Define a roadmap process to transform the vpn architecture

Assignment Help Computer Networking
Reference no: EM132223430

Assignment - High level design for an SME network and VPN services

Learning Outcomes

The purpose of this assignment is to develop requirements and design a network which can be implemented with VPN services for an SME (small and medium sized enterprises). The design of network and service must be specific so that it can be used for a purpose of a quotation and proposal from vendors.

After the assignment, students are expected to learn not only the knowledge and current technical aspects of VPN but also research, data collection, analysis and writing skills, which are very important and help them for study. Students will be able to understand what aspects and contents are required for requirements too.

The following ULOs are covered;

– c. Develop architectural VPN designs for small, medium and large businesses and corporations
– d. Report on the health of the existing VPN architecture, solution, data, application, and technology
– e. Investigate and justify the appropriate design and solution for different organisations
– f. Analyse and report on the current and future state of the management of VPN infrastructure and its technologies
– g. Define a roadmap process to transform the VPN architecture to support long-term organisational goals
– h. Implement a process to support the administration and the management of VPN

Assignment Description

Tasks:

There are two parts to this assignment, i.e. part A and part B.

A. Investigate, design and develop a suitable VPN network for an SME by addressing the following criteria. See detailed instruction in the next section. 90 marks

B. Presentation 10 marks

Part A description:

There are two areas to consider for VPN network design in this assignment.
1. Design a network for an SME
2. Build VPN services for the users
Contents must include:
– Introduction
– Scopes and Limitations
– Requirements (Network parts and VPN service parts)
– Solution Design
a. Logical Design
b. Physical Design
c. Network Topologies
d. IP addressing
e. Security features and Policies
f. Redundancy and Failover plans
g. VPN service implementation
– Refer the sample document included in below for network design, and consider how to implement VPN services onto the network. Do not copy the contents of the sample in your work as it is regarded as plagiarism.

Part B description:

Prepare slides (between 10 - 15 slides) for presentation during the lab class. The solution of VPN services and network design shall be presented with 15 minutes for a group during week 11 Lab class. Presentation slides should be submitted in Moodle prior to the presentation for marking.

Attachment:- Assignment.rar

Verified Expert

In this assignment, I investigated, designed and developed an IPsec VPN for an SME. This was achieved by use following the following criteria:Designed a network for an SME in which I introduced the topic, presented scopes, limitations and requirements. Solution design was the main body of the assignment. Here, logical design, physical design network topologies security features, IP addressing and redundancy of the network are discussed. Finally, VPN service is implemented.

Reference no: EM132223430

Questions Cloud

Breakdowns over last four breakdowns in simulation run : Mayflower Manufacturing Company produces product on number of machines. What is average time between breakdowns over last four breakdowns in simulation run?
Conduct an appropriate research project : What skills are required to conduct an appropriate research project? What research skills are valuable for use in work environment?
Expected value approach to determine optimal strategy : Define and use the expected value approach to determine the optimal strategy.
Outsourcing agreements with firms with specialized services : Identify atleast two companies in different industries that have entered into outsourcing agreements with firms with specialized services.
Define a roadmap process to transform the vpn architecture : MN610 - Virtual Private Networks - Develop architectural VPN designs for small, medium and large businesses and corporations
Explain chose subject and why its exploring in humanities : HUMN 100 Final Project - In a 750-1200 word essay: Explain the subject you chose and why it's worth exploring in the Humanities
Regarding the recent financial crisis-government regulation : What is your perspective regarding the recent financial crisis and government regulation? Could more effective government regulation have prevented this crisis?
Strengths and weaknesses of xerox over the decade : What changes happened in the internal strengths and weaknesses of Xerox over the decade?
What do people and companies use facebook for : What do people and/or companies use Facebook for? Can you share different cultural usage in Europe, the Middle East, China and South America?

Reviews

len2223430

1/27/2019 10:32:45 PM

Criteria 5 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Criteria 6 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors End of Document

len2223430

1/27/2019 10:32:39 PM

Criteria 3 Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrated excellent ability to think critically but did not source reference material appropriately Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately Criteria 4 All elements are present and very well integrated. Components present with good cohesive Components present and mostly well integrated Most components present Proposal lacks structure.

len2223430

1/27/2019 10:32:28 PM

Example Marking Rubric for Assignment #: Total Marks 100 Note: The marking criteria varies for each assignment Marking Rubric Criteria/ Grades High Distinction (HD) [Excellent] >80% Distinction (D) [Very Good] 70%-80% Credits (C) [Good] 60%-70% Pass (P) [Satisfactory] 50%-60% Fail (N) [Unsatisfactory] <50% Criteria 1 Concise and specific to the project Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Criteria 2 Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrated excellent ability to think critically but did not source reference material appropriately Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately

len2223430

1/27/2019 10:32:23 PM

VPN service configurations VPN services implemented and configured shall include screenshots with proper explanation and configurations 15 In body citation Strictly follow the order and instruction by IEEE. Check when/where to put the citation. See attached files and search the internet for guidelines 5 References section Check whether they follow the instruction. Otherwise, no marks will be provided 5 Presentation Presentation skills and materials quality 10 Total 100

len2223430

1/27/2019 10:32:17 PM

Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Note: The marking criteria varies for each assignment Section to be included in the report Detailed Description of the Criteria Marks Template and format The document should include all necessary headings and contents to depict a VPN services and network design as per the example provided. 10 Requirements Multiple Figures and Tables need to be included to properly show the requirements development. There must be a section for ‘compliance’ check so that vendors can properly reply to the requirements. 20 Solutions This section should include proper headings and contents to propose a solution for a VPN network. Wireless LAN solution needs to be included. 35

Write a Review

Computer Networking Questions & Answers

  Implement network for an small and medium sized enterprise

ME504 - Advanced Networking - A thorough verification and evaluation analysis should be presented to meet he ULO mapping in the Unit Description

  Small amount of unused address

Note that there will be a small amount of unused address space when you have completed your subnetting.

  Write down a 2- to 3-page paper comparing and contrasting

write a 2- to 3-page paper comparing and contrasting switches routers and gateways. include the difference between a

  How will dns be handled for the second site

Describe new features of Windows Server 2012 that WAI can take advantages of. Will DHCP reservations be used for servers? DNS namespace design (e.g., domain name(s) chosen, split DNS for Internet/intranet, zones) How will DNS be handled for the ..

  Explain the networks fundamental characteristics

Explain the network's fundamental characteristics and components. Evaluate the current network topology

  Design a modern network for a private high school

You are required to design the network you would recommend and how it would be configured - Design a Modern Network for a Private High School.

  Relationship between business process modeling

What is the relationship between business process modeling, and software development (or systems procurement)?

  Can the given command sequence be used to change ip address

Can the following command sequence be used to change the IP address on an interface? Why or why not?

  Provide all specific details regarding packet information

Describe the need of encapsulation. Elaborately describe the process of encapsulation and creation of packets as a result of encapsulation. Analyze and provide all specific details regarding packet information, like headers or trailers

  Validity of de morgan''s theorem for three variables

It is the determination by means of a truth table the validity of De Morgan's Theorem for three variables.

  Asymmetrical digital subscriber line and wi-fi

Describe the specific modulation techniques that are used in a 56K modem, Asymmetrical Digital Subscriber Line, and Wi-Fi.

  Discuss the types of monitoring and alarms

Discuss the types of monitoring and alarms necessary in your configuration. Describe where each one is housed and how it is implemented

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd