Develop an architectural internetworking design

Assignment Help Computer Network Security
Reference no: EM132202592

Assessment - Network requirement analysis and plan

Purpose of the assessment (with ULO Mapping)

This assignment is designed to assess students' knowledge and skills related to the following learning outcomes:

b. Explain human factors in achieving business and technical goals through planning and design.
c. Investigate and develop an architectural internetworking design for the business and application domains.

Assignment Overview of Internetworking

A case study entitled "Chase Grammar School Accelerates Learning with BYOD" is uploaded with the assignment 1 folder, and the link for the case study is provided as an appendix. Based on the case study, Leo Li, Director for Administrator at the school, is highly concerned with the reliable, high- speed internet connection whether wired or wireless. He thinks that pupils are digital natives and they thrive in the multi-media environment. He further adds that one cannot underestimate the importance of rich and varied contents in the landscape that internet provides.

The case study focusses on the wireless solution and installation of additional wireless access points. As a result, the current throughput rate is recorded as 51 Mbps compared to a patchy 20 Mbps before. All seems good with the Chase Grammar School's network at the moment. However, there has not been any updates and upgrades on the existing wired infrastructure.

In addition to the wireless infrastructure, you as a network consultant strongly believe that the network experience of the end users at the school could have been further enhanced with the updating and upgrading of the current sluggish wired infrastructure. You tentatively figured out that with the proper upgrade of the wired network the throughput could go up to 90 - 100 Mbps.

Based on your understanding of the case study prepare a report on the proposed wired and wireless network design for Chase Grammar School. The report on the proposed design should have the following contents.
• Project scope
• Challenges
• User-centric design concept
• Project hardware requirements
• Network design in netsim
• Outcomes
• Limitations
• Conclusion
• Demonstration (snapshots of ping connectivity is preferable)
• IEEE referencing style

While designing the wired and the wireless network, please consider Chase Grammar School has six departments, namely, Admin, Academic, Human Resource (HR), Finance, IT support and Sports.

Attachment:- CaseStudy ChaseGrammar.rar

Verified Expert

The network is designed according to the requirement of the chase grammar school. The routers and switches are configured to achieve the bandwidth required by the user, the routing protocol is also very important issue which we need to take care, in this case , RIP(Routing information protocol) is used.

Reference no: EM132202592

Questions Cloud

Why is ethics important in the health care industry : Why is ethics important in the health care industry? Provide an example of a situation in healthcare that could be considered unethical.
Weighted average implied by two outstanding debt issues : Assume that the overall cost of debt is the weighted average implied by two outstanding debt issues. What is the company’s wacc?
The importance of traditions in all cultures : Describe your favourite family tradition. (Ukrainian Christmas) Do you know why this practice is important to this culture?
Modular arrangement with marge stevens : The office is beautiful. You work in a modular arrangement with Marge Stevens, administrative assistant in purchasing,
Develop an architectural internetworking design : MN503 - Overview of Internetworking - Explain human factors in achieving business and technical goals through planning and design
Explain and integrate some code into your recycling machine : Create an activity chart which describes the behaviour of the Recycling Machine system - Design and model two classes:RecyclableItemand RecyclingMachine
Organization without the other two : Are innovation, creativity, and sustainability related? Explain.
Eliminating the use of paper in the workplace : Technology is slowly eliminating the use of paper in the workplace. What are some examples where applications have moved us from a paper free workplace?
How can the company overcome this resistance : Should the company go ahead with the move to Mexico or try one more time to work things out in the Oconomo facility?

Reviews

len2202592

12/26/2018 12:31:10 AM

Submission Guidelines All work must be submitted on Moodle by the due date along with a Title Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2202592

12/26/2018 12:29:54 AM

Network Design in Netsim You must not use packet tracer. Screen capture of Netsim design. Write justification for the selected network design. 7 Outcomes Write at least 2 outcomes of the network 2 Limitations Write limitations of the hardware devices used in your design. 2 Conclusions Write a clear conclusion of the case study. 2 Demonstration Demonstrate to your instructor during Week-7 lab the detailed network design on Netsim, with justifications explained. 10 Reference style Follow IEEE reference style 5 Total SO

len2202592

12/26/2018 12:29:44 AM

Section to be included in the report Description of the section Marks Project scope Outline of the report ( in 3-4 sentences) 2 Challenges Write at least 3 appropriate challenges you might face during network setup. 3 User-centric design concept The process to incorporate user-centric design concept in your design. S Project hardware requirements - Name of the network device with manufacturer's name, series, model, features and ports - Type of the cables - Name of the server, PC with specification such as operating system, RAM, hard disk etc. 8 2 2

Write a Review

Computer Network Security Questions & Answers

  Network forensic data collection

Explain how the Silk Road case serves as an example of how to carry out network forensic data collection. Conduct research to find out how the FBI collected evidence and traced the owner of the Silk Road. Suggest alternate steps that you might hav..

  Expose the computers to virus and worms

Some hackers even try to expose the computers to virus and worms. Moreover these persons sometimes specially design worms to distribute in peer-to-peer networks only.

  Analyze the emerging security threats

Analyze the emerging security threats presented within the "Security Threat Report 2014" report.

  Explain the importance of standards organizations

A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security

  What rc4 key value will completely invert s

What RC4 key value will completely invert S after the initial permutation (so that S[0] = 255, S[1] = 254, ..., S[254] = 1, S[255] = 0)?  Show your work. (Explain how you got this.)

  Discuss recommendations on selecting a security modality

Write a 2-page article using Microsoft Word for publishing in the company newsletter on cyber security. Discuss Recommendation on selecting a security modality.

  What assets are important for you to protect

SIT 182 - Real World Practices for Cyber Security Assignment. You are the in-charge of Myki central sever at Melbourne. What assets important for you to protect

  What are some basic differences in the privacy rules

What are some basic differences in the privacy rules among the US, Asia and Europe? Do you believe they may be changed over time?

  Explain the most common forms of digital crime

Explain the most common forms of digital crime. Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.

  Describe policies standards processes and guidelines

Describe Policies, Standards, Processes and Guidelines. Discuss the relationship between Controls and Audits. The Sarbanes-Oxley Act. The different implications Regulations have on Government and non-Government entities.

  What do you use at home and what are your thoughts on it

What do you use at home and what are your thoughts on it? What defense/security features does it include?

  Cybersecurity research paper

Identifying and explaining how the breach occurred and identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd