Network infrastructure design for a banking corporation, Computer Networking

Assignment Help:
this is Our final year project where we have to create a network infrastructure design for a banking corporation for their new setup in Australia.for this we have to create network topology diagram for WAN network and Local branch Network with design specifications.we also have to mention the functional requirements and non-functional requirements of the system.
we have already submitted a report which examiner have rejected with objection on it.Now we want to have the same kind of report as the examiner has mentioned in his comments. which is given below


Overall Assessment:

•The report covers some of the unit/project aspects well and provides design alternatives and shows evidence of applying the theories learnt in project situation.

•However, the report in current state fails to meet certain requirements of the unit.

•Report may be accepted if the comments below are addressed and revisions carried out to the satisfaction of the examination board.


Planning Report :
For planning you have provided WBS and the Gantt Chart. Gantt chart is not readable which should be addressed. However WBS is good.

System Requirements Report:

System requirements are listed. See more comments in the report.

System Analysis Report:
You need to improve on this. You need to perform a good analysis on the system. You need to link identify problems with possible solution.

System Design Report:
In the network diagram you have addressed the security and the availability aspects. Further you can add on performance. VPN is a bit of a costly solution. It is always better to justify your design in terms of cost and the advantages.

Comments on overall quality of the report:

You have not fully covered the scope in your report. What you need to have in this report.
1. Requirement analysis of the project
2. Planning
3. Analysis
4. System design aspects
Your report has some quality information but needs restructuring.

This type of a report need to have following sections.

1. Cover page – with all the information about your group and the members
2. Abstract
3. Table of contents – this you have
4. If needed Table of figures
5. Table of tables
6. Introduction
7. Objective and motivation
8. Background
9. System requirements – functional non functional
10. Planning
11. System analysis – requirements, network and etc
12. System design
13. Risk and quality management
14. Conclusions
And you have added general information that we could find in the books. There are no references.
Please do not add empty tables for the report unless you need to show a template.
All the tables and figures should be numbered and named.
Please do not add links to documents such as Gantt chart. You need to add the diagrams to the document and should explain.
The links you have added are not working.
In your report you need to ensure consistency and clarity as well.
There are empty headers without content. Appendices should be at the end of the document.



Now we need a new clear project report as the examiner has mentioned in his comments.
please let me know if you need any more information


please reply me as soon as possible
My email address is




Related Discussions:- Network infrastructure design for a banking corporation

Define the backbone networks, Q. Define the Backbone Networks? Backbon...

Q. Define the Backbone Networks? Backbone Networks - Allows several LANs to be connected - Non of station is directly connected to the backbone - Stations are part

Network, do you do paraphrase

do you do paraphrase

Root, Originally Linux/UNIX systems had one all-powerful user called root t...

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities c

Disadvantage of vpns - point to point , Disadvantage of VPNs The disad...

Disadvantage of VPNs The disadvantages of VPN  are related to implementation troubleshooting  trust and  internet  availability. a.Implementation  can be time consuming: Im

Determine the computing infrastructure, Determine the computing infrastruct...

Determine the computing infrastructure One solution for the protection of the computing infrastructure is to use digital certificate-based solutions. Users can be given access

Explain the bit-level encryption, Q. Explain the Bit-Level Encryption? ...

Q. Explain the Bit-Level Encryption? Bit-Level Encryption - Data is divided into blocks of bits then altered by encoding/decoding, permutation, substitution, exclusive OR

Characteristics of the user private group scheme, Question: a) The cpi...

Question: a) The cpio utility has three operating modes. What are they? b) The characters of the permission string are broken up into three groups of three characters. Ex

Comparing transport for tcp/ip and osi model, Q. Comparing Transport for TC...

Q. Comparing Transport for TCP/IP and osi model? - The features of TCP and UDP defined at TCP/IP Transport Layer correspond to many of the requirements of the OSI Transport Lay

Discuss about lan topologies, Discuss about LAN topologies LAN topolog...

Discuss about LAN topologies LAN topologies:   Network topology is a physical schematic that demonstrates interconnection of the many users. There are four fundamental topolog

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd