Part 2 Capstone Project Information This Part Of The Assignm

Part 2 Capstone Project Informationalthis Part Of The Assignment Is

This part of the assignment is to contribute to the Capstone project and also to show the instructor that progress is being made on the Capstone project. Continue using the template that was modified in Unit 1. Submit your Capstone project work to the Group Submission area. Include the word "DRAFT" in the document title.

Your second draft will then be available to share with your team. The second draft will also be available for your instructor to review team progress. Use the company profile and scenario found here as the subject of your Systems Implementation Plan.

Team Project New Requirements

Designing a network involves data, voice, and power considerations. Creating a well-integrated social relationship platform involves interoperability with other technologies, like customer relationship management (CRM).

Assume you are designing a network infrastructure for Verbania, Inc. The company requires an efficient network that carries data, Voice over Internet Protocol (VoIP), and Power over Ethernet (PoE). It also requires the effective use of a CRM system to pull customers’ social media data for review and analysis to improve user experience and generate profits.

Capstone Project Activity - Unit 2

The project team must analyze the New Requirements. This section will specify what the company will need in the area of solution elements, such as networking, Voice Over Internet Protocol (VoIP), and Power over Ethernet (PoE).

Specifically, this section will answer the following questions (at a minimum):

  • Which type of network topology would you recommend for the corporate backbone and the wired and wireless connections? Why do you think this would be the best choice?
  • Which type of cabling would you recommend? Why do you think this would be the best choice?
  • How will the network infrastructure accommodate remote access?
  • What solution would you propose to integrate the social media site with a CRM solution?
  • What security considerations are involved?

Paper For Above instruction

The design and implementation of a robust network infrastructure for Verbania, Inc. require a comprehensive approach, addressing connectivity, security, integration, and scalability. As the company's requirements include data transmission, VoIP, PoE, social media integration, and remote access, the selection of network topology, cabling, and security measures becomes crucial for operational efficiency and security.

Recommended Network Topology

For the corporate backbone, a hierarchical star topology is highly recommended. This topology centralizes network management, facilitates scalability, and simplifies troubleshooting. In a star topology, all devices are connected to a central switch or router, which efficiently manages data traffic and reduces potential points of failure. For wired connections within the office environment, this topology supports high-speed data transfer essential for operations and VoIP services (Stewart & Terry, 2020).

For wireless connections, deploying a mesh topology enhances coverage and reliability. Wireless mesh networks provide multiple pathways for data to reach its destination, which is particularly advantageous in a large or multi-floor facility. They improve resilience by automatically rerouting traffic if a node fails, ensuring uninterrupted connectivity essential for remote employees and mobile devices (Ahmed et al., 2019).

Recommended Cabling

Category 6a twisted-pair Ethernet cabling is the optimal choice for this environment. It supports 10-Gigabit Ethernet over distances of up to 100 meters, providing high bandwidth and future-proofing the infrastructure. Its shielding minimizes electromagnetic interference, ensuring stable data transmission critical for VoIP and data services (Cisco, 2021). For backbone connections where longer distances are involved, fiber optic cabling is recommended due to its higher bandwidth capacity and immunity to electromagnetic interference, thus supporting large data volumes and high-speed applications (Ossman et al., 2018).

Remote Access Accommodation

To support remote access securely, implementing a Virtual Private Network (VPN) is essential. VPNs encrypt data transmitted over public networks, safeguarding sensitive information. Combining VPNs with multi-factor authentication (MFA) enhances security by verifying user identities (Liu & Wang, 2020). Additionally, deploying a remote desktop or cloud-based collaboration tools ensures remote employees can access necessary resources efficiently without compromising security. Ensuring the network infrastructure supports sufficient bandwidth and low latency is also critical for remote VPN users to maintain productivity (Zhao et al., 2021).

Integration of Social Media with CRM

Integrating social media platforms with a CRM system requires APIs and middleware that facilitate data exchange. A cloud-based integration platform can aggregate social media data—such as customer interactions, feedback, and preferences—into the CRM for analysis. This integration enables real-time monitoring of customer sentiment, engagement metrics, and social behavior, thereby enhancing customer insights and targeted marketing efforts (Kumar & Shah, 2018). The integration solution must be scalable and compliant with data privacy regulations, like GDPR, to maintain customer trust and legal adherence (Zhou et al., 2019).

Security Considerations

Security is paramount in a network supporting data, VoIP, PoE, and social media integration. Key security measures include deploying firewalls, intrusion detection and prevention systems (IDPS), and regular security audits to monitor and mitigate threats (Chen et al., 2020). Encrypting data through TLS and SSL protocols ensures secure communications, especially over remote access VPNs. Network segmentation isolates sensitive systems, minimizing the risk of lateral movement by malicious actors (Sun et al., 2021). Additionally, establishing strict access controls and user authentication protocols prevents unauthorized access, and employee training is vital to maintain security awareness.

Conclusion

Designing a scalable, secure, and integrated network infrastructure for Verbania, Inc. involves selecting appropriate topologies, cabling, security protocols, and integration solutions. A hierarchical star topology for the backbone, mesh for wireless redundancy, Category 6a and fiber optic cabling, and VPN-based remote access collectively create a resilient and adaptable network. Integrating social media data into CRM empowers customer insight and business growth, while rigorous security measures safeguard digital assets. Carefully aligning these components ensures the company's technological infrastructure effectively supports its operational and strategic goals.

References

  • Ahmed, M., Bentaleb, A., & Zitouni, D. (2019). Wireless Mesh Networks: A Review. Journal of Network and Computer Applications, 135, 124–138.
  • Chen, L., Zhou, Y., & Wang, J. (2020). Network Security in Modern Organizations: Challenges and Solutions. International Journal of Network Security, 22(3), 386–395.
  • Cisco. (2021). Understanding Ethernet Cabling Standards. Cisco Press.
  • Kumar, V., & Shah, D. (2018). Customer Relationship Management and Social Media Integration. Journal of Business Research, 94, 337–348.
  • Liu, H., & Wang, Q. (2020). Enhancing VPN Security: Multi-Factor Authentication. IEEE Transactions on Network and Service Management, 17(2), 921–930.
  • Ossman, A., Youssef, A. M., & El-Sayed, H. (2018). Fiber Optic Communications Principles and Applications. Springer.
  • Stewart, J., & Terry, B. (2020). Network Design Fundamentals. McGraw-Hill Education.
  • Sun, X., Liu, Y., & Zhang, Z. (2021). Network Segmentation for Enhanced Security. Computers & Security, 113, 102520.
  • Zhao, H., Li, X., & Wang, J. (2021). Optimizing VPN Performance for Remote Workers. Journal of Network and Computer Applications, 181, 102927.
  • Zhou, W., Liu, K., & Wang, D. (2019). Data Privacy Compliance in Social Media Data Integration. Journal of Business Analytics, 2(4), 231–242.