Demonstrate in-depth knowledge of system engineering

Assignment Help Computer Network Security
Reference no: EM132509129

ME503 - Telecommunication System Engineering - Melbourne Institute of Technology

Understanding the fundamental systems engineering principles and their applications in telecommunication systems.

Learning Outcome 1: Demonstrate in-depth knowledge of system engineering and understand how to make a system more reliable and efficient;

Learning Outcome 2: Acquire in-depth technical knowledge of signalling, switching and call routing in Public Switched Telephone Network (PSTN) and population queuing models;

Learning Outcome 3: Obtain conceptual knowledge and understanding of system reliability, maintainability, costing and design for affordability and human factors;

Part 1A: PBX and Reflective Journal

Problem 1: Advancement on Private Branch Exchange (PBX)

The majority of modern organisations are using Private Branch Exchange (PBX) system for internal communications. By the introduction of Voice over Internet Protocol (VoIP) technology and cloud network, there are significate changes in PBX system. In this context, prepare a report including the following sections:

a) Evolution of PBX
b) Comprehensive analysis of current and emerging PBX systems in terms of reliability.
c) Architecture of PBX systems.
d) Compare and contrast different PBX systems in terms of costing

Problem 2: (Reflective Journal Week 1 to 2)

Every student has to watch at least one video weekly video (available on the Moodle every week) relating to the topic for the week and write reflective journal weekly from week one (1) to three (2).

The purpose of this assignment is to identify new learning, self-realization and plan for improvement. Students will have an opportunity to explore the use of the online tools (e.g., online blogs) to record and reflect on their learning in different ways. Students are required to:

• Record the development of their ideas or insights.
• Reflect upon the unit content and personal experiences.

• Analyse their own learning and self-development.
• Plan to improve on identified strengths and weaknesses.

Students are required to explore situations from a personal perspective, and/or based on previous learning/industry experience. They may use the DEEP method to reflective writing. The four steps in this method are:

• D - Describe experience (past or present)
• E - Explore or consolidate new learning
• E - Evaluate/analyse/self-reaction
• P - Plan future learning

Part 1B: NBN and Reflective Journal

Problem 3: High Seed Connectivity NBN and Reflective Journal

Access to the Internet has arguably become an essential service. However, the quality of the service varies widely in Australia. Multiple governments had promised and begun to deliver a high-speed connectivity throughout Australia via the National Broadband Network (NBN). Prepare a comprehensive report containing following points based on research findings and industry reports.

• NBN technology and its architecture
• NBN advantages and disadvantages associated.

• Compare NBN with the similar technology used in New Zealand. Your comparison should incorporate cost and marketing.

Problem 4: (Reflective Journal Week 3 to 5)

Every student has to watch at least one video weekly video (available on the moodle every week) relating to the topic for the week and write reflective journal weekly from week three (3) to five (5). The purpose of this assignment can be found at PART 1A, Problem 2.

Note: Need only Part 1A: PBX and Reflective Journal

Attachment:- Telecommunication System Engineering.rar

Reference no: EM132509129

Questions Cloud

Define step-by-step process of conducting dismissal meeting : Describe a step-by-step process of conducting the dismissal meeting. Determine the compensation that the fictitious company may provide to the separated.
Identify something might have changed during the process : Identify something you might have changed during this process. Choose an evaluation method described by Toseland & Rivas (2017) or London (2007)
Discuss Mason and Street formed an enforceable contract : Mr. Mason brings a claim for breach of contract against Ms. Street. Discuss whether Mr. Mason and Ms. Street formed an enforceable contract
Identify current business problem : You will identify a current business problem and justify the change needed. Explain how the rules of logic helped you determine your five arguments for change.
Demonstrate in-depth knowledge of system engineering : Demonstrate in-depth knowledge of system engineering and understand how to make a system more reliable and efficient and Obtain conceptual knowledge
Discuss impact of leadership style on staff versus clients : Discuss the impact of leadership style on staff versus clients, abuses of leadership power and the impact on disenfranchised client groups.
What role does social media play in pursuit of social change : What role does social media play in the pursuit of social change? How does social media advance the goals of a particular group advocating
Describe the discrimination issues in brief : Betty is a female production line worker at TechLine. She is a single mother who is seven months pregnant with her fourth child. TechLine is considering moving.
Reflect on the leadership theories : Create a chart comparing at least 3 leadership theories (Managerial, democratic and autocratic) presented in this week's reading.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is an organizational security policy

What is an organizational security policy? What should occur following the handling of an incident with regard to the overall IT security management process?

  Network security and wan connectivity

The project is to design a network, network security and WAN connectivity for the following situation:

  Cyber security triad

Choose a threat that targets one of three categories of the cyber security triad: Confidentiality, Integrity or  Availability. Using the posted instructions for writing a white paper

  What advice do you have for the project manager

How likely does it seem that Pete will achieve his desired goals of being on time and within budget if nothing is done?

  How will the stackguard approach be able to detect attack

How will the StackGuard approach be able to detect this attack? Will the control flow integrity approach be able to detect this attack? Please justify.

  Problem regarding the digital computer crime

Explain the four (4) major categories of computercrimes, and provide at least one (1) example for each.Explain the most common forms ofdigitalcrime.

  How can mls be implemented in an rbac system

In general terms, how can MLS be implemented in an RBAC system? Describe each of the possible degrees of granularity possible with an MLS database system.

  What do you think is the most common type of attack

Would you expect the most common type of attack to exploit the most common vulnerabilities? Why or why not?

  What is the encrypted message entropy

Consider the following plaintext message: FAIN 460 9043 IS A GRADUATE COURSE.

  Identify and outline the function of digital certificates

Identify and outline the function of digital certificates. Explain the concepts of encrypting data and securing e-mail transmissions.

  Key generation of the simplified des algorithm

What is the history of DES and describe the key generation of the Simplified DES algorithm

  Server program receives a newline character

The server program receives a NewLine character sent from the client, it will display a message like 'Line from the client: - How much will it be to get some help with this small portion of the assignment?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd