Background Information for the Campus Network Design Project

  

PART 1 Only.

Background Information for the Campus Network Design Project XUMUC is large online university in the Eastern United States. The university has an enrollment of 90,000 students, mostly online. The students do not live on campus and are scattered around the globe. XUMUC offer courses in the fields of arts and humanities, business, social sciences, mathematics, computer science, the physical sciences, and health sciences. Many of the professors are working professionals with jobs in the business community, and only 5% of the 3000 faculty have offices on main campus. Due to opening of new online universities in the DC metropolitan area, the university has had difficult time attracting new students. The college wishes to attract and retain more students, many of whom leave the state to attend more prestigious colleges. Because of these reasons and others, the State advisory board expanded the Shady Grove campus of XUMUC. Nine states colleges open their branches at Shady Grove location. XUMUC’s management board now wishes to consolidate management functions at its Shady Grove location. The president of XUMUC formed an Advisory Group whose mission was to consolidate IT functions and implement state of the art network to attract prospective students. The Advisory Group was also to determine why prospective students do not select XUMUC. The group determined that many prospective students do not select XUMUC because they perceive the computer facilities at XUMUC to be inadequate. In addition to the computer applications used by the students and professors, the college administration personnel use the College Management System, which is a Novell NetWare client/server application that keeps track of class registrations and student records. The Current Network at Shady Grove Campus: The Shady Grove campus hosts 9 independent universities working independently. The campus has three main buildings and fiber optic cable is used for backbone connections. The campus diagram is shown below. Each building is connected by fiber optic cable. Because most of the students that attend XUMUC do so on a part-time basis, and because much of the faculty have other jobs, the assumption in the past has been that many of the students and professors use computing resources at home or at work and do not depend on the XUMUC network. The current network is shown in Figure -1. Fig:-1 All the LANs at this site use 10-Mbps Ethernet although they can be upgraded to 100 Mbps. Every building is equipped with Category-5 cabling and wall plates in the various offices, classrooms, and labs, though the cabling and wall-plates are not used in some of the buildings. To support users in Building-3, multi-mode fiber-optic cabling was pulled through cabling conduits to Building-1 and Building-2. At the Shady Grove campus, XMUC uses the services of 4 ISPs for internet connections. The college provides 10 Macintoshes and 25 PCs in the Computing Center (in Building-1) for student use. A LAN switch in the Computing Center connects hubs, servers, printers, and the router that connects to the Internet. Shady Grove campus does not have its own web server. For security, packet filtering firewall is used on some routers. The routers have default routes to the Internet and do not run routing protocols. Based on the advice of the Community Advisory Group, the president started the “Upgrade XUMUC Project” with the goal of upgrading the computer and networking facilities. The three network administrators and the Director of Operations for XUMUC formed the Project Task Force. Table:-1 Shady Grove Inventories Subnets Devices Comment UMUC 20 Work Stations UMES 8 Work Stations UMCPTowson 8 Work Stations Towson 4 Work Stations UB 5 Work Stations UMB 15 Work Stations Eastern Shore 4 Work Stations UMBC 12 Work Stations Bowe 5 Work Stations Class Rooms 150 Work Stations Shady Grove Administrations 50 Application server, Data server, and SAN Router 4 2600 series, Slow processing power Switches 10 switches All switches are without port security. No technology to reduce convergence time. Patch Panel 4 Hubs 5 Printers 5 Commercial Type in Copy Centre Network Printers and departments Printers 25 Voice Network: Shady Grove campus has 200 telephones on a separate voice network. IP telephony is used for internal purpose. PSTN (Phone Company) network is used to dial out. The logical diagram is shown below Security: The site recently experienced an increase in network attacks (DoS). The network was recently unavailable for a considerable time because of an attack. IT staff suspects that these attacks are coming from broad range of spoofed IP addresses, but unable to prevent these attacks. They have suggested installing NID so that they can monitor better and stop it while it is happening. Network availability is crucial for the university, because their revenue depends on availability of network. Web server: The director of the site wants to host a web

Problem 5- Planning

Problem:Earned-value analysis. A project budget calls for the following expenditures:TaskDateBudgeted AmountBuild formsApril 1$10,000Pour foundationApril 1$50,000May 1$100,000Frame wallsMay 1$30,000June 1$30,000Remaining tasksJuly 1 and beyond$500,000
Define each term in your own words, calculate these values for the above project, and show your work:

  1. Budgeted cost baseline (make a graph illustrating this one)
  2. Budget at completion (BAC)
  3. Planned value (PV) as of May 1
  4. Earned value (EV) as of May 1 if the foundation work is only two-thirds complete. Everything else is on schedule.
  5. SV as of May 1.
  6. Actual cost as of May 1 is $160,000. Calculate the cost variance (CV) as of May 1.
  7. Schedule performance index (SPI)
  8. Cost performance index (CPI)
  9. Estimate to complete (ETC), assuming that the previous cost variances will not affect future costs
  10. Estimate at completion (EAC)

Text

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

Authors: Adrienne Watt 

Publisher: BCcampus Open Education 

Publication Date: 2019 

Edition: 2nd Edition

Discuss the connections that you made from the evidence

 Learning Goal: I’m working on a writing multi-part question and need an explanation and answer to help me learn.
Assessment Traits
Assessment Description
Synthesis is the act of creating something new from multiple existing entities. Synthesis of research, then, is creating a new idea from existing ideas. This assignment is designed to help you identify how themes can emerge from reading literature and how you can synthesize this information in a way that creates new knowledge. You will use your understandings of the Topic 2 readings to complete a synthesis worksheet.
General Requirements:
This assignment will be used as a pre-writing activity for the synthesis paper in Topic 5.
Locate and download “Synthesis Worksheet” from the Topic Resources.
Review the articles by Baker & Pifer (2011), Gardner (2009), and Smith & Hatmaker (2014) located in the Topic Resources.
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Doctoral learners are required to use APA style for their writing assignments. Review the GCU APA Style Guide for Writing located in the Student Success Center.
You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.
Directions:
Complete the Synthesis Worksheet for the articles by Baker & Pifer (2011), Gardner (2009), and Smith & Hatmaker (2014). The completed worksheet will include the following sections:
An Introduction that introduces and provides context for the topic, presents three common themes that emerged from the readings, and provides organization for the paper with a thesis statement.
A description of the evidence to support three common themes that emerged from the articles. Since this is likely your first experience with this depth of synthesis, we have provided two of the themes found in the articles. Your task is to identify a third theme and to provide evidence from each article for all three common themes.
A conclusion where you will return to your thesis and provide evidence showing you successfully addressed your thesis statement. Discuss the connections that you made from the evidence and how each theme emerged from the central topic of doctoral identity.
Attachments 

Operational excellence

 Assignment: (2 page: 1 page each) Information Systems for Business and Beyond Questions:

  • Chapter 13- study questions 1-10, Exercise 1 (2, 4)

Information Technology and Organizational Learning Assignment:

  • Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

Discussion: (Your response should be 250-300 words.)

This week we focus on the various maturity stages and variables in the middle manager best practices arc.  Refer to chapter 12 from this week’s reading and not the various stages, what they are and why they are important.

Note: The first post should be made by Wednesday 5 p.m., EST.  There is only one post due this week.

Assignment: (1 page)

Information Technology and Organizational Learning Assignment:

Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc.  Define each of the maturity stages and performance dimensions.  What are the key concepts from each section? 

 

Security Architecture

 Assessment Description

It is essential as a security expert to be able to evaluate potential risks within the security infrastructure in order to position security controls/countermeasures.

Create an overall security architecture structure diagram with descriptions of the architecture components making sure to:

  1. Identify all types of data and sensitive data the organization will store.
  2. Define where that information is stored.
  3. Record all hardware and software devices in your network.
  4. Describe how the security controls are positioned and how they relate to the overall systems architecture.
  5. Define security attacks, mechanisms, and services, and the relationships between these categories.
  6. Specify when and where to apply security controls.
  7. Present in-depth security control specifications.
  8. Address restricting access, layering security, employing authentication, encrypting storage, automating security, and IT infrastructure.
  9. Include the full scope of policy, procedural, and technical responsibilities.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 Security Architecture Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

Exp19_Access_App_CapAssessment – Student Loans 1.0

Exp19_Access_App_CapAssessment – Student Loans 1.0

  

Exp19_Access_App_CapAssessment – Student Loans 1.0

Project Description:

Quill Financial Services has recently started working with student loans. You will build the company’s database. The initial set of financed student loans are stored in an Excel spreadsheet. You have already compiled the list of colleges and universities into an Access table. You will use your expertise to import the information from Excel, modify the table, create relationships, create queries, create forms, and create reports.

     

To   start, you have been provided with a database the Information Technology   department created. The database has one table. You will be importing an   Excel spreadsheet into a table   and creating a primary key. 

Start Access. Open the   downloaded Access file named Exp19_Access_Ch03_CapAssessment_Student_Loans.accdb.

