Designing the wired and the wireless network

Assignment Help Computer Network Security
Reference no: EM132360301

Overview of Internetworking Assignment - Network Requirement Analysis and Plan

Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcomes:

  • Explain human factors in achieving business and technical goals through planning and design.
  • Investigate and develop an architectural internetworking design for the business and application domains.

Assignment Overview of Internetworking -

A case study entitled "Yeshiva University Dorm Wi-Fi Changes from Restrictive to Enriched Student Experience".

Based on your comprehension of the case study prepare a report on the proposed wired and wireless network solution for Yeshiva University. The report on the proposed design must have the following contents.

  • Project scope
  • Challenges and constraints
  • User-centric design concept
  • Project hardware requirements
  • Network design in an appropriate simulation software
  • Outcomes
  • Limitations
  • Conclusion
  • Demonstration of the simulation model (snapshots of ping connectivity is preferable)
  • IEEE referencing style

While designing the wired and the wireless network, please consider Yeshiva University has four campuses in New York City. The Beren Campus, located in midtown Manhattan, has four dorms.

Section needs to be included in the report -

1. Project Scope - Outline of the report (in 5 - 8 sentences).

2. Challenges - Identify at least 3 challenges of the case study that needs to be addressed

3. User centric design concept - The user centric design approach used in the case study and the additional improvements in terms of the user centric design.

4. Project hardware requirements -

  • Name of the devices with manufacturer's name, series, model, features and ports
  • Types of cables or connections
  • Name of the servers, Hosts (PCs, laptops, smartphones etc.)

5. Network design - Network design using a simulator software. Justification of the approach and the concept

6. Outcomes - Identify at least 4 outcomes of the network.

7. Limitations and further development - Identify and 2 limitation of the project and your suggestion/s for future.

8. Conclusions - Write a clear conclusion of the case study.

9. Reference style - Follow IEEE style referencing.

Attachment:- Case Study.rar

Reference no: EM132360301

Questions Cloud

Appreciation on the us trade deficit with china : Discuss the effect of the 20 percent yuan appreciation on the US trade deficit with China
List the different technology eras : List the different technology eras. Which would be our current era? How these eras are affecting the labor market? What is the internet of things?
Which countries are referred to as andean : Which countries are referred to as Andean? Identify two Pre-European civilizations where coca leaves were cultivated ans used
Prepare a structured report : Assessment - Structured Report It is advised that you write in the Interact2 journal itself rather than a word processor
Designing the wired and the wireless network : Based on your comprehension of the case study prepare a report on the proposed wired and wireless network solution for Yeshiva University
Equation of the harrod-domar model : What is the fundamental growth equation of the Harrod-Domar model?
Difference between financial capital and capital goods : What is the difference between financial capital and capital goods?
What is an immigrant network : How is selection into migration different than the returns to migration? What is an immigrant network?
Define increasing returns and comparative advantage : Define increasing returns and comparative advantage. What are the testable predictions of the Hecksher - Ohlin Model?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Outline the steps required to complete a risk assessment

What factors have brought increased emphasis on network security? -  Briefly outline the steps required to complete a risk assessment.

  Application you are a network administrator in net ambit

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  Improving the security of the current network

The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

  Identify hardware needed to secure your choice of networks

Identify hardware and software needed to secure your choice of networks against all electronic threats. Compare Local Area Networks (LANs), Wide Area Networks (WANs), and wireless technologies.

  What are guest-hopping attacks

Identify the security advantages of cloud-based solutions.

  Is it possible to decrypt the message with a different key

Is it possible to decrypt the message with a different key? Justify your answer. Do you agree with the statement of the message? Why or why not?

  Calculate the value of the symmetric key

Explain your solutions for avoiding such attacks. Calculate the value of the symmetric key and the values of R1 and R2 in the Diffie-Helman Protocol for the set of given values.

  Describe the role that nat plays in a network

Describe the role that NAT plays in a Network. Does IPv6 require NAT? Does NAT have an added security benefit. How does NAT complicate network communication?

  Consider a mac technique called cbc­mac

Consider a MAC technique called CBC­MAC. The algorithm takes a message, m, a secret key, k, and runs CBC mode encryption on the blocks of the message. For purposes of this problem the initialization vector will always be zero. The tag is the final..

  Explain the difference between IDS - firewall and antivirus

Explain the difference between: IDS, firewall and antivirus - Deploying only one of these controls is not enough to protect your Network

  Discuss primary challenges related to maintaining security

Discuss the primary challenges related to maintaining the security of both applications and data in such an environment.

  Mobile application security project

CST620 You are a cyber threat analyst at a mobile applications company. One morning, your supervisor, Dan, tells you about a mobile application security project

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd