Evaluate typical network protocols and standards

Assignment Help Other Subject
Reference no: EM133075186

R/617/2272 Network Information Systems - OTHM Level 5 Diploma in Information Technology

Aim: The aim of this unit is to develop learners knowledge and skills in planning, configuring, setting up and managing networks (such as a LAN, PAN, MAN, WAN) as well as build skills in network monitoring, and knowledge of Network Security, network protocols and standards.

Learning Outcome 1: Understand the principles of networking.
1.1 Compare common networking approaches.
1.2 Assess how protocols enable the effectiveness of networked systems.
1.3 Explain the impact of network topology, communication and bandwidth management.
1.4 Evaluate the importance of Network Systems Management.
1.5 Explain the interdependencies of hardware, software and networking.

Learning Outcome 2: Understand network management protocols and standards.
2.1 Evaluate typical network protocols and standards.
2.2 Evaluate different network monitoring systems

Learning Outcome 3: Be able to plan, design, setup and configure a network system.

3.1 Produce a comprehensive design of a network to a given scenario.

3.2 Install a network according to a predefined network specification.

3.3 Configure network services and applications in a given scenario.

Scenario

Netron plc is a British quad play internet service provider (ISP); providing broadband, landline, digital television and Mobile services. The company was founded in Sheffield, South Yorkshire. On 30 January 2007, Netron was acquired by CT Group, but it continues to operate as a separate business. By December 2013, it had over 450,000 customers across the UK. Netron was one of the first ISPs in the UK to use Network Quality of Service (QoS) techniques, which it introduced in 2002, in order to control the finite data bandwidth available to them at peak times.

Netron are an active player in the UK's web community, playing an active role in web community events around the UK, especially in the north of England. Events like OpenCoffee and Geekup often see a Netron presence. Netron also work with local universities on graduate recruitment, internships and multimedia projects.

You work as a Senior Network analyst in Netron. They have recently formed a partnership with an UK university and temporarily recruited 5 graduates for network analyst positions. At the end of the probationary period you will be able to offer one of them a permanent position.

Your line manager Mark Johnson has asked you to provide training to this group of analysts. You have the following tasks for your new assignment with the company.

Task 1

Instructions
You need to provide all apprentices with a handbook which will provide them with a review of the core academic knowledge before they start lab training.

You are now preparing a handbook for them and you are required to do the following:

a. Introductory part of the handbook covers the fundamentals of networking. In the introduction, provide an explanation of the impact of network topology, communication and bandwidth management and an assessment of how protocols enable the effectiveness of networked systems.
b. Introduction is followed by a comparison of common networking approaches, an evaluation of the importance of Network Systems Management and an explanation of the interdependencies of hardware, software and networking.
c. Conclude the handbook by providing an evaluation of typical network protocols and standards and also an evaluation of different network monitoring systems

Task 2
All juniors have completed the mandatory academic part of the training and now they are ready to start practical part of their work. You have planned to demonstrate them how to plan, design, setup and configure a network system.

Instructions

a. Your lab instructor will give you a scenario based on the resource availability.
Produce a comprehensive design of a network to that given scenario.
b. Install a network according to a predefined network specification as given by your lab instructor.
c. Configure network services and applications as instructed by your lab instructor.

Reference no: EM133075186

Questions Cloud

Explain windows vulnerabilities and linux vulnerabilities : Explain the user's role in OS. Explain Windows vulnerabilities and Linux vulnerabilities; Explain Mac OS vulnerabilities and vulnerabilities of mobile devices
Write an essay for an mba application : Write an essay for an MBA application. (250-500 words)
Percentage of asset operating value lost in liquidation : There are no corpomte taxes in this question. F's operating value2 of assets in one year can be high ($5 million) or low ($2 million) with equal probability. F
Find out wacc for project : The WACC is used as the discount rate to evaluate various capital budgeting projects. However, it is important to realize that the WACC is an appropriate discou
Evaluate typical network protocols and standards : Evaluate typical network protocols and standards and Configure network services and applications in a given scenario
What is the optimal for nifty : What is the optimal (best risk-adjustment return) for Nifty, CNX, and Gold? Why?
Compute the irr static for project e : Compute the IRR static for Project E. The appropriate cost of capital is 9 percent. two decimal placesProject E
Make a loan amortization schedule : Make a loan amortization schedule for this loan (along the lines of the student loan example on page 55 of TVM Applications lecture note).
Total value of luther gross estate : Both Samantha and Luther have wills and their wills list each other as primary beneficiaries, and their two children as alternate beneficiaries. The Luther Vand

Reviews

Write a Review

Other Subject Questions & Answers

  Explain the cultural identifiers discussed in the articles

Explain the cultural identifiers discussed in the articles. Identifies 2-3 arguments presented for and 2-3 arguments against the issue.

  Serve a productive purpose

Have you ever run across a process or procedure that seemed like it didn't serve a productive purpose? How did it get there in the first place?

  Explain the primary manner in which the source

The textbook describes cognitive dissonance as the difference between our beliefs and our actions. Provide three (3) examples of cognitive dissonance that you have experienced. Describe at least two (2) potential behaviors or consequences that can..

  Explain violent action

What types of theories or biological/sociological factors explain violent action? What are some preventative measures that can be taken to combat the commission

  Show that equation has exactly two real roots

Let {p(x) = a0 + a1x2 + a2x4 + . . . . . . + anx2n}. Show that p(x)-p'(x) = 0 has exactly two real roots

  Describe one study that used comparative effective research

Comparative effective research is important in translating research. Describe one study that used comparative effective research. What were t he findings.

  Review the medications

Review the medications she is taking for hypertension and dyslipidemia. Evaluate the efficacy of these medications.

  A descriptive or quantitative method to explore research

If you were to switch gears and conduct a qualitative study instead, what specifically would you study and using what qualitative method.

  Leadership and organizing-sensemaking in action

In this week's 'Leadership and organizing: sensemaking in action' article by Pye, the chief executive (CE) in the case took an approach to change that resulted in his being terminated. Was he too focussed on his preeminent 'position' as a formal lead..

  Uses of symbolism used by each of writers

Explain and illustrate the uses of symbolism used by each of the writers in the narrative module. How does the symbolism reflect each main character's struggle with society?

  What kind of incentives

What kind of incentives would motivate you to participate in an interest group? Among people you know who are active, what are their incentives?

  Working with chemist at george mason university

Working with chemist at George Mason University. Golding blended Golding-Grow. It consists of four chemical compounds:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd