9-1 Final Project Submission: Network Analysis And Architecture Evaluation
IT 640 Final Project Guidelines and Rubric
Overview Within an organization, the dependability of network infrastructures has become less of a want and more of a need. Without a fully developed communication architecture around business growth, efficiencies, and competitive advantage, many companies will find themselves underperforming. Network connectivity used to be considered a luxury for many businesses, but it has recently become a critical piece of an organization. The fundamental understanding of how networks play such a big role in the success of a company has to be assessed from the basic approach of the advancement in Transmission Control Protocol/Internet Protocol (TCP/IP) communication and the functionality of the Open Systems Interconnection (OSI) model. Understanding how a network communicates is key to understanding how your corporate applications and services work within the business. Your understanding around the concepts of IP communication, devices used to communicate, and the traffic that is continually passed between devices is the first key to gaining the understanding of network infrastructure. The knowledge you develop through this course will help build on your basic understanding of network infrastructures and the components that are critical to the success of any business communication architecture. For your final project, you will assume the role of a network consultant for an organization looking to expand its communication reach. You have been be tasked with analyzing the current network architecture of the organization and determining any key changes that should occur as the organization prepares for future growth. You will evaluate traffic patterns to determine critical aspects of your business and provide basic insight into what should be done to the network from a capability aspect and from a security viewpoint as the organization prepares for future growth. Ultimately, you will recommend a design for the future network architecture of the organization. The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Three, Five, and Seven. The final product will be submitted in Module Nine. Before beginning your project, read the Final Project Scenario document about SNHUEnergy, Inc., an organization that is looking to expand its operations. Then, review all of the logical and physical design diagrams as well as the Wireshark capture showing the traffic patterns of the organization’s current network. These files are provided below:
Milestone One Physical Diagram – Current
Final Project Physical Diagram – Current
Memphis Office Logical Design – Current
Physical Network Design Example
Logical Network Design Example
Dallas Office Logical Design – Current
Traffic Flow Wireshark Capture
In this assignment, you will demonstrate your mastery of the following course outcomes:
Determine how network applications communicate from end to end by applying the network Open Systems Interconnection (OSI) model
Analyze the network infrastructure of an existing network for determining what the basic traffic patterns are communicating
Recommend an effective architecture design for supporting communication needs throughout an organization
Analyze network traffic patterns for informing a network design that mitigates performance and security issues
Develop recommendations for designing and maintaining a secure network infrastructure in accordance with industry standard best practices
Prompt Imagine that you are a newly hired network consultant for SNHUEnergy, Inc. The leadership team at the organization has asked you to create a network analysis and architecture evaluation on the current network. Your report will also include design recommendations for the organization’s future network architecture, including basic recommendations to mitigate any potential performance or security issues. Specifically, the following critical elements must be addressed:
I. Executive Summary: Provide a high-level overview of the contents of your report for the leadership team. Include your findings around data traffic flows, applications impacted, and the overall network and security recommendations for the future needs of the organization.
II. Current Network Architecture: In this section, you will analyze the information provided in the SNHUEnergy, Inc. scenario to provide high-level assumptions about the design of the network.
A. Identify the network applications that are a part of the current network. B. Describe how the current network is designed by explaining how the different layers of the Open Systems Interconnection
(OSI) model relate to each other within the network. C. Develop a visual representation of an end-to-end path flow of the existing network by creating a Visio diagram showing the output
of the traffic flows. Use the provided logical network design example as a guide for creating your diagram, and include your diagram with your submission.
D. Explain the types of physical network devices used in connecting all devices across the organization based on what you know from the scenario.
E. Identify the critical traffic patterns currently used by the organization, supported by examples. Use the provided Wireshark capture to guide your response.
F. Describe the traffic patterns that the organization’s critical applications take across the infrastructure from office to office. Remember, the organization’s critical applications were specified in the scenario.
G. Describe the potential performance issues that may occur within the current network if no changes are made to support the organization’s expansion. Provide examples to support your response.
H. Describe the potential security issues that may occur within the current network if no changes are made to support the organization’s expansion. Provide examples to support your response.
III. Future Network Architecture A. Determine the future communication needs of the organization based on what you know from the scenario. B. Describe in detail a network architecture that would be appropriate for supporting the ultimate growth of the organization and defend how this
recommended network would improve communication across the company. C. Develop a visual representation of your recommended network architecture by creating a Visio diagram. Use the provided physical network
design example as a guide for creating your diagram, and include your diagram with your submission.
IV. Planning and Security A. Recommend the best approach to mitigate the potential performance and security issues that you previously identified, and defend your
response. B. Recommend a network management tool to implement into the future network and explain its potential benefit to the organization. C. Recommend types of security devices that you would implement into the existing network, and explain how the devices would mitigate
potential security issues. D. Explain the changes that need to be made to existing devices on the network in order to successfully integrate the security devices into the
future network design. E. Describe specific challenges that the organization might face as it attempts to implement the future network, and recommend ways to mitigate
those challenges. F. Concisely explain the overall risk for the network and the organization of not keeping security services up to standard.
Milestones Milestone One: Project Analysis Plan In Module Three, you will analyze the final project scenario and provide a nontechnical description of the role and functions of key network components. This milestone will be graded with the Milestone One Rubric. Milestone Two: Current Network Architecture In Module Five, you will analyze the information provided in the SNHUEnergy, Inc. scenario to provide high-level assumptions about the design of the network. This milestone will be graded with the Milestone Two Rubric. Milestone Three: Future Network Architecture In Module Seven, you will determine the future communication needs of the organization based on the work you have done and what you know about SNHUEnergy Inc. This milestone will be graded with the Milestone Three Rubric. Final Submission: Network Analysis and Architecture Evaluation In Module Nine, you will be completing Section IV. Planning and Security, and you will submitting your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.
Deliverables Milestone Deliverable Module Due Grading
One Project Analysis Plan Three Graded separately; Milestone One Rubric
Two Current Network Architecture Five Graded separately; Milestone Two Rubric
Three Future Network Architecture Seven Graded separately; Milestone Three Rubric
Final Submission: Network Analysis and Architecture Evaluation
Nine Graded separately; Final Project Rubric
Final Project Rubric Guidelines for Submission: Your network analysis and architecture evaluation should be 10 to 12 pages in length with 12-point Times New Roman font and double spacing.
Critical Elements Exemplary Proficient Needs Improvement Not Evident Value
Executive Summary: Overview
Provides a high-level overview of the contents of the report, including findings around data traffic flows, applications impacted, and the network and security recommendations for the future needs of the organization (100%)
Provides an overview of the contents of the report, but overview is overly detailed or is missing required components (70%)
Does not provide an overview of the contents of the report (0%)
5
Current Network Architecture:
Network Applications
Identifies the network applications that are a part of the current network (100%)
Identifies the network applications that are a part of the current network, but response contains inaccuracies (70%)
Does not identify the network applications that are a part of the current network (0%)
6
Current Network Architecture: OSI
Model
Meets “Proficient” criteria and description demonstrates a sophisticated awareness of the design of the current network (100%)
Describes how the current network is designed by explaining how the different layers of the OSI model relate to each other within the network (90%)
Describes how the current network is designed, but does not explain how the different layers of the OSI model relate to each other within the network, or description contains inaccuracies (70%)
Does not describe how the current network is designed (0%)
6
Current Network Architecture: Visual
Representation
Meets “Proficient” criteria and diagram created demonstrates a complex grasp of the end-to- end path flow of the existing network (100%)
Develops a visual representation of an end-to- end path flow of the existing network by creating a Visio diagram showing the output of the traffic flows (90%)
Develops a visual representation of an end-to- end path flow of the existing network by creating a Visio diagram showing the output of the traffic flows, but diagram is illogical or contains inaccuracies (70%)
Does not develop a visual representation of an end-to- end path flow of the existing network (0%)
6
Current Network Architecture: Physical
Network Devices
Meets “Proficient” criteria and explanation demonstrates complex grasp of the network devices that connect all devices across the organization (100%)
Explains the types of physical network devices used in connecting all devices across the organization (90%)
Explains the types of physical network devices used in connecting all devices across the organization, but response is cursory or contains inaccuracies (70%)
Does not explain the types of physical network devices used in connecting all devices across the organization (0%)
6
Current Network Architecture: Critical
Traffic Patterns
Meets “Proficient” criteria and response provides keen insight into the organization’s critical traffic patterns (100%)
Identifies the critical traffic patterns currently used by the organization, supported by examples (90%)
Identifies the critical traffic patterns currently used by the organization, but does not provide examples, examples provided are inappropriate, or response contains inaccuracies (70%)
Does not identify the critical traffic patterns currently used by the organization (0%)
6
Current Network Architecture:
Patterns Across the Infrastructure
Meets “Proficient” criteria and description demonstrates a nuanced understanding of the application’s traffic patterns (100%)
Describes the traffic patterns that the critical applications take across the infrastructure from office to office (90%)
Describes the traffic patterns that the critical applications take across the infrastructure from office to office, but description is cursory, illogical, or contains inaccuracies (70%)
Does not describe the traffic patterns that the critical applications take across the infrastructure from office to office (0%)
6
Current Network Architecture:
Performance Issues
Meets “Proficient” criteria and examples provided demonstrate a sophisticated awareness of the potential performance issues in the network (100%)
Describes the potential performance issues that may occur within the current network if no changes are made to support the organization’s expansion, and provides examples to support response (90%)
Describes the potential performance issues that may occur within the current network if no changes are made to support the organization’s expansion, but does not provide examples, examples provided are inappropriate, or description is illogical or contains inaccuracies (70%)
Does not describe the potential performance issues that may occur within the current network if no changes are made to support the organization’s expansion (0%)
6
Current Network Architecture: Security
Issues
Meets “Proficient” criteria and examples provided demonstrate a sophisticated awareness of the potential security issues in the network (100%)
Describes the potential security issues that may occur within the current network if no changes are made to support the organization’s expansion, and provides examples to support response (90%)
Describes the potential security issues that may occur within the current network if no changes are made to support the organization’s expansion, but does not provide examples, examples provided are inappropriate, or description is illogical or contains inaccuracies (70%)
Does not describe the potential security issues that may occur within the current network if no changes are made to support the organization’s expansion (0%)
6
Future Network Architecture: Future
Communication Needs
Summarizes the future communication needs of the organization (100%)
Summarizes the future communication needs of the organization, but summary contains inaccuracies (70%)
Does not summarize the future communication needs of the organization (0%)
6
Future Network Architecture:
Network Architecture
Meets “Proficient” criteria and defense demonstrates a complex grasp of the appropriateness of the proposed network architecture for improving communication across the company (100%)
Describes in detail a network architecture that would be appropriate for supporting the ultimate growth of the organization and defends how the future network would improve communication across the company (90%)
Describes a network architecture that would be appropriate for supporting the ultimate growth of the organization, but does not defend how the future network would improve communication across the company, or response is cursory, illogical, or contains inaccuracies (70%)
Does not describe a network architecture that would be appropriate for supporting the ultimate growth of the organization (0%)
6
Future Network Architecture: Future
Visual Representation
Meets “Proficient” criteria and diagram created provides keen insight into the architecture of the recommended network (100%)
Develops a visual representation of the recommended network architecture by creating a Visio diagram (90%)
Develops a visual representation of the recommended network architecture by creating a Visio diagram, but diagram is illogical or contains inaccuracies (70%)
Does not develop a visual representation of the recommended network architecture (0%)
6
Planning and Security:
Performance and Security Issues
Meets “Proficient” criteria and defense demonstrates keen insight into how to mitigate potential issues that may occur within the network (100%)
Recommends the best approach to mitigate the previously identified potential performance and security issues and defends response (90%)
Recommends the best approach to mitigate the previously identified potential performance and security issues, but does not defend response, or defense is cursory or illogical or contains inaccuracies (70%)
Does not recommend the best approach to mitigate the previously identified potential performance and security issues (0%)
6
Planning and Security: Network Management Tool
Meets “Proficient” criteria and explanation demonstrates keen insight into how the organization would benefit from the recommended network management tool (100%)
Recommends a network management tool to implement into the future network and explains its potential benefit to the organization (90%)
Recommends a network management tool to implement into the future network, but does not explain its potential benefit to the organization, or explanation is cursory or illogical or contains inaccuracies (70%)
Does not recommend a network management tool to implement into the future network (0%)
3.6
Planning and Security: Security
Devices
Meets “Proficient” criteria and explanation demonstrates a complex grasp of how the recommended security devices would mitigate potential security issues (100%)
Recommends types of security devices to implement into the existing network and explains how the devices would mitigate potential security issues (90%)
Recommends types of security devices to implement into the existing network, but does not explain how the devices would mitigate potential security issues, or explanation is cursory or illogical or contains inaccuracies (70%)
Does not recommend types of security devices to implement into the existing network (0%)
3.6
Planning and Security: Changes to
Existing Devices
Meets “Proficient” criteria and explanation demonstrates a sophisticated awareness of the changes that are required for existing devices (100%)
Explains the changes that need to be made to existing devices on the network in order to successfully integrate the security devices into the future network design (90%)
Explains the changes that need to be made to existing devices on the network in order to successfully integrate the security devices into the future network design, but explanation is cursory or illogical or contains inaccuracies (70%)
Does not explain the changes that need to be made to existing devices on the network (0%)
3.6
Planning and Security: Challenges
Meets “Proficient” criteria and recommendations demonstrate nuanced understanding of how to plan for the challenges associated with implementing a new network (100%)
Describes specific challenges that the organization might face as it attempts to implement the future network and recommends ways to mitigate those challenges (90%)
Describes challenges that the organization might face as it attempts to implement the future network but does not recommend ways to mitigate those challenges, recommendations are inappropriate, or challenges described are not specific (70%)
Does not describe challenges that the organization might face as it attempts to implement the future network (0%)
3.6
Planning and Security: Overall Risk
Meets “Proficient” criteria and explanation provides keen insight into the importance of keeping security services up to standard (100%)
Concisely explains the overall risk for the network and the organization of not keeping security services up to standard (90%)
Explains the overall risk for the network and the organization of not keeping security services up to standard, but explanation is illogical or contains inaccuracies (70%)
Does not explain the overall risk for the network and the organization of not keeping security services up to standard (0%)
3.6
Articulation of Response
Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to- read format (100%)
Submission has no major errors related to citations, grammar, spelling, syntax, or organization (90%)
Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas (70%)
Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas (0%)
5
Total 100%
Needs help with similar assignment?
We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper
![](https://powerpointpresentationhelp.com/wp-content/uploads/2022/03/WhatsApp_icon.png)
![](https://powerpointpresentationhelp.com/wp-content/uploads/2022/03/205-2057855_essay-icon.png)