9-1 Final Project Submission: Network Analysis and Architecture Evaluation

I have done a terrible job at writing my milestone pages because I don’t understand and can’t wrap my head around this networking details my instructor wants. I’m attaching the final rubric for the final paper and would like to see how much you would charge to make an A on this and do it for me. 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Please let me know.

IT 640 Final Project Guidelines and Rubric

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Overview
Within an organization, the dependability of network infrastructures has become less of a want and more of a need. Without a fully developed communication
architecture around business growth, efficiencies, and competitive advantage, many companies will find themselves underperforming. Network connectivity
used to be considered a luxury for many businesses, but it has recently become a critical piece of an organization. The fundamental understanding of how
networks play such a big role in the success of a company has to be assessed from the basic approach of the advancement in Transmission Control
Protocol/Internet Protocol (TCP/IP) communication and the functionality of the Open Systems Interconnection (OSI) model.

Understanding how a network communicates is key to understanding how your corporate applications and services work within the business. Your
understanding around the concepts of IP communication, devices used to communicate, and the traffic that is continually passed between devices is the first key
to gaining the understanding of network infrastructure. The knowledge you develop through this course will help build on your basic understanding of network
infrastructures and the components that are critical to the success of any business communication architecture.

For your final project, you will assume the role of a network consultant for an organization looking to expand its communication reach. You have been be tasked
with analyzing the current network architecture of the organization and determining any key changes that should occur as the organization prepares for future
growth. You will evaluate traffic patterns to determine critical aspects of your business and provide basic insight into what should be done to the network from a
capability aspect and from a security viewpoint as the organization prepares for future growth. Ultimately, you will recommend a design for the future network
architecture of the organization.

The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Three, Five, and Seven. The final product will be submitted in Module Nine.

Before beginning your project, read the Final Project Scenario document about SNHUEnergy, Inc., an organization that is looking to expand its operations. Then,
review all of the logical and physical design diagrams as well as the Wireshark capture showing the traffic patterns of the organization’s current network. These
files are provided below:

 Milestone One Physical Diagram – Current

 Final Project Physical Diagram – Current

 Memphis Office Logical Design – Current

 Physical Network Design Example

 Logical Network Design Example

 Dallas Office Logical Design – Current

 Traffic Flow Wireshark Capture

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_final_project_scenario

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_milestone_one_physical_diagram_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_final_project_physical_diagram_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_memphis_office_logical_design_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_physical_network_design_example

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_logical_network_design_example

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_dallas_office_logical_design_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_traffic_flow_wireshark_capture

In this assignment, you will demonstrate your mastery of the following course outcomes:

 Determine how network applications communicate from end to end by applying the network Open Systems Interconnection (OSI) model

 Analyze the network infrastructure of an existing network for determining what the basic traffic patterns are communicating

 Recommend an effective architecture design for supporting communication needs throughout an organization

 Analyze network traffic patterns for informing a network design that mitigates performance and security issues

 Develop recommendations for designing and maintaining a secure network infrastructure in accordance with industry standard best practices

Prompt
Imagine that you are a newly hired network consultant for SNHUEnergy, Inc. The leadership team at the organization has asked you to create a network analysis
and architecture evaluation on the current network. Your report will also include design recommendations for the organization’s future network architecture,
including basic recommendations to mitigate any potential performance or security issues.

Specifically, the following critical elements must be addressed:

I. Executive Summary: Provide a high-level overview of the contents of your report for the leadership team. Include your findings around data traffic
flows, applications impacted, and the overall network and security recommendations for the future needs of the organization.

II. Current Network Architecture: In this section, you will analyze the information provided in the SNHUEnergy, Inc. scenario to provide high-level
assumptions about the design of the network.

A. Identify the network applications that are a part of the current network.
B. Describe how the current network is designed by explaining how the different layers of the Open Systems Interconnection

(OSI) model relate to each other within the network.
C. Develop a visual representation of an end-to-end path flow of the existing network by creating a Visio diagram showing the output

of the traffic flows. Use the provided logical network design example as a guide for creating your diagram, and include your diagram
with your submission.

D. Explain the types of physical network devices used in connecting all devices across the organization based on what you know from
the scenario.

E. Identify the critical traffic patterns currently used by the organization, supported by examples. Use the provided Wireshark
capture to guide your response.

F. Describe the traffic patterns that the organization’s critical applications take across the infrastructure from office to office.
Remember, the organization’s critical applications were specified in the scenario.

G. Describe the potential performance issues that may occur within the current network if no changes are made to support the organization’s
expansion. Provide examples to support your response.

H. Describe the potential security issues that may occur within the current network if no changes are made to support the organization’s
expansion. Provide examples to support your response.

III. Future Network Architecture
A. Determine the future communication needs of the organization based on what you know from the scenario.
B. Describe in detail a network architecture that would be appropriate for supporting the ultimate growth of the organization and defend how this

recommended network would improve communication across the company.
C. Develop a visual representation of your recommended network architecture by creating a Visio diagram. Use the provided physical network

design example as a guide for creating your diagram, and include your diagram with your submission.

IV. Planning and Security
A. Recommend the best approach to mitigate the potential performance and security issues that you previously identified, and defend your

response.
B. Recommend a network management tool to implement into the future network and explain its potential benefit to the organization.
C. Recommend types of security devices that you would implement into the existing network, and explain how the devices would mitigate

potential security issues.
D. Explain the changes that need to be made to existing devices on the network in order to successfully integrate the security devices into the

future network design.
E. Describe specific challenges that the organization might face as it attempts to implement the future network, and recommend ways to mitigate

those challenges.
F. Concisely explain the overall risk for the network and the organization of not keeping security services up to standard.

Milestones
Milestone One: Project Analysis Plan
In Module Three, you will analyze the final project scenario and provide a nontechnical description of the role and functions of key network components. This
milestone will be graded with the Milestone One Rubric.

Milestone Two: Current Network Architecture
In Module Five, you will analyze the information provided in the SNHUEnergy, Inc. scenario to provide high-level assumptions about the design of the network.
This milestone will be graded with the Milestone Two Rubric.

Milestone Three: Future Network Architecture
In Module Seven, you will determine the future communication needs of the organization based on the work you have done and what you know about
SNHUEnergy Inc. This milestone will be graded with the Milestone Three Rubric.

Final Submission: Network Analysis and Architecture Evaluation
In Module Nine, you will be completing Section IV. Planning and Security, and you will submitting your final project. It should be a complete, polished artifact
containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be
graded with the Final Project Rubric.

Deliverables
Milestone Deliverable Module Due Grading

One Project Analysis Plan Three Graded separately; Milestone One Rubric

Two Current Network Architecture Five Graded separately; Milestone Two Rubric

Three Future Network Architecture Seven Graded separately; Milestone Three Rubric

Final Submission: Network Analysis and
Architecture Evaluation

Nine Graded separately; Final Project Rubric

Final Project Rubric
Guidelines for Submission: Your network analysis and architecture evaluation should be 10 to 12 pages in length with 12-point Times New Roman font and
double spacing.

Critical Elements Exemplary Proficient Needs Improvement Not Evident Value

Executive Summary:
Overview

Provides a high-level overview
of the contents of the report,
including findings around data
traffic flows, applications
impacted, and the network and
security recommendations for
the future needs of the
organization (100%)

Provides an overview of the
contents of the report, but
overview is overly detailed or is
missing required components
(70%)

Does not provide an overview
of the contents of the report
(0%)

5

Current Network
Architecture:

Network Applications

Identifies the network
applications that are a part of
the current network (100%)

Identifies the network
applications that are a part of
the current network, but
response contains inaccuracies
(70%)

Does not identify the network
applications that are a part of
the current network (0%)

6

Current Network
Architecture: OSI

Model

Meets “Proficient” criteria and
description demonstrates a
sophisticated awareness of the
design of the current network
(100%)

Describes how the current
network is designed by
explaining how the different
layers of the OSI model relate
to each other within the
network (90%)

Describes how the current
network is designed, but does
not explain how the different
layers of the OSI model relate
to each other within the
network, or description
contains inaccuracies (70%)

Does not describe how the
current network is designed
(0%)

6

Current Network
Architecture: Visual

Representation

Meets “Proficient” criteria and
diagram created demonstrates
a complex grasp of the end-to-
end path flow of the existing
network (100%)

Develops a visual
representation of an end-to-
end path flow of the existing
network by creating a Visio
diagram showing the output of
the traffic flows (90%)

Develops a visual
representation of an end-to-
end path flow of the existing
network by creating a Visio
diagram showing the output of
the traffic flows, but diagram is
illogical or contains
inaccuracies (70%)

Does not develop a visual
representation of an end-to-
end path flow of the existing
network (0%)

6

Current Network
Architecture: Physical

Network

Devices

Meets “Proficient” criteria and
explanation demonstrates
complex grasp of the network
devices that connect all devices
across the organization (100%)

Explains the types of physical
network devices used in
connecting all devices across
the organization (90%)

Explains the types of physical
network devices used in
connecting all devices across
the organization, but response
is cursory or contains
inaccuracies (70%)

Does not explain the types of
physical network devices used
in connecting all devices across
the organization (0%)

6

Current Network
Architecture: Critical

Traffic Patterns

Meets “Proficient” criteria and
response provides keen insight
into the organization’s critical
traffic patterns (100%)

Identifies the critical traffic
patterns currently used by the
organization, supported by
examples (90%)

Identifies the critical traffic
patterns currently used by the
organization, but does not
provide examples, examples
provided are inappropriate, or
response contains inaccuracies
(70%)

Does not identify the critical
traffic patterns currently used
by the organization (0%)

6
Current Network
Architecture:

Patterns Across the
Infrastructure

Meets “Proficient” criteria and
description demonstrates a
nuanced understanding of the
application’s traffic patterns
(100%)

Describes the traffic patterns
that the critical applications
take across the infrastructure
from office to office (90%)

Describes the traffic patterns
that the critical applications
take across the infrastructure
from office to office, but
description is cursory, illogical,
or contains inaccuracies (70%)

Does not describe the traffic
patterns that the critical
applications take across the
infrastructure from office to
office (0%)

6
Current Network
Architecture:

Performance

Issues

Meets “Proficient” criteria and
examples provided
demonstrate a sophisticated
awareness of the potential
performance issues in the
network (100%)

Describes the potential
performance issues that may
occur within the current
network if no changes are
made to support the
organization’s expansion, and
provides examples to support
response (90%)

Describes the potential
performance issues that may
occur within the current
network if no changes are
made to support the
organization’s expansion, but
does not provide examples,
examples provided are
inappropriate, or description is
illogical or contains
inaccuracies (70%)

Does not describe the potential
performance issues that may
occur within the current
network if no changes are
made to support the
organization’s expansion (0%)

6

Current Network
Architecture: Security

Issues

Meets “Proficient” criteria and
examples provided
demonstrate a sophisticated
awareness of the potential
security issues in the network
(100%)

Describes the potential security
issues that may occur within
the current network if no
changes are made to support
the organization’s expansion,
and provides examples to
support response (90%)

Describes the potential security
issues that may occur within
the current network if no
changes are made to support
the organization’s expansion,
but does not provide examples,
examples provided are
inappropriate, or description is
illogical or contains
inaccuracies (70%)

Does not describe the potential
security issues that may occur
within the current network if
no changes are made to
support the organization’s
expansion (0%)

6

Future Network
Architecture: Future

Communication
Needs

Summarizes the future
communication needs of the
organization (100%)

Summarizes the future
communication needs of the
organization, but summary
contains inaccuracies (70%)

Does not summarize the future
communication needs of the
organization (0%)

6

Future Network
Architecture:

Network Architecture

Meets “Proficient” criteria and
defense demonstrates a
complex grasp of the
appropriateness of the
proposed network architecture
for improving communication
across the company (100%)

Describes in detail a network
architecture that would be
appropriate for supporting the
ultimate growth of the
organization and defends how
the future network would
improve communication across
the company (90%)

Describes a network
architecture that would be
appropriate for supporting the
ultimate growth of the
organization, but does not
defend how the future network
would improve communication
across the company, or
response is cursory, illogical, or
contains inaccuracies (70%)

Does not describe a network
architecture that would be
appropriate for supporting the
ultimate growth of the
organization (0%)

6
Future Network
Architecture: Future

Visual Representation

Meets “Proficient” criteria and
diagram created provides keen
insight into the architecture of
the recommended network
(100%)

Develops a visual
representation of the
recommended network
architecture by creating a Visio
diagram (90%)

Develops a visual
representation of the
recommended network
architecture by creating a Visio
diagram, but diagram is illogical
or contains inaccuracies (70%)

Does not develop a visual
representation of the
recommended network
architecture (0%)

6

Planning and
Security:

Performance and
Security Issues

Meets “Proficient” criteria and
defense demonstrates keen
insight into how to mitigate
potential issues that may occur
within the network (100%)

Recommends the best
approach to mitigate the
previously identified potential
performance and security
issues and defends response
(90%)

Recommends the best
approach to mitigate the
previously identified potential
performance and security
issues, but does not defend
response, or defense is cursory
or illogical or contains
inaccuracies (70%)

Does not recommend the best
approach to mitigate the
previously identified potential
performance and security
issues (0%)

6

Planning and
Security: Network
Management Tool

Meets “Proficient” criteria and
explanation demonstrates keen
insight into how the
organization would benefit
from the recommended
network management tool
(100%)

Recommends a network
management tool to
implement into the future
network and explains its
potential benefit to the
organization (90%)

Recommends a network
management tool to
implement into the future
network, but does not explain
its potential benefit to the
organization, or explanation is
cursory or illogical or contains
inaccuracies (70%)

Does not recommend a
network management tool to
implement into the future
network (0%)

3.6

Planning and
Security: Security

Devices

Meets “Proficient” criteria and
explanation demonstrates a
complex grasp of how the
recommended security devices
would mitigate potential
security issues (100%)

Recommends types of security
devices to implement into the
existing network and explains
how the devices would mitigate
potential security issues (90%)

Recommends types of security
devices to implement into the
existing network, but does not
explain how the devices would
mitigate potential security
issues, or explanation is cursory
or illogical or contains
inaccuracies (70%)

Does not recommend types of
security devices to implement
into the existing network (0%)

3.6

Planning and
Security: Changes to

Existing Devices

Meets “Proficient” criteria and
explanation demonstrates a
sophisticated awareness of the
changes that are required for
existing devices (100%)

Explains the changes that need
to be made to existing devices
on the network in order to
successfully integrate the
security devices into the future
network design (90%)

Explains the changes that need
to be made to existing devices
on the network in order to
successfully integrate the
security devices into the future
network design, but
explanation is cursory or
illogical or contains
inaccuracies (70%)

Does not explain the changes
that need to be made to
existing devices on the network
(0%)

3.6

Planning and
Security: Challenges

Meets “Proficient” criteria and
recommendations demonstrate
nuanced understanding of how
to plan for the challenges
associated with implementing a
new network (100%)

Describes specific challenges
that the organization might
face as it attempts to
implement the future network
and recommends ways to
mitigate those challenges (90%)

Describes challenges that the
organization might face as it
attempts to implement the
future network but does not
recommend ways to mitigate
those challenges,
recommendations are
inappropriate, or challenges
described are not specific (70%)

Does not describe challenges
that the organization might
face as it attempts to
implement the future network
(0%)

3.6

Planning and
Security: Overall Risk

Meets “Proficient” criteria and
explanation provides keen
insight into the importance of
keeping security services up to
standard (100%)

Concisely explains the overall
risk for the network and the
organization of not keeping
security services up to standard
(90%)

Explains the overall risk for the
network and the organization
of not keeping security services
up to standard, but explanation
is illogical or contains
inaccuracies (70%)

Does not explain the overall
risk for the network and the
organization of not keeping
security services up to standard
(0%)

3.6

Articulation of
Response

Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization and is presented
in a professional and easy-to-
read format (100%)

Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
(90%)

Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact
readability and articulation of
main ideas (70%)

Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas (0%)

5

Total 100%

IT 640 Milestone Three Guidelines and Rubric

Future Network Architecture

Overview: When you plan your network infrastructure, a number of key elements need to be clarified or determined because it is the network’s logical
infrastructure that makes it possible for computers to communicate using the routes defined in the physical network topology. For the final milestone, you will
provide a detailed recommendation of components that are able to meet the future communication needs of SNHUEnergy Inc.

Prompt: In this section, you will provide a future recommendation based on the information presented. In addition, analyze the information provided in the
Final Project Scenario document to develop a visual representation of your recommended network architecture in a Visio diagram.

Refer to the following files when completing this milestone:

 Dallas Office Logical Design – Current

 Final Project Physical Diagram – Current

 Memphis Office Logical Design – Current

To complete this assignment, you must address the following critical elements:

 Summarize the future communication needs of the organization based on what you know from the scenario.

 Describe in detail a network architecture that would be appropriate for supporting the ultimate growth of the organization and defend how this
recommended network would improve communication across the company.

 Develop a visual representation of your recommended network architecture by creating a Visio diagram. Use the provided physical network design
example as a guide for creating your diagram.

Rubric
Guidelines for Submission: Review each critical element and designate a bold subheading for each element followed by your review of the current network
architecture. Include an introduction for this assignment that aligns with your analysis from the first milestone. Your submission should align to the current APA
standards. Add the following direction: Submit your finalized network configuration as a Visio diagram. You will submit two files for this milestone.

Critical Elements Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value

Future
Communication

Needs

Summarizes the future communication
needs of the organization

Summarizes the future communication
needs of the organization, but summary
contains inaccuracies

Does not summarize the future
communication needs of the organization

30

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_final_project_scenario

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_dallas_office_logical_design_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_final_project_physical_diagram_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_memphis_office_logical_design_current

Network

Architecture
Describes in detail a network architecture
that would be appropriate for supporting
the ultimate growth of the organization and
defends how the future network would
improve communication across the company

Describes a network architecture that would
be appropriate for supporting the ultimate
growth of the organization, but does not
defend how the future network would
improve communication across the company
or response is cursory or illogical or contains
inaccuracies

Does not describe a network architecture
that would be appropriate for supporting
the ultimate growth of the organization

30

Future Visual
Representation

Develops a visual representation of the
recommended network architecture by
creating a Visio diagram

Develops a visual representation of the
recommended network architecture by
creating a Visio diagram, but diagram is
illogical or contains inaccuracies

Does not develop a visual representation of
the recommended network architecture

30

Articulation of
Response

Summary is free of errors related to
citations, grammar, spelling, syntax, and
organization and is presented in a
professional and easy-to-read format

Summary contains errors related to
citations, grammar, spelling, syntax, or
organization that negatively impact
readability and articulation of main ideas

Summary contains critical errors related to
citations, grammar, spelling, syntax, or
organization that prevent understanding of
ideas

10

Total 100%

IT 640 Milestone Two Guidelines and Rubric

Current Network Architecture

Overview: Network architecture refers to the layout of the network, consisting of the hardware, software, connectivity, communication protocols, and mode of
transmission such as wired or wireless. For the second milestone, you will provide a high-level overview of the SNHUEnergy Inc. network architecture. You will
evaluate traffic patterns to determine critical aspects of your business and provide basic insight into what should be done to the network from a capability
aspect as well as a security viewpoint. Finally, you will develop a visual representation of an end-to-end path flow of the existing network by creating a Visio
diagram showing the output of the traffic flows.

Prompt: In this section, you will analyze the information provided on SNHUEnergy Inc. in the Final Project Scenario document to provide a high-level assumption
for the design of the network.

To complete this assignment, you must address the following critical elements:

 Based on what you know from the scenario, explain the types of physical network devices used in connecting all devices across the organization.

 Identify the critical traffic patterns currently used by the organization, supported by examples. Use the Traffic Flow Wireshark Capture document to
guide your response.

o Service (Voice over Internet Protocol [VoIP])
o Application (Structured Query Language [SQL])
o Network management
o Other opportunities not specified above

 Describe the traffic patterns that the organization’s critical applications take across the infrastructure from office to office. Remember, the
organization’s critical applications were specified in the scenario.

 Describe the potential performance issues that may occur within the current network if no changes are made to support the organization’s expansion.
Provide examples to support your response.

 Describe the potential security issues that may occur within the current network if no changes are made to support the organization’s expansion.
Provide examples to support your response.

 Develop a visual representation of an end-to-end path flow of the existing network by creating a Visio diagram showing the output of the traffic flows.
Use the provided Logical Network Design Example file as a guide for creating your diagram, and include your diagram with your submission.

Rubric

Guidelines for Submission: Review each critical element and designate a bold subheading for each element followed by your review of the current network
architecture. Include an introduction for this assignment that aligns with your analysis from the first milestone. Make sure your submission aligns with the
current APA standards. Upload your Visio diagram as a separate file to complete this milestone.

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_final_project_scenario

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_traffic_flow_wireshark_capture

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_logical_network_design_example

Critical Elements Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value

Physical Network
Devices

Explains the types of physical network
devices used in connecting all devices across
the organization

Explains the types of physical network
devices used in connecting all devices across
the organization, but response is cursory or
contains inaccuracies

Does not explain the types of physical
network devices used in connecting all
devices across the organization

15

Critical Traffic
Patterns

Identifies the critical traffic patterns
currently used by the organization,
supported by examples

Identifies the critical traffic patterns
currently used by the organization but does
not provide examples, or examples provided
are inappropriate, or response contains
inaccuracies

Does not identify the critical traffic patterns
currently used by the organization

15

Patterns Across the
Infrastructure

Describes the traffic patterns that the
critical applications take across the
infrastructure from office to office

Describes the traffic patterns that the
critical applications take across the
infrastructure from office to office, but
description is cursory or illogical or contains
inaccuracies

Does not describe the traffic patterns that
the critical applications take across the
infrastructure from office to office

15

Performance Issues Describes the potential performance issues
that may occur within the current network if
no changes are made to support the
organization’s expansion and provides
examples to support response

Describes the potential performance issues
that may occur within the current network if
no changes are made to support the
organization’s expansion but does not
provide examples, or examples provided are
inappropriate, or description is illogical or
contains inaccuracies

Does not describe the potential
performance issues that may occur within
the current network if no changes are made
to support the organization’s expansion

15

Security Issues Describes the potential security issues that
may occur within the current network if no
changes are made to support the
organization’s expansion and provides
examples to support response

Describes the potential security issues that
may occur within the current network if no
changes are made to support the
organization’s expansion but does not
provide examples, or examples provided are
inappropriate, or description is illogical or
contains inaccuracies

Does not describe the potential security
issues that may occur within the current
network if no changes are made to support
the organization’s expansion

15

Visual
Representation

Develops a visual representation of an end-
to-end path flow of the existing network by
creating a Visio diagram showing the output
of the traffic flows

Develops a visual representation of an end-
to-end path flow of the existing network by
creating a Visio diagram showing the output
of the traffic flows, but diagram is illogical or
contains inaccuracies

Does not develop a visual representation of
an end-to-end path flow of the existing
network

25

Total 100%

IT 640 Milestone One Guidelines and Rubric

Project Analysis Plan

Overview: For your final project, you will assume the role of a network consultant for SNHUEnergy Inc., an organization looking to expand its communication
reach. Refer to the Final Project Scenario document for details. You have been tasked with analyzing the current network architecture of the organization and
determining any key changes that should occur as the organization prepares for future growth. You will evaluate traffic patterns to determine critical aspects of
your business and provide basic insight into what should be done to the network from a capability aspect and from a security viewpoint as the organization
prepares for future growth. Ultimately, you will recommend a design for the future network architecture of the organization.

Prompt: Your first milestone for this project will be the creation of a project analysis plan. Your plan will identify the network applications of the current network
including a description of how the current network is designed by explaining how the different layers of the Open Systems Interconnection (OSI) model relate to
each other within the network.

Refer to the following files when completing this milestone:

 Dallas Office Logical Design – Current

 Final Project Physical Diagram – Current

 Memphis Office Logical Design – Current

 Milestone One Physical Diagram – Current

To complete this assignment, address the following critical elements:

 Identify the network applications that are a part of the current network.

 Identify and label the components of the network with the appropriate OSI network layer(s) (refer to Final Project Physical Diagram – Current file)

 Provide a nontechnical description of the role and functions of key components, including routers, switches, and firewalls.

 Provide a brief analysis of the current network configuration in terms of day-to-day business operations. Consider the following questions as a guide to
your analysis:

o What is the impact of losing connectivity between the Dallas router and the Memphis router? Which applications might be impacted between
locations?

o What is the risk of just having a single router or switch within the Memphis office?
o How effective is the firewall in the current network?

 Summarize the project requirements and deliverables

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_final_project_scenario

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_dallas_office_logical_design_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_final_project_physical_diagram_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_memphis_office_logical_design_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_milestone_one_physical_diagram_current

Rubric

Guidelines for Submission: Your assignment should be 1 to 2 pages in length with double spacing and should conform to academic writing standard expectations
for mechanics, content organization, and use of APA style.

Critical
Elements

Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value

Network
Applications

Identifies the network applications that are a
part of the current network

Identifies the network applications that are a
part of the current network, but response
contains inaccuracies

Does not identify the network applications
that are a part of the current network

1

5

OSI Model
Identification

and Label

Identifies and labels the different layers of
the OSI model according to the components
of current network

Identifies and labels the different layers of
the OSI model according to the components
of current network, but the diagram is
incomplete or contains inaccuracies

Does not identify the different layers of the
OSI model according to the components of
current network

15

Component
Description

Provides a nontechnical description of the
role and functions of key components
including routers, switches, and firewalls

Provides a description of the role and
functions of key components, but the
description is overly technical, inaccurate, or
incomplete

Does not provide a nontechnical description
of the role and functions of key components

25

Network
Analysis

Provides a brief analysis of current network
configuration by describing the impact on
day-to-day business operations

Provides a brief analysis of current network
configuration by describing the impact on
day-to-day business operations, but the
analysis is incomplete or contains
inaccuracies

Does not provide a brief analysis of current
network configuration by describing the
impact on day-to-day business operations

25

Project
Summary

Summarizes and addresses key elements of
project requirements

Summarizes and addresses key elements of
project requirements, but summary is
incomplete or contains inaccuracies

Does not summarize and address key
elements of project requirements

15

Articulation of
Response

Plan is free of errors related to citations,
grammar, spelling, syntax, and organization
and is presented in a professional and easy-
to-read format that addresses technical and
nontechnical audiences

Plan contains errors related to citations,
grammar, spelling, syntax, or organization
that negatively impact readability and
articulation of main ideas

Plan contains critical errors related to
citations, grammar, spelling, syntax, or
organization that prevent understanding of
ideas

5

Total 100%

ProRubbs/it640_milestone_one_physical_diagram_current

Dallas Office
Memphis Office

SNHUEnergy, Inc.
Physical Network Design

CURRENT

NETWORK DESIGN

Dallas Office:

Total Employees – 90

Applications –

Email

Payroll

Accounting

HR

Services –

VoIP Phone System

Video Conferencing

Hardware –

Routers – 1

Switches – 2

Firewalls – 1

Connectivity –

Internet

Memphis Office:

Total Employees – 30

Applications –

Billing

Operations

Services –

VoIP Phone System

Video Conferencing

Hardware –

Routers – 1

Switches – 1

Firewalls – 0

Connectivity –

Internet

Internet

it640_milestone_one_physical_diagram_current.vsdx
Page-1

__MACOSX/ProRubbs/._it640_milestone_one_physical_diagram_current

ProRubbs/it640_logical_network_design_example

Server Farm

WAP’s

IP Phone

End-users

Corporate Computers

Switch-2

INTERNET

FIREWALL

10.0.1.0 /24

10.0.2.0 /24

10.0.3.0 /24

10.0.4.0 /24
10.0.5.0 /24

10.0.6.0 /24

XYZ Company
Logical Network Design

Router
Switch-1

EXAMPLE DIAGRAM

10.0.1.1 /2410.0.6.1 /24
10.1.0.1 /24

10.0.3.1 /24 10.0.4.1 /24
10.0.2.1 /2410.0.5.1 /24

10.1.0.11 /2410.1.0.10 /24

Video
Conferencing

it640_logical_network_design_example.vsdx
Page-1

__MACOSX/ProRubbs/._it640_logical_network_design_example

ProRubbs/it640_final_project_physical_diagram_current

Dallas Office

DALLAS_SW_1

PAYROLL

Memphis Office

MEMPHIS_SW-01

MEMPHIS_WKS_002

DALLAS_WKS_003

ACCOUNTING E-MAIL

DALLAS_SW-01

HR

DALL_RTR_03

SNHUEnergy, Inc.
Physical Network Design

CURRENT

NETWORK DESIGN

MEMPHIS_RTR_002DALLAS_WKS_002

DALLAS_WKS_001

MEMPHIS_WKS_001

Operations
Dallas Office:

Total Employees – 90

Applications –

Email

Payroll

Accounting

HR

Services –

VoIP Phone System

Video Conferencing

Hardware –

Routers – 1

Switches – 2

Firewalls – 1

Connectivity –

Internet

Memphis Office:

Total Employees – 30

Applications –

Billing

Operations

Services –

VoIP Phone System

Video Conferencing

Hardware –

Routers – 1

Switches – 1

Firewalls – 0

Connectivity –

Internet

Billing

Internet

it640_final_project_physical_diagram_current.vsdx
Page-1

__MACOSX/ProRubbs/._it640_final_project_physical_diagram_current

ProRubbs/it640_traffic_flow_wireshark_capture

IT 640 Traffic Flow Wireshark Capture

__MACOSX/ProRubbs/._it640_traffic_flow_wireshark_capture

ProRubbs/it640_memphis_office_logical_design_current

Server Farm

IP Phone

End-users

Corporate Computers

Switch-1

Dallas Office

10.2.1.0 /24

10.2.2.0 /2410.2.4.0 /24

10.2.5.0 /24

10.2.6.0 /24

SNHUEnergy, Inc.
Logical Network Design

Router

Memphis Office

10.2.1.1 /2410.2.6.1 /24

10.10.1.1 /24

10.2.2.1 /2410.2.5.1 /24

Video
Conferencing

10.2.4.1 /24

10.10.1.2 /24

it640_memphis_office_logical_design_current.vsdx
Page-1

__MACOSX/ProRubbs/._it640_memphis_office_logical_design_current

ProRubbs/it640_milestone_one_physical_diagram_current (1)

Dallas Office
Memphis Office

SNHUEnergy, Inc.
Physical Network Design

CURRENT

NETWORK DESIGN

Dallas Office:

Total Employees – 90

Applications –

Email

Payroll

Accounting

HR

Services –

VoIP Phone System

Video Conferencing

Hardware –

Routers – 1

Switches – 2

Firewalls – 1

Connectivity –

Internet

Memphis Office:

Total Employees – 30

Applications –

Billing

Operations

Services –

VoIP Phone System

Video Conferencing

Hardware –

Routers – 1

Switches – 1

Firewalls – 0

Connectivity –

Internet

Internet

it640_milestone_one_physical_diagram_current.vsdx
Page-1

__MACOSX/ProRubbs/._it640_milestone_one_physical_diagram_current (1)

ProRubbs/it640_physical_network_design_example

Office Z

Office X

X_ SWITCH_1

PAYROLL

Office Y

Y_SWITCH_01

Y_WKS_1

X_WKS_003

ACCOUNTING

E-MAIL

X_SWITCH_2

HR

X_ROUTER_1

XYZ, Inc.
Physical Network Design

*** Example for Final Project ***

Y_ROUTER_1

X_WKS_002

X_WKS_001

Y_WKS_002

Operations

Billing

FIREWALL

Internet

Z_WKS_001 Z_WKS_001

Z_ROUTER_1

WORKSTATION

SERVER

FIREWALL

SWITCH

ROUTER

VISIO LEGEND

VIDEO C ONF

VIDEO C ONF

VIDEO C ONF

VIDEO CONF

it640_physical_network_design_example.vsdx
Page-1

__MACOSX/ProRubbs/._it640_physical_network_design_example

ProRubbs/it640_final_project_scenario

IT 640 Final Project Scenario

Imagine that you are a newly hired network consultant for SNHUEnergy Inc., a quickly growing oil and
gas company that has decided to expand its operation and begin developing a more efficient approach
to its use of the currently available technology. As a consultant for the company, you will evaluate the
current network architecture, determine any key changes that should occur, and recommend a high-
level design for future growth. The leadership team within the company has made a major commitment
to the board of directors that they will begin an initiative to create a communication architecture that
will allow the company to grow for the next ten years. You have been assigned the task of addressing
the overall framework for the architecture and evaluating the basic structure of the network, its
communication paths, and the type of traffic utilized. You will also begin to develop a basic security plan
in an effort to mitigate any risk the company currently has to internal and external factors.

SNHUEnergy Inc. is a medium-sized oil and gas company that is focused on the discovery and drilling of
oil-based products. It wants to grow from company solely focused on exploration into a company that
also provides the transportation and refinement of its discoveries. This is a big step for the company,
and it wants to make sure the communication infrastructure is ready to deliver in the next 12 to 18
months. The company is currently headquartered in Dallas, Texas, and operates small facilities in the
central United States. The total employee count is 120 across the organization, but this will grow by 50%
each year for the next two years. Initially, you will evaluate the current logical and physical design of the
network to determine the network connectivity, the traffic patterns of the organization, and what would
need to occur to enable the business to grow.

The network infrastructure consists of a single building with multiple floors and different divisions
(human resources, IT, accounting, and operations and payroll). The company will develop a plan to
expand to three additional regional offices in Kansas City and Houston. You will be asked to take the
initial design and determine what traffic will need to communicate at each office and which security
parameters will need to exist as the company grows. This work will consist of understanding the
connectivity and traffic traversing internally and externally and developing a plan to enable end-users to
access the correct communication to the key critical applications (i.e., human resources, email, and
Voice over Internet Protocol [VoIP]) across the company.

The infrastructure consists of network routers, switches, and firewall equipment that currently connect
all the users to the internet internally and externally. All the connectivity between the users is
Transmission Control Protocol/Internet Protocol (TCP/IP) traffic, which is utilized by data, voice, and
video applications across the organization.

In the future, the company will extend these services across the wide area network (WAN) by using
TCP/IP communication processes.

__MACOSX/ProRubbs/._it640_final_project_scenario

ProRubbs/it640_dallas_office_logical_design_current

Server Farm

WAP’s

IP Phone

End-users

Corporate Computers

Switch-2

INTERNET

FIREWALL

10.0.1.0 /24

10.0.2.0 /24

10.0.3.0 /24

10.0.4.0 /24
10.0.5.0 /24

10.0.6.0 /24

SNHUEnergy, Inc.
Logical Network Design

Router
Switch-1

Dallas Office

10.0.1.1 /2410.0.6.1 /24
10.1.0.1 /24

10.0.3.1 /24 10.0.4.1 /24
10.0.2.1 /2410.0.5.1 /24

10.1.0.11 /2410.1.0.10 /24

Video
Conferencing

67.0.0.0

it640_dallas_office_logical_design_current.vsdx
Page-1

__MACOSX/ProRubbs/._it640_dallas_office_logical_design_current

ProRubbs/IT 640 Final Project Guidelines and Rubric (1)

IT 640 Final Project Guidelines and Rubric

Overview
Within an organization, the dependability of network infrastructures has become less of a want and more of a need. Without a fully developed communication
architecture around business growth, efficiencies, and competitive advantage, many companies will find themselves underperforming. Network connectivity
used to be considered a luxury for many businesses, but it has recently become a critical piece of an organization. The fundamental understanding of how
networks play such a big role in the success of a company has to be assessed from the basic approach of the advancement in Transmission Control
Protocol/Internet Protocol (TCP/IP) communication and the functionality of the Open Systems Interconnection (OSI) model.

Understanding how a network communicates is key to understanding how your corporate applications and services work within the business. Your
understanding around the concepts of IP communication, devices used to communicate, and the traffic that is continually passed between devices is the first key
to gaining the understanding of network infrastructure. The knowledge you develop through this course will help build on your basic understanding of network
infrastructures and the components that are critical to the success of any business communication architecture.

For your final project, you will assume the role of a network consultant for an organization looking to expand its communication reach. You have been be tasked
with analyzing the current network architecture of the organization and determining any key changes that should occur as the organization prepares for future
growth. You will evaluate traffic patterns to determine critical aspects of your business and provide basic insight into what should be done to the network from a
capability aspect and from a security viewpoint as the organization prepares for future growth. Ultimately, you will recommend a design for the future network
architecture of the organization.

The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Three, Five, and Seven. The final product will be submitted in Module Nine.

Before beginning your project, read the Final Project Scenario document about SNHUEnergy, Inc., an organization that is looking to expand its operations. Then,
review all of the logical and physical design diagrams as well as the Wireshark capture showing the traffic patterns of the organization’s current network. These
files are provided below:

 Milestone One Physical Diagram – Current

 Final Project Physical Diagram – Current

 Memphis Office Logical Design – Current

 Physical Network Design Example

 Logical Network Design Example

 Dallas Office Logical Design – Current

 Traffic Flow Wireshark Capture

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_final_project_scenario

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_milestone_one_physical_diagram_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_final_project_physical_diagram_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_memphis_office_logical_design_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_physical_network_design_example

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_logical_network_design_example

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_dallas_office_logical_design_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_traffic_flow_wireshark_capture

In this assignment, you will demonstrate your mastery of the following course outcomes:

 Determine how network applications communicate from end to end by applying the network Open Systems Interconnection (OSI) model

 Analyze the network infrastructure of an existing network for determining what the basic traffic patterns are communicating

 Recommend an effective architecture design for supporting communication needs throughout an organization

 Analyze network traffic patterns for informing a network design that mitigates performance and security issues

 Develop recommendations for designing and maintaining a secure network infrastructure in accordance with industry standard best practices

Prompt
Imagine that you are a newly hired network consultant for SNHUEnergy, Inc. The leadership team at the organization has asked you to create a network analysis
and architecture evaluation on the current network. Your report will also include design recommendations for the organization’s future network architecture,
including basic recommendations to mitigate any potential performance or security issues.

Specifically, the following critical elements must be addressed:

I. Executive Summary: Provide a high-level overview of the contents of your report for the leadership team. Include your findings around data traffic
flows, applications impacted, and the overall network and security recommendations for the future needs of the organization.

II. Current Network Architecture: In this section, you will analyze the information provided in the SNHUEnergy, Inc. scenario to provide high-level
assumptions about the design of the network.

A. Identify the network applications that are a part of the current network.
B. Describe how the current network is designed by explaining how the different layers of the Open Systems Interconnection

(OSI) model relate to each other within the network.
C. Develop a visual representation of an end-to-end path flow of the existing network by creating a Visio diagram showing the output

of the traffic flows. Use the provided logical network design example as a guide for creating your diagram, and include your diagram
with your submission.

D. Explain the types of physical network devices used in connecting all devices across the organization based on what you know from
the scenario.

E. Identify the critical traffic patterns currently used by the organization, supported by examples. Use the provided Wireshark
capture to guide your response.

F. Describe the traffic patterns that the organization’s critical applications take across the infrastructure from office to office.
Remember, the organization’s critical applications were specified in the scenario.

G. Describe the potential performance issues that may occur within the current network if no changes are made to support the organization’s
expansion. Provide examples to support your response.

H. Describe the potential security issues that may occur within the current network if no changes are made to support the organization’s
expansion. Provide examples to support your response.

III. Future Network Architecture
A. Determine the future communication needs of the organization based on what you know from the scenario.
B. Describe in detail a network architecture that would be appropriate for supporting the ultimate growth of the organization and defend how this

recommended network would improve communication across the company.
C. Develop a visual representation of your recommended network architecture by creating a Visio diagram. Use the provided physical network

design example as a guide for creating your diagram, and include your diagram with your submission.

IV. Planning and Security
A. Recommend the best approach to mitigate the potential performance and security issues that you previously identified, and defend your

response.
B. Recommend a network management tool to implement into the future network and explain its potential benefit to the organization.
C. Recommend types of security devices that you would implement into the existing network, and explain how the devices would mitigate

potential security issues.
D. Explain the changes that need to be made to existing devices on the network in order to successfully integrate the security devices into the

future network design.
E. Describe specific challenges that the organization might face as it attempts to implement the future network, and recommend ways to mitigate

those challenges.
F. Concisely explain the overall risk for the network and the organization of not keeping security services up to standard.

Milestones
Milestone One: Project Analysis Plan
In Module Three, you will analyze the final project scenario and provide a nontechnical description of the role and functions of key network components. This
milestone will be graded with the Milestone One Rubric.

Milestone Two: Current Network Architecture
In Module Five, you will analyze the information provided in the SNHUEnergy, Inc. scenario to provide high-level assumptions about the design of the network.
This milestone will be graded with the Milestone Two Rubric.

Milestone Three: Future Network Architecture
In Module Seven, you will determine the future communication needs of the organization based on the work you have done and what you know about
SNHUEnergy Inc. This milestone will be graded with the Milestone Three Rubric.

Final Submission: Network Analysis and Architecture Evaluation
In Module Nine, you will be completing Section IV. Planning and Security, and you will submitting your final project. It should be a complete, polished artifact
containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be
graded with the Final Project Rubric.

Deliverables
Milestone Deliverable Module Due Grading

One Project Analysis Plan Three Graded separately; Milestone One Rubric

Two Current Network Architecture Five Graded separately; Milestone Two Rubric

Three Future Network Architecture Seven Graded separately; Milestone Three Rubric

Final Submission: Network Analysis and
Architecture Evaluation

Nine Graded separately; Final Project Rubric

Final Project Rubric
Guidelines for Submission: Your network analysis and architecture evaluation should be 10 to 12 pages in length with 12-point Times New Roman font and
double spacing.

Critical Elements Exemplary Proficient Needs Improvement Not Evident Value

Executive Summary:
Overview

Provides a high-level overview
of the contents of the report,
including findings around data
traffic flows, applications
impacted, and the network and
security recommendations for
the future needs of the
organization (100%)

Provides an overview of the
contents of the report, but
overview is overly detailed or is
missing required components
(70%)

Does not provide an overview
of the contents of the report
(0%)

5

Current Network
Architecture:

Network Applications

Identifies the network
applications that are a part of
the current network (100%)

Identifies the network
applications that are a part of
the current network, but
response contains inaccuracies
(70%)

Does not identify the network
applications that are a part of
the current network (0%)

6

Current Network
Architecture: OSI

Model

Meets “Proficient” criteria and
description demonstrates a
sophisticated awareness of the
design of the current network
(100%)

Describes how the current
network is designed by
explaining how the different
layers of the OSI model relate
to each other within the
network (90%)

Describes how the current
network is designed, but does
not explain how the different
layers of the OSI model relate
to each other within the
network, or description
contains inaccuracies (70%)

Does not describe how the
current network is designed
(0%)

6

Current Network
Architecture: Visual

Representation

Meets “Proficient” criteria and
diagram created demonstrates
a complex grasp of the end-to-
end path flow of the existing
network (100%)

Develops a visual
representation of an end-to-
end path flow of the existing
network by creating a Visio
diagram showing the output of
the traffic flows (90%)

Develops a visual
representation of an end-to-
end path flow of the existing
network by creating a Visio
diagram showing the output of
the traffic flows, but diagram is
illogical or contains
inaccuracies (70%)

Does not develop a visual
representation of an end-to-
end path flow of the existing
network (0%)

6

Current Network
Architecture: Physical

Network Devices

Meets “Proficient” criteria and
explanation demonstrates
complex grasp of the network
devices that connect all devices
across the organization (100%)

Explains the types of physical
network devices used in
connecting all devices across
the organization (90%)

Explains the types of physical
network devices used in
connecting all devices across
the organization, but response
is cursory or contains
inaccuracies (70%)

Does not explain the types of
physical network devices used
in connecting all devices across
the organization (0%)

6

Current Network
Architecture: Critical

Traffic Patterns

Meets “Proficient” criteria and
response provides keen insight
into the organization’s critical
traffic patterns (100%)

Identifies the critical traffic
patterns currently used by the
organization, supported by
examples (90%)

Identifies the critical traffic
patterns currently used by the
organization, but does not
provide examples, examples
provided are inappropriate, or
response contains inaccuracies
(70%)

Does not identify the critical
traffic patterns currently used
by the organization (0%)

6

Current Network
Architecture:

Patterns Across the
Infrastructure

Meets “Proficient” criteria and
description demonstrates a
nuanced understanding of the
application’s traffic patterns
(100%)

Describes the traffic patterns
that the critical applications
take across the infrastructure
from office to office (90%)

Describes the traffic patterns
that the critical applications
take across the infrastructure
from office to office, but
description is cursory, illogical,
or contains inaccuracies (70%)

Does not describe the traffic
patterns that the critical
applications take across the
infrastructure from office to
office (0%)

6

Current Network
Architecture:

Performance Issues

Meets “Proficient” criteria and
examples provided
demonstrate a sophisticated
awareness of the potential
performance issues in the
network (100%)

Describes the potential
performance issues that may
occur within the current
network if no changes are
made to support the
organization’s expansion, and
provides examples to support
response (90%)

Describes the potential
performance issues that may
occur within the current
network if no changes are
made to support the
organization’s expansion, but
does not provide examples,
examples provided are
inappropriate, or description is
illogical or contains
inaccuracies (70%)

Does not describe the potential
performance issues that may
occur within the current
network if no changes are
made to support the
organization’s expansion (0%)

6

Current Network
Architecture: Security

Issues

Meets “Proficient” criteria and
examples provided
demonstrate a sophisticated
awareness of the potential
security issues in the network
(100%)

Describes the potential security
issues that may occur within
the current network if no
changes are made to support
the organization’s expansion,
and provides examples to
support response (90%)

Describes the potential security
issues that may occur within
the current network if no
changes are made to support
the organization’s expansion,
but does not provide examples,
examples provided are
inappropriate, or description is
illogical or contains
inaccuracies (70%)

Does not describe the potential
security issues that may occur
within the current network if
no changes are made to
support the organization’s
expansion (0%)

6

Future Network
Architecture: Future

Communication
Needs

Summarizes the future
communication needs of the
organization (100%)

Summarizes the future
communication needs of the
organization, but summary
contains inaccuracies (70%)

Does not summarize the future
communication needs of the
organization (0%)

6

Future Network
Architecture:

Network Architecture

Meets “Proficient” criteria and
defense demonstrates a
complex grasp of the
appropriateness of the
proposed network architecture
for improving communication
across the company (100%)

Describes in detail a network
architecture that would be
appropriate for supporting the
ultimate growth of the
organization and defends how
the future network would
improve communication across
the company (90%)

Describes a network
architecture that would be
appropriate for supporting the
ultimate growth of the
organization, but does not
defend how the future network
would improve communication
across the company, or
response is cursory, illogical, or
contains inaccuracies (70%)

Does not describe a network
architecture that would be
appropriate for supporting the
ultimate growth of the
organization (0%)

6

Future Network
Architecture: Future

Visual Representation

Meets “Proficient” criteria and
diagram created provides keen
insight into the architecture of
the recommended network
(100%)

Develops a visual
representation of the
recommended network
architecture by creating a Visio
diagram (90%)

Develops a visual
representation of the
recommended network
architecture by creating a Visio
diagram, but diagram is illogical
or contains inaccuracies (70%)

Does not develop a visual
representation of the
recommended network
architecture (0%)

6

Planning and
Security:

Performance and
Security Issues

Meets “Proficient” criteria and
defense demonstrates keen
insight into how to mitigate
potential issues that may occur
within the network (100%)

Recommends the best
approach to mitigate the
previously identified potential
performance and security
issues and defends response
(90%)

Recommends the best
approach to mitigate the
previously identified potential
performance and security
issues, but does not defend
response, or defense is cursory
or illogical or contains
inaccuracies (70%)

Does not recommend the best
approach to mitigate the
previously identified potential
performance and security
issues (0%)

6

Planning and
Security: Network
Management Tool

Meets “Proficient” criteria and
explanation demonstrates keen
insight into how the
organization would benefit
from the recommended
network management tool
(100%)

Recommends a network
management tool to
implement into the future
network and explains its
potential benefit to the
organization (90%)

Recommends a network
management tool to
implement into the future
network, but does not explain
its potential benefit to the
organization, or explanation is
cursory or illogical or contains
inaccuracies (70%)

Does not recommend a
network management tool to
implement into the future
network (0%)

3.6

Planning and
Security: Security

Devices

Meets “Proficient” criteria and
explanation demonstrates a
complex grasp of how the
recommended security devices
would mitigate potential
security issues (100%)

Recommends types of security
devices to implement into the
existing network and explains
how the devices would mitigate
potential security issues (90%)

Recommends types of security
devices to implement into the
existing network, but does not
explain how the devices would
mitigate potential security
issues, or explanation is cursory
or illogical or contains
inaccuracies (70%)

Does not recommend types of
security devices to implement
into the existing network (0%)

3.6

Planning and
Security: Changes to

Existing Devices

Meets “Proficient” criteria and
explanation demonstrates a
sophisticated awareness of the
changes that are required for
existing devices (100%)

Explains the changes that need
to be made to existing devices
on the network in order to
successfully integrate the
security devices into the future
network design (90%)

Explains the changes that need
to be made to existing devices
on the network in order to
successfully integrate the
security devices into the future
network design, but
explanation is cursory or
illogical or contains
inaccuracies (70%)

Does not explain the changes
that need to be made to
existing devices on the network
(0%)

3.6

Planning and
Security: Challenges

Meets “Proficient” criteria and
recommendations demonstrate
nuanced understanding of how
to plan for the challenges
associated with implementing a
new network (100%)

Describes specific challenges
that the organization might
face as it attempts to
implement the future network
and recommends ways to
mitigate those challenges (90%)

Describes challenges that the
organization might face as it
attempts to implement the
future network but does not
recommend ways to mitigate
those challenges,
recommendations are
inappropriate, or challenges
described are not specific (70%)

Does not describe challenges
that the organization might
face as it attempts to
implement the future network
(0%)

3.6

Planning and
Security: Overall Risk

Meets “Proficient” criteria and
explanation provides keen
insight into the importance of
keeping security services up to
standard (100%)

Concisely explains the overall
risk for the network and the
organization of not keeping
security services up to standard
(90%)

Explains the overall risk for the
network and the organization
of not keeping security services
up to standard, but explanation
is illogical or contains
inaccuracies (70%)

Does not explain the overall
risk for the network and the
organization of not keeping
security services up to standard
(0%)

3.6

Articulation of
Response

Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization and is presented
in a professional and easy-to-
read format (100%)

Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
(90%)

Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact
readability and articulation of
main ideas (70%)

Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas (0%)

5

Total 100%

__MACOSX/ProRubbs/._IT 640 Final Project Guidelines and Rubric (1)

IT 640 Final Project Scenario

Imagine that you are a newly hired network consultant for SNHUEnergy Inc., a quickly growing oil and
gas company that has decided to expand its operation and begin developing a more efficient approach
to its use of the currently available technology. As a consultant for the company, you will evaluate the
current network architecture, determine any key changes that should occur, and recommend a high-
level design for future growth. The leadership team within the company has made a major commitment
to the board of directors that they will begin an initiative to create a communication architecture that
will allow the company to grow for the next ten years. You have been assigned the task of addressing
the overall framework for the architecture and evaluating the basic structure of the network, its
communication paths, and the type of traffic utilized. You will also begin to develop a basic security plan
in an effort to mitigate any risk the company currently has to internal and external factors.

SNHUEnergy Inc. is a medium-sized oil and gas company that is focused on the discovery and drilling of
oil-based products. It wants to grow from company solely focused on exploration into a company that
also provides the transportation and refinement of its discoveries. This is a big step for the company,
and it wants to make sure the communication infrastructure is ready to deliver in the next 12 to 18
months. The company is currently headquartered in Dallas, Texas, and operates small facilities in the
central United States. The total employee count is 120 across the organization, but this will grow by 50%
each year for the next two years. Initially, you will evaluate the current logical and physical design of the
network to determine the network connectivity, the traffic patterns of the organization, and what would
need to occur to enable the business to grow.

The network infrastructure consists of a single building with multiple floors and different divisions
(human resources, IT, accounting, and operations and payroll). The company will develop a plan to
expand to three additional regional offices in Kansas City and Houston. You will be asked to take the
initial design and determine what traffic will need to communicate at each office and which security
parameters will need to exist as the company grows. This work will consist of understanding the
connectivity and traffic traversing internally and externally and developing a plan to enable end-users to
access the correct communication to the key critical applications (i.e., human resources, email, and
Voice over Internet Protocol [VoIP]) across the company.

The infrastructure consists of network routers, switches, and firewall equipment that currently connect
all the users to the internet internally and externally. All the connectivity between the users is
Transmission Control Protocol/Internet Protocol (TCP/IP) traffic, which is utilized by data, voice, and
video applications across the organization.

In the future, the company will extend these services across the wide area network (WAN) by using
TCP/IP communication processes.

Office Z

Office X

X_ SWITCH_1

PAYROLL

Office Y

Y_SWITCH_01

Y_WKS_1

X_WKS_003

ACCOUNTING

E-MAIL

X_SWITCH_2

HR

X_ROUTER_1

XYZ, Inc.
Physical Network Design

*** Example for Final Project ***

Y_ROUTER_1

X_WKS_002

X_WKS_001

Y_WKS_002

Operations

Billing

FIREWALL

Internet

Z_WKS_001 Z_WKS_001

Z_ROUTER_1

WORKSTATION

SERVER

FIREWALL

SWITCH

ROUTER

VISIO LEGEND

VIDEO C ONF

VIDEO C ONF
VIDEO C ONF

VIDEO CONF

  • it640_physical_network_design_example.vsdx
  • Page-1

Dallas Office
Memphis Office

SNHUEnergy, Inc.
Physical Network Design

CURRENT

NETWORK DESIGN

Dallas Office:

Total Employees – 90

Applications –

Email

Payroll

Accounting

HR

Services –

VoIP Phone System

Video Conferencing

Hardware –

Routers – 1

Switches – 2

Firewalls – 1

Connectivity –

Internet

Memphis Office:

Total Employees – 30

Applications –

Billing

Operations

Services –
VoIP Phone System
Video Conferencing
Hardware –

Routers – 1

Switches – 1

Firewalls – 0

Connectivity –
Internet
Internet

  • it640_milestone_one_physical_diagram_current.vsdx
  • Page-1

Server Farm

WAP’s

IP Phone

End-users

Corporate Computers

Switch-2

INTERNET

FIREWALL

10.0.1.0 /24

10.0.2.0 /24

10.0.3.0 /24

10.0.4.0 /24
10.0.5.0 /24

10.0.6.0 /24

SNHUEnergy, Inc.
Logical Network Design

Router
Switch-1

Dallas Office

10.0.1.1 /2410.0.6.1 /24
10.1.0.1 /24

10.0.3.1 /24 10.0.4.1 /24
10.0.2.1 /2410.0.5.1 /24

10.1.0.11 /2410.1.0.10 /24

Video
Conferencing

67.0.0.0

  • it640_dallas_office_logical_design_current.vsdx
  • Page-1

Dallas Office

DALLAS_SW_1

PAYROLL

Memphis Office

MEMPHIS_SW-01

MEMPHIS_WKS_002

DALLAS_WKS_003

ACCOUNTING E-MAIL

DALLAS_SW-01

HR

DALL_RTR_03

SNHUEnergy, Inc.
Physical Network Design

CURRENT

NETWORK DESIGN

MEMPHIS_RTR_002DALLAS_WKS_002

DALLAS_WKS_001

MEMPHIS_WKS_001

Operations

Dallas Office:

Total Employees – 90

Applications –

Email

Payroll

Accounting

HR

Services –

VoIP Phone System

Video Conferencing

Hardware –

Routers – 1

Switches – 2

Firewalls – 1

Connectivity –

Internet

Memphis Office:

Total Employees – 30

Applications –

Billing

Operations
Services –
VoIP Phone System
Video Conferencing
Hardware –

Routers – 1

Switches – 1

Firewalls – 0

Connectivity –
Internet
Billing
Internet

  • it640_final_project_physical_diagram_current.vsdx
  • Page-1

Dallas Office
Memphis Office

SNHUEnergy, Inc.
Physical Network Design

CURRENT

NETWORK DESIGN

Dallas Office:

Total Employees – 90

Applications –

Email

Payroll

Accounting

HR

Services –

VoIP Phone System

Video Conferencing

Hardware –

Routers – 1

Switches – 2

Firewalls – 1

Connectivity –

Internet

Memphis Office:

Total Employees – 30

Applications –

Billing

Operations

Services –
VoIP Phone System
Video Conferencing
Hardware –

Routers – 1

Switches – 1

Firewalls – 0

Connectivity –
Internet
Internet

  • it640_milestone_one_physical_diagram_current.vsdx
  • Page-1

Server Farm

WAP’s

IP Phone

End-users

Corporate Computers

Switch-2

INTERNET

FIREWALL

10.0.1.0 /24

10.0.2.0 /24

10.0.3.0 /24

10.0.4.0 /24
10.0.5.0 /24

10.0.6.0 /24

XYZ Company
Logical Network Design

Router
Switch-1

EXAMPLE DIAGRAM

10.0.1.1 /2410.0.6.1 /24
10.1.0.1 /24

10.0.3.1 /24 10.0.4.1 /24
10.0.2.1 /2410.0.5.1 /24

10.1.0.11 /2410.1.0.10 /24

Video
Conferencing

  • it640_logical_network_design_example.vsdx
  • Page-1

IT 640 Final Project Guidelines and Rubric

Overview
Within an organization, the dependability of network infrastructures has become less of a want and more of a need. Without a fully developed communication
architecture around business growth, efficiencies, and competitive advantage, many companies will find themselves underperforming. Network connectivity
used to be considered a luxury for many businesses, but it has recently become a critical piece of an organization. The fundamental understanding of how
networks play such a big role in the success of a company has to be assessed from the basic approach of the advancement in Transmission Control
Protocol/Internet Protocol (TCP/IP) communication and the functionality of the Open Systems Interconnection (OSI) model.

Understanding how a network communicates is key to understanding how your corporate applications and services work within the business. Your
understanding around the concepts of IP communication, devices used to communicate, and the traffic that is continually passed between devices is the first key
to gaining the understanding of network infrastructure. The knowledge you develop through this course will help build on your basic understanding of network
infrastructures and the components that are critical to the success of any business communication architecture.

For your final project, you will assume the role of a network consultant for an organization looking to expand its communication reach. You have been be tasked
with analyzing the current network architecture of the organization and determining any key changes that should occur as the organization prepares for future
growth. You will evaluate traffic patterns to determine critical aspects of your business and provide basic insight into what should be done to the network from a
capability aspect and from a security viewpoint as the organization prepares for future growth. Ultimately, you will recommend a design for the future network
architecture of the organization.

The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Three, Five, and Seven. The final product will be submitted in Module Nine.

Before beginning your project, read the Final Project Scenario document about SNHUEnergy, Inc., an organization that is looking to expand its operations. Then,
review all of the logical and physical design diagrams as well as the Wireshark capture showing the traffic patterns of the organization’s current network. These
files are provided below:

 Milestone One Physical Diagram – Current

 Final Project Physical Diagram – Current

 Memphis Office Logical Design – Current

 Physical Network Design Example

 Logical Network Design Example

 Dallas Office Logical Design – Current

 Traffic Flow Wireshark Capture

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_final_project_scenario

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_milestone_one_physical_diagram_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_final_project_physical_diagram_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_memphis_office_logical_design_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_physical_network_design_example

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_logical_network_design_example

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_dallas_office_logical_design_current

http://snhu-media.snhu.edu/files/course_repository/graduate/it/it640/it640_traffic_flow_wireshark_capture

In this assignment, you will demonstrate your mastery of the following course outcomes:

 Determine how network applications communicate from end to end by applying the network Open Systems Interconnection (OSI) model

 Analyze the network infrastructure of an existing network for determining what the basic traffic patterns are communicating

 Recommend an effective architecture design for supporting communication needs throughout an organization

 Analyze network traffic patterns for informing a network design that mitigates performance and security issues

 Develop recommendations for designing and maintaining a secure network infrastructure in accordance with industry standard best practices

Prompt
Imagine that you are a newly hired network consultant for SNHUEnergy, Inc. The leadership team at the organization has asked you to create a network analysis
and architecture evaluation on the current network. Your report will also include design recommendations for the organization’s future network architecture,
including basic recommendations to mitigate any potential performance or security issues.

Specifically, the following critical elements must be addressed:

I. Executive Summary: Provide a high-level overview of the contents of your report for the leadership team. Include your findings around data traffic
flows, applications impacted, and the overall network and security recommendations for the future needs of the organization.

II. Current Network Architecture: In this section, you will analyze the information provided in the SNHUEnergy, Inc. scenario to provide high-level
assumptions about the design of the network.

A. Identify the network applications that are a part of the current network.
B. Describe how the current network is designed by explaining how the different layers of the Open Systems Interconnection

(OSI) model relate to each other within the network.
C. Develop a visual representation of an end-to-end path flow of the existing network by creating a Visio diagram showing the output

of the traffic flows. Use the provided logical network design example as a guide for creating your diagram, and include your diagram
with your submission.

D. Explain the types of physical network devices used in connecting all devices across the organization based on what you know from
the scenario.

E. Identify the critical traffic patterns currently used by the organization, supported by examples. Use the provided Wireshark
capture to guide your response.

F. Describe the traffic patterns that the organization’s critical applications take across the infrastructure from office to office.
Remember, the organization’s critical applications were specified in the scenario.

G. Describe the potential performance issues that may occur within the current network if no changes are made to support the organization’s
expansion. Provide examples to support your response.

H. Describe the potential security issues that may occur within the current network if no changes are made to support the organization’s
expansion. Provide examples to support your response.

III. Future Network Architecture
A. Determine the future communication needs of the organization based on what you know from the scenario.
B. Describe in detail a network architecture that would be appropriate for supporting the ultimate growth of the organization and defend how this

recommended network would improve communication across the company.
C. Develop a visual representation of your recommended network architecture by creating a Visio diagram. Use the provided physical network

design example as a guide for creating your diagram, and include your diagram with your submission.

IV. Planning and Security
A. Recommend the best approach to mitigate the potential performance and security issues that you previously identified, and defend your

response.
B. Recommend a network management tool to implement into the future network and explain its potential benefit to the organization.
C. Recommend types of security devices that you would implement into the existing network, and explain how the devices would mitigate

potential security issues.
D. Explain the changes that need to be made to existing devices on the network in order to successfully integrate the security devices into the

future network design.
E. Describe specific challenges that the organization might face as it attempts to implement the future network, and recommend ways to mitigate

those challenges.
F. Concisely explain the overall risk for the network and the organization of not keeping security services up to standard.

Milestones
Milestone One: Project Analysis Plan
In Module Three, you will analyze the final project scenario and provide a nontechnical description of the role and functions of key network components. This
milestone will be graded with the Milestone One Rubric.

Milestone Two: Current Network Architecture
In Module Five, you will analyze the information provided in the SNHUEnergy, Inc. scenario to provide high-level assumptions about the design of the network.
This milestone will be graded with the Milestone Two Rubric.

Milestone Three: Future Network Architecture
In Module Seven, you will determine the future communication needs of the organization based on the work you have done and what you know about
SNHUEnergy Inc. This milestone will be graded with the Milestone Three Rubric.

Final Submission: Network Analysis and Architecture Evaluation
In Module Nine, you will be completing Section IV. Planning and Security, and you will submitting your final project. It should be a complete, polished artifact
containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be
graded with the Final Project Rubric.

Deliverables
Milestone Deliverable Module Due Grading

One Project Analysis Plan Three Graded separately; Milestone One Rubric

Two Current Network Architecture Five Graded separately; Milestone Two Rubric

Three Future Network Architecture Seven Graded separately; Milestone Three Rubric

Final Submission: Network Analysis and
Architecture Evaluation

Nine Graded separately; Final Project Rubric

Final Project Rubric
Guidelines for Submission: Your network analysis and architecture evaluation should be 10 to 12 pages in length with 12-point Times New Roman font and
double spacing.

Critical Elements Exemplary Proficient Needs Improvement Not Evident Value

Executive Summary:
Overview

Provides a high-level overview
of the contents of the report,
including findings around data
traffic flows, applications
impacted, and the network and
security recommendations for
the future needs of the
organization (100%)

Provides an overview of the
contents of the report, but
overview is overly detailed or is
missing required components
(70%)

Does not provide an overview
of the contents of the report
(0%)

5

Current Network
Architecture:

Network Applications

Identifies the network
applications that are a part of
the current network (100%)

Identifies the network
applications that are a part of
the current network, but
response contains inaccuracies
(70%)

Does not identify the network
applications that are a part of
the current network (0%)

6

Current Network
Architecture: OSI

Model

Meets “Proficient” criteria and
description demonstrates a
sophisticated awareness of the
design of the current network
(100%)

Describes how the current
network is designed by
explaining how the different
layers of the OSI model relate
to each other within the
network (90%)

Describes how the current
network is designed, but does
not explain how the different
layers of the OSI model relate
to each other within the
network, or description
contains inaccuracies (70%)

Does not describe how the
current network is designed
(0%)

6

Current Network
Architecture: Visual

Representation

Meets “Proficient” criteria and
diagram created demonstrates
a complex grasp of the end-to-
end path flow of the existing
network (100%)

Develops a visual
representation of an end-to-
end path flow of the existing
network by creating a Visio
diagram showing the output of
the traffic flows (90%)

Develops a visual
representation of an end-to-
end path flow of the existing
network by creating a Visio
diagram showing the output of
the traffic flows, but diagram is
illogical or contains
inaccuracies (70%)

Does not develop a visual
representation of an end-to-
end path flow of the existing
network (0%)

6

Current Network
Architecture: Physical

Network

Devices

Meets “Proficient” criteria and
explanation demonstrates
complex grasp of the network
devices that connect all devices
across the organization (100%)

Explains the types of physical
network devices used in
connecting all devices across
the organization (90%)

Explains the types of physical
network devices used in
connecting all devices across
the organization, but response
is cursory or contains
inaccuracies (70%)

Does not explain the types of
physical network devices used
in connecting all devices across
the organization (0%)

6

Current Network
Architecture: Critical

Traffic Patterns

Meets “Proficient” criteria and
response provides keen insight
into the organization’s critical
traffic patterns (100%)

Identifies the critical traffic
patterns currently used by the
organization, supported by
examples (90%)

Identifies the critical traffic
patterns currently used by the
organization, but does not
provide examples, examples
provided are inappropriate, or
response contains inaccuracies
(70%)

Does not identify the critical
traffic patterns currently used
by the organization (0%)

6
Current Network
Architecture:

Patterns Across the
Infrastructure

Meets “Proficient” criteria and
description demonstrates a
nuanced understanding of the
application’s traffic patterns
(100%)

Describes the traffic patterns
that the critical applications
take across the infrastructure
from office to office (90%)

Describes the traffic patterns
that the critical applications
take across the infrastructure
from office to office, but
description is cursory, illogical,
or contains inaccuracies (70%)

Does not describe the traffic
patterns that the critical
applications take across the
infrastructure from office to
office (0%)

6
Current Network
Architecture:

Performance

Issues

Meets “Proficient” criteria and
examples provided
demonstrate a sophisticated
awareness of the potential
performance issues in the
network (100%)

Describes the potential
performance issues that may
occur within the current
network if no changes are
made to support the
organization’s expansion, and
provides examples to support
response (90%)

Describes the potential
performance issues that may
occur within the current
network if no changes are
made to support the
organization’s expansion, but
does not provide examples,
examples provided are
inappropriate, or description is
illogical or contains
inaccuracies (70%)

Does not describe the potential
performance issues that may
occur within the current
network if no changes are
made to support the
organization’s expansion (0%)

6

Current Network
Architecture: Security

Issues

Meets “Proficient” criteria and
examples provided
demonstrate a sophisticated
awareness of the potential
security issues in the network
(100%)

Describes the potential security
issues that may occur within
the current network if no
changes are made to support
the organization’s expansion,
and provides examples to
support response (90%)

Describes the potential security
issues that may occur within
the current network if no
changes are made to support
the organization’s expansion,
but does not provide examples,
examples provided are
inappropriate, or description is
illogical or contains
inaccuracies (70%)

Does not describe the potential
security issues that may occur
within the current network if
no changes are made to
support the organization’s
expansion (0%)

6

Future Network
Architecture: Future

Communication
Needs

Summarizes the future
communication needs of the
organization (100%)

Summarizes the future
communication needs of the
organization, but summary
contains inaccuracies (70%)

Does not summarize the future
communication needs of the
organization (0%)

6

Future Network
Architecture:

Network Architecture

Meets “Proficient” criteria and
defense demonstrates a
complex grasp of the
appropriateness of the
proposed network architecture
for improving communication
across the company (100%)

Describes in detail a network
architecture that would be
appropriate for supporting the
ultimate growth of the
organization and defends how
the future network would
improve communication across
the company (90%)

Describes a network
architecture that would be
appropriate for supporting the
ultimate growth of the
organization, but does not
defend how the future network
would improve communication
across the company, or
response is cursory, illogical, or
contains inaccuracies (70%)

Does not describe a network
architecture that would be
appropriate for supporting the
ultimate growth of the
organization (0%)

6
Future Network
Architecture: Future

Visual Representation

Meets “Proficient” criteria and
diagram created provides keen
insight into the architecture of
the recommended network
(100%)

Develops a visual
representation of the
recommended network
architecture by creating a Visio
diagram (90%)

Develops a visual
representation of the
recommended network
architecture by creating a Visio
diagram, but diagram is illogical
or contains inaccuracies (70%)

Does not develop a visual
representation of the
recommended network
architecture (0%)

6

Planning and
Security:

Performance and
Security Issues

Meets “Proficient” criteria and
defense demonstrates keen
insight into how to mitigate
potential issues that may occur
within the network (100%)

Recommends the best
approach to mitigate the
previously identified potential
performance and security
issues and defends response
(90%)

Recommends the best
approach to mitigate the
previously identified potential
performance and security
issues, but does not defend
response, or defense is cursory
or illogical or contains
inaccuracies (70%)

Does not recommend the best
approach to mitigate the
previously identified potential
performance and security
issues (0%)

6

Planning and
Security: Network
Management Tool

Meets “Proficient” criteria and
explanation demonstrates keen
insight into how the
organization would benefit
from the recommended
network management tool
(100%)

Recommends a network
management tool to
implement into the future
network and explains its
potential benefit to the
organization (90%)

Recommends a network
management tool to
implement into the future
network, but does not explain
its potential benefit to the
organization, or explanation is
cursory or illogical or contains
inaccuracies (70%)

Does not recommend a
network management tool to
implement into the future
network (0%)

3.6

Planning and
Security: Security

Devices

Meets “Proficient” criteria and
explanation demonstrates a
complex grasp of how the
recommended security devices
would mitigate potential
security issues (100%)

Recommends types of security
devices to implement into the
existing network and explains
how the devices would mitigate
potential security issues (90%)

Recommends types of security
devices to implement into the
existing network, but does not
explain how the devices would
mitigate potential security
issues, or explanation is cursory
or illogical or contains
inaccuracies (70%)

Does not recommend types of
security devices to implement
into the existing network (0%)

3.6

Planning and
Security: Changes to

Existing Devices

Meets “Proficient” criteria and
explanation demonstrates a
sophisticated awareness of the
changes that are required for
existing devices (100%)

Explains the changes that need
to be made to existing devices
on the network in order to
successfully integrate the
security devices into the future
network design (90%)

Explains the changes that need
to be made to existing devices
on the network in order to
successfully integrate the
security devices into the future
network design, but
explanation is cursory or
illogical or contains
inaccuracies (70%)

Does not explain the changes
that need to be made to
existing devices on the network
(0%)

3.6

Planning and
Security: Challenges

Meets “Proficient” criteria and
recommendations demonstrate
nuanced understanding of how
to plan for the challenges
associated with implementing a
new network (100%)

Describes specific challenges
that the organization might
face as it attempts to
implement the future network
and recommends ways to
mitigate those challenges (90%)

Describes challenges that the
organization might face as it
attempts to implement the
future network but does not
recommend ways to mitigate
those challenges,
recommendations are
inappropriate, or challenges
described are not specific (70%)

Does not describe challenges
that the organization might
face as it attempts to
implement the future network
(0%)

3.6

Planning and
Security: Overall Risk

Meets “Proficient” criteria and
explanation provides keen
insight into the importance of
keeping security services up to
standard (100%)

Concisely explains the overall
risk for the network and the
organization of not keeping
security services up to standard
(90%)

Explains the overall risk for the
network and the organization
of not keeping security services
up to standard, but explanation
is illogical or contains
inaccuracies (70%)

Does not explain the overall
risk for the network and the
organization of not keeping
security services up to standard
(0%)

3.6

Articulation of
Response

Submission is free of errors
related to citations, grammar,
spelling, syntax, and
organization and is presented
in a professional and easy-to-
read format (100%)

Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
(90%)

Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact
readability and articulation of
main ideas (70%)

Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas (0%)

5

Total 100%

Server Farm

IP Phone

End-users

Corporate Computers

Switch-1

Dallas Office

10.2.1.0 /24

10.2.2.0 /2410.2.4.0 /24

10.2.5.0 /24

10.2.6.0 /24

SNHUEnergy, Inc.
Logical Network Design

Router

Memphis Office

10.2.1.1 /2410.2.6.1 /24

10.10.1.1 /24

10.2.2.1 /2410.2.5.1 /24

Video
Conferencing

10.2.4.1 /24

10.10.1.2 /24

  • it640_memphis_office_logical_design_current.vsdx
  • Page-1

IT 640 Traffic Flow Wireshark Capture

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP