57
CIS 532 – Network Architecture and Analysis Student Course Guide Prerequisite: CIS 175 Quarter: Winter 1012 Meeting Days/Time: Online Instructor: Nelson Stewart, PhD Instructor Phone: 412- 252-2485 Instructor E-mail: [email protected] du Instructor Office Hours/Location AOL IM: NelStewart06 - - Wednesday 8:00-9:00 pm and Friday 8:30-9:30 ET Academic Office Phone Number Strayer Technical Support 1-877-642-2999 INSTRUCTIONAL MATERIAL – Required Oppenheimer, P. (2011). Top-down network design (3rd ed.). Indianapolis, IN: Pearson Education, Cisco Press. Microsoft Office, Microsoft Visio, and Microsoft Project or their equivalents such as Open Project, Dia, and OpenOffice are required. INSTRUCTIONAL MATERIAL – Supporting © 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University. CIS532 Student Version 201103 [1112 –03/04/11] Page 1 of 57

CIS532 January 2012 Stewart

Embed Size (px)

Citation preview

Page 1: CIS532 January 2012 Stewart

CIS 532 – Network Architecture and Analysis

Student Course GuidePrerequisite: CIS 175

Quarter: Winter 1012Meeting Days/Time: OnlineInstructor: Nelson Stewart, PhDInstructor Phone: 412-252-2485Instructor E-mail: [email protected] Office Hours/Location AOL IM: NelStewart06 - - Wednesday 8:00-9:00 pm and Friday 8:30-9:30 ETAcademic Office Phone NumberStrayer Technical Support 1-877-642-2999

INSTRUCTIONAL MATERIAL – Required

Oppenheimer, P. (2011). Top-down network design (3rd ed.). Indianapolis, IN: Pearson Education, Cisco Press.

Microsoft Office, Microsoft Visio, and Microsoft Project or their equivalents such as Open Project, Dia, and OpenOffice are required.

INSTRUCTIONAL MATERIAL – Supporting

The following resources provide additional background and supporting information for this course. There is no need to purchase these items for the course.

Cisco- http://www.cisco.com/IEEE - http://www.ieee.org/index.htmlSourceforge - http://sourceforge.net/ Internet Engineering Task Force - http://www.ietf.org/

COURSE DESCRIPTION

This course focuses on network architecture development concepts and components, including architecture functions and use. It provides the student with the skills required for developing, managing, and sizing architectures in large organizations. Topics include topologies, protocols, connectivity, transactions, and performance.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 1 of 36

Page 2: CIS532 January 2012 Stewart

COURSE OUTCOMES

Upon the successful completion of this course, the student will be able to:1. Design a systematic network architecture plan in accordance with network design steps. 2. Summarize among scalability, availability, performance security, manageability,

usability, adaptability, and affordability as they relate to internetworking product selection.

3. Evaluate existing Internet work in terms of its infrastructure, logical structure, physical structure, addressing and naming, wiring and media, architectural and environmental constraints, and health.

4. Evaluate the flow, load, behavior, and Quality of Service (QoS) requirements of network traffic.

5. Design a network topology to include hierarchy, redundancy, modularity, and security.6. Assign and design models for addressing and naming to include a central or distributed

authority, public or private addressing, and static or dynamic addressing. 7. Compare and contrast the selection of switching and routing protocols to include interior

versus exterior protocols, RIP, RIP2, EIGRP, OSPR, and BGP.8. Create a network security plan inclusive of identifying and analyzing network assets,

security risks, security requirements, and security policy.9. Develop network management strategies to include resource monitoring and data collection

and interpretation.10. Describe processes that address performance, fault, configuration, security, and accounting

management.11. Summarize network management architecture and monitoring strategies to include

management protocols and tools.12. Compare and contrast the selection of technologies and devices for campus and enterprise

networks that include remote access networks, WANs, service providers, end user remote access devices, central site remote access devices, VPN concentrators, and routers.

13. Develop network design testing procedures through services, tools, and testing scripts.14. Describe optimal network design for critical business applications to include effective use of

bandwidth and satisfying Quality of Service (QoS) requirements.15. Develop a comprehensive network design document. 16. Use technology and information resources to research issues in network architecture and

analysis.17. Write clearly and concisely about issues in network architecture and analysis using proper

writing mechanics.

Writing Assignments

The objective of the School of Information Systems’ writing assignments is to promote attitudes and skills that will improve a student’s ability to communicate in writing, develop research skills and documentation techniques, and encourage critical analysis of data and conclusions specific to the course learning outcomes in the information systems and technology domain.

COURSE EXPECTATIONS

To obtain the most benefit from this class:

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 2 of 36

Page 3: CIS532 January 2012 Stewart

Follow Strayer University’s policies and procedures as well as those specific to this class o Class specific information can be found within the “Class Information” section

within the Student Center.

WEEKLY COURSE SCHEDULE

The weekly schedule describes the learning activities that will help you achieve the course outcomes and the assignments that will be used to measure your mastery of the outcomes. Each week is divided into sections consisting of readings, lectures, discussions, and assignments. For selected assignments, a grading rubric is included in this Course Guide and will be used to evaluate your performance.

Assignments are due by midnight of the day posted in the table below.

Week Assignments Due Date12 Assignment 1: Request for Proposal – Response 01-15-123 Case Study 1: Harriet’s Fruit and Chocolate Company 01-22-124 Assignment 2: Network Topology Design 01-29-125 Midterm Exam 02-05-126 Case Study 2: Genome4U? 02-12-127 Assignment 3: Network Security Planning 02-19-128 Assignment 4: Network Design Executive Plan 02-26-129 Case Study 3: Design Scenario, Klamath Paper Products 03-04-1210 Assignment 5: Technical Term Paper 03-11-1211 Final Exam 03-18-12

Course Schedule: (The course schedule to follow provides the start and end dates of the eleven weeks of the course. Note that the schedule requirements for discussion postings does not align with the course schedule. Please review the discussion start day, (Friday) and the end of the discussion week, (Thursday) as noted in the Weekly Discussion Criteria above.)

Start Date End Date

Week 1 Jan 2 Jan 8

Week 2 Jan 9 Jan 15

Week 3 Jan 16 Jan 22

Week 4 Jan 23 Jan 29

Week 5 Jan 30 Feb 5

Week 6 Feb 6 Feb 12

Week 7 Feb 13 Feb 19

Week 8 Feb 20 Feb 26

Week 9 Feb 27 March 4

Week 10 March 5 March 11

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 3 of 36

Page 4: CIS532 January 2012 Stewart

Week 11 March 12 March 18

Graded Course Components The course will include weekly readings and lectures, discussions, assignments, case

studies, a technical term paper, and mid-term and final examinations. Assignments:

o Due Dates: Sunday 11:59 pm in the week in which they are assigned and/or as noted in the assignment

o Late assignments (submitted after the due date) are subject to up to a 20% point deduction.

o Assignments submitted beyond one week after the due date are not accepted (unless previously arranged with professor to submit late)

o Submit assignments by clicking on the Assignment link under the appropriate weekly unit and attach your work as a Word 2007-2010 or other acceptable file formats

o Refer to the grading requirements and the rubric for individual assignments, case studies, and term paper.

Discussionso Due Dates: Sunday 11:59 pmo Minimum Postings:

An initial response to each discussion question Respond to classmates: two additional postings (miminum) are required in

total to classmates each week. The additional postings can be on one or more discussion threads.

Tests: Mid-Term and Final ExamsDue Dates: as noted in the course

Point Values for Graded Course Components

Refer to the Assignment Outline and Grading table in the Course Guide The Assignment Outline and Grading table provides

o specific point values and percentage values for discussions, activities, assignments, and examinations for each week’s components

o point values and percentages of overall course evaluation for all course points

File Formating Requirements Files should be submitted in MS Word 2007-2010 documents as noted in assignments

(MS Office 2007 for other formats as required)Document Naming Protocols

Provide files submitted to the dropbox based on the protocol example to follow Format: FirstName_LastName_Assignment Example: Nelson_Stewart_Assignment1

Plagiarism Policy:

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 4 of 36

Page 5: CIS532 January 2012 Stewart

The following actions constitute plagiarism:

· Using someone’s words and ideas and presenting them as your own original thoughts

· Using someone’s exact words and ideas without placing them inside quotation marks, using in in-text citations, and including a reference page

· Using someone’s words or ideas without citing them in in-text references (parenthetical references) and on a reference page

· Using someone’s words or ideas, changing the wording (paraphrasing), and failing to cite them in in-text references and on a reference page

· Submitting the same assignment for two different classes (self-plagiarism) without the professor’s knowledge

Plagiarism may be intentional (purposely passing over another’s ideas as one’s own) or unintentional (inadvertently failing to cite someone’s ideas and/ or words).

Unintentional plagiarism usually occurs because a writer is unfamiliar with the idea that he or she has to give a source credit for his or her ideas by using in-text references and a reference page.

All cases of plagiarism will result in a written warning and notification to Student Affairs.

APA requirements:

Assignments must comply with APA formatting.

Two resources to review APA formatting:

http://owl.english.purdue.edu/owl/resource/560/01

http://www.apastyle.org/

WEEK 1Course outcomes in focus:

Design a systematic network architecture plan in accordance with network design steps. Summarize among scalability, availability, performance security, manageability, usability, adaptability, and affordability as they relate to internetworking product selection.

Activities:Readings:

Read Chapter 1: Analyze Business Goals and Constraints Read Chapter 2: Analyze Technical Goal and Tradeoffs

Supporting Topics:Lecture 1 Topics: Using a top-down network design

methodology Using a structured network design process The system development life cycle Analyzing business goals

Lecture 2 Topics: Scalability Availability Network performance Response time Security

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 5 of 36

Page 6: CIS532 January 2012 Stewart

Analyzing business constraints Manageability, usability, adaptability, and affordability

Lectures and Discussions: Faculty introduction, course overview, and expectations.

Review course philosophy, expectations, assignments, late policy, grading, academic integrity, APA use if appropriate, and attendance policy.

Student introductions: please briefly introduce yourself and describe your academic, professional and personal interests. This is a non-graded discussion.

Lecture on using a top-down network design methodology, using a structured network design process, the system development life cycle, analyzing business goals, and analyzing business constraints.

Discussion 1: “Business Goals and Constraints.” Students will respond to the following:

o Discuss some of the key considerations in designing a network design strategy. What approaches have worked for you in your present role or would you propose in a future systems planning role for an organization?

Lecture on scalability, availability, network performance, response time, security, and manageability, usability, adaptability, and affordability.

Discussion 2: “Technical Goals and Tradeoffs.” Students will respond to the following:

o Describe how technical goals can be coupled with information assurance and security considerations in a network design project.

WEEK 2Course outcomes in focus: Evaluate existing Internet work in terms of its infrastructure, logical structure, physical

structure, addressing and naming, wiring and media, architectural and environmental constrains, and health.

Evaluate the flow, load, behavior, and Quality of Service (QoS) requirements of network traffic.

Activities:Readings:

Read Chapter 3: Characterizing the Existing Internetwork Read Chapter 4: Characterizing Network Traffic

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 6 of 36

Page 7: CIS532 January 2012 Stewart

e-Activity: Research cloud computing to determine whether or not cloud computing fits into the

types of traffic flow discussed in the book.

Supporting Topics:Lecture 1 Topics: Characterizing the network infrastructure Developing a network map Characterizing network addressing and

naming Characterizing wiring and media Checking architectural and environmental

constraints Checking the health of the existing

network Analyzing network availability and

efficiency Checking the status of major routers,

switches, and firewalls

Lecture 2 Topics: Characterizing traffic flow Characterizing types of traffic flow for

new network applications Documenting traffic flow on new and

existing network applications Calculating theoretical traffic load Characterizing traffic behavior Characterizing Quality of Service (QoS)

requirements

Lectures/Discussions: Lecture on characterizing the network infrastructure, developing a network map,

characterizing network addressing and naming, characterizing wiring and media, checking architectural and environmental constraints, checking the health of the existing network, analyzing network availability and efficiency, and checking the status of major routers, switches, and firewalls.

Discussion 1: ‘Characterizing the Existing Internetwork.” Students will respond to the following:

o Explain the process of characterizing a new internetwork using the OSI model as its foundation. What tools would you use to assist in your planning efforts?

Lecture on characterizing traffic flow, characterizing types of traffic flow for new network applications, documenting traffic flow on new and existing network applications, calculating theoretical traffic load, characterizing traffic behavior, and characterizing Quality of Service (QoS) requirements.

Discussion 2: “Characterizing Network Traffic.” Students will respond to the following:

o From your research on cloud computing, explain how cloud computing fits the types of traffic flow discussed in the textbook (terminal/host, client/server, peer to peer, server/server, and distributed computing) or explain whether it is a new type of traffic flow. Defend your answer.

Assignment 1: Request for Proposal – Response

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 7 of 36

Page 8: CIS532 January 2012 Stewart

This assignment is due for online students by midnight on Sunday of Week 2 and for on-ground students before Week 3’s class meeting. Submit your assignment to the course shell.

You are a $10 million consulting company responding to a Request for Proposal for a prospective client. The client seeks an analysis of its existing network in anticipation of a large merger. This engagement would be worth over $5 million in revenue to your $10 million company. The client seeks to ensure that your small organization has the technical acumen to prepare, guide, and assess merging the two company networks.

Write a two to three (2-3) page paper in which you:1. Prepare an opening statement that specifies your organization’s capabilities to manage

a deployment of this size. 2. Graphically depict and effectively promote your company’s structured development

and services. 3. Explain what the client can expect from your services.

The format of the paper is to be as follows:o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all

sides, APA format.o Type the question followed by your answer to the question.o In addition to the two to three (2-3) pages required, a title page is to be included.

The title page is to contain the title of the assignment, your name, the instructor’s name, the course title, and the date.

Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills.

The assignment will be graded using the following rubric:

Outcomes Assessed

Design a systematic network architecture plan in accordance with network design steps. Summarize among scalability, availability, performance security, manageability, usability,

adaptability, and affordability as they relate to internetworking product selection. Use technology and information resources to research issues in network architecture and

analysis. Write clearly and concisely about issues in network architecture and analysis using proper

writing mechanics.Grading Rubric for Assignment 1 – Request for Proposal – Response

Criteria Unacceptable Developing Competent Exemplary1. Prepare an

opening statement that specifies your organization’s capabilities to manage a deployment of this size.

Did not complete the assignment or did not prepare an opening statement that specifies your organization’s capabilities to manage a deployment of this size; omitted key information and/or

Partially prepared an opening statement that specifies your organization’s capabilities to manage a deployment of this size; omitted some key information.

Sufficiently prepared an opening statement that specifies your organization’s capabilities to manage a deployment of this size.

Fully prepared an opening statement that specifies your organization’s capabilities to manage a deployment of this size.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 8 of 36

Page 9: CIS532 January 2012 Stewart

included irrelevant information. 0-9 points 11 points 13 points 15 points

2. Graphically depict and effectively promote your company’s structured development and services.

Did not complete the assignment or did not graphically depict and effectively promote your company’s structured development and services; omitted key information and/or included irrelevant information. 0-9 points

Partially graphically depicted and effectively promoted your company’s structured development and services; omitted some key information.

11 points

Sufficiently graphically depicted and effectively promoted your company’s structured development and services.

13 points

Fully graphically depicted and effectively promoted your company’s structured development and services.

15 points3. Explain what the

client can expect from your services.

Did not complete the assignment or did not explain what the client can expect from your services; omitted key information and/or included irrelevant information. 0-5 points

Partially explained what the client can expect from your services; omitted some key information.

7 points

Sufficiently explained what the client can expect from your services.

8 points

Fully explained what the client can expect from your services.

10 points4. Clarity

Did not complete the assignment, or explanations are unclear and not organized, (Major issues)0-2 points

Explanations generally unclear and not well organized. (Many issues)

3 points

Explanations generally clear and/or organized. (Minor issues)

4 points

Explanations very clear and well organized.(Added helpful details)

5 points5. Writing –

Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues)0-2 points

Had 6–7 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues)

3 points

Had 4–5 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues)

4 points

Had 0–3 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

5 points

WEEK 3Course outcome in focus: Design a network topology to include hierarchy, redundancy, modularity, and security.

Activities:Readings:

Read Chapter 5: Designing a Network Topology

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 9 of 36

Page 10: CIS532 January 2012 Stewart

Supporting Topics:Lecture 1 Topics: Microsoft Project Microsoft Visio Other open source alternatives

Lecture 2 Topics: Hierarchal network design The classical three-layer hierarchical model Guidelines for hierarchical network design Redundant network design topologies Modular network design Designing a campus network design topology Virtual and wireless LANs Secure network design topologies

Lectures/Discussions: Lecture on using Microsoft Project, Microsoft Visio, and other open source alternatives.

Present a live workshop demonstrating how to use the software.

Lecture on hierarchical network design, the classical three-layer hierarchical model, guidelines for hierarchical network design, redundant network design topologies, modular network design, designing a campus network design topology, virtual and wireless LANs, and secure network design topologies.

Discussion 1: “Designing a Network Topology.” Students will respond to the following:

o Present real-world examples that describe the significance of designing modular, redundant, and secure network architectures. Defend your answer from a technical perspective.

Discussion 2: “Network Hierarchy.” Students will respond to the following:

o Contrast the various types of servers or services that can be placed at the access, distribution, and core layers.

Case Study 1: Harriet’s Fruit and Chocolate Company

This assignment is due for online students by midnight on Sunday of Week 3 and for on-ground students before Week 4’s class meeting. Submit your assignment to the course shell.

Read the Harriet’s Fruit and Chocolate Company case study found in Chapter 2 of the textbook. Then, answer the questions below. Each response should be one (1) paragraph in length submitted in MS Word and the submission is not to exceed two (2) pages.

Write a one to two (1-2) page paper that addresses:

1. What investigation will you do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building?

2. Make a list of business goals for Harriet’s Fruit and Chocolate Company. What are some constraints that will affect these goals?

3. Make a list of technical goals for Harriet’s Fruit and Chocolate Company. What

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 10 of 36

Page 11: CIS532 January 2012 Stewart

tradeoffs might you need to make to meet these goals?

4. Will a wireless solution support the low delay that will be needed to meet the needs of the applications? Defend your answer.

5. What security concerns should you bring up as you design the network upgrade?

The format of the paper is to be as follows:o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all

sides, APA format.o Type the question followed by your answer to the question.o In addition to the one to two (1-2) pages required, a title page is to be included. The

title page is to contain the title of the assignment, your name, the instructor’s name, the course title, and the date.

Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills.

The assignment will be graded using the following rubric:

Outcomes Assessed

Summarize among scalability, availability, performance security, manageability, usability, adaptability, and affordability as they relate to internetworking product selection.

Use technology and information resources to research issues in network architecture and analysis.

Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics.

Grading Rubric for Case Study 1 – Harriet’s Fruit and Chocolate Company

Criteria Unacceptable Developing Competent Exemplary1. Determine what investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building.

Did not complete the assignment or did not determine what investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building; omitted key information and/or included irrelevant information. 0-6 points

Partially determined what investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building; omitted some key information.

7 points

Sufficiently determined what investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building.

8 points

Fully determined what investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building.

10 points2. Make a list of business goals for Harriet’s Fruit and Chocolate Company and determine some constraints that will affect these goals.

Did not complete the assignment or did not make a list of business goals for Harriet’s Fruit and Chocolate Company and determine some constraints that will

Partially made a list of business goals for Harriet’s Fruit and Chocolate Company and determined some constraints that will affect these goals; omitted some

Sufficiently made a list of business goals for Harriet’s Fruit and Chocolate Company and determined some constraints that will affect these goals.

Fully made a list of business goals for Harriet’s Fruit and Chocolate Company and determined some constraints that will affect these goals.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 11 of 36

Page 12: CIS532 January 2012 Stewart

affect these goals; omitted key information and/or included irrelevant information. 0-9 points

key information.

11 points 12 points 15 points3. Make a list of technical goals for Harriet’s Fruit and Chocolate Company and determine what tradeoffs you might need to make to meet these goals.

Did not complete the assignment or did not make a list of technical goals for Harriet’s Fruit and Chocolate Company and determine what tradeoffs you might need to make to meet these goals; omitted key information and/or included irrelevant information. 0-9 points

Partially made a list of technical goals for Harriet’s Fruit and Chocolate Company and determined what tradeoffs you might need to make to meet these goals; omitted some key information.

11 points

Sufficiently made a list of technical goals for Harriet’s Fruit and Chocolate Company and determined what tradeoffs you might need to make to meet these goals.

12 points

Fully made a list of technical goals for Harriet’s Fruit and Chocolate Company and determined what tradeoffs you might need to make to meet these goals.

15 points4. Determine if a wireless solution will support the low delay that will be needed to meet the needs of the applications. Defend your answer.

Did not complete the assignment or did not determine if a wireless solution will support the low delay that will be needed to meet the needs of the applications. Did not defend your answer; omitted key information and/or included irrelevant information. 0-6 points

Partially determined if a wireless solution will support the low delay that will be needed to meet the needs of the applications and defended your answer; omitted some key information.

7 points

Sufficiently determined if a wireless solution will support the low delay that will be needed to meet the needs of the applications and defended your answer.

8 points

Fully determined if a wireless solution will support the low delay that will be needed to meet the needs of the applications and defended your answer.

10 points5. Determine what security concerns you should bring up as you design the network upgrade.

Did not complete the assignment or did not determine what security concerns you should bring up as you design the network upgrade; omitted key information and/or included irrelevant information. 0-6 points

Partially determined what security concerns you should bring up as you design the network upgrade; omitted some key information.

7 points

Sufficiently determined what security concerns you should bring up as you design the network upgrade.

8 points

Fully determined what security concerns you should bring up as you design the network upgrade.

10 points6. Clarity

Did not complete the assignment, or explanations are unclear and not organized. (Major issues)0-2.5 points

Explanations generally unclear and not well organized. (Many issues)

3.5 points

Explanations generally clear and/or organized. (Minor issues)

4 points

Explanations very clear and well organized.(Added helpful details)

5 points7. Writing – Did not complete the Had 6–7 different Had 4–5 different Had 0–3 different

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 12 of 36

Page 13: CIS532 January 2012 Stewart

Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues)0-2.5 points

errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues)

3.5 points

errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues)

4 points

errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

5 points

WEEK 4Course outcome in focus: Assign and design models for addressing and naming to include a central or distributed

authority, public or private addressing, and static or dynamic addressing.

Activities:Readings:

Read Chapter 6: Designing Models for Addressing and Numbering

Supporting Topics:Lecture Topics: Guidelines for assigning network layer addresses Using hierarchical model for assigning addresses Classless routing versus classful routing Designing a model for naming

Lectures/Discussions: Lecture on guidelines for assigning network layer addresses, using hierarchical model

for assigning addresses, classless routing versus classful routing, and designing a model for naming.

Discussion 1: “Addressing and Numbering.” Students will respond to the following:

o Discuss how you would develop an addressing and naming model in an environment that has 10 departments in a 1000 employee organization, are equally separated by geography, and use a common data center of 20 backend enterprise servers. How would you utilize hierarchical addressing in this scenario?

Discussion 2: “Routing Protocols.” Students will respond to the following:

o Compare and contrast classless with classful routing. Support and cite your response with real-world examples.

Assignment 2: Network Topology Design

This assignment is due for online students by midnight on Sunday of Week 4 and for on-

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 13 of 36

Page 14: CIS532 January 2012 Stewart

ground students before Week 5’s class meeting. Submit your assignment to the course shell.

You are the network manager of a company that has grown from 10 employees to 100 employees in 12 months. Year 2 projected growth is estimated to be 100 additional employees located at a remote location. The aggressive growth has brought about some unique challenges and opportunities. The company has one remote warehouse and no off-site disaster recovery services or servers. The network design remains a non-redundant, flat topology.

Your assignment must consider the three-layer hierarchical model. You are free to make supported assumptions of the applications and services that this organization uses.

Write a two to three (2-3) page paper that is supported by a Visio or similar graphic model in which you:

1. Depict a network topology graphical model of the initial environment of 10 employees.

2. Depict a network topology graphical model of the current 100 employees. 3. Depict a network topology graphical model for future growth to 200 employees. 4. Create a two-paragraph executive summary.

The format of the paper is to be as follows:o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all

sides, APA format.o Type the question followed by your answer to the question.o In addition to the two to three (2-3) pages required, a title page is to be included.

The title page is to contain the title of the assignment, your name, the instructor’s name, the course title, and the date.

Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills.

The assignment will be graded using the following rubric:

Outcomes Assessed

Design a network topology to include hierarchy, redundancy, modularity, and security. Use technology and information resources to research issues in network architecture and

analysis. Write clearly and concisely about issues in network architecture and analysis using proper

writing mechanics.Grading Rubric for Assignment 2 – Network Topology Design

Criteria Unacceptable Developing Competent Exemplary1. Depict a network topology graphical model of the initial environment of 10 employees.

Did not complete the assignment or did not depict a network topology graphical model of the initial environment of 10 employees; omitted

Partially depicted a network topology graphical model of the initial environment of 10 employees; omitted some key

Sufficiently depicted a network topology graphical model of the initial environment of 10 employees.

Fully depicted a network topology graphical model of the initial environment of 10 employees.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 14 of 36

Page 15: CIS532 January 2012 Stewart

key information and/or included irrelevant information. 0-9 points

information.

11 points 13 points 15 points2. Depict a network topology graphical model of the current 100 employees.

Did not complete the assignment or did not depict a network topology graphical model of the current 100 employees; omitted key information and/or included irrelevant information. 0-9 points

Partially depicted a network topology graphical model of the current 100 employees; omitted some key information.

11 points

Sufficiently depicted a network topology graphical model of the current 100 employees.

13 points

Fully depicted a network topology graphical model of the current 100 employees.

15 points3. Depict a network topology graphical model for future growth to 200 employees.

Did not complete the assignment or did not depict a network topology graphical model for future growth to 200 employees; omitted key information and/or included irrelevant information.

0-5 points

Partially depicted a network topology graphical model for future growth to 200 employees; omitted some key information.

7 points

Sufficiently depicted a network topology graphical model for future growth to 200 employees.

8 points

Fully depicted a network topology graphical model for future growth to 200 employees.

10 points 4. Create a two-paragraph executive summary

Did not complete the assignment or did not create a two-paragraph executive summary; omitted key information and/or included irrelevant information.

0-2 points

Partially created a two-paragraph executive summary; omitted some key information.

3 points

Sufficiently created a two-paragraph executive summary.

4 points

Fully created a two-paragraph executive summary.

5 points5. Clarity, writing, grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

Did not complete the assignment, or explanations are unclear and not organized; had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues). 0-2 points

Explanations generally unclear and not well organized; had 6–7 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues).

3 points

Explanations generally clear and/or organized; had 4–5 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues).

4 points

Explanations very clear and well organized.(Added helpful details.) Had 0–3 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

5 points

WEEK 5

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 15 of 36

Page 16: CIS532 January 2012 Stewart

Course outcomes in focus: Compare and contrast the selection of switching and routing protocols to include interior versus exterior protocols, RIP, RIP2, EIGRP, OSPR, and BGP. Develop a comprehensive network design document.

Activities:Readings:

Read Chapter 7: Selecting Switching and Routing Protocols Read Chapter 14: Documenting Your Network Design

e-Activity: Search the Web for business or government computing organizations that have used a

request for proposal (RFP)

Supporting Topics:Lecture 1 Topics: Selecting switching protocols Selecting routing protocols Using multiple routing protocols in an

internetwork

Lecture 2 Topics: Responding to a request for proposals

(RFP) Contents of a network design document:

o Executive summaryo Project goalo Project scopeo Design requirements (business goals,

technical goals, user communities and data stores, and network applications)

o Current state of the networko Logical designo Physical designo Results of network design testingo Implementation plan (project schedule)o Project budget (return on investment)

Lectures/Discussions: Lecture on the selecting switching protocols, selecting routing protocols, and using

multiple routing protocols in an internetwork.

Discussion 1: “Routing and Switching Selection Criteria.” Students will respond to the following:

o Compare and contrast distance-vector and link-state routing. If you were designing a new routing protocol, which would you use and why?

Lecture on responding to a request for proposals, contents of a network design document, including: executive summary, project goal, project scope, design requirements (business goals, technical goals, user communities and data stores, network applications) current state of the network, logical design, physical design, results of network design testing,

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 16 of 36

Page 17: CIS532 January 2012 Stewart

implementation plan (project schedule), and project budget (return on investment).

Discussion 2: “Documenting Your Network Design.” Students will respond to the following:

o Describe the process you used (or will use) to derive the budget and project schedule for your technical term paper. What recommendation would you offer your colleagues when developing a network design plan?

Midterm Exam: The exam is available in the course shell under Week 5. There are 2.5 hours allocated to

take the exam and it is worth 200 points. Online students must complete the exam before midnight Sunday of Week 5 and on-

ground students must complete the exam before the Week 6 class.

WEEK 6Course outcomes in focus: Compare and contrast the selection of switching and routing protocols to include interior

versus exterior protocols, RIP, RIP2, EIGRP, OSPR, and BGP. Create a network security plan inclusive of identifying and analyzing network assets,

security risks, security requirements, and security policy.

Activities:Readings:

Read Chapter 8: Developing Network Security Strategies

e-Activity: Research security issues pertaining to routing protocols and be ready to discuss in

class

Supporting Topics:Lecture Topics: Network security design Security mechanisms Modularizing security design Securing remote access and VPNs Securing wireless services

Lectures/Discussions: Lecture on network security design, security mechanisms, modularizing security

design, securing remote access and VPNs, and securing wireless services.

Discussion 1: “Selecting Switching and Routing Protocols.” Students will respond to the following:

o Select a routing protocol that interests you, whether it’s RIP vs. OSPF, EIGRP, BGP, or a different routing protocol. Research any security issues

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 17 of 36

Page 18: CIS532 January 2012 Stewart

associated with this routing protocol.

Discussion 2: “Developing Network Security Strategies.” Students will respond to the following:

o Describe the modular approach to security design. Find a recent computing security breach in the news and present how a modular approach may have been used to prevent the security breach.

Case Study 2: Genome4U?

This assignment is due for online students by midnight on Sunday of Week 6 and for on-ground students before Week 7’s class meeting. Submit your assignment to the course shell.

Read the Genome4U case study found in Chapter 7 of the textbook.

Write a two to four (2-4) page paper in which you:1. Design a plan to integrate the different routing protocols into a new network

design for Genome4U’s lab.2. What information will you redistribute between routing protocols?3. Identify the problems you expect to encounter (with different metrics, security,

etc.) when you redistribute.4. Explain how you will overcome the problems.5. Explain how you will provide Internet access.

The format of the paper is to be as follows:o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on

all sides, APA format.o Type the question followed by your answer to the question.o In addition to the two to four (2-4) pages required, a title page is to be

included. The title page is to contain the title of the assignment, your name, the instructor’s name, the course title, and the date.

Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills.

The assignment will be graded using the following rubric:

Outcomes Assessed

Compare and contrast the selection of switching and routing protocols to include interior versus exterior protocols, RIP, RIP2, EIGRP, OSPR, and BGP.

Use technology and information resources to research issues in network architecture and analysis.

Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics.

Grading Rubric for Case Study 2 – Genome4U?

Criteria Unacceptable Developing Competent Exemplary

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 18 of 36

Page 19: CIS532 January 2012 Stewart

1. Present a plan to integrate the different routing protocols into a new network design for Genome4U’s lab.

Did not complete the assignment or did not present a plan to integrate the different routing protocols into a new network design for Genome4U’s lab; omitted key information and/or included irrelevant information. 0-6 points

Partially presented a plan to integrate the different routing protocols into a new network design for Genome4U’s lab; omitted some key information.

7 points

Sufficiently presented a plan to integrate the different routing protocols into a new network design for Genome4U’s lab.

8 points

Fully presented a plan to integrate the different routing protocols into a new network design for Genome4U’s lab.

10 points2. Describe the information that you will need to redistribute among routing protocols.

Did not complete the assignment or did not describe the information that you will need to redistribute among routing protocols; omitted key information and/or included irrelevant information. 0-9 points

Partially described the information that you will need to redistribute among routing protocols; omitted some key information.

11 points

Sufficiently described the information that you will need to redistribute among routing protocols.

12 points

Fully described the information that you will need to redistribute among routing protocols.

15 points3. Identify the problems you expect to encounter (with different metrics, security, etc.) when you redistribute.

Did not complete the assignment or did not identify the problems you expect to encounter (with different metrics, security, and etc.) when you redistribute; omitted key information and/or included irrelevant information. 0-9 points

Partially identified the problems you expect to encounter (with different metrics, security, etc.) when you redistribute; omitted some key information.

11 points

Sufficiently identified the problems you expect to encounter (with different metrics, security, etc.) when you redistribute.

12 points

Fully identified the problems you expect to encounter (with different metrics, security, etc.) when you redistribute.

15 points4. Explain how you will overcome the problems.

Did not complete the assignment or did not explain how you will overcome the problems; omitted key information and/or included irrelevant information. 0-6 points

Partially explained how you will overcome the problems; omitted some key information.

7 points

Sufficiently explained how you will overcome the problems.

8 points

Fully explained how you will overcome the problems.

10 points5. Explain how you will provide Internet access.

Did not complete the assignment or did not explain how you will provide Internet access; omitted key

Partially explained how you will provide Internet access; omitted some key information.

Sufficiently explained how you will provide Internet access.

Fully explained how you will provide Internet access.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 19 of 36

Page 20: CIS532 January 2012 Stewart

information and/or included irrelevant information. 0-6 points 7 points 8 points 10 points

6. Clarity

Did not complete the assignment, or explanations are unclear and not organized. (Major issues)2.5 points

Explanations generally unclear and not well organized. (Many issues)

3.5 points

Explanations generally clear and/or organized. (Minor issues)

4 points

Explanations very clear and well organized.(Added helpful details)

5 points7. Writing – Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues) 0-2.5 points

Had 6–7 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues).

3.5 points

Had 4–5 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues)

4 points

Had 0–3 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

5 points

WEEK 7Course outcomes in focus: Develop network management strategies to include resource monitoring and data collection

and interpretation. Describe processes that address performance, fault, configuration, security, and accounting

management. Summarize network management architecture and monitoring strategies to include

management protocols and tools.

Activities:Readings:

Read Chapter 9: Developing Network Management Strategies

Supporting Topics:Lecture Topics: Network management design Network management processes to include:

o Faulto Configurationo Accountingo Performanceo Security

Network management’s tools and protocols

Lectures/Discussions: Lecture on network management design, network management processes to include:

fault, configuration, accounting, performance and security; and network management tools and protocols.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 20 of 36

Page 21: CIS532 January 2012 Stewart

Discussion 1: “Developing Network Management Strategies.” Students will respond to the following:

o Select and describe one (1) of the five (5) network management processes. Search the Web for tools that support your selected process. How is this product or tool used? Please be sure to cite your sources.

Discussion 2: “Network Security.” Students will respond to the following:

o When designing network management for your customer, what security concerns will you be addressing? Support your response.

Assignment 3: Network Security Planning

This assignment is due for online students by midnight on Sunday of Week 7 and for on-ground students before Week 8’s class meeting. Submit your assignment to the course shell.

Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture, review the modules that afford an organization the foremost protection in evolving technologies and media.

Write a two to three (2-3) page paper in which you:1. Determine if the SAFE architecture has any limitations.2. Defend and support your response with at least three (3) professional references.

The format of the paper is to be as follows:o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all

sides, APA format.o Type the question followed by your answer to the question.o In addition to the two to three (2-3) pages required, a title page is to be included.

The title page is to contain the title of the assignment, your name, the instructor’s name, the course title, and the date.

Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills.

The assignment will be graded using the following rubric:

Outcomes Assessed

Create a network security plan inclusive of identifying and analyzing network assets, security risks, security requirements, and security policy.

Develop network management strategies to include resource monitoring and data collection and interpretation.

Use technology and information resources to research issues in network architecture and analysis.

Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics.

Grading Rubric for Assignment 3 – Network Security Planning

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 21 of 36

Page 22: CIS532 January 2012 Stewart

Criteria Unacceptable Developing Competent Exemplary1. Determine if the SAFE architecture has any limitations.

Did not complete the assignment or did not determine if the SAFE architecture has any limitations; omitted key information and/or included irrelevant information. 0-9 points

Partially determined if the SAFE architecture has any limitations; omitted some key information.

11 points

Sufficiently determined if the SAFE architecture has any limitations.

13 points

Fully determined if the SAFE architecture has any limitations.

15 points 2. Include three (3) references to peer-reviewed journals in support of your answer.

Included no references to peer- reviewed journals in support of your answer.

0-9 points

Included one (1) reference to peer- reviewed journals in support of your answer.

11 points

Included two (2) references to peer- reviewed journals in support of your answer.

13 points

Included three (3) or more references to peer- reviewed journals in support of your answer.

15 points3. Clarity

Did not complete the assignment, or explanations are unclear and not organized. (Major issues)0-5 points

Explanations generally unclear and not well organized. (Many issues)

7 points

Explanations generally clear and/or organized. (Minor issues)

8 points

Explanations very clear and well organized.(Added helpful details)

10 points4. Writing – Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues)0-4 points

Had 6–7 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues)

6 points

Had 4–5 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues)

8 points

Had 0–3 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

10 points

WEEK 8Course outcome in focus:

Compare and contrast the selection of technologies and devices for campus and enterprise networks that include remote access networks, WANs, service providers, end user remote access devices, central site remote access devices, VPN concentrators, and routers.

Activities:Readings:

Read Chapter 10: Selecting Technologies and Devices for Campus Networks Read Chapter 11: Selecting Technologies and Enterprise Networks

Supporting Topics:Lecture 1 Topics: Lecture 2 Topics:

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 22 of 36

Page 23: CIS532 January 2012 Stewart

LAN cabling plant design, including: o Cabling topographieso Types of cables

LAN technologies Selecting internetworking devices

Remote access technologies to include: o Point-to-point protocolso Cable modemso Digital subscriber lines

Review of the following WAN technologies: o Leased lineso SONETo Frame Relayo ATM o Metro Ethernet

Selecting routers for an enterprise WAN design

Selecting a WAN service provider

Lectures/Discussions: Lecture on LAN cabling plant design, including: cabling topographies and types

of cables; LAN technologies; and selecting internetworking devices.

Discussion 1: “Campus Networks.” Students will respond to the following:

o Review and describe the most important criteria for selecting internetworking devices at the core, access, and distribution layer in a computer network.

Lecture on remote access technologies to include point-to-point protocols, cable modems, and digital subscriber lines; a review of the following WAN technologies: leased lines, SONET, Frame Relay, ATM and Metro Ethernet; selecting routers for an enterprise WAN design; and, selecting a WAN service provider.

Discussion 2: “Enterprise Networks.” Students will respond to the following:

o Describe the key criteria involved in selecting WAN technologies and WAN providers. Discuss which criteria is the most important from your perspective and state why.

Assignment 4: Network Design Executive Plan

This assignment is due for online students by midnight on Sunday of Week 8 and for on-ground students before Week 9’s class meeting. Submit your assignment to the course shell.

In this assignment you are to submit the Network Design Executive PowerPoint Presentation for the term paper.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 23 of 36

Page 24: CIS532 January 2012 Stewart

This is the first of two parts for your technical paper submission. Part A is a persuasive Executive PowerPoint presentation of up to 15 slides that you will present to the Executive Committee of Fiction Corporation.

The PowerPoint must include the following in accordance with Chapter 14 of the text:

1. Title page2. Executive summary3. Project goal4. Project scope5. Design requirements:

a. Business goalsb. Technical goalsc. User communities and data storesd. Network applications

6. Current state of the network7. Logical design8. Physical design9. Results of network design testing10. Implementation plan with a project schedule11. Project budget with a return on investment calculation

Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills.

The assignment will be graded using the following rubric:

Outcomes Assessed

Develop a comprehensive network design document. Use technology and information resources to research issues in network architecture

and analysis. Write clearly and concisely about issues in network architecture and analysis using

proper writing mechanics.Grading Rubric for Assignment 4 – Network Design Executive Plan

Criteria Unacceptable Developing Competent Exemplary1. Executive

summary

Did not complete the assignment or did not develop an executive summary that would persuade the Executive Committee of Fiction Corporation. 0 – 1 point

Partially developed an executive summary that would persuade the Executive Committee of Fiction Corporation.

2.25 points

Sufficiently developed an executive summary that would persuade the Executive Committee of Fiction Corporation.

2.5 points

Fully developed an executive summary that would persuade the Executive Committee of Fiction Corporation.

3 points2. Project goal Did not complete

the assignment or did not develop a project goal that

Partially developed a project goal that would persuade the Executive

Sufficiently developed a project goal that would persuade the

Fully developed a project goal that would persuade the Executive

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 24 of 36

Page 25: CIS532 January 2012 Stewart

would persuade the Executive Committee of Fiction Corporation. 0-1 point

Committee of Fiction Corporation.

2.25 points

Executive Committee of Fiction Corporation.

2.5 points

Committee of Fiction Corporation.

3 points3. Project scope Did not complete

the assignment or did not develop a project scope that would persuade the Executive Committee of Fiction Corporation.

0-2 points

Partially developed a project scope that would persuade the Executive Committee of Fiction Corporation.

2.5 points

Sufficiently developed a project scope that would persuade the Executive Committee of Fiction Corporation.

3 points

Fully developed a project scope that would persuade the Executive Committee of Fiction Corporation.

4 points4. Design

Requirements (Business Goals, Technical Goals, User Communities and Data Stores, and Network Applications)

Did not complete the assignment or did not summarize design requirements (business goals, technical goals, user communities and data stores, and network applications) that would persuade the Executive Committee of Fiction Corporation. 0-3 points

Partially summarized design requirements (business goals, technical goals, user communities and data stores, and network applications) that would persuade the Executive Committee of Fiction Corporation.

3.5 points

Sufficiently summarized design requirements (business goals, technical goals, user communities and data stores, and network applications) that would persuade the Executive Committee of Fiction Corporation.

4 points

Fully summarized design requirements (business goals, technical goals, user communities and data stores, and network applications) that would persuade the Executive Committee of Fiction Corporation.

5 points5. Current state of

the networkDid not complete the assignment or did not summarize the current state of the network in a way that would persuade the Executive Committee of Fiction Corporation. 0-2 points

Partially summarized the current state of the network in a way that would persuade the Executive Committee of Fiction Corporation.

2.5 points

Sufficiently summarized the current state of the network in a way that would persuade the Executive Committee of Fiction Corporation.

3 points

Fully summarized the current state of the network in a way that would persuade the Executive Committee of Fiction Corporation.

4 points6. Logical design Did not complete

the assignment or did not summarize a logical design that would persuade the Executive Committee of Fiction Corporation.

Partially summarized a logical design that would persuade the Executive Committee of Fiction Corporation.

Sufficiently summarized a logical design that would persuade the Executive Committee of Fiction Corporation.

Fully summarized a logical design that would persuade the Executive Committee of Fiction Corporation.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 25 of 36

Page 26: CIS532 January 2012 Stewart

0-3 points 3.5 points 4 points 5 points7. Physical design Did not complete

the assignment or did not summarize a physical design that would persuade the Executive Committee of Fiction Corporation. 0-3 points

Partially summarized a physical design that would persuade the Executive Committee of Fiction Corporation.

3.5 points

Sufficiently summarized a physical design that would persuade the Executive Committee of Fiction Corporation.

4 points

Fully summarized a physical design that would persuade the Executive Committee of Fiction Corporation.

5 points 8. Results of

network design testing

Did not complete the assignment or did not summarize the results of network design testing in a way that would persuade the Executive Committee of Fiction Corporation. 0-3 points

Partially summarized the results of network design testing in a way that would persuade the Executive Committee of Fiction Corporation.

3.5 points

Sufficiently summarized the results of network design testing in a way that would persuade the Executive Committee of Fiction Corporation.

4 points

Fully summarized the results of network design testing in a way that would persuade the Executive Committee of Fiction Corporation.

5 points9. Implementation

plan (including project schedule)

Did not complete the assignment or did not summarize an implementation plan (including project schedule) that would persuade the Executive Committee of Fiction Corporation. 0-3 points

Partially summarized an implementation plan (including project schedule) that would persuade the Executive Committee of Fiction Corporation.

3.5 points

Sufficiently summarized an implementation plan (including project schedule) that would persuade the Executive Committee of Fiction Corporation.

4 points

Fully summarized an implementation plan (including project schedule) that would persuade the Executive Committee of Fiction Corporation.

5 points10. Project budget

(including return on investment calculation)

Did not complete the assignment or did not summarize a project budget (including return on investment calculation) that would persuade the Executive Committee of Fiction Corporation. 0-3 points

Partially summarized a project budget (including return on investment calculation) that would persuade the Executive Committee of Fiction Corporation.

3.5 points

Sufficiently summarized a project budget (including return on investment calculation) that would persuade the Executive Committee of Fiction Corporation.

4 points

Fully summarized a project budget (including return on investment calculation) that would persuade the Executive Committee of Fiction Corporation.

5 points11. Clarity

Did not complete the assignment, or explanations are unclear and not organized.

Explanations generally unclear and not well organized. (Many issues)

Explanations generally clear and/or organized. (Minor issues)

Explanations very clear and well organized.(Added helpful details)

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 26 of 36

Page 27: CIS532 January 2012 Stewart

(Major issues)0-1.5 points 2.25 points 2.5 points 3 points

12. Writing – Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues)0-1.5 points

Had 6–7 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues)

2.25 points

Had 4–5 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues)

2.5 points

Had 0–3 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

3 points

WEEK 9Course outcomes in focus: Develop network design testing procedures through services, tools, and testing scripts. Describe optimal network design for critical business applications to include effective use of

bandwidth and satisfying Quality of Service (QoS) requirements.

Activities:Readings:

Read Chapter 12: Testing Your Network Design

e-Activity: Research network testing tools and be prepared to describe a few different tools in class.

Supporting Topics:Lecture Topics: Using industry tests Building and testing a prototype network system Writing and implementing a test plan for your network design Tools for testing a network design

Lectures/Discussions: Lecture on using industry tests, building and testing a prototype network system, writing

and implementing a test plan for your network design, and tools for testing a network design.

Discussion 1: “Testing Your Network Design.” Students will respond to the following:

o Describe the significance of testing your network design. Use a real-world example to illustrate your point.

Discussion 2: “Network Tools.” Students will respond to the following:

o Compare and contrast the network tools that you researched. Identify which you highly recommend and state why.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 27 of 36

Page 28: CIS532 January 2012 Stewart

Case Study 3: Design Scenario, Klamath Paper Products

This assignment is due for online students by midnight on Sunday of Week 9 and for on-ground students before Week 10’s class meeting. Submit your assignment to the course shell.

Read the Design Scenario, Klamath Paper Products case study found in Chapter 11 of the textbook.

Research a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesn’t have Metro Ethernet). Write a one to two (1-2) page paper that describes the service in technical terms. Make sure to include pricing information. You may need to contact the provider to obtain this information.

The format of the paper is to be as follows:o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all

sides, APA format.o Type the question followed by your answer to the question.o In addition to the one to two (1-2) pages required, a title page is to be included. The

title page is to contain the title of the assignment, your name, the instructor’s name, the course title, and the date.

Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills.

The assignment will be graded using the following rubric:

Outcomes Assessed

Describe optimal network design for critical business applications to include effective use of bandwidth and satisfying Quality of Service (QoS) requirements.

Use technology and information resources to research issues in network architecture and analysis.

Write clearly and concisely about issues in network architecture and analysis using proper writing mechanics.

Grading Rubric for Case 3 – Design Scenario, Klamath Paper Product

Criteria Unacceptable Developing Competent Exemplary1. Research a

Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesn’t have Metro Ethernet). Write a one-two page paper that describes the service in technical terms.

Did not complete the assignment or did not research a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesn’t have Metro Ethernet) and write a one-two page paper that describes the service in technical terms,

Partially researched a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesn’t have Metro Ethernet) and wrote a one-two page paper that describes the service in technical terms, making sure to include pricing

Sufficiently researched a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesn’t have Metro Ethernet) and wrote a one-two page paper that describes the service in technical terms, making sure to

Fully researched a Metro Ethernet service that is offered by a vendor in your country (or another country if your country doesn’t have Metro Ethernet) and wrote a one-two page paper that describes the service in technical terms, making sure to include pricing

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 28 of 36

Page 29: CIS532 January 2012 Stewart

Make sure to include pricing information. You may need to contact the provider to obtain this information).

making sure to include pricing information; omitted key information and/or included irrelevant information. 0-15 points

information; omitted some key information.

18 points

include pricing information.

20 points

information.

25 points2. Clarity

Did not complete the assignment, or explanations are unclear and not organized. (Major issues)0-15 points

Explanations generally unclear and not well organized. (Many issues)

18 points

Explanations generally clear and/or organized. (Minor issues)

20 points

Explanations very clear and well organized.(Added helpful details)

25 points3. Writing –

Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues)0-6 points

Had 6–7 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues)

7 points

Had 4–5 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues)

8 points

Had 0–3 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

10 points

WEEK 10Course outcome in focus: Describe optimal network design for critical business applications to include effective use of

bandwidth and satisfying Quality of Service (QoS) requirements.

Activities:Readings:

Read Chapter 13: Optimizing Your Network Design

Supporting Topics:Lecture Topics: Optimizing bandwidth usage IP multicast technologies Reducing serialization delay Optimizing network performance to meet QoS requirements Cisco IOS features for optimizing network performance

Lectures/Discussions: Lecture on optimizing bandwidth usage, IP multicast technologies, reducing serialization

delay, optimizing network performance to meet QoS requirements, and Cisco IOS features for optimizing network performance.

Discussion 1: “Optimizing Your Network Design.” Students will respond to the following:

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 29 of 36

Page 30: CIS532 January 2012 Stewart

o Select and describe one (1) of the queuing methods described in the readings. Present a real-world example of the method you selected.

Discussion 2: “Bandwidth Utilization.” Students will respond to the following:

o Discuss the difference between multicast and unicast routing. Choosing either one, describe where it can be used in your professional or personal life.

Assignment 5: Technical Term Paper

This assignment is due for online students by midnight on Sunday of Week 10 and for on-ground students before Week 11’s class meeting. Submit your assignment to the course shell.

The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word with graphics embedded within the document.

Background

You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP company, you recently made a persuasive presentation of your company’s approach to designing networks at a large industry event. The CEO of Fiction Corporation, a large retail chain, was impressed by your presentation. It looks like you’ve finally got your break!

You have a small team of 10 technically proficient staffers with a strong background in project management, networking, and internetworking skills that include PMP, Network+, CCNP, and CISSP credentials.

You have been selected by Fiction Corporation to develop a network design document and plan without an RFP.

Overview

Fiction Corporation, a large national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.

The data in the center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hours a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation’s operations and profitability. From the data processing viewpoint, the move includes 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.

The network consists of approximately 500 remote location retail stores connected via frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the entire organization. The retail operations also run WLANs that are on its own subnet. You

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 30 of 36

Page 31: CIS532 January 2012 Stewart

will have a T1 link and ISDN as a primary backup. Network managers also need to monitor the status of remote systems. The SNMP management system must be able to detect and report failure of the remote system or its communications link and the status of individual applications.

The company wishes a seamless migration that minimizes impact to its customers and employees. Any gaps in this background will require you to make sound technical and persuasive assumptions that satisfy the customer’s goals that are within the budget guidelines.

You were selected in part due to your detailed analysis and agreement to an implementation cost that will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is the availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers.

Include the following in your assignment: 1. Title page2. Table of contents3. Executive summary4. Project goal5. Project scope6. Design requirements:

a. Business goalsb. Technical goalsc. User communities and data storesd. Network applications

7. Current state of the network8. Logical design9. Physical design10. Results of network design testing11. Implementation plan with a project schedule12. Project budget with a return on investment calculation13. Design document appendix

The format of the paper is to be as follows:o Typed, double-spaced, Times New Roman font (size 12), one-inch margins on all

sides, APA format.o Type the question followed by your answer to the question.o This paper should be between 10-15 pages, including graphics.

Note: You will be graded on the quality of your answers, the logic/organization of the report, your language skills, and your writing skills.

The assignment will be graded using the following rubric:Outcomes Assessed Design a systematic network architecture plan in accordance with network design steps.

Summarize among scalability, availability, performance security, manageability, usability, adaptability, and affordability as they relate to internetworking product selection.

Design a network topology to include hierarchy, redundancy, modularity, and security.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 31 of 36

Page 32: CIS532 January 2012 Stewart

Create a network security plan inclusive of identifying and analyzing network assets, security risks, security requirements, and security policy.

Develop network management strategies to include resource monitoring and data collection and interpretation.

Describe processes that address performance, faulty, configuration, security, and accounting management.

Compare and contrast the selection of technologies and devices for campus and enterprise networks that include remote access networks, WANs, service providers, end user remote access devices, central site remote access devices, VPN concentrators, and routers.

Develop network design testing procedures through services, tools, and testing scripts. Describe optimal network design for critical business applications to include effective

use of bandwidth and satisfying QoS requirements. Develop a comprehensive network design document Use technology and information resources to research issues in network architecture and

analysis. Write clearly and concisely about issues in network architecture and analysis using proper

writing mechanics.Grading Rubric for Assignment 5 – Technical Term Paper

Criteria Unacceptable Developing Competent Exemplary1. Executive

summary Did not complete the assignment or did not develop an executive summary that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees. 0-3 points

Partially developed an executive summary that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

4 points

Sufficiently developed an executive summary that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

5 points

Fully developed an executive summary that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

6 points 2. Project goal Did not complete

the assignment or did not develop a project goal that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees. 0-3 points

Partially developed a project goal that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

4 points

Sufficiently developed a project goal that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

5 points

Fully developed a project goal that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

6 points3. Project scope Did not complete

the assignment or did not develop a project scope that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and

Partially developed a project scope that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

Sufficiently developed a project scope that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

Fully developed a project scope that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 32 of 36

Page 33: CIS532 January 2012 Stewart

employees. 0-4 points 5 points 6 points 7 points

4. Design requirements (business goals, technical goals, technical goals, user communities and data stores, and network applications)

Did not complete the assignment or did not develop design requirements (business goals, technical goals, technical goals, user communities and data stores, and network applications) that support a seamless migration that minimizes impact to Fiction Corporation’s customers and employees. 0-6 points

Partially developed design requirements (business goals, technical goals, technical goals, user communities and data stores, and network applications) that support a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

7 points

Sufficiently developed design requirements (business goals, technical goals, technical goals, user communities and data stores, and network applications) that support a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

8 points

Fully developed design requirements (business goals, technical goals, technical goals, user communities and data stores, and network applications) that support a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

10 points5. Current state of

the networkDid not complete the assignment or did not analyze the current state of the network in a way that minimizes impact to Fiction Corporation’s customers and employees. 0-4 points

Partially analyzed the current state of the network in a way that minimizes impact to Fiction Corporation’s customers and employees.

5 points

Sufficiently analyzed the current state of the network in a way that minimizes impact to Fiction Corporation’s customers and employees.

6 points

Fully analyzed the current state of the network in a way that minimizes impact to Fiction Corporation’s customers and employees.

7 points6. Logical design Did not complete

the assignment or did not develop a logical design that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

0-6 points

Partially developed a logical design that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

7 points

Sufficiently developed a logical design that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

8 points

Fully developed a logical design that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

10 points7. Physical design Did not complete

the assignment or did not develop a physical design that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and

Partially developed a physical design that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

Sufficiently developed a physical design that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

Fully developed a physical design that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 33 of 36

Page 34: CIS532 January 2012 Stewart

employees. 0-6 points 8 points 8 points 10 points

8. Results of network design testing

Did not complete the assignment or did not discern the results of network design testing in a way that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees. 0-6 points

Partially discerned the results of network design testing in a way that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

7 points

Sufficiently discerned the results of network design testing in a way that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

8 points

Fully discerned the results of network design testing in a way that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

10 points9. Implementation

plan (including project schedule)

Did not complete the assignment or did not develop an implementation plan (including project schedule) that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

0-6 points

Partially developed an implementation plan (including project schedule) that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

7 points

Sufficiently developed an implementation plan (including project schedule) that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

8 points

Fully developed an implementation plan (including project schedule) that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

10 points 10. Project budget

(including return on investment calculation)

Did not complete the assignment or did not develop a project budget (including return on investment calculation) that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

0-6 points

Partially developed a project budget (including return on investment calculation) that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

7 points

Sufficiently developed a project budget (including return on investment calculation) that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

8 points

Fully developed a project budget (including return on investment calculation) that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

10 points 11. Document

appendixDid not complete the assignment or did not develop a document appendix that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and

Partially developed a document appendix that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

Sufficiently developed a document appendix that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

Fully developed a document appendix that supports a seamless migration that minimizes impact to Fiction Corporation’s customers and employees.

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 34 of 36

Page 35: CIS532 January 2012 Stewart

employees. 0-2 points 2.5 points 3 points 4 points

12. Clarity

Did not complete the assignment, or explanations are unclear and not organized. (Major issues)0-3 points

Explanations generally unclear and not well organized. (Many issues)

3.75 points

Explanations generally clear and/or organized. (Minor issues)

4 points

Explanations very clear and well organized.(Added helpful details)

5 points13. Writing – Grammar, sentence structure, paragraph structure, spelling, punctuation, APA usage.

Did not complete the assignment or had 8 or more different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Major issues) 0-3 points

Had 6–7 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Many issues)

3.75 points

Had 4–5 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage. (Minor issues)

4 points

Had 0–3 different errors in grammar, sentence structure, paragraph structure, spelling, punctuation, or APA usage.

5 points

WEEK 11Course outcome in focus: No new material.

Activities:Readings:

No new material.

Lectures/Discussions: Discussion 1: “Course Wrap-Up.” Students will respond to the following:

o Discuss how you can apply the learning outcomes of this course to your professional and personal life.

Final Exam The exam is available in the course shell under Week 11. There are 2.5 hours

allocated to take this exam and it is worth 200 points. Online students must complete the exam before midnight Sunday of Week 11

and on-ground students must complete the exam before the Week 11 class.

ASSIGNMENT OUTLINE AND GRADING

Assignment Type Total Points Percentage*Assignment 1 50 5%Assignment 2 50 5%Assignment 3 50 5%Assignment 4 50 5%Assignment 5 100 10%Case Study 1 70 7%Case Study 2 70 7%

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 35 of 36

Page 36: CIS532 January 2012 Stewart

Case Study 3 60 6%Midterm Exam 200 20%Final Exam 200 20%Participation 100 10%

Total 1,000 100%

* The percentages may not total 100% due to rounding.

Grading ScalePoints Percentage Grade

900-1000 90-100 A800-899 80-89 B700-799 70-79 CBelow 700 Below 70 F

© 2010 Strayer University, All Rights Reserved. This document contains Strayer University Confidential and Proprietary information and may not be copied, further distributed, or otherwise disclosed in whole or in part, without the expressed written permission of Strayer University.

CIS532 Student Version 201103 [1112 –03/04/11] Page 36 of 36