Digital subscriber lines Review of the following WAN technologies: o Leased lines o SONET o Frame Relay o ATM o Metro Ethernet Selecting routers for an enterprise WAN design Selecting a WAN service provider

Lectures/Discussions: Lecture on LAN cabling plant design, including: cabling topographies and types of cables; LAN technologies; and selecting internetworking devices. Discussion 1: Campus Networks. Students will respond to the following: o Review and describe the most important criteria for selecting internetworking devices at the core, access, and distribution layer in a computer network. Lecture on remote access technologies to include point-to-point protocols, cable modems, and digital subscriber lines; a review of the following WAN technologies: leased lines, SONET, Frame Relay, ATM and Metro Ethernet; selecting routers for an enterprise WAN design; and, selecting a WAN service

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 23 of 36

provider. Discussion 2: Enterprise Networks. Students will respond to the following: o Describe the key criteria involved in selecting WAN technologies and WAN providers. Discuss which criteria is the most important from your perspective and state why. Assignment 4: Network Design Executive Plan This assignment is due for online students by midnight on Sunday of Week 8 and for on-ground students before Week 9s class meeting. Submit your assignment to the course shell. In this assignment you are to submit the Network Design Executive PowerPoint Presentation for the term paper. This is the first of two parts for your technical paper submission. Part A is a persuasive Executive PowerPoint presentation of up to 15 slides that you will present to the Executive Committee of Fiction Corporation. The PowerPoint must include the following in accordance with Chapter 14 of the text: 1. 2. 3. 4. 5. Title page Executive summary Project goal Project scope Design requirements: a. Business goals b. Technical goals c. User communities and data stores d. Network applications 6. Current state of the network 7. Logical design 8. Physical design 9. Results of network design testing 10. Implementation plan with a project schedule 11. Project budget with a return on investment calculation Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills. The assignment will be graded using the following rubric:
Outcomes Assessed

Develop a comprehensive network design document. Use technology and information resources to research issues in network architecture and analysis.

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 24 of 36

Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics. Grading Rubric for Assignment 4 Network Design Executive Plan

Criteria 1. Executive summary

2. Project goal

3. Project scope

Unacceptable Did not complete the assignment or did not develop an executive summary that would persuade the Executive Committee of Fiction Corporation. 0 1 point Did not complete the assignment or did not develop a project goal that would persuade the Executive Committee of Fiction Corporation. 0-1 point Did not complete the assignment or did not develop a project scope that would persuade the Executive Committee of Fiction Corporation. 0-2 points Did not complete the assignment or did not summarize design requirements (business goals, technical goals, user communities and data stores, and network applications) that would persuade the Executive Committee of Fiction Corporation. 0-3 points Did not complete

Developing Partially developed an executive summary that would persuade the Executive Committee of Fiction Corporation. 2.25 points Partially developed a project goal that would persuade the Executive Committee of Fiction Corporation. 2.25 points Partially developed a project scope that would persuade the Executive Committee of Fiction Corporation.

Competent Sufficiently developed an executive summary that would persuade the Executive Committee of Fiction Corporation. 2.5 points Sufficiently developed a project goal that would persuade the Executive Committee of Fiction Corporation. 2.5 points Sufficiently developed a project scope that would persuade the Executive Committee of Fiction Corporation. 3 points Sufficiently summarized design requirements (business goals, technical goals, user communities and data stores, and network applications) that would persuade the Executive Committee of Fiction Corporation. 4 points Sufficiently

Exemplary Fully developed an executive summary that would persuade the Executive Committee of Fiction Corporation. 3 points Fully developed a project goal that would persuade the Executive Committee of Fiction Corporation. 3 points Fully developed a project scope that would persuade the Executive Committee of Fiction Corporation.

4. Design Requirements (Business Goals, Technical Goals, User Communities and Data Stores, and Network Applications)

2.5 points Partially summarized design requirements (business goals, technical goals, user communities and data stores, and network applications) that would persuade the Executive Committee of Fiction Corporation. 3.5 points Partially

4 points Fully summarized design requirements (business goals, technical goals, user communities and data stores, and network applications) that would persuade the Executive Committee of Fiction Corporation. 5 points Fully summarized

5. Current state of

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 25 of 36

the network

6. Logical design

7. Physical design

8. Results of network design testing

9. Implementation plan (including project schedule)

the assignment or did not summarize the current state of the network in a way that would persuade the Executive Committee of Fiction Corporation. 0-2 points Did not complete the assignment or did not summarize a logical design that would persuade the Executive Committee of Fiction Corporation. 0-3 points Did not complete the assignment or did not summarize a physical design that would persuade the Executive Committee of Fiction Corporation. 0-3 points Did not complete the assignment or did not summarize the results of network design testing in a way that would persuade the Executive Committee of Fiction Corporation. 0-3 points Did not complete the assignment or did not summarize an implementation plan (including project schedule) that would persuade the Executive Committee of

summarized the current state of the network in a way that would persuade the Executive Committee of Fiction Corporation. 2.5 points Partially summarized a logical design that would persuade the Executive Committee of Fiction Corporation. 3.5 points Partially summarized a physical design that would persuade the Executive Committee of Fiction Corporation. 3.5 points Partially summarized the results of network design testing in a way that would persuade the Executive Committee of Fiction Corporation. 3.5 points Partially summarized an implementation plan (including project schedule) that would persuade the Executive Committee of Fiction

summarized the current state of the network in a way that would persuade the Executive Committee of Fiction Corporation. 3 points Sufficiently summarized a logical design that would persuade the Executive Committee of Fiction Corporation. 4 points Sufficiently summarized a physical design that would persuade the Executive Committee of Fiction Corporation. 4 points Sufficiently summarized the results of network design testing in a way that would persuade the Executive Committee of Fiction Corporation. 4 points Sufficiently summarized an implementation plan (including project schedule) that would persuade the Executive Committee of Fiction

the current state of the network in a way that would persuade the Executive Committee of Fiction Corporation. 4 points Fully summarized a logical design that would persuade the Executive Committee of Fiction Corporation.

5 points Fully summarized a physical design that would persuade the Executive Committee of Fiction Corporation. 5 points Fully summarized the results of network design testing in a way that would persuade the Executive Committee of Fiction Corporation. 5 points Fully summarized an implementation plan (including project schedule) that would persuade the Executive Committee of Fiction Corporation.

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 26 of 36

10. Project budget (including return on investment calculation)

11. Clarity

12. Writing Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

Fiction Corporation. 0-3 points Did not complete the assignment or did not summarize a project budget (including return on investment calculation) that would persuade the Executive Committee of Fiction Corporation. 0-3 points Did not complete the assignment, or explanations are unclear and not organized. (Major issues) 0-1.5 points Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues) 0-1.5 points

Corporation. 3.5 points Partially summarized a project budget (including return on investment calculation) that would persuade the Executive Committee of Fiction Corporation. 3.5 points Explanations generally unclear and not well organized. (Many issues) 2.25 points Had 67 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues) 2.25 points

Corporation. 5 points 4 points Sufficiently summarized a project budget (including return on investment calculation) that would persuade the Executive Committee of Fiction Corporation. 4 points Explanations generally clear and/or organized. (Minor issues) 2.5 points Had 45 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues) 2.5 points Fully summarized a project budget (including return on investment calculation) that would persuade the Executive Committee of Fiction Corporation. 5 points Explanations very clear and well organized. (Added helpful details) 3 points Had 03 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

3 points

WEEK 9 Course outcomes in focus: Develop network design testing procedures through services, tools, and testing scripts. Describe optimal network design for critical business applications to include effective use of bandwidth and satisfying Quality of Service (QoS) requirements. Activities: Readings: Read Chapter 12: Testing Your Network Design e-Activity: Research network testing tools and be prepared to describe a few different tools in class. Supporting Topics: Lecture Topics: Using industry tests Building and testing a prototype network system
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 27 of 36

Writing and implementing a test plan for your network design Tools for testing a network design

Lectures/Discussions: Lecture on using industry tests, building and testing a prototype network system, writing and implementing a test plan for your network design, and tools for testing a network design. Discussion 1: Testing Your Network Design. Students will respond to the following: o Describe the significance of testing your network design. Use a real-world example to illustrate your point. Discussion 2: Network Tools. Students will respond to the following: o Compare and contrast the network tools that you researched. Identify which you highly recommend and state why. Case Study 3: Design Scenario, Klamath Paper Products This assignment is due for online students by midnight on Sunday of Week 9 and for onground students before Week 10s class meeting. Submit your assignment to the course shell. Read the Design Scenario, Klamath Paper Products case study found in Chapter 11 of the textbook. Research a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesnt have Metro Ethernet). Write a one to two (1-2) page paper that describes the service in technical terms. Make sure to include pricing information. You may need to contact the provider to obtain this information. The format of the paper is to be as follows: o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format. o Type the question followed by your answer to the question. o In addition to the one to two (1-2) pages required, a title page is to be included. The title page is to contain the title of the assignment, your name, the instructors name, the course title, and the date. Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills. The assignment will be graded using the following rubric:
Outcomes Assessed Describe optimal network design for critical business applications to include effective 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 28 of 36

use of bandwidth and satisfying Quality of Service (QoS) requirements. Use technology and information resources to research issues in network architecture and analysis. Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics. Grading Rubric for Case 3 Design Scenario, Klamath Paper Product

Criteria 1. Research a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesnt have Metro Ethernet). Write a one-two page paper that describes the service in technical terms. Make sure to include pricing information. You may need to contact the provider to obtain this information). 2. Clarity

3. Writing Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

Unacceptable Did not complete the assignment or did not research a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesnt have Metro Ethernet) and write a one-two page paper that describes the service in technical terms, making sure to include pricing information; omitted key information and/or included irrelevant information. 0-15 points Did not complete the assignment, or explanations are unclear and not organized. (Major issues) 0-15 points Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues) 0-6 points

Developing Partially researched a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesnt have Metro Ethernet) and wrote a one-two page paper that describes the service in technical terms, making sure to include pricing information; omitted some key information.

Competent Sufficiently researched a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesnt have Metro Ethernet) and wrote a one-two page paper that describes the service in technical terms, making sure to include pricing information.

Exemplary Fully researched a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesnt have Metro Ethernet) and wrote a one-two page paper that describes the service in technical terms, making sure to include pricing information.

18 points Explanations generally unclear and not well organized. (Many issues) 18 points Had 67 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues) 7 points

20 points Explanations generally clear and/or organized. (Minor issues) 20 points Had 45 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues) 8 points

25 points Explanations very clear and well organized. (Added helpful details) 25 points Had 03 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

10 points

WEEK 10 Course outcome in focus: Describe optimal network design for critical business applications to include effective use
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 29 of 36

of bandwidth and satisfying Quality of Service (QoS) requirements. Activities: Readings: Read Chapter 13: Optimizing Your Network Design Supporting Topics: Lecture Topics: Optimizing bandwidth usage IP multicast technologies Reducing serialization delay Optimizing network performance to meet QoS requirements Cisco IOS features for optimizing network performance Lectures/Discussions: Lecture on optimizing bandwidth usage, IP multicast technologies, reducing serialization delay, optimizing network performance to meet QoS requirements, and Cisco IOS features for optimizing network performance. Discussion 1: Optimizing Your Network Design. Students will respond to the following: o Select and describe one (1) of the queuing methods described in the readings. Present a real-world example of the method you selected. Discussion 2: Bandwidth Utilization. Students will respond to the following: o Discuss the difference between multicast and unicast routing. Choosing either one, describe where it can be used in your professional or personal life. Assignment 5: Technical Term Paper This assignment is due for online students by midnight on Sunday of Week 10 and for onground students before Week 11s class meeting. Submit your assignment to the course shell. The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word with graphics embedded within the document. Background You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP company, you recently made a persuasive presentation of your companys approach to designing networks at a large industry event. The CEO of Fiction Corporation, a large retail chain, was impressed by your presentation. It looks like youve finally got your break! You have a small team of 10 technically proficient staffers with a strong background in project
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 30 of 36

management, networking, and internetworking skills that include PMP, Network+, CCNP, and CISSP credentials. You have been selected by Fiction Corporation to develop a network design document and plan without an RFP. Overview Fiction Corporation, a large national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design. The data in the center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hours a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporations operations and profitability. From the data processing viewpoint, the move includes 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers. The network consists of approximately 500 remote location retail stores connected via frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the entire organization. The retail operations also run WLANs that are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers also need to monitor the status of remote systems. The SNMP management system must be able to detect and report failure of the remote system or its communications link and the status of individual applications. The company wishes a seamless migration that minimizes impact to its customers and employees. Any gaps in this background will require you to make sound technical and persuasive assumptions that satisfy the customers goals that are within the budget guidelines. You were selected in part due to your detailed analysis and agreement to an implementation cost that will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is the availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers. Include the following in your assignment: 1. Title page 2. Table of contents 3. Executive summary 4. Project goal 5. Project scope 6. Design requirements: a. Business goals b. Technical goals c. User communities and data stores d. Network applications 7. Current state of the network
2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 31 of 36

8. Logical design 9. Physical design 10. Results of network design testing 11. Implementation plan with a project schedule 12. Project budget with a return on investment calculation 13. Design document appendix The format of the paper is to be as follows: o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format. o Type the question followed by your answer to the question. o This paper should be between 10-15 pages, including graphics. Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills. The assignment will be graded using the following rubric:
Design a systematic network architecture plan in accordance with network design steps. Summarize among scalability, availability, performance security, manageability, usability, adaptability, and affordability as they relate to internetworking product selection. Design a network topology to include hierarchy, redundancy, modularity, and security. Create a network security plan inclusive of identifying and analyzing network assets, security risks, security requirements, and security policy. Develop network management strategies to include resource monitoring and data collection and interpretation. Describe processes that address performance, faulty, configuration, security, and accounting management. Compare and contrast the selection of technologies and devices for campus and enterprise networks that include remote access networks, WANs, service providers, end user remote access devices, central site remote access devices, VPN concentrators, and routers. Develop network design testing procedures through services, tools, and testing scripts. Describe optimal network design for critical business applications to include effective use of bandwidth and satisfying QoS requirements. Develop a comprehensive network design document Use technology and information resources to research issues in network architecture and analysis. Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics. Grading Rubric for Assignment 5 Technical Term Paper

Outcomes Assessed

Criteria 1. Executive summary

Unacceptable Did not complete the assignment or did not develop an executive summary that supports a seamless migration

Developing Partially developed an executive summary that supports a seamless migration that minimizes impact

Competent Sufficiently developed an executive summary that supports a seamless migration that minimizes

Exemplary Fully developed an executive summary that supports a seamless migration that minimizes impact to Fiction

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 32 of 36

2. Project goal

3. Project scope

4. Design requirements (business goals, technical goals, technical goals, user communities and data stores, and network applications)

5. Current state of the network

that minimizes impact to Fiction Corporations customers and employees. 0-3 points Did not complete the assignment or did not develop a project goal that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 0-3 points Did not complete the assignment or did not develop a project scope that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 0-4 points Did not complete the assignment or did not develop design requirements (business goals, technical goals, technical goals, user communities and data stores, and network applications) that support a seamless migration that minimizes impact to Fiction Corporations customers and employees. 0-6 points Did not complete the assignment or did not analyze the current state of the network in a way that minimizes

to Fiction Corporations customers and employees. 4 points Partially developed a project goal that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 4 points Partially developed a project scope that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 5 points Partially developed design requirements (business goals, technical goals, technical goals, user communities and data stores, and network applications) that support a seamless migration that minimizes impact to Fiction Corporations customers and employees. 7 points Partially analyzed the current state of the network in a way that minimizes impact to Fiction Corporations

impact to Fiction Corporations customers and employees. 5 points Sufficiently developed a project goal that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 5 points Sufficiently developed a project scope that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 6 points Sufficiently developed design requirements (business goals, technical goals, technical goals, user communities and data stores, and network applications) that support a seamless migration that minimizes impact to Fiction Corporations customers and employees. 8 points Sufficiently analyzed the current state of the network in a way that minimizes impact to Fiction

Corporations customers and employees. 6 points Fully developed a project goal that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 6 points Fully developed a project scope that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 7 points Fully developed design requirements (business goals, technical goals, technical goals, user communities and data stores, and network applications) that support a seamless migration that minimizes impact to Fiction Corporations customers and employees. 10 points Fully analyzed the current state of the network in a way that minimizes impact to Fiction Corporations

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 33 of 36

6. Logical design

impact to Fiction Corporations customers and employees. 0-4 points Did not complete the assignment or did not develop a logical design that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 0-6 points Did not complete the assignment or did not develop a physical design that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 0-6 points Did not complete the assignment or did not discern the results of network design testing in a way that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 0-6 points Did not complete the assignment or did not develop an implementation plan (including project schedule) that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees.

customers and employees. 5 points Partially developed a logical design that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees.

Corporations customers and employees. 6 points Sufficiently developed a logical design that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 8 points Sufficiently developed a physical design that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 8 points Sufficiently discerned the results of network design testing in a way that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 8 points Sufficiently developed an implementation plan (including project schedule) that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees.

customers and employees. 7 points Fully developed a logical design that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees.

7. Physical design

7 points Partially developed a physical design that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 8 points Partially discerned the results of network design testing in a way that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 7 points Partially developed an implementation plan (including project schedule) that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees.

10 points Fully developed a physical design that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 10 points Fully discerned the results of network design testing in a way that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 10 points Fully developed an implementation plan (including project schedule) that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees.

8. Results of network design testing

9. Implementation plan (including project schedule)

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 34 of 36

10. Project budget (including return on investment calculation)

0-6 points Did not complete the assignment or did not develop a project budget (including return on investment calculation) that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 0-6 points Did not complete the assignment or did not develop a document appendix that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 0-2 points Did not complete the assignment, or explanations are unclear and not organized. (Major issues) 0-3 points Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues) 0-3 points

7 points Partially developed a project budget (including return on investment calculation) that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees.

8 points Sufficiently developed a project budget (including return on investment calculation) that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 8 points Sufficiently developed a document appendix that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 3 points Explanations generally clear and/or organized. (Minor issues) 4 points Had 45 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues) 4 points

10 points Fully developed a project budget (including return on investment calculation) that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees.

11. Document appendix

7 points Partially developed a document appendix that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 2.5 points Explanations generally unclear and not well organized. (Many issues) 3.75 points Had 67 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues) 3.75 points

10 points Fully developed a document appendix that supports a seamless migration that minimizes impact to Fiction Corporations customers and employees. 4 points Explanations very clear and well organized. (Added helpful details) 5 points Had 03 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. 5 points

12. Clarity

13. Writing Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

WEEK 11 Course outcome in focus: No new material. Activities: Readings:


2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 35 of 36

No new material.

Lectures/Discussions: Discussion 1: Course Wrap-Up. Students will respond to the following: o Discuss how you can apply the learning outcomes of this course to your professional and personal life. Final Exam The exam is available in the course shell under Week 11. There are 2.5 hours allocated to take this exam and it is worth 200 points. Online students must complete the exam before midnight Sunday of Week 11 and on-ground students must complete the exam before the Week 11 class. ASSIGNMENT OUTLINE AND GRADING Assignment Type Assignment 1 Assignment 2 Assignment 3 Assignment 4 Assignment 5 Case Study 1 Case Study 2 Case Study 3 Midterm Exam Final Exam Participation Total Total Points 50 50 50 50 100 70 70 60 200 200 100 1,000 Percentage* 5% 5% 5% 5% 10% 7% 7% 6% 20% 20% 10% 100%

* The percentages may not total 100% due to rounding. Grading Scale Points Percentage Grade 900-1000 90-100 A 800-899 80-89 B 700-799 70-79 C Below 700 Below 70 F

2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 03/04/11]

Page 36 of 36

Das könnte Ihnen auch gefallen