 

Import the exploring_acap_grader_a1_Clients.xlsx Excel workbook into a table   named Clients. While importing the data, make   sure to select the option First Row Contains Column Headings, and select   ClientID as the primary key field.

 

Now that you have imported the   data from the spreadsheet, you will modify the field properties in the   Clients table and demonstrate sorting.

Open the Clients table in Design   view. Change the ClientID field size to 6 and remove the @ symbol from the ClientID format   property. Change the ZIP field size to 5. Change the ExpectedGraduation field to have 0 Decimal Places. Delete the   Comments field. Add a new field named LastContact as the last field in the table.   Change the data type to Date/Time, and change the format to Short Date. Switch   to Datasheet View, and apply Best Fit to all columns. Sort the table on the   LoanAmount field in descending order, then save and close the table.

 

Now that the table is imported   and modified, you will create a relationship between the Colleges and Clients   tables.
 

  Open the Relationships window. Add the Clients and Colleges tables to the   window, and create a one-to-many relationship between the CollegeID fields in   the Clients and Colleges tables. Enforce referential integrity between the   two tables and select the cascade updates and cascade delete options. Save   the changes, and close the Relationships window.

 

Polly Esther, a financial   adviser, would like your assistance in helping her find certain information.   You will create a query for her and demonstrate how she can change information.
  Create a new query using Design view. From the Clients table, add the   LastName, FirstName, Email, Phone, and ExpectedGraduation fields, in that   order. From the Colleges table, add the CollegeName field. Sort the query by   LastName and then FirstName, both in ascending order. Set the criteria in the   ExpectedGraduation field to 2019. Run the query. Save the query as 2019 Graduates and close the query.

 

Now that you have created the   query, you will create a second query for Polly that will calculate the loan   payments for which each student will be responsible (assuming monthly   payments).
 

  Create a copy of the 2019 Graduates query. Name the copy Loan Payments and open the query in Design   view. Remove the criteria from the ExpectedGraduation field. Create   calculated field named MonthlyPayment that determines the estimated monthly student loan   payment. The loan will have a fixed rate of 5% interest, paid monthly, for 10   years. Using the Pmt function, replace the rate argument with 0.05/12, the num_periods argument with 10*12, and the present_value argument   with the LoanAmount field. Use 0 for the future_value and type arguments. Format   the field as Currency. 

Run the query. Ensure the   payment displays as a positive number. Add a total row to Datasheet view.   Average the MonthlyPayment field and count the values in the LastName column.   Save and close the query.

 

Stann Dupp, the director of   finance, needs to summarize information about all of the student loans Quill   Financial Services offers based on each college. You will create a totals   query for him to summarize the number of loans, average loan amount by   college.

 

Create a new query using Design   View. From the Colleges table, add the CollegeName field. From the Clients   table, add the ClientID and LoanAmount fields. Display the Total row, and   group by CollegeName. Show the count of ClientID and the average LoanAmount.

 

Change the caption for the   ClientID field to Num Loans, and the caption for LoanAmount to Avg Loan. Format the LoanAmount field as   Standard. Run the query. Save the query as Loan Summary by College and close it.

 

Jay Walker, one of the company’s   administrative assistants, will handle data entry. He has asked you to   simplify the way he inputs information into the Clients table. You will   create a form based on the Clients table.

 

Create a Split Form using the   Clients table as the source. Change the height of all of the fields and   labels to .25 collectively. Reorder the fields in the bottom half of the split   form so the FirstName displays before the LastName field. Switch to Form view   and click the row for Riya Gonzalez. Change her expected graduation date to 2022. Save the form as Client   Information and   close it.

 

Stann is hoping you can create a   more print-friendly version of the query you created earlier for him to   distribute to the executives. You will create a report based on the Loan   Payments query.

   Create a report using the Report Wizard. From the Loan Payments query, add   the LastName, FirstName, Email, ExpectedGraduation, CollegeName, and   MonthlyPayment fields. Do not add any grouping or sorting. Ensure the report   is in Landscape orientation. Save the report as Loans by Client and view the report in Layout   view. Adjust the width and position of the fields and labels so that all of   the values are visible. Save the report.

 

Now that you have included the   fields Stann has asked for, you will work to format the report to make the   information more obvious.

   Apply the Integral theme. Group the report by the ExpectedGraduation field.   Sort the records within each group by LastName then by FirstName, both in   ascending order. Switch to Print Preview mode and verify that the report is   only one page wide (Note: it may be a number of pages long).

IT214 Week 7

Discussion:

Define, mathematically, the Fibonacci sequence. Find and post four occurrences of Fibonacci sequences in nature. Justify your posting.

You must reply to at least two posts.