Discuss network designs, Computer Networking

Assignment Help:

This assignment will assess parts of objectives 2-6 from the subject outline:

1 Explain the principles of logical design

2 Discuss the strengths and weaknesses of various network designs

3 Demonstrate an understanding of network design by presenting their own designs

4 Share and promote own design by means of written communication

The assignment will focus on parts of the following topics from the subject outline:

1 Requirements Analysis

2 Flow Analysis

3 Design Taxonomy

4 Network Management

5 Network Security

6 Routing and Addressing

7 Technology Choices

You have completed the requirements analysis and the flow analysis for the departmental network infrastructure (Assignment 1). You are now ready for the architectural design for the entire network of the department.

This is a group assignment. It is to be completed in groups of three. The Requirements Analysis and

Flow Analysis completed previously should be used as a starting point for this project. This detail may be updated based on collaboration within the group, or based on other information which may have been made available. Your design should be based on your agreed set of requirements within your group.

Your task as the Network Engineering team within the IT group is to provide the logical and physical design, and have it approved by the review committee of the department.

You are to deliver a logical and physical design. The logical design is to include:

1. IP addressing scheme based on RFC1918 addressing,

2. Network and systems management and monitoring design,

3. Routing protocol design,

4. HA design - you need to propose a reasonable network availability SLA which will form the basis of your HA design,

5. WAN connectivity design

6. Security design for the network,

7. Performance design.

The physical design needs to show physical device connectivity for devices within the departmental network. You are not required to specifically identify product types, models or specifications.

Likewise, application hosts and workstations need not be specified, however IP addressing needs to be accommodated in the data centres for up to 100 servers.

The network design needs to accommodate all Australian departmental facilities as described in

Assignment 1. Your network design also needs to include security components, such as firewalls at the various departmental network boundaries; however, your design should not be limited to firewall functionality only.

All other connectivity is as defined in the earlier brief.

Your design needs to identify the management requirements for this type of network. You are to identify the traffic flows for management, and the management requirements.

Your management design also needs to include management systems software and hardware, including the minimum required snmp MIBs.


Related Discussions:- Discuss network designs

Explain the two modes of ip security, Question 1 Describe the architecture...

Question 1 Describe the architecture and usage of ISDN Question 2 Write about different network structures in use Question 3 Explain the concept of framing in Data Li

What is fcs, FCS= Frame Check Sequence CRC (Cyclic Redundancy Check) alg...

FCS= Frame Check Sequence CRC (Cyclic Redundancy Check) algorithm runs in switch that known as FCS (Frame Check Sequence)

What are called fat clients and fat servers, What are called Fat clients an...

What are called Fat clients and Fat servers? If the bulk of the application runs on the Client side, then it is Fat clients. It is used for decision support and personal softwa

Explain categorization according to pipeline configuration, Categorization ...

Categorization according to pipeline configuration According to the configuration of a pipeline, the below categories are recognized under this classification: Unifunct

Roles of host system, Q.Role of Host System? Hosts on OSI implementatio...

Q.Role of Host System? Hosts on OSI implementations don't handle network operations (simple terminal) but TCP/IP hosts participate in most network protocols. TCP/IP hosts do su

Categories of networks, Distance covered, Based on size, ownership and phys...

Distance covered, Based on size, ownership and physical architecture - LAN (Local Area Network) - Suitable for smaller geographical area - MAN (Metropolitan Area Network) - S

Define about the term - hackers, Define about the term - hackers Every ...

Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are

What are the two types of transmission technologies, What are the two types...

What are the two types of Transmission technologies, basis on which computer networks can be categorized? Broadly there are two types of transmission technology: 1. Broadc

Barters, What is a OSI layer 2 device called a "barter"?

What is a OSI layer 2 device called a "barter"?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd