ITMG624_W3_Nance
.docx
keyboard_arrow_up
School
American Public University *
*We aren’t endorsed by this school
Course
624
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
8
Uploaded by MateArt376
1
Statement of Work: Building Network for New Office Nicholas Nance American Public University ITMG624
Dr. Mikell
11/26/2023
2
1.0 Planned Network Installation for Office
This project aims to bring online a comprehensive and effective network infrastructure for the newly developed office site for Microsoft’s Northern Virginia headquarters (Cole, Martin,
2012). The project’s primary goals will be the design, allocation, and implementation of a secure yet scalable network that can meet the demands of the Microsoft workforce and ensure the security of the work being done. The network will serve Microsoft in the highest capacity following completion and eventual transfer of personnel from the old to the new site.
1.1 Background The undertaking of this project for Microsoft was driven by a need for expanded office space to match the growth the company has enjoyed over the past few years, accompanied by that is the need for robust, secure, and scalable networks to accommodate the transfer of the workforce (Cole, Martin, 2012). The movement of the workforce to a newly designed headquarters allows a chance for Microsoft to completely revamp the designed network from the ground up ensuring state-of-the-art security and a network that can respond to any demands and produce efficient speeds and connectivity. Because the office was planned to have a newly developed network Microsoft has been able to take notes and lessons learned from the existing network and plans to apply them during the project's lifecycle. The project serves as a responsive
and efficient means for Microsoft to achieve multiple operational goals.
1.2 Scope of Work The scope of this project is a revolutionary, laser-focused analysis of the new office's physical layout. Once the physical layout is completed the project will take on the design and implantation of a sophisticated network topology that will utilize a combination of wired and wireless assets (Todd, 2009). Allocating resources will focus on identifying and gathering the
3
latest cutting-edge network hardware as well as ensuring the essential software licensing that aligns with Microsoft operating procedures in the day-to-day. Once the adequate resources have been secured, they will be installed along with pre-mapped and efficiently installed cabling systems to aid the wired portion of the topology, and the installation and security of advanced wireless access points and other assets built for the wireless portions (Todd, 2009). To fully realize the securement of the network the project shall entail the implementation of security protocols melded with the information technology systems within the building, backed by comprehensive documents that focus on training, troubleshooting shooting, and governance of the information technology environment of the office (Todd, 2009).
1.3 Objectives
The project’s objectives for Microsoft are aimed to increase the technological juggernaut connectivity, communication capabilities, and overall work efficiency in the newly built headquarters (Cole, Martin, 2012). The project will seek to ensure the newly designed network has the scalability to meet any demands brought on by Microsoft from user and data standpoints and ensure all transactions, activity, and overall usage of the network remains the most secure environment in the digital world. Microsoft's status in the technology field and its dedication to innovation and growth spun the need for a network to match. In the cyber world, the ability to conduct the needed activities such as what is envisioned by Microsoft is one half of the puzzle, the network must remain secure for the success of these undertakings to remain feasible thus security is a frontrunner in the project to ensure no unauthorized accesses, and data theft remains a likelihood and is aligned with Microsoft’s dedication to information security (Todd, 2009). The
project encompasses the installation of the network outside of this the filling of the office space with assets falls on Microsoft thus the network must be compatible with Microsoft’s existing
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Suggest and explain 3 major reasons why computer network
documentations for Sunway University network are very important to
record, maintain and keep officially.
arrow_forward
DESCRIBE THREE REQUIREMENTS FOR A STRONG AND EFFECTIVE NETWORK.
arrow_forward
What three requirements must be met for a network to be effective and successful? Please spend a time describing one.
arrow_forward
There are three keepass (instruments) in place to investigate and track the aims of a system or network.
arrow_forward
Discuss the concept of Software-Defined Networking (SDN) and its impact on IT resource management. How does SDN improve network flexibility and efficiency?
arrow_forward
A number of key elements, such as cost, time, scalability, and sustainability, must be taken into consideration while designing an effective network. What are some of the ways that a good network design can have a positive impact on our social lives and the environment?
arrow_forward
A number of key elements, such as cost, time, scalability, and sustainability, are taken into account while designing an effective network. How can a well-designed network have a good impact on our social lives and the environment?
arrow_forward
Software-defined Network (SDN)!
How do they function?
What are their features?
What are their advantages and disadvantages? If you were to recommend a SDN for your school or business, what would be the reason(s)?
arrow_forward
How does network function virtualization (NFV) transform the way network services are deployed and managed within a virtualized infrastructure? Provide use cases.
arrow_forward
What are the three keepass (tool)s used to examine and monitor the goals of a system or network?
arrow_forward
Explore the concept of network virtualization and its role in creating isolated virtual networks within a physical network infrastructure.
arrow_forward
Explore the principles of network virtualization and its impact on network management and scalability.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Suggest and explain 3 major reasons why computer network documentations for Sunway University network are very important to record, maintain and keep officially.arrow_forwardDESCRIBE THREE REQUIREMENTS FOR A STRONG AND EFFECTIVE NETWORK.arrow_forwardWhat three requirements must be met for a network to be effective and successful? Please spend a time describing one.arrow_forward
- There are three keepass (instruments) in place to investigate and track the aims of a system or network.arrow_forwardDiscuss the concept of Software-Defined Networking (SDN) and its impact on IT resource management. How does SDN improve network flexibility and efficiency?arrow_forwardA number of key elements, such as cost, time, scalability, and sustainability, must be taken into consideration while designing an effective network. What are some of the ways that a good network design can have a positive impact on our social lives and the environment?arrow_forward
- A number of key elements, such as cost, time, scalability, and sustainability, are taken into account while designing an effective network. How can a well-designed network have a good impact on our social lives and the environment?arrow_forwardSoftware-defined Network (SDN)! How do they function? What are their features? What are their advantages and disadvantages? If you were to recommend a SDN for your school or business, what would be the reason(s)?arrow_forwardHow does network function virtualization (NFV) transform the way network services are deployed and managed within a virtualized infrastructure? Provide use cases.arrow_forward
- What are the three keepass (tool)s used to examine and monitor the goals of a system or network?arrow_forwardExplore the concept of network virtualization and its role in creating isolated virtual networks within a physical network infrastructure.arrow_forwardExplore the principles of network virtualization and its impact on network management and scalability.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning