Oral presentation on your logical network design

Assignment Help Computer Network Security
Reference no: EM131016951 , Length: 1900 Words + PPT

Please do the assignment carefully as it has Part A and Part B, there is a marking criteria for both A and B, make sure you will fulfill all of those.

General

The students should progressively develop their logical network design based on the scenario given in page 5 of this document. In this process, they are expected to participate in the weekly discussions and find the answers to the recommended discussion questions. Discussion questions have been selected and formulated not only to gradually increase the knowledge and skills of the students in this course but also to help them develop the logical network design. The students who do not attempt weekly discussion questions would very likely produce a logical network design that would not satisfy the requirements and/or that cannot be justified.

Part A

Objectives
In this part of Assessment Item 1, you will create and deliver an oral presentation on your logical network design. The scenario to be used for the logical network design is given in page 5. Please refer to the course profile to understand how this part of the assessment item relates to the course learning outcomes.

Requirements

All students
You are to demonstrate your technical as well as presentation skills by presenting your logical network design, and receive feedback from your peers and/or the tutor.

Students should deliver their presentations during the class time. The maximum duration for each presentation groupwill be 15 minutes, including 5 minutes to answer the questions and for discussion. This time frame will be strictly enforced due to time constraints.

Please note that the presentations must be completed on the scheduled day. If a student or a group does not present on the scheduled day, they will receive 0marks for Part A unless they have a valid reason supported by evidence such as a doctor's certificate.

Part A - Marking Criteria

1. Presentation structure:

a. Introduction

Introduce yourself (or your group) and the road map. Aim to engage your audience from the beginning of the presentation.

b.Body

Marks will be given for the quality of the content that you deliver.The content must explain your design.

c. Conclusion

Summarise the key points that you presented in the body.

2. Delivery

Do not read the fulltext, practice and keep to the time limit.

Use the time carefully without rushing at the end.

3. Coping with questions at the end of the presentation (the telephone interview for the distance students).

4. Presentation slides

Ensure that the slide contents are clearly

visible to entire audience and your slides are well-prepared and useful.

Use your slide effectively (i.e. integrated into the presentation).

Part B

Objectives

In this part of the Assessment Item1, you willcomplete your logical network design reportbased on the written and oral feedback that you received after your presentation in Part A. Please refer to the course profile to see how this part of the assessment item relates to the course learning outcomes.

Assessment Task

You are required to analyse the scenario given below and complete a logical design of the network. In Part A of Assessment item 1, you have presented your logical network design to the class. In Part B of the assessment item 1, you will improve your design based on the feedback that you received in Part A and complete your logical network design report. In order to undertake your design, you may need to make justifiable assumptions. You will need to include them in your report. The report must follow the Harvard citation and referencing guidelines.

You also need to upload the logical network design report. This report should include:

1. The list of requirements

2. The list of assumptions - Note: The assumptions are not the requirements that are provided in the task. They are the additionalrequirements that you may need for your design.

3. The logical network diagram(s)

4. The explanation of your logical network design

5. The justification of your logical network design

6. The model for addressing and naming

7. The list of routing and switching protocols

8. The list of security mechanisms

Note:Please do not include an executive summary, a table of contents, an introduction or a conclusion. Please see the marking guide.

The Scenario for Network Design Assessment Tasks

Your company in Australia specialises indesigning networks for local and international clients. They have won a contract to design a network for a project undertaken by a construction company in the Philippines.

This company in the Philippines is planning to construct a new hotel of an international hotel chain on a big island that is situated offshore of the main island. The hotel will have 5 floors and each floor will have 80 rooms. The company also has to create trails through the rainforests in this big island and three small surrounding islands. The terrains of all four islands are not easy to access and all four islands are currently uninhabited. The wildlife habitats of the islands are protected by the government, and except for the hotel and the trails, no other permanent or temporary building constructions are allowed.

The new hotel project also owns a coastal land on the main island. All four islands are 100-200km away from this coastal property and this is the shortest distance from these islands to any available Internet service.The main island has Long Term Evolution (LTE) and 200Mbps fibre optic connections. The big island can fit into a circle of 20km in radius and each small island can fit into a circle of 5km in radius. Each small island is less than 10km away from the seashore of the big island. The network design contract of your company includes the design of the network for the hotel on the big island and the Internet and phone serviceson all four islands. The tourists and hotel staff and tour guides should have Internet access and phone communication from anywhere on these islands to the rest of the world. The trails should have information posts that provide interactive maps and trails of the islands. The user should be able to find the shortest route to a location of interest using them. The surfers will be able to surf in the flagged area of 200m behind the hotel that runs 500m into the sea. However, this is an area known for shark attacks and the surfers should be provided with wireless communication devices to communicate with the lifeguards when required. The company in the Philippines require that the cost of Internet and phone services be minimum.

Using the top-down network design methodology that you learned in this course, design the required network. Each step of your design should clearly explain and justify how you satisfy the requirements.

Verified Expert

The solution file contain 1935 words for PART A solution which discussed about the network design of international hotel. This report explained about the requirements, assumptions, network design , security mechanism ,justification of network design and also explained about the network design. In APA format , the references included in the solution file. In PART A , prepared presentation which is based on network design.

Reference no: EM131016951

Questions Cloud

Derive the equations of motion for the system : Consider the mass M subject to periodic forcing P(t) = P sin ωt + ε sin ω2t, where ε is a small parameter. Derive the equations of motion for the system
Determine the rate of heat transfer to the device : A single moist air stream exits at 85°F, 1 atm, and 35% relative humidity. Determine the rate of heat transfer to the device, in Btu/min.
Determine for stream two the relative humidity : A single stream exits the mixing chamber at 66°F, 1 atm, and 60% relative humidity, with a volumetric flow rate of 1500 ft3/min. Determine for stream 2 the relative humidity.
Find mass flow rate of cooled water stream exiting tower : Atmospheric air enters at 1 atm with a dry-bulb temperature of 70°F and a wet-bulb temperature of 60°F. Saturated air exits at 110°F, 1 atm. Ignoring kinetic and potential energy effects, determine the mass flow rate of the cooled water stream exi..
Oral presentation on your logical network design : Oral presentation on your logical network design. The scenario to be used for the logical network design - You are to demonstrate your technical as well as presentation skills by presenting your logical network design
Determine the mass flow rate of the liquid stream entering : A fan located within the tower draws in atmospheric air at 17°C, 0.098 Pa, 60% relative humidity with a volumetric flow rate of 110 m3/min. Saturated air exits the tower at 30°C, 0.098 MPa. The power input to the fan is 8 kW. Ignoring kinetic an..
Modified cash bases of accounting : For this assignment please answer each of the following questions in a short paragraph: Explain the accrual, cash, and modified cash bases of accounting.
Payment of a loan to purchase a new car : Tiffany is trying to decide whether or not she can afford the monthly payment of a loan to purchase a new car. The car costs $19,600. She is considering a 5-year loan at 6% interest calculated using the declining balance method. Her monthly paymen..
Difference in mean prices of midrange homes : The Realtor assumes prices of midrange homes are normally distributed and the variance in prices in the two cities is about the same. What would he obtain for a 90% confidence interval for the difference in mean prices of midrange homes between P..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd