Network infrastructure design for a banking corporation, Computer Networking

Assignment Help:
this is Our final year project where we have to create a network infrastructure design for a banking corporation for their new setup in Australia.for this we have to create network topology diagram for WAN network and Local branch Network with design specifications.we also have to mention the functional requirements and non-functional requirements of the system.
we have already submitted a report which examiner have rejected with objection on it.Now we want to have the same kind of report as the examiner has mentioned in his comments. which is given below


Overall Assessment:

•The report covers some of the unit/project aspects well and provides design alternatives and shows evidence of applying the theories learnt in project situation.

•However, the report in current state fails to meet certain requirements of the unit.

•Report may be accepted if the comments below are addressed and revisions carried out to the satisfaction of the examination board.


Planning Report :
For planning you have provided WBS and the Gantt Chart. Gantt chart is not readable which should be addressed. However WBS is good.

System Requirements Report:

System requirements are listed. See more comments in the report.

System Analysis Report:
You need to improve on this. You need to perform a good analysis on the system. You need to link identify problems with possible solution.

System Design Report:
In the network diagram you have addressed the security and the availability aspects. Further you can add on performance. VPN is a bit of a costly solution. It is always better to justify your design in terms of cost and the advantages.

Comments on overall quality of the report:

You have not fully covered the scope in your report. What you need to have in this report.
1. Requirement analysis of the project
2. Planning
3. Analysis
4. System design aspects
Your report has some quality information but needs restructuring.

This type of a report need to have following sections.

1. Cover page – with all the information about your group and the members
2. Abstract
3. Table of contents – this you have
4. If needed Table of figures
5. Table of tables
6. Introduction
7. Objective and motivation
8. Background
9. System requirements – functional non functional
10. Planning
11. System analysis – requirements, network and etc
12. System design
13. Risk and quality management
14. Conclusions
And you have added general information that we could find in the books. There are no references.
Please do not add empty tables for the report unless you need to show a template.
All the tables and figures should be numbered and named.
Please do not add links to documents such as Gantt chart. You need to add the diagrams to the document and should explain.
The links you have added are not working.
In your report you need to ensure consistency and clarity as well.
There are empty headers without content. Appendices should be at the end of the document.



Now we need a new clear project report as the examiner has mentioned in his comments.
please let me know if you need any more information


please reply me as soon as possible
My email address is




Related Discussions:- Network infrastructure design for a banking corporation

Illustrate about rsa encryption, Q. Illustrate about RSA Encryption? R...

Q. Illustrate about RSA Encryption? RSA Encryption - Public key encryption technique - Encryption steps: - Encode data to be encrypted as a number to create the pla

Explain about domain name system, Q. Explain about Domain Name System? ...

Q. Explain about Domain Name System? -In the past, mapping of IP addresses was static using a host file -Impossible in today's dynamic environment -Domain Name System (DN

Explain classification of computer network by range, Question 1 Explain cl...

Question 1 Explain classification of computer Network by range Question 2 Explain three major problems of Transmission lines Question 3 What is the maximum data rate of

Internet mail access protocol - application layer, Internet  Mail Access P...

Internet  Mail Access Protocol Another  mail access  protocols  is internet  mail access  protocols  version 4 (  IMAP4). IMAP4 is  similar to POP3 but it  has more  feature

Security goals confidentiality- integrity- digital signature, Question 1   ...

Question 1   This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not

What are the call routers, What are the Call routers Call routers A, B,...

What are the Call routers Call routers A, B, C, D, and E. There are ten potential lines: AB, AC, AD, AE, BC, BD, BE, CD, CE, and DE. Each of these lines has four possibilities

Determine the advantages of fast ethernet, Fast Ethernet Operates a...

Fast Ethernet Operates at 100 Mbps faster speeds required for image processing, CAD, real-time audio and video No change in frame addressing, format or access method

Determine the load and throughput in slotted aloha system, In slotted Aloha...

In slotted Aloha system, it has been measured that 70% of slots are occupied by frames (i.e. the remaining slots are empty).  a)  How many frames need to be transmitted, on aver

Command to show the hardware platform information, Recognize the command to...

Recognize the command to show the hardware platform information Ans) Show version is the command to show the hardware platform information

Bit stuffing, bit stuffing program in python

bit stuffing program in python

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd