Telecommunications in Information Systems

Please provide the original work, Previously someone provided the copied from someone else’s work. If you have any question please message me. These assignments will check for plagarism.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Project 1: VPN testing

File: VPN Log + IFSM 370 Project 2 VPN Testing

Project 2: Case Study

File: IFSM 370 r2 doc

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Project 3: Final Assessment

File: Project Final assessment

VPN Log
DATE
Desktop/Mobile
VPN Server
URL
Observations
Jan-1
21:00
TIME
Desktop
Germany/185.216.33.11
www.cnn.com
Came up in international edition. Very fast load time.
Jan-2
8:00
Desktop
USA/207.189.25.171
www.huffingtonpost.com
very fast load time. No difference from non-vpn.
Jan-3
14:30
Desktop
Mexico/185.153.177.4
www.huffingtonpost.com
site comes up in Spanish. Relatively slow load time.
Jan-4
7:45
Desktop
Mobile
Mobile
Mobile
Mobile
Mobile
Mobile
IFSM 370 Project 3: Case Study Instructions
Introduction
This is an individual project. The target audience will be the organization’s senior
leadership, the founders. The Case Study deliverable is an MS Word document. The
completed Case Study deliverable is due by 11:59 PM Eastern Time on the due date
shown in the Course Schedule. See the Additional Information section of the syllabus for
the penalty for late or missed assignments and projects.
The Case Study is valued at 16% of the course grade.
Case Study
Company Overview
FractalApps is a online software development start-up whose product is resume
development service. It was founded by three friends who went to undergrad school
together at the University of Maryland. They founded the startup recently and set up their
headquarters at the condo of the two founders in Washington, DC. They plan to grow their
operations over time to support populations in a variety of cities around the US however
their first 2 markets are Virgina and Mayland.
They have recently received a cash infusion from an angel investor in Silicon Valley and are
ready to build out their business. Their plan is to have three locations:



A headquarters office in DC where the founders and senior staff reside
Two sales offices sales office based in VA and MD
A development house in San Francisco where product developers live and work.
They are looking for you to develop a network design for their business. They are seeking
a standardized LAN design (using consistent and cost-effective hardware/software) for the
three offices, and a cost-effective WAN design that allows all of their staff to communicate
and collaborate quickly, efficiently, without a lot of network delay. The network should
support both their voice and data needs.
Many of the sales staff are in the field, and many of the development staff want to be able to
work practically anywhere so they require secure access to the network as if they were in
the office. A VPN solution is what they are seeking but need guidance.
1
IFSM 370 Project 3: Case Study Instructions
The Deliverable
Using this case study, you are to:
1.
Identify five specific business requirements that relate to the design and
implementation of the network.
2.
Define the most appropriate cabling for the local area network(s); define
the network components in the local area network and explain your reasoning
for selecting each of these.
3.
Define the wide area network infrastructure (technology); define the
network components in the wide area network and explain your reasoning for
selecting each of these.
4.
Define the VPN components (hardware/software) for the organization.
Explain what components go where, and what is required on mobile devices.
Remember, your plan and network diagram include all three locations and how they
interconnect. In both your plan and diagram, you don’t need to specify the number of
workers or workstations in each location, but you need to address the different
requirements at each site.
DO NOT INCORPORATE CLOUD BASED SEVICES A design submitted that simply
depicts a connection to and from a cloud-based service providers will be graded as
zero.
Please provide descriptive headings for each of the following four deliverables listed above.
Designs should be constructed using the fundamental network devices covered in this
course (devices, switches, routers, cables, servers, etc.) at each location.
Your deliverable will be a 3 – 5-page Microsoft Word document. The page count
includes the diagram(s) but does not count the cover page and references page.
NOTE: External sources must be ACADEMIC RESOURCES. Product marketing or
vendor sales material are not acceptable. Citations and references must be in APA
format.
Your paper will be scored according to the Scoring Rubric below. Be sure you have
incorporated all required aspects of the assignment.
2
IFSM 370 Project 3: Case Study Instructions
Scoring Rubric
Attribute
Full points
Partial points
No points
Possible
Points
Business
Requirements
Analysis
Analysis covers five
requirements, defining them
and providing explanations
of each; and demonstrates
understanding of course
concepts, analysis, and
critical thinking.
Analysis covers one to four
requirements, and/or lacks
definitions and/or
explanations for each; and
may be
lacking in demonstration of
understanding of course
concepts, analysis, and/or
critical thinking.
Analysis is not
included or
does not
identify any
requirements.
3
LAN
Technology
solution
An appropriate technology
solution is provided,
including cabling and all
network components in the
local area network(s).
Thorough explanation of the
reasoning for selecting each
of the LAN components and
all identified requirements
are addressed.
A technology solution is
partially provided for the
local area network(s). An
explanation of the reasoning
for selecting each of the
LAN components and
all identified
requirements may be
included.
No technology
solution is
provided.
4
WAN
Technology
solution
An appropriate technology
solution is provided,
including infrastructure and
all network components in
the wide area network(s).
Thorough explanation of the
reasoning for
selecting each of the WAN
components and all identified
requirements are addressed.
A technology solution is
No technology
partially provided for the
solution is
wide area network(s). An
provided.
explanation of the reasoning
for
selecting each of the WAN
components
and all identified
requirements may be
included.
4
RUBRIC CONTINUES ON NEXT PAGE
3
IFSM 370 Project 3: Case Study Instructions
VPN
An appropriate technology
Technology solution, including VPN
components
(hardware/software) is provided
and thoroughly
explained/justified. It addresses
all identified requirements.
A technology solution is
partially appropriate and/or
partially explained. It may
only partially address the
requirements.
No
technology
solution is
provided.
3
External
research
More than two sources other
than assigned course readings
or materials are incorporated and
used effectively.
One or two sources other
than the assigned readings
and course materials may be
used but are not properly
incorporated or used and/or
are not effective or
appropriate.
No external
research is
incorporated.
1
Document
format
The document
reflects effective organization
and correct sentence structure,
grammar, and spelling; it is
presented in a professional
format; it
incorporates illustrations or
diagrams; and references are
appropriately incorporated and
cited, using APA style.
At least one network diagram is
incorporated to illustrate the
proposed solution.
The document is not wellorganized, and/or contains
grammar and/or
spelling errors; it does not
contain appropriate
illustrations or diagrams;
and/or it does not follow
APA style for references
and citations. At least one
network diagram may be
incorporated to illustrate the
proposed solution.
The
document is
extremely
poorly
written and
does not
convey the
information.
1
Total
Points:
No network
diagram is
incorporated
to illustrate
the proposed
solution.
16
4
IFSM 370 Project 2: VPN Testing
Introduction
This project gives the student the opportunity to get hands-on experience downloading and exploring the
attributes and value of using a Virtual Private Network (VPN).
The Project is valued at 12% of the course grade.
VPN Access
VPNs come in hardware and software varieties. There are a number of VPN apps that can be
downloaded to your desktop and mobile device. One of these is called Tunnel Bear. Tunnel Bear has a
free trial download. You are not required to use Tunnel Bear, but it is free.
Download Tunnel Bear (https://www.tunnelbear.com/) to your desktop/laptop AND mobile device
(phone/tablet). Use Tunnel Bear for one week. Please keep in mind the free version is limited to 500 MB
of data (so don’t use Tunnel Bear to watch Netflix or you will run out of data before you finish the
assignment)! The idea is to experience a VPN client on your desktop and mobile device and keep a log
of the sites your visit while changing the VPN servers that you connect to around the world. Make sure
you change your VPN servers to a minimum of ten countries. Visit a minimum of ten websites (minimum
of five sites on your desktop/laptop and a minimum of five different sites on your mobile device). Keep a
log and make notes of your experience. What works well with the Tunnel Bear VPN? What doesn’t work
so well. What specific performance impacts (if any) do you note. Why would you want to use a product
like Tunnel Bear all the time?
Project Deliverables
Your deliverable consists of your turned in VPN log and a two to four page write up of your observations
and experiences. Include the following questions as the sectional headings in your writeup
(should be bolded in paper):
1. What VPN client did you use?
2. Did you have problems installing the client on either your desktop or mobile?
3. What was your general experience with the VPN client?
4. What specifically did you note about the VPN client when you connected to various VPN servers?
Provide details.
5. What performance issues did you encounter (if any)?
6. Would you use a VPN client like Tunnel Bear all the time? If not, why not?
7. What are the perceived benefits of a VPN like Tunnel Bear.
You should include at least one relevant external reference, and your sources must be cited correctly in
APA format. Your paper will be scored according to the Scoring Rubric below. Be sure you have
incorporated all required aspects of the assignment.
Page 1 of 2
IFSM 370 Project 2: VPN Testing
Scoring Rubric
Attribute
Full points
Partial points
No points
VPN Log filled
in completely
Log is filled in with at
least five desktop and
five mobile sites.
Observations
recorded for each
visit.
No log or minimal
effort.
Multiple VPN
Servers
A minimum of 10
country VPN servers
were tested.
Write up explains the
observer’s general
experiences
(positive/negative)
regarding VPN client.
Write up provides the
observer’s specific
details that were
uncovered during
testing.
Write up shows an
understanding of VPN
concepts and how it is
used.
The document reflects
effective organization
and correct sentence
structure, grammar,
and spelling; it is
presented in a
professional format; it
incorporates
illustrations or
diagrams.
Log is partially filled in
with desktop and mobile
sites. Log shows at
fewer than 10 VPN
servers. Observations
are not recorded for
each visit.
Less than 10 country
VPN servers were
tested.
Write up lists minimal
observations
(positive/negative)
regarding VPN client.
DocumentGeneral
Experience
Write upSpecifics
VPN Benefits
Document
Format
Possible
Points
3
Single VPN server
tested.
3
No general
comments
provided.
2
Write up provides limited
observer’s details that
were uncovered during
testing.
No specific details
provided.
2
Write up shows a limited
understanding of VPN
concepts and how it is
used.
The document is not
well-organized, and/or
contains grammar
and/or spelling errors; it
does not contain
appropriate illustrations
or diagrams.
No benefits
provided.
1
The document is
extremely poorly
written and does
not convey the
information.
1
Total Points:
Page 2 of 2
12
IFSM 370 Project 4: Final Assessment Instructions
Introduction
The final assessment is a five-question essay assignment. Your answers to all questions should be
complete and demonstrate your understanding of ALL of this semester’s lessons. Each answer should
be 3-5 paragraphs in length. This final assessment is to be completed independently and without help
from another student or person. Each question has multiple parts. Please read the question carefully
and answer all parts for full credit. A minimum of two reference sources are required for each question.
All sources must be cited correctly using APA format. Failure to cite reference sources will result in a
reduced grade.
The completed Final Exam Paper deliverable is due by 11:59 PM Eastern Time on the due date shown in
the Course Schedule.
The Final Assessment is valued at 20% of the course grade.
The format of the paper should include bolded sectional headings as follows:
• Question 1
• Question 2
• Question 3
• Question 4
• Question 5
Final Assessment
Question 1: Explain the differences between the following network devices: hub, bridge, switch, router,
firewall. Where would you utilize each device and why? Where does each device reside within the OSI
model?
Question 2: Define what VPNs are and used for. Distinguish hardware VPN devices and appliances from
software devices. Give examples of both. How do VPNs work? Why would one use a VPN? What are
the downsides of using VPNs?
Question 3: Describe four wireless technologies. Describe what each one does and briefly how it
works? How is each one different from the other? Why would you use one over the other?
Question 4: Describe what cloud computing is. Describe the three cloud computing models. Discuss
why and when you would utilize each model. Give examples.
Question 5: Describe in detail what the Internet of Things (IoT) is. What are the issues with IoT? Do you
believe IoT is the wave of the future (yes or no, and why)? How will IoT impact the overall internet?
Page 1 of 4
IFSM 370 Project 4: Final Assessment Instructions
Scoring Rubric
Attribute
Question 1
Question 2
Full points
Partial points
No points
Answer demonstrates
a complete
understanding of the
course concepts,
analysis, and critical
thinking. Answer is
complete, with
sufficient detail and
examples. Answer is
written in student’s
own voice and not
simply copied and
pasted from another
source.
Answer demonstrates
a complete
understanding of the
course concepts,
analysis, and critical
thinking. Answer is
complete, with
sufficient detail and
examples. Answer is
written in student’s
own voice and not
simply copied and
pasted from another
source.
Answer demonstrates
that student does not
have a complete
understanding of
course concepts,
analysis, and/or
critical thinking.
Some content is
copied/pasted from
another source—not
in the student’s own
words. Lacking
sufficient
detail/examples.
Answer demonstrates
that student does not
have a complete
understanding of
course concepts,
analysis, and/or
critical thinking.
Some content is
copied/pasted from
another source—not
in the student’s own
words. Lacking
sufficient
detail/examples.
Answer is missing or
displays a complete
lack of understanding
of the material. Entire
answer copied from
other source.
Page 2 of 4
Answer is missing or
displays a complete
lack of understanding
of the material. Entire
answer copied from
other source.
Possible
Points
3
3
IFSM 370 Project 4: Final Assessment Instructions
Attribute
Question 3
Question 4
Full points
Partial points
No points
Answer demonstrates
a complete
understanding of the
course concepts,
analysis, and critical
thinking. Answer is
complete, with
sufficient detail and
examples. Answer is
written in student’s
own voice and not
simply copied and
pasted from another
source.
Answer demonstrates
a complete
understanding of the
course concepts,
analysis, and critical
thinking. Answer is
complete, with
sufficient detail and
examples. Answer is
written in student’s
own voice and not
simply copied and
pasted from another
source.
Answer demonstrates
that student does not
have a complete
understanding of
course concepts,
analysis, and/or
critical thinking.
Some content is
copied/pasted from
another source—not
in the student’s own
words. Lacking
sufficient
detail/examples.
Answer demonstrates
that student does not
have a complete
understanding of
course concepts,
analysis, and/or
critical thinking.
Some content is
copied/pasted from
another source—not
in the student’s own
words. Lacking
sufficient
detail/examples.
Answer is missing or
displays a complete
lack of understanding
of the material. Entire
answer copied from
other source.
Page 3 of 4
Answer is missing or
displays a complete
lack of understanding
of the material. Entire
answer copied from
other source.
Possible
Points
3
3
IFSM 370 Project 4: Final Assessment Instructions
Attribute
Question 5
Reference
Sources
Full points
Partial points
No points
Answer demonstrates
a complete
understanding of the
course concepts,
analysis, and critical
thinking. Answer is
complete, with
sufficient detail and
examples. Answer is
written in student’s
own voice and not
simply copied and
pasted from another
source.
At least two references
are appropriately
incorporated and cited,
using APA style for
each question.
Answer demonstrates
that student does not
have a complete
understanding of
course concepts,
analysis, and/or
critical thinking.
Some content is
copied/pasted from
another source—not
in the student’s own
words. Lacking
sufficient
detail/examples.
One references are
appropriately
incorporated and
cited, using APA style
for each question.
Answer is missing or
displays a complete
lack of understanding
of the material. Entire
answer copied from
other source.
Missing references
from each question.
Total Points:
Page 4 of 4
Possible
Points
3
5
20

Still stressed with your coursework?
Get quality coursework help from an expert!