Develop an architectural internetworking design

Assignment Help Computer Network Security
Reference no: EM132202592

Assessment - Network requirement analysis and plan

Purpose of the assessment (with ULO Mapping)

This assignment is designed to assess students' knowledge and skills related to the following learning outcomes:

b. Explain human factors in achieving business and technical goals through planning and design.
c. Investigate and develop an architectural internetworking design for the business and application domains.

Assignment Overview of Internetworking

A case study entitled "Chase Grammar School Accelerates Learning with BYOD" is uploaded with the assignment 1 folder, and the link for the case study is provided as an appendix. Based on the case study, Leo Li, Director for Administrator at the school, is highly concerned with the reliable, high- speed internet connection whether wired or wireless. He thinks that pupils are digital natives and they thrive in the multi-media environment. He further adds that one cannot underestimate the importance of rich and varied contents in the landscape that internet provides.

The case study focusses on the wireless solution and installation of additional wireless access points. As a result, the current throughput rate is recorded as 51 Mbps compared to a patchy 20 Mbps before. All seems good with the Chase Grammar School's network at the moment. However, there has not been any updates and upgrades on the existing wired infrastructure.

In addition to the wireless infrastructure, you as a network consultant strongly believe that the network experience of the end users at the school could have been further enhanced with the updating and upgrading of the current sluggish wired infrastructure. You tentatively figured out that with the proper upgrade of the wired network the throughput could go up to 90 - 100 Mbps.

Based on your understanding of the case study prepare a report on the proposed wired and wireless network design for Chase Grammar School. The report on the proposed design should have the following contents.
• Project scope
• Challenges
• User-centric design concept
• Project hardware requirements
• Network design in netsim
• Outcomes
• Limitations
• Conclusion
• Demonstration (snapshots of ping connectivity is preferable)
• IEEE referencing style

While designing the wired and the wireless network, please consider Chase Grammar School has six departments, namely, Admin, Academic, Human Resource (HR), Finance, IT support and Sports.

Attachment:- CaseStudy ChaseGrammar.rar

Verified Expert

The network is designed according to the requirement of the chase grammar school. The routers and switches are configured to achieve the bandwidth required by the user, the routing protocol is also very important issue which we need to take care, in this case , RIP(Routing information protocol) is used.

Reference no: EM132202592

Questions Cloud

Why is ethics important in the health care industry : Why is ethics important in the health care industry? Provide an example of a situation in healthcare that could be considered unethical.
Weighted average implied by two outstanding debt issues : Assume that the overall cost of debt is the weighted average implied by two outstanding debt issues. What is the company’s wacc?
The importance of traditions in all cultures : Describe your favourite family tradition. (Ukrainian Christmas) Do you know why this practice is important to this culture?
Modular arrangement with marge stevens : The office is beautiful. You work in a modular arrangement with Marge Stevens, administrative assistant in purchasing,
Develop an architectural internetworking design : MN503 - Overview of Internetworking - Explain human factors in achieving business and technical goals through planning and design
Explain and integrate some code into your recycling machine : Create an activity chart which describes the behaviour of the Recycling Machine system - Design and model two classes:RecyclableItemand RecyclingMachine
Organization without the other two : Are innovation, creativity, and sustainability related? Explain.
Eliminating the use of paper in the workplace : Technology is slowly eliminating the use of paper in the workplace. What are some examples where applications have moved us from a paper free workplace?
How can the company overcome this resistance : Should the company go ahead with the move to Mexico or try one more time to work things out in the Oconomo facility?

Reviews

len2202592

12/26/2018 12:31:10 AM

Submission Guidelines All work must be submitted on Moodle by the due date along with a Title Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2202592

12/26/2018 12:29:54 AM

Network Design in Netsim You must not use packet tracer. Screen capture of Netsim design. Write justification for the selected network design. 7 Outcomes Write at least 2 outcomes of the network 2 Limitations Write limitations of the hardware devices used in your design. 2 Conclusions Write a clear conclusion of the case study. 2 Demonstration Demonstrate to your instructor during Week-7 lab the detailed network design on Netsim, with justifications explained. 10 Reference style Follow IEEE reference style 5 Total SO

len2202592

12/26/2018 12:29:44 AM

Section to be included in the report Description of the section Marks Project scope Outline of the report ( in 3-4 sentences) 2 Challenges Write at least 3 appropriate challenges you might face during network setup. 3 User-centric design concept The process to incorporate user-centric design concept in your design. S Project hardware requirements - Name of the network device with manufacturer's name, series, model, features and ports - Type of the cables - Name of the server, PC with specification such as operating system, RAM, hard disk etc. 8 2 2

Write a Review

Computer Network Security Questions & Answers

  Produce a literature review paper

To remain competitive, the company has a strategy to produce reviews covering state-of-the-art research in the field of Digital Forensics and Incident Response.

  How can one remove a rootkit from a computer

Explain in your words what a rootkits is, what harm it does, and why it is so difficult to remove and how can one remove a rootkit from a computer?

  Estimate the largest possible value of characters

Estimate the largest possible value of m if you use the fast exponentiation algorithm and find ab and to find the quotient and remainder when a is divided

  Discuss your experiences with cyber-bullying

Discuss your experiences with cyber-bullying - either a personal experience or one you know of from peers or the media.

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisements and describe an instance of a file that contain evidence of its own integrity and authenticity.

  Expected time to find all users passwords

Assume that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Describe your initial thoughts on the best advantage

Describe your initial thoughts on the best advantage over the other system's services they posted. Note any major similarities or differences your notice between the different services.

  Evaluate ability of different cloud computing architectures

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind etal, and the ASD Cloud Computing Security Considerations as your primary references.

  Define security infrastructure and protocols

The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust model assumed in SSL, and compare it with the trust model used in Kerberos.

  When did the bulk of the data get transmitted

When did the bulk of the data get transmitted? What caused this transmission spike? Were any ISP sites accessed? If so which ones? What accounts?

  Implement the s-box functionality as a class

Implement the cipher as a class which implements the provided interface.

  Ethics or values within the hacking subculture.

Write a 1-2 page essay defining and showing examples of hacking and its subculture. Do hackers have ethics or values? If so, give examples of ethics or values within the hacking subculture.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd