Develop an architectural internetworking design

Assignment Help Computer Network Security
Reference no: EM132202592

Assessment - Network requirement analysis and plan

Purpose of the assessment (with ULO Mapping)

This assignment is designed to assess students' knowledge and skills related to the following learning outcomes:

b. Explain human factors in achieving business and technical goals through planning and design.
c. Investigate and develop an architectural internetworking design for the business and application domains.

Assignment Overview of Internetworking

A case study entitled "Chase Grammar School Accelerates Learning with BYOD" is uploaded with the assignment 1 folder, and the link for the case study is provided as an appendix. Based on the case study, Leo Li, Director for Administrator at the school, is highly concerned with the reliable, high- speed internet connection whether wired or wireless. He thinks that pupils are digital natives and they thrive in the multi-media environment. He further adds that one cannot underestimate the importance of rich and varied contents in the landscape that internet provides.

The case study focusses on the wireless solution and installation of additional wireless access points. As a result, the current throughput rate is recorded as 51 Mbps compared to a patchy 20 Mbps before. All seems good with the Chase Grammar School's network at the moment. However, there has not been any updates and upgrades on the existing wired infrastructure.

In addition to the wireless infrastructure, you as a network consultant strongly believe that the network experience of the end users at the school could have been further enhanced with the updating and upgrading of the current sluggish wired infrastructure. You tentatively figured out that with the proper upgrade of the wired network the throughput could go up to 90 - 100 Mbps.

Based on your understanding of the case study prepare a report on the proposed wired and wireless network design for Chase Grammar School. The report on the proposed design should have the following contents.
• Project scope
• Challenges
• User-centric design concept
• Project hardware requirements
• Network design in netsim
• Outcomes
• Limitations
• Conclusion
• Demonstration (snapshots of ping connectivity is preferable)
• IEEE referencing style

While designing the wired and the wireless network, please consider Chase Grammar School has six departments, namely, Admin, Academic, Human Resource (HR), Finance, IT support and Sports.

Attachment:- CaseStudy ChaseGrammar.rar

Verified Expert

The network is designed according to the requirement of the chase grammar school. The routers and switches are configured to achieve the bandwidth required by the user, the routing protocol is also very important issue which we need to take care, in this case , RIP(Routing information protocol) is used.

Reference no: EM132202592

Questions Cloud

Why is ethics important in the health care industry : Why is ethics important in the health care industry? Provide an example of a situation in healthcare that could be considered unethical.
Weighted average implied by two outstanding debt issues : Assume that the overall cost of debt is the weighted average implied by two outstanding debt issues. What is the company’s wacc?
The importance of traditions in all cultures : Describe your favourite family tradition. (Ukrainian Christmas) Do you know why this practice is important to this culture?
Modular arrangement with marge stevens : The office is beautiful. You work in a modular arrangement with Marge Stevens, administrative assistant in purchasing,
Develop an architectural internetworking design : MN503 - Overview of Internetworking - Explain human factors in achieving business and technical goals through planning and design
Explain and integrate some code into your recycling machine : Create an activity chart which describes the behaviour of the Recycling Machine system - Design and model two classes:RecyclableItemand RecyclingMachine
Organization without the other two : Are innovation, creativity, and sustainability related? Explain.
Eliminating the use of paper in the workplace : Technology is slowly eliminating the use of paper in the workplace. What are some examples where applications have moved us from a paper free workplace?
How can the company overcome this resistance : Should the company go ahead with the move to Mexico or try one more time to work things out in the Oconomo facility?

Reviews

len2202592

12/26/2018 12:31:10 AM

Submission Guidelines All work must be submitted on Moodle by the due date along with a Title Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2202592

12/26/2018 12:29:54 AM

Network Design in Netsim You must not use packet tracer. Screen capture of Netsim design. Write justification for the selected network design. 7 Outcomes Write at least 2 outcomes of the network 2 Limitations Write limitations of the hardware devices used in your design. 2 Conclusions Write a clear conclusion of the case study. 2 Demonstration Demonstrate to your instructor during Week-7 lab the detailed network design on Netsim, with justifications explained. 10 Reference style Follow IEEE reference style 5 Total SO

len2202592

12/26/2018 12:29:44 AM

Section to be included in the report Description of the section Marks Project scope Outline of the report ( in 3-4 sentences) 2 Challenges Write at least 3 appropriate challenges you might face during network setup. 3 User-centric design concept The process to incorporate user-centric design concept in your design. S Project hardware requirements - Name of the network device with manufacturer's name, series, model, features and ports - Type of the cables - Name of the server, PC with specification such as operating system, RAM, hard disk etc. 8 2 2

Write a Review

Computer Network Security Questions & Answers

  System requirement of open-source intrusion detection system

CSD3999 Computer Science Project - Assessing the performance and system requirements of open-source intrusion detection systems

  Explain security measures that you would recommend

Determine and explain security measures, in detail, that you would recommend to enhance security. How cryptography and authentication can support security.

  Why is the file kept inaccessible to the web server

Why is the file kept inaccessible to the Web server? Discuss this issue, but assume that the attacker is on the internal network.

  Calculate the total time required to transfer a file

Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial.

  Why are anti-social engineering and dumpster diving safeguar

Attackers are becoming more ingenious in their attack methods every day. A part of this evolving methodology is the physical aspect of security. Please respond to all of the following prompts: 1. Why are anti-social engineering and dumpster diving sa..

  Why input-output activity is problem with memory protection

Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

  Describe activities that set up emergency operations center

Describe the activities that need to occur to set up the emergency operations center for your company, and where your company should locate the center.

  Combine the two disks into one logical volume

Illustrate your explanation by using the Linux Log- ical Volume Manager to combine the two spare disks available on the Virtual Debian distribution. Combine the two disks into one logical volume. Format the new logical disk and modify the /etc/fst..

  How to build a secure network for an organization

Research the resources that are available to you that you need to provide accurate recommendations for the resource manager.

  What is mac and what is discretionary access control

What is MAC and what is discretionary access control - Given Example on p. 69, draw the lattice diagram. Given two security levels, decide whether one dominates the other.

  Develop a listing of vulnerabilities in current security

Develop a listing of vulnerabilities (10) in the current security posture of Omega Research. A vulnerability is defined as the absence or weakness.

  Develop an ids with the use of the material

Develop an IDS with the use of the material provided. The ids must detect as many attacks as possible and you must report them in a human readable format.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd