Make your own free website on

Capella University CollegeNET
Integrated Action Learning Project - UNIT 5

Unit 5 - TS4991

Christine Pena
Implementation of a Network Plan for Miami-Dade College
Unit 5: 01/27/05 to 02/03/05


Task1: Meet with Network administrators and develop a strategy for implementation of the new infrastructure. Review campus equipment. Evaluate our current equipment standings and host/traffic requirements.

Task 2: Schedule meetings with the staff who will be involved in the project implementation and organize the documentation and role that each will fulfill. Discuss new ideas, brainstorm, and exchange ideas to create a new better vision, and develop new goals and plans. Meet with the chairperson of CIS, Engineering, and CNS Department for progress report. Send notifications via e-mail for the third meeting.

1.I have met with Network Administrators of all Departments, and developed a strategy for implementing a new infrastructure, and redesign of the network in all campuses. We have reviewed all paperwork that has been discussed in the meeting and collected all information from it concerning the new systems in all campuses, including the planned changes and updates to hardware and software. The political issues about the security and policy concerned have been addressed college-wide and, where necessary, on an individual case by case basis. We have been reviewing the equipment that the campuses need, and after thorough analysis and discussion have decided on the equipment, the network administrators for developing an infrastructure, the design based on the host/traffic requirements, and the testing of the proposals. We begin to use some goals for implementing the new plan. [Completed]

2.After the scheduled meetings with the staff who are involved, I organized the documentation. After discussing new ideas, I have created a new better vision and developed new goals and plans which we have begun to use as mentioned above. I have met with the chairperson of CIS, Engineering, and CNS Departments and demonstrated the progress report. Once the documentation was completed and the new ideas were discussed, and all have agreed with the new report, I have sent via e-mail all pertinent information from the meetings and scheduled the anticipated next meeting.[Completed]

3.Major accomplishments:

The progress is going as scheduled. The committee is satisfied with the new implementation, and the goals will play an important role in the development of the plan with acting new strategies for it. All tasks has been completed successfully.


We have made the decision to begin to change the hardware and software. The network has been redesigned with the new and latest technology as mentioned above. The design of the network physical architecture and logical infrastructure has been very productive and imperative to complete rapidly.

Also, we have discussed the network's policies, security, performance, capacity and fault tolerance for all campuses and the impact of the new technology on the college and the surrounding community. Also of vital importance we have covered the new network's long range, large scale scalability ascertaining that it can grow into the future as the needs of the campuses, the community, and the Internet portal increase the total hosts and per host traffic demands.

After discussing the above decisions, we have also included another decision which is the overall testing strategy for the network in all phases from policies and security to capacity, fault tolerance and recoverability.[Completed]


[Answer all questions below.]

1) What helpful feedback did you get in the class (instructor, classmates) and outside the class (user, stakeholder, beneficiary, mentor, expert advisor, others)? What did you learn from this feedback?

The feedback received from all staff is continual and important, because if we ever encounter problems during our implementation, we can act immediately and solve the problem. Also, the security of our network has been an experience which I have never encountered, and I will always remember the knowledge gained from this effort and be able to apply it in other places.

2) What resources did you use this week (e.g., people, money, equipment, systems, or software)? Did you add new resources? What was your learning?

MS Word, the Internet, all equipment, tools and testing/troubleshooting devices used for changing the network of all campuses.The security test in our network is justifying this large scale project in that it has demonstrated a superior infrastructure over the former which has many vulnerabilities. The result will be a more secure and, as important, an easier to manage network security for our benefit and for all campuses benefit.

3) What research did you perform this week that was assisting and/or literature based? What is your findings/learning?

Syngress Media, Inc. (2002). Windows 2000 Network Administration, Berkley, CA: Osborne-McGraw-Hill It explains procedures, administration, monitoring, and maintaining the network environment.Fratto, Mike (2003, December 19). The 2004 Security Survivorís Guide.;jsessionid=D4H3OTMFM3FMQSNDBCCKHQ?articleId=17000382&printableArticle=true

This article discusses the new security products and develops methods for finding the right combination of them. It develops a sound patching strategy that can be implemented and maintained effectively. It emphasizes that security plans must never get in the way of the companyís business needs. The article helps in the selectinon of the best protection systems both hardware and software and their combinations that can be used for the network.

In his article, "Security Survivor's Guide," Mike Fratto provides more concepts and guidance for preventing the conflicts and mismatches during the installation of the firewalls. He covers the details of how to install and configure the systems and how to effectively stop the attacks from intruders. This is vauable information because quite often the vendors do not provide sufficient details in the documentation of their products concerning the details necessary to take full advantage of their features especially concerning particular implementation scenarios and vendors alomst never provide the details of how to interface their products with competitors products. Moreover, the author develops a superior methodology with which to comprehend security technology and how we need to apply it in our implementations, accordingly to the specific scenario.

Another important point, is the multiple and varied agents that we need to install in our systems such as firewalls, antivirus packages, VPN, host ID's and interoperability issues where all these are working in proper function with no interruptions or failures. Also, the article discusses how we need to implement all these products and the necessary approach concerning the VPN, and how robust it will be in our system. In other words, the author is teaching solutions from which we can select during the implementation according to our needs.

Finally,I have learned more about security, what products I need to buy for improved security and maintenance as well as how to implement long range security auditing programs for maintaining and monitoring the network's protection against external and internal hackers, malicious code, and future vulnerabilities. Firewalls are very important inasmuch as they are tools that when properly understood and implemented can prevent and control intrusion. But they cannot necessarily control internal intruders unless this is anticipated from the beginning. The firewall alone is also inadequate in defending the overall integrity of the network information system against malicious code and cannot provide any defense against weaknesses and exploits that are discovered in the future.

4) What did you learn this week in general in producing your project?

I learned that it is better to work completely within the framework of the team, because when I encountered some problems I could solve them faster than if I work alone. It was a very effective process in which specific problems were resolved while I was learning how to resolve them. Also, I have learned more about how to effectively deploy firewall technology, and audit the security vulnerabilities that our campuses have had during the past years, and to see how the network's security can be improved based on anticipated threats, superior design, thorough understanding of security at all levels and the deployment of a long term security auditing strategy and the training of a computer incident response team capable of finding and correcting unexpected situations as they occur.


[Answer all questions below.]

1) What went well this week? What didnít?

All of our tasks have been really working properly, as we anticipated. The best part has been the measurement of the current network vulnerability, and how to implement a multifaceted global network security architecture, infrastructure, and strategy.

2) How well did you stick to your project schedule?

I have encountered no major obstacles during this week. The schedule is going ahead.

3) How prepared are you to conclude your project in Unit 10 as required in this course?

I think that it will conclude as required, and on schedule, with no delays from any administrative department, everything has been approved in a timely manner.

4) How likely is it that you will need to resort to your contingency plan?

I expect that I will not need to resort my contingency plan. I think that I could complete it according my project plan, including the potential network security vulnerabilities primarily due to the fact that the college has recommended and approved a permanent computer incident response team to be retained after the project is complete.

Copyright (C) 2004 Christine Pena ALL RIGHTS RESERVED