Develop hardware requirements for a network

Assignment Help Computer Networking
Reference no: EM131617000

Overview of Internetworking - Network requirement analysis and plan

Main objectives of this assignment is to enable student to analyse a business case study, develop requirements, select networking devices for the given business case and plan a network design. After successful completion of this assignment, students should be able to:

a. Analyse and discuss the significance of internetworking for contemporary organisations.

b. Explain the role of internetworking to support business and technical goals through planning and design.

c. Develop architectural internetworking design for the business, information, technology, and application domains.

Assignment 1 Specification

Business case study: Choose one of the four business case studies provided in the appendix at page 5. You have to inform your instructor on the choice before start working on the assignment.

Description

For a chosen business case, write a report on the following points:
a. Analyse and discuss the significance of internetworking for the chosen business case.
b. Develop hardware requirements for a network with device specifications including series, model and features.
c. Draw architectural internetworking design for the business in Netsim.

Write a report with the following contents

• Project Scope
• Challenges
• Project hardware requirements
- Name of the network device with manufacturer's name, series, model, features and ports
- Type of the cables
- Name of the server, PC with specification such as operating system, RAM, hard disk etc.
• Network Design in Netsim (You must not use packet tracer, or any other software!)
• Outcomes / benefits of the proposed design
• Limitations and conclusions.Appendix- a list of case studies (please choose one)

Business case study 1
Chock Children's Case study

Business case study 22
GITAM University case study

Business case study 33

Cisco Crownnetstart case study

Business case study 44
Cisco Sleepcity case study

Attachment:- Appendix.rar

Verified Expert

In this case study we have discussed the CHOC interconnecting network by Cisco. Project scopte, challenges, hardware requirements and outcomes with conclusion has been discussed with network diagram.

Reference no: EM131617000

Questions Cloud

Find the mrts of firm : Assume Firm A's production function is Q = KL + K, and Firm B's Q = LK2
Discuss the cost of e-research affordable : Determine two (2) methods that paralegals could employ to help keep the cost of e-research affordable
Read the united nations fact sheets on youth : Analyze cultural perspectives of the courts and corrections for juveniles who commit violent acts by indicating if you believe they should be tried as adults.
Diminishing marginal returns : a) Show in a diagram that a production function an have diminishing marginal returns to a factor and constant returns to scale.
Develop hardware requirements for a network : MN503 Analyse and discuss the significance of internetworking for the chosen business case - Develop hardware requirements for a network
Write a paper about conflict in the workplace : Write a paper about Conflict in the Workplace. I would like you to identify a management issue at your current place of employment.
The concept for admissibility of plain sight evidence : Detail the concept for admissibility of plain sight evidence and the legal requirements for the investigator to invoke a plain sight seizure.
Think of an externality in your community : ?Think of an externality in your community. Explain what type of externality it is. How can it be resolved (through the market and/or through government policie
How credible do you think the media : How Credible do you think the Media is today? What are the affects on people and industry?

Reviews

inf1617000

9/21/2017 5:45:25 AM

Dear i want network design in netsim My two friends got this same subject assignment from u. And u make that network design in bosom netsim which was really good. So make sure in my assignment network design is should not be copy paste from internet. I need complete new design.

Write a Review

Computer Networking Questions & Answers

  How can you design networks to improve performance

What is the turnpike effect and why is it important in network design?- How can you design networks to improve performance?

  Explain the purpose and use of mime in an email message

Explain the purpose and use of MIME in an email message. Describe how all three types of network switching (message, circuit, and packet) are used in the email system.

  What applications are mapped to the database

What applications are mapped to the database, and are they the correct ones? The next step is to continuously monitor what is going on between your application and the database.

  Query and response for a complete dns query

Compare the time for a query and response for a complete DNS query and response (to all required nameservers) if M=1, M=2, and M=3.

  How much does the bandwidth change

A 250-µm-long semiconductor laser is used as an FP amplifier by biasing it below threshold. Calculate the amplifier bandwidth by assuming 32% reflectivity.

  What is the type of block of the abbreviated ipv6 address

Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable leave your answers in fully expanded hexadecimal colon notation.

  Message forwarding a computer in the computing department

message forwarding a computer in the computing department has just been turned on. the user starts up their web browser

  Research three recent information security breaches

Research three recent information security breaches. Do main targets seem to be larger or smaller companies? Is there a particular industry which seems predominately targeted?

  You are the network administrator for your lan

You are the network administrator for your LAN. You have just captured the network traffic for the last ten minutes and have thousands of packets captured.

  What is a denial of service attack

List six ways an attacker gains access to a network.

  Does rule list any particular oddities-protocol makes unique

Does rule list any particular oddities or protocol(s) or anything which makes it unique (such as messages)? If so, list these. If not, what must be included?

  Explain how to upgrade bus topology lan

You are asked to upgrade bus topology LAN at a friend's house to a star topology LAN. your friend wishes to connect three computers and printer and use Ethernet access method.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd