Explain human factors in achieving technical goals

Assignment Help Computer Networking
Reference no: EM132358785

Overview of Internetworking Assignment - Network Requirement Analysis and Plan

Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcomes:

  • Explain human factors in achieving business and technical goals through planning and design.
  • Investigate and develop an architectural internetworking design for the business and application domains.

Assignment Overview of Internetworking -

A case study entitled "Yeshiva University Dorm Wi-Fi Changes from Restrictive to Enriched Student Experience".

Based on your comprehension of the case study prepare a report on the proposed wired and wireless network solution for Yeshiva University. The report on the proposed design must have the following contents.

  • Project scope
  • Challenges and constraints
  • User-centric design concept
  • Project hardware requirements
  • Network design in an appropriate simulation software
  • Outcomes
  • Limitations
  • Conclusion
  • Demonstration of the simulation model (snapshots of ping connectivity is preferable)
  • IEEE referencing style

While designing the wired and the wireless network, please consider Yeshiva University has four campuses in New York City. The Beren Campus, located in midtown Manhattan, has four dorms.

Section needs to be included in the report -

1. Project Scope - Outline of the report (in 5 - 8 sentences).

2. Challenges - Identify at least 3 challenges of the case study that needs to be addressed

3. User centric design concept - The user centric design approach used in the case study and the additional improvements in terms of the user centric design.

4. Project hardware requirements -

  • Name of the devices with manufacturer's name, series, model, features and ports
  • Types of cables or connections
  • Name of the servers, Hosts (PCs, laptops, smartphones etc.)

5. Network design - Network design using a simulator software. Justification of the approach and the concept

6. Outcomes - Identify at least 4 outcomes of the network.

7. Limitations and further development - Identify and 2 limitation of the project and your suggestion/s for future.

8. Conclusions - Write a clear conclusion of the case study.

9. Reference style - Follow IEEE style referencing.

Attachment:- Case Study.rar

Verified Expert

In this task network design is given for Yeshiva university dorm.Its limitations are mentioned in detail.The outcome of the network design is shown.In the ping connection the demonstration is given .Hardware requirements are clearly mentioned. While deploying wireless network many challenges are deployed

Reference no: EM132358785

Questions Cloud

Hurricane sandy-key phases of disaster recovery : review the attached lessons learned from Hurricane Sandy. Review the key phases of disaster recovery as outlined in chapter 10 of your textbook
HPE Business Value Dashboard : Read the article, "HPE Business Value Dashboard." How do these parts help the business managers? How do they help the individual contributors?
Professionals and investigators use digital forensic methods : Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article
Understand computer architecture and networking : A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills,
Explain human factors in achieving technical goals : Melbourne Institute of Technology- MN503 Overview of Internetworking - Network Requirement Analysis and Plan. Explain human factors in achieving technical goals
Identify trend in information systems-technology supported : Each student will identify a trend in Information Systems and Technology supported by three pieces of research to support why you think it is a trend
How and why developing and running experiments using cluster : Assignment - Descriptive Data Analytics: A Review - Explain how and why developing and running experiments using cluster
The power is disrupted again in the future due to hurricane : Create a short guide to keep business going if the power is disrupted again in the future due to hurricane. What procedures would you take to fulfill the order?
About benefits of cloud computing applications : Even with this great news about benefits of cloud computing applications, authors have warned business user community regarding dangers associated with cloud

Reviews

len2358785

8/19/2019 10:45:19 PM

Total Words – 1200. All work must be submitted on Moodle by the due date along with a Title Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Implementing ospf over a multipoint frame

Implementing OSPF over a Multipoint Frame Relay needs more planning and requires specific configurations such as (1) a single subnet for every PVC or (2) a single subnet for all routers using point to point subinterfaces associated with each PVC

  Troubleshoot networking issues on a regular basis

Network administrators are required to troubleshoot networking issues on a regular basis. Based upon your experiences completing the LabSim Unit 3 Lab tasks

  What is the time spent in the listening

What is the time spent in the listening and learning states called? The time between each BPDU sent on a port is called which of the following

  Government emergency management agencies

Throughout the history of emergency management in the United States, priorities set for government emergency management agencies

  Describe basic wireless network maintenance functions

Describe basic wireless network maintenance functions. Producers are continuously releasing firmware upgrades for their products. If you were manager of WLAN.

  How will the software circuit firewall react

Which type of attack is primarily intended to disrupt the availability of critical business functions - assify each attack method in relation to its direct impact.

  Define cumulative distribution function

Cumulative distribution function (CDF) Suppose that discrete random variable D take values {1, 2, 3,...,i,...} with probability 1/2i. What is its CDF?

  What is an ip network and what is an ip sub-network

ITNE2003 – Install and configure medium size networks (2017SS) - Write down the configuration command in Branch C router to statically route all traffic

  What was the terminal password for lanswitch one and two

What were the Destination IP addresses discovered by the NetWitness Investigator analysis? Are packet-capturing tools like Wireshark less dangerous on switched LANs? What was the terminal password for LanSwitch 1 and LanSwitch 2?

  What is the application layer primarily concerned

With what is the Application layer primarily concerned and what is the broadcast address of the subnet address 178.55.20.88 255.255.0.0?

  What commands are used to apply initial router configuration

What commands are used to apply initial router configurations? Provide an example from one of the labs. What commands are used to apply the VLANs and Trunk.

  Why you think dynamically assigning ip addresses are useful

Is the IP address 192.168.12.254 a valid address for use by a computer connected directly to the Internet? Explain your answer. c) Is it possible to divide a class C network into 14 subnets with 15 computers connected to each sub network? Explain..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd