16
Appendix IT Infrastructure – Assessment
Introduction
This assignments consists of six tasks related to a single scenario. The tasks are intended to assess whether
you have met the minimum acceptable level for each of the learning outcomes associated with this module
1. Critically evaluate an enterprises IT strategy to assess whether it meets the enterprises current
needs and aspirations
2. Critically evaluate an enterprise’s technical information to assess equipment suitability
3. Critically evaluate wireless networks to assess their suitability to meet the needs of the enterprise
4. Capture and analyse network traffic to assess the performance of the network.
5. Evaluate strategies for data management, storage and disaster recovery
6. Critically evaluate own and other’s designs.
The grading criteria at the end of the assignment indicate how the learning outcomes relate to the tasks.
Scenario
A large manufacturing organisation has a factory sight which has the following network architecture.
Note that although a single 24 port 2960 is shown in each department they are actually 4 stacked 24 port
switches giving 96 ports for each department. The subnetting policy has been the cause of a number of
issues with the network and a new Network Manager has been appointed and has decided to address
the issue.
There are 40 end user devices in the manufacturing department 60 in production and 95 in Design.
There are typically around 20 visiting staff from partnering companies who require wireless access
though this can be as many at 75 at any one time.
As part of the overall strategy the Network Manager is considering replacing all the existing PCs (which
are getting towards end of life anyway) and servers and using a cloud based solution. What he has in
mind is to use third party servers accessible from anywhere through the internet. All data storage will be
off site. He is also considering using virtual PCs so that all the processing is also done off site so that the 17
machines on the desktop are only used for entering data, interacting with the applications and displaying
the output.
He is planning on using the 172.30.0.0 private address range and subnetting it in the following manner.
Device Interface Description IP Address Subnet Mask
Router 0 Manufacturing 17.30.2.65 /27
Core 17.30.1.0 /30
Router 1 Production 17.30.3.65 /25
Core 17.30.1.1 /30
Router 2 Design 17.30.4.64 /28
Core 17.30.1.2 /30
Router 3 Access Point 17.30.128.1 /28
Core 17.30.1.3 /30
Services 17.30.128.2 /28
Manufacturing hosts 17.30.2.66 to
17.30.2.126
/27
Production hosts 17.30.3.65 to
17.30.3.190
/25
Design Hosts 17.30.4.66 to
17.30.4.127
/27
Printer 0 17.30.128.1 /28
Printer 1 17.30.128.3 /28
Printer 2 17.30.128.4 /28
Main Server 17.30.128.5 /28
Backup Server 17.30.128.6 /28
Web Server 17.30.128.7 /28
AP wireless DHCP
pool
17.30.129.129
17.30.129.254
/25
The reports requested below are intended for presentation at board meetings so high quality is expected.
There is a word limit as the board members are busy people and do not like having to wade through
more words than are necessary. It will therefor be necessary to make good use of appendices (which do
not contribute towards the word count) to provide supporting evidence for the claims made in the main
body of the report. It is important that you identify the core points and state them clearly and concisely in
your report. If the reader wants to verify the evidence used to support the points made in the report then
this should be available in the appendix.
Allied to this is the importance of providing references for claims made. It is not enough just to have a
reference list at the end of the report. it is also essential to use Harvard standard citations in the text
where the reference is used.18
Assignment 1 1500 words (30%)
Due 7th November 2014
Task A1
Research and recommend an appropriate desktop client machine that will fulfil the IT manager’s
requirements for running a virtual PC. The choice needs to be justified.
Task A2
Use a software modelling tool such as Riverbed’s Modeler Academic Edition to determine how well a
802.11n wireless router will cope with the proposed loading to be placed upon it. It will be used
predominantly for accessing web sites, applications and the cloud based data. It is not intended for the
laptops to be virtualised. Make clear the limitations the application you used for attempting to model this
scenario. You are recommended to model all the wireless devices a wireless router and the necessary
infrastructure to give the hosts access to a server running the applications necessary for the model.
Task A3
Provide a detailed analysis of the Subnetting policy highlighting all the errors and weaknesses.
Assignment 2 3500 words (70%)
Due 19th December 2014
Task B1
Write a position paper that briefly indicates the weaknesses in the proposed design and propose a
suitable alternative design.
Task B2
The IT Manager is particularly interested in a recommendation for providing proper support for the
wireless devices. Make use of Cisco material to identify the recommended way of supporting wireless on
a single site.
Task B3
The report must also briefly discusses the pros and cons of a cloud-based approach for all the
company’s data storage requirements, virtual desktop and backup.
General notes
The assignments must be comb bound and submitted by the due dates given above.
A professional, properly spelt report with good grammar, Harvard referencing and supporting evidence in
appendices is expected. Be certain you are aware of what is meant by Plagiarism and copying and
avoid it at all costs. Ask for advice as necessary and visit the library website
Study the Assessment Criteria below to ensure that you cover all the necessary requirements and gain
the best grade you can.
Consider Your Assignments Done
See Why Our Clients Hire Us Again And Again!
Success Guarantee
When you order form the best, some of your greatest problems as a student are solved!








Jermaine Byrant
Nicole Johnson



