Discuss networking principles to meet requirements

Assignment Help Computer Networking
Reference no: EM133283160

Course aim
To provide students with the knowledge of fundamental concepts of networking principles, area networks. Students will learn to configure, secure user systems and troubleshoot networks and will be introduced to the fundamentals of virtualisation and cloud technologies.

Purpose
The purpose of the assessment is to assess students' ability to discuss various networking principles such as topologies, network devices, reference models etc. to meet organisational requirements

Learning Outcome 1: Discuss various networking principles to meet organisational requirements.

Learning Outcome 2: Apply the fundamentals of IT technical support concepts and practice to securely manage hardware, software, and networking resources to support end users and meet security, ethical and organisational requirements

Assessment Task

Scenario
Simply Solutions Ltd, a company based in Mount Eden has approached you to help them setup their new office. They have rented 1 floor in an office block and are looking at ways of having the employees to hot desk and have access to any of the documents that they are or have been working on, along with accessing printing facilities. They project that they will have around 300 (max) devices connected at any one time throughout the day.

As the owner is not tech savvy, you have been asked to write a report informing them how it would be possible to setup such a system.

Task Inform the user (Simply Solution Ltd.)

Discuss various networking principles to meet organisational requirements.

To inform the owner of Simply Solutions Ltd, write a report (2000 words ±10%) which includes a discussion of different networking principles needed to recommend (with justification) the best networking setup option that meets the organisational requirements of Simply Solutions Ltd.

Use the following networking principles requirements as a guide in writing your report:

Part 1: You are required to discuss every item shown below:
1. Reference Models:
a. OSI model
b. TCP/IP models
2. Network Standards
a. ITU
b. IEEE
c. ANSI
3. Network Protocols
a. UDP
b. TCP

Part 2: You are required to discuss every item shown below and make a suitable recommendation (with justification) of its applicability for Simply Solutions Ltd requirements.

4. Types of networks:
a. LAN, WAN and MAN
b. Peer-to-peer and Client Server
c. Recommend and justify a suitable type of network (from Part 2: 4a and 4b)
5. Topologies:
a. Physical
b. Logical (Star, Bus, Ring, Mesh)
c. Recommend and justify a suitable type of network (from Part 2: 5a and 5b)

6. IP Addressing
a. IPv4 classes
b. Subnetting, including an example of IPv4 Class C subnetting
7. Network Media
a. Types of cables (coaxial, UTP, STP, fibre)
b. Wi-Fi 802.11 technologies (b, g, n, ac)
c. Recommend and justify a suitable type of network (from Part 2: 7a and 7b)
8. Network Devices
a. Hubs
b. Switches
c. Routers
d. WAP's
e. Repeaters
f. Modem
g. Recommend and justify a suitable type of network (from Part 2: 8a to Part 2:8f)
9. Virtualisation
a. Type 1 hypervisor
b. Type 2 hypervisor
c. Recommend and justify a suitable type of network (from Part 2: 9a and 9b)

Attachment:- Network Technologies.rar

Reference no: EM133283160

Questions Cloud

What strategies might you use to make your message : What strategies might you use to make your message more compelling to this audience than it might otherwise be? List and explain three separate strategies
Explain relationship between media industries and ideology : Explain the relationship between media industries and 'ideology'. Do media reinforce or contest the dominant ideology of our times
What type of data did the researcher use : What type of data did the researcher use to find their conclusions? What are two conclusions that the researcher made? Which did you find most interesting
What concepts can you apply to sarah and mark case : What concepts can you apply to Sarah and Mark's case? How could this have turned out? Would it have a different outcome
Discuss networking principles to meet requirements : IT501 Network Technologies Discuss various networking principles to meet organisational requirements and Apply the fundamentals of IT technical support concepts
What are the characteristics of the cult that lasn describes : In Lasn's article "the cult, you are in" what are the characteristics of the cult that Lasn describes? Who are its members (and non-members)
Define the evident communication theories : Research the same issue from 2 news sources with different perspectives. Define the evident communication theories
How can individuals help stop the spread of misinformation : How can individuals help stop the spread of misinformation on social media? How can individuals help spread useful social justice information on social media
What strategies can shawn use to take control : What strategies can Shawn use to take control and effectively manage his time once he figures out where his time is going

Reviews

Write a Review

Computer Networking Questions & Answers

  Internet security and network neutrality

Compose an executive summary highlighting the paper's contents and reasoning for your chosen topic. Internet Security and Network Neutrality

  Design a form for gathering the given information

Design a form for gathering this information, including space for items such as model number, serial number, NIC type, MAC address and logical address.

  Assignment on domain design for security worksheet

Assignment on Domain Design for Security Worksheet, Research and examine a domain model for security that is different from the one you previously developed for this course. Assume that recent compromises of sensitive information require security e..

  Description of the network security

The thesis statement: following technological advancement, it is advisable to consider the new forms to manage security within possible limits

  Explain what happens at each layer of the osi model

Explain the layers of the OSI Model and how data flows through the model. Explain what happens at each layer of the OSI Model.

  Determine the classes that are required for the design

MN404 - Specify Use cases for the design of Country Kitchen Classics Web User Interface specifying the actors. Provide possible scenarios for each Use case.

  Provide further detail discussing any additional anomalies

Provide further detail discussing any additional anomalies you might have noticed with the infected PCAP file. What was the URL that was identified?

  Complete final network design report

COIT20264 Network Design - you are required to undertake the physical design of the network taking into consideration the feedback that you receivedon

  Is practise of implanting rfid chips into humans appropriate

Is the practise of implanting RFID chips into humans appropriate? How should the practise of RFID chip implants in humans be governed?

  What is the difference between capturing traffic for

answer the following questions in a two to three page word document using good apa formatting.1 four capabilities are

  Build the network and verify connectivity

Network device, such as a Cisco router, assigns a public address to host devices inside a private network. The main reason to use NATisto reduce the number

  Examine a known vulnerability present in software running

Examine a known vulnerability present in software running on a host-machine or network component. Find an exploit for this vulnerability

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd