Creating a proposal to upgrade the network architecture

Assignment Help Computer Network Security
Reference no: EM133871781 , Length: word count:1500

Introduction to Information Networks

Task

This assessment is to be completed individually. In this assessment, you will write a report and create a network architecture proposal for the organisation

Assessment Description
You are a network engineer tasked with creating a proposal to upgrade the network architecture for the organisation UniversityNet. Your proposal should address the current challenges faced by the company and provide solutions to improve their network performance, reliability, and security. Get online assignment help in the USA!
Please refer to the case study below for more detailed information.

Case Study:
UniversityNet is a growing tech startup that specialises in building online learning platforms for schools and universities. The organisation has 50 employees who work remotely from various locations around the world. The organisation's current network infrastructure consists of a router, two switches, and 50 laptops. Each laptop is connected to the switches via Ethernet cables, and the switches are connected to the router. The router is connected to a fibre optic internet connection that provides 100 Mbps download and upload speed. The organisation's online learning platform is hosted on a cloud server.

The organisation has recently experienced network performance issues, including slow download and upload speeds, dropped connections, and difficulty accessing cloud-based applications. The company has also expressed concerns about network security and wants to ensure that their network infrastructure is secure and reliable.

Your task is to analyse the current network infrastructure and propose a solution that addresses the identified problems and improves the network performance, reliability, and security. Your proposal should include a network diagram, a description of the proposed network architecture, a list of recommended hardware and software components, and a cost estimate.

Learning outcome 1: Describe the main technologies, models and protocols used in data communications and networking.

Learning outcome 2: Identify problems that emerge among the networks that constitute today's internet architecture.

Learning outcome 3: Describe solutions for common internet architecture problems.

Assessment Instructions
Your report should be submitted in Word Document or PDF format and be approximately 1500 words in length.
Conduct research on network architecture principles and protocols that are appropriate for UniversityNet organisation's needs.
Analyse the current network infrastructure and identify the problems and limitations.
Develop a proposal that addresses the identified issues and proposes solutions for improving network performance, reliability, and security. The proposal should include a network diagram, a description of the proposed network architecture, a list of recommended hardware and software components, and a cost estimate.
Prepare a technical report that outlines your proposal, including the analysis, the proposed network architecture, and the cost estimate. The report should be engaging and provide clear explanations of the proposed solutions.
Your report should include a minimum of six (6) academic references from credible sources, such as peer-reviewed journal articles, industry reports, or academic books. These references should be cited using KBS Harvard referencing style.

Reference no: EM133871781

Questions Cloud

What you see as essential for effective disaster preparation : Based on your readings on emergency preparedness and disaster planning, what do you see as essential for effective disaster preparation and management?
Which wont open the door to white house for stephen douglas : Explain the significance of the three keys which won't open the door to the White House for Stephen Douglas.
What are effective strategy for adapting rhythmic activities : What are some effective strategies for adapting rhythmic activities for diverse learners? Share an example of an adaptation you think would be beneficial.
What additional assessments would be important to rule out : What additional assessments would be important to rule out medical causes of Mr. T.'s anxiety symptoms?
Creating a proposal to upgrade the network architecture : Creating a proposal to upgrade the network architecture for the organisation UniversityNet. Your proposal should address the current challenges
Explain the legacies of the 19th century imperialism : Explain the legacies of the 19th century imperialism.
Identify and articulate the main challenges or issues faced : Critically evaluate and apply practices, polices and standards to analyze the Information Systems Data Governance or Security Governance of an organization
How do you think integrating abcs and glasgow coma scale : How do you think integrating both the ABCs and the Glasgow Coma Scale enhances the accuracy of assessing an unconscious patient's condition?
Discuss the major issues that led to world war 1 : Discuss the major issues that led to World War 1.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd