Explanation of the planning and designing of network

Assignment Help Computer Network Security
Reference no: EM132371179 , Length: word count:1500

Overview of Internetworking Assignment - Network Requirement Analysis and Plan

Purpose of the This assignment is designed to assess students' knowledge and skills related to the assessment (with following learning outcomes:

  • Analyse and report on the current and future state of the internetworking infrastructure and its applications.
  • Implement a process to support the administration and management of internetworking.

Assignment Description -

Project Scope: A typical network layout diagram of a higher education Institute is given as under (for illustrative purposes only). The Institute has sections segregated as Melbourne and Sydney campuses connected through WAN. Within the campuses we have laboratories and other office workstations segregated into School of IT and School of Business. The Network requirements are given as under;

2485_figure.png

Network requirements -

1. Two campuses have separate local area networks. Staff users from two campuses should be capable of accessing other campuses.

2. There should be clear restriction of Lab (students) host not capable of pinging any office (staff) hosts.

3. Printing services should be available to all the schools users.

4. Wireless access is available to all the staff and student and guest as well on both campuses.

5. Internet should be provided to all the sections.

6. IP network design is required

7. Hardware requirements with costs specification.

8. Configuration details on the hardware (Routers, switches and workstations).

Assignment requirements: As a group you are required to design and simulate a network fulfilling the above mentioned requirement. The report should have a detailed explanation of the planning and designing of network. It is recommended that bullet points are included whenever necessary.

1. Project Scope

2. Project requirements

3. Network design - Consider the human factor design concepts

4. IP addressing in a tabular form (include justification whenever necessary)

5. Network topology diagram and simulation (CISCO Packet tracer is mandatory)

Switch configuration

Router configuration

Access point and server configuration guidelines

Security configuration

Student should show the demo of the network design in Week 11 lab. Work progress and consultation will be done during week 9 and 10. Demonstration marks will be awarded in regards to the stage of the completion of the design

The format of the demonstration will be

a) An individual demo,

b) At least 3 viva voce questions related to the design, and

c) Demo and viva voce duration 5 - 7 minutes (at max). The following is to be covered.

Demonstration of the network design simulation in CISCO Packet Tracer.

Note: As per the need, the lab tutor can allocate 15 minutes in Week 9 and Week 10 for work progression check and consultation.

Reference no: EM132371179

Questions Cloud

What factors will you incorporate into hal new website : Based on your SWOT analysis of the proposed online business, write a report that includes a summary of your assumptions and a list of specific recommendations.
Elements of presentation could be improved for future work : How effective was the presentation? What did the classmate do well? What elements of the presentation could be improved for future work?
Implement a process to support the administration : Network Requirement Analysis and Plan - Implement a process to support the administration and management of internetworking
Friendship is developed and portrayed in the poem : Write about the way friendship is developed and portrayed in the poem.
Explanation of the planning and designing of network : Overview of Internetworking Assignment - Network Requirement Analysis and Plan. Explanation of the planning and designing of network
Discusses issues pertaining to diversity in the workplace : Locate a scholarly article which discusses issues pertaining to diversity, culture, and change in the workplace. Discuss how you and your organization.
Report on current state of internetworking infrastructure : Overview of Internetworking Assignment - Analyse and report on the current and future state of the internetworking infrastructure and its applications
How you use technology to show the positive aspects of job : You are the HR manager for a commercial airline. You have been assigned to develop a realistic job preview for flight attendants. Your objective is to give a.
Define why we should put any weight behind the opinions : Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article's author, note their credentials.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Topographical layout of the current and planned network

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included..

  Case - detect excessive shock using phones sensor data

Calculate the time of operation between each stop and start - identify the orientation of the phone to display in debug - Process of app deployment

  What type of encryption will be utilized

What type of encryption will be utilized, including the attributes of the encryption methodology? What kind of logon security will be employed.

  Determine troubleshooting steps it support technician follow

Determine at least two troubleshooting steps an IT support technician should follow to find a solution to a general network printing issue.

  Discuss a minimum of five event types found in a dhcp log

Discuss a minimum of five event types found in a DHCP log and describe what they refer to and what plan will you follow to assign printers to all the users in the organization?

  Kilgore custom milling and blue wood chocolates

What are the main financial risk management issues that Cathy and the rest of the management team at Kilgore need to focus on?

  Address the narrative plan as well as a network diagram

Please address the narrative plan as well as a network diagram (no IP addresses, or circuit data required) and what is being done to secure the network.

  Designate an appropriate class type for this attack

Designate an appropriate class type for this attack. Annotate your rules with comments describing what each component of the rule does, so other security specialists in your team can see how your rules are written.

  Briefly describe the technologies

Research Report - Compare and contrast the two technologies: what are their good points and (more interestingly) their bad points or weaknesses

  Controls to detect or prevent salami attacks

List three controls that could be applied to detect or prevent salami attacks. Modularity can have a negative as well as a positive effect. A program that is overmodularized performs its operations in very small modules.

  Explain each protocol stack where encryption can be used

Explain each protocol stack where encryption can be used and how it is used in real world applications. Support your argument with examples.

  How the threats are exploiting holes in current security

which web security threats are most prevalent, the hazards they present, and how these threats are exploiting holes in current security countermeasures.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd