Apply concepts and theories of human factors

Assignment Help Computer Networking
Reference no: EM132219715

Network requirement analysis and plan

Purpose of the assessment (with ULO Mapping)

This assignment is designed to assess students' knowledge and skills related to the following learning outcomes:
a. Apply concepts and theories of human factors as related to network design and implementation;
b. Evaluate performance metrics and dimensions according to specifications.

Assignment Description

Project Scope: A typical network layout diagram of a medium sized firm is given below. Provided the advantages, the firm wants to redesign its network adapting a layered approach (core, distribution and access) in the design. The network design requirements are a) three layered network design (core, distribution and access) b) redundancy required in the core layer.

Gathering information about the existing network (such as IP addressing scheme, traffic restriction polices, applications used etc.) is paramount for any network redesign for seamless transition. In this regard, the staff members and IT staffs can be invaluable sources of information. A carefully designed questionnaire can be instrumental in gathering the information.

487_figure.jpg

Figure. Network layout of a firm

Part I: Information collection
Develop a questionnaire to gather requirements from staff members, IT members and management.

The followings are to be covered in this section.
- What kinds of questions would you ask to better understand their environment to each group of users?

- For the Quality of Service (QoS) requirements, it is mandatory to acquire the information about the traffic types from the IT staffs and set the bandwidth requirement accordingly. Specifically, for the new design the followings criteria have to be satisfied.
For real time traffic, bandwidth percent should be set to 70 of the available bandwidth. For ftp traffic, bandwidth should be set is 200 kbps.
For SNMP traffic, bandwidth should be set to 800 kbps.

Note that the traffic information is important and will be used for QoS. QoS reflects on the performance evaluation of the design.

- How would you validate and verify the gathered information?

Part II: Network redesign and Demonstration

This is a network redesign and demonstration section. The following are to be covered.
- A three-layered network design (consisting of the Core, Distribution and Access) is needed.
- The new design must be the transformation of the existing design show in the figure above (i.e., IP addressing, number of departments etc., should remain intact in the new design).

For demonstration, the format would be a) no more than 2 persons in a group, b) at least 3 viva voce questions related to the design, and c) demo and viva voce duration 5 - 7 minutes (at max). The following is to be covered.

- Demonstration of a part of the design in Week 11 lab class (hardware platform)

Note to the lab tutor: As per the need, the lab tutor can allocate 15 minutes in Week 9 and Week 10 for work progression check and consultation.

Reference no: EM132219715

Questions Cloud

Is the the dominant religion connected to privilege : For those of you who are from another country or familiar with religious practices and privilege in other countries.
How would you incorporate concept of total safety management : As an OSH employee at Machines Unlimited, you are tasked with the supervision of over 200 employees, numerous machinery, and a hotter than average working.
Strategic responsibility of supply chain management : Which is a NOT a strategic responsibility of supply chain management? The Supply Chain process is a subset of the Operations business process.
How would you prioritize training when selecting practicum : How would you prioritize training, location, and population when selecting practicum and your personal career plan?
Apply concepts and theories of human factors : MN621 - Network requirement analysis and plan - Melbourne institute of technology - Apply concepts and theories of human factors as related to network design
Explain the different theories of ethical thought : This week introduces you to different theories of ethical thought and five theories of social responsibility. Define the concept of ethics.
Demonstrate engagement skills : Demonstrates engagement skills. You take on the role of the social worker, while a friend, family member, or colleague takes on the role of the client.
What is the definition of aggregate supply : What is the definition of aggregate supply and aggregate demand?
What are some of the unintended consequences : You identified some interesting policies in your post; what suggestions do you have to improve or revise these policies?

Reviews

len2219715

1/20/2019 11:25:19 PM

Demonstration Logic is clear Consistent Mostly Adequate Argument is (10) and easy to logic and consistent cohesion and confused and follow with convincing logic conviction disjointed strong convincing arguments IEEE Reference Clear styles Clear Generally Sometimes Lacks style with excellent referencing good clear consistency (5) source of style referencing referencing with many references style style errors

len2219715

1/20/2019 11:25:11 PM

Evaluation i.e., Demonstrated Demonstrated Demonstrated Demonstrated Did not validation and excellent excellent an average an average demonstrate verification of the questionnaire (5) ability to think critically and sourced reference ability to think critically but did not source material ability to think critically and sourced reference ability to think critically but did not sourced the ability to think critically and did not material appropriately material reference sourced appropriately appropriately material reference appropriately material appropriately Network All elements Components Components Most Lacks design and its applications (10) are present and very well integrated present with good cohesion presented and mostly well integrated components present and an average components and not integrated integration well

len2219715

1/20/2019 11:25:00 PM

Grades HD 80% and above D 70 - 79% CR 60 - 69% P 50 - 59% Fail <50% Questionnaire prepared (10) Concise and specific to the project Topics relevant and soundly analysed Generally relevant and analysed Some relevance and briefly presented Not relevant to the assignment topic Questionnaire purpose (10) Demonstrated excellent ability to think critically and sourced reference Demonstrated excellent ability to think critically but did not source material appropriately Demonstrated an average ability to think critically and sourced reference Demonstrated an average ability to think critically but did not sourced reference Did not demonstrate the ability to think critically and did not sourced

len2219715

1/20/2019 11:24:39 PM

Validation and Verification plan Is there a plan to verify the gathered requirements from various stakeholders? 5 Network design with proper explanation and justification A clear network design (use netsim only) and proper labelling 10 Demonstration Demonstration of the part of the network in hardware platform in lab • Work progression record and consultation will be on week 9 and 10 by the lab tutor. • Demonstration of a part of the design in Week 11 lab (hardware platform) Demonstration marks will be awarded in regards to the stage of the completion of the demo and viva. 10

len2219715

1/20/2019 11:24:32 PM

Section to be included in the report Description of the section Marks Questionnaire prepared Are question prepared for: • Users • Management • IT staffs 10 Purpose of each question Are questions valid for gathering the information from stakeholders? 10

len2219715

1/20/2019 11:24:08 PM

Due Date Week 11, 1, 11:55 PM, submit individual report on Moodle, demonstration of part of a design in hardware lab Week 11. Submission Guidelines • All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  How to evaluate a hash

We have been handed a file that contains a bunch of encoded text or hashed passwords and we need get these back into a readable plain text format. Some answers are text strings and others are the passwords that we will need to complete our investi..

  Define the elements of an information security plan

Identify, define, and describe the three or four most important elements of an Information Security Plan. Be sure to identify and support why your selected elements are the most important

  What are the two main types of acls in cisco

What are the two main types of ACLs in Cisco - Name two types of network devices that an ACL can be applied to.

  Network design and analysis

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 250,000 volunteers with a goal of creating a set of publicly accessible databases wit..

  Create a new topic and report any observations you make

Create a new topic and report any observations you make about the sort of information you see in the output of the packet stream. Save your capture and post the .pcap file with your conference response.

  Explain all potential security threats on personal computer

Computer security is not the issue for organizations alone. Anyone whose personal computer is connected to the network or Internet faces the potential risk of attack.

  Convert the given octet to decimal

Convert the following 8-bit binary number to decimal: 10010011

  Calculate the value of qqi for each of the qqic values

Calculate the value of QQI for each of the following QQIC values. Calculate the value of maximum response delay for each of the following maximum response.

  Explain the networks fundamental characteristics and

write a 2- to 4-page paper that includes the following based on your organizationmiddot explain the networks

  Why do we need care-of address

Calculate the Sum, Wrapped Sum and Checksum from the following header values. a. Version number = 4, Header Length = 12, Service Type = 0, Total Length = 28 b. Identification = 56781, Flags = reset, Fragmentation offset = 0

  Explanation of the planning and designing of network

detail explanation of the planning and designing of network. It is recommended that bullet points are included whenever necessary

  Define throughput in regards to wireless network

Define throughput in regards to wireless network and use a practical method to measure throughput of a wireless network? You should provide any appropriate screenshots.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd