Discuss network designs, Computer Networking

Assignment Help:

This assignment will assess parts of objectives 2-6 from the subject outline:

1 Explain the principles of logical design

2 Discuss the strengths and weaknesses of various network designs

3 Demonstrate an understanding of network design by presenting their own designs

4 Share and promote own design by means of written communication

The assignment will focus on parts of the following topics from the subject outline:

1 Requirements Analysis

2 Flow Analysis

3 Design Taxonomy

4 Network Management

5 Network Security

6 Routing and Addressing

7 Technology Choices

You have completed the requirements analysis and the flow analysis for the departmental network infrastructure (Assignment 1). You are now ready for the architectural design for the entire network of the department.

This is a group assignment. It is to be completed in groups of three. The Requirements Analysis and

Flow Analysis completed previously should be used as a starting point for this project. This detail may be updated based on collaboration within the group, or based on other information which may have been made available. Your design should be based on your agreed set of requirements within your group.

Your task as the Network Engineering team within the IT group is to provide the logical and physical design, and have it approved by the review committee of the department.

You are to deliver a logical and physical design. The logical design is to include:

1. IP addressing scheme based on RFC1918 addressing,

2. Network and systems management and monitoring design,

3. Routing protocol design,

4. HA design - you need to propose a reasonable network availability SLA which will form the basis of your HA design,

5. WAN connectivity design

6. Security design for the network,

7. Performance design.

The physical design needs to show physical device connectivity for devices within the departmental network. You are not required to specifically identify product types, models or specifications.

Likewise, application hosts and workstations need not be specified, however IP addressing needs to be accommodated in the data centres for up to 100 servers.

The network design needs to accommodate all Australian departmental facilities as described in

Assignment 1. Your network design also needs to include security components, such as firewalls at the various departmental network boundaries; however, your design should not be limited to firewall functionality only.

All other connectivity is as defined in the earlier brief.

Your design needs to identify the management requirements for this type of network. You are to identify the traffic flows for management, and the management requirements.

Your management design also needs to include management systems software and hardware, including the minimum required snmp MIBs.


Related Discussions:- Discuss network designs

Connection to packet switches, CONNECTION TO PACKET SWITCHES:  A packe...

CONNECTION TO PACKET SWITCHES:  A packet switch many join to devices and to other packet switches. But the speeds are different in both parts. There are typically high-speed j

Distinguish between flow control and congestion control, Question: (a) ...

Question: (a) Distinguish between Flow Control and Congestion Control. (b) Explain clearly how a URL is resolved by a computer. (c) List one application that uses TCP

Processor arrangements-array, Processor Arrangements It is a very frequ...

Processor Arrangements It is a very frequent event in data parallel programming to group a number of processors to perform definite tasks. To reach this goal, HPF gives a direc

Explain about twisted-pair cable, Q. Explain about Twisted-Pair Cable? ...

Q. Explain about Twisted-Pair Cable? - Two conductors surrounded by insulating material - One wire utilize to carry signals and other used as a ground reference - Twistin

Determine the signal bandwidth and the amplitudes, 1. A low voltage digital...

1. A low voltage digital device has a low state of 0 V and a high state of 1.8 V. It generates a signal train of high pulses at a rate of 1 MHz, these pulses having a 10 ns width a

Install, how to install xp via network

how to install xp via network

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

State about the communications network, State about the communications netw...

State about the communications network 1) The communications network may only accept blocks of data up to a specific size.   (2) Error control might be more effective with a

Explain in brief about crc, What is CRC The CRC is computed while trans...

What is CRC The CRC is computed while transmission and appended to output stream as soon as last bit goes out onto wire. If the CRC were in header, it will be necessary to make

What is telnet, What is Telnet It is a protocol or set of rules that us...

What is Telnet It is a protocol or set of rules that uses to connect one computer to another computer in network. It is also called as a remote login. The telnet operates on cl

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd