ICTNWK518 - Design an Enterprise Wireless Local Area Network

Assignment Help Computer Networking
Reference no: EM132505505

ICTNWK518 - Design an Enterprise Wireless Local Area Network Assignment - Abbey College Australia

Assessment 1 - Knowledge Assessment (Written Tasks)

1.1 Wifi-Edge is a wireless-specialist company, Wifi-Edge Networks takes pride in delivering quality Wi-Fi surveys to their customers. they believe in the performance gains that a good Wi-Fi site survey brings.

Describe about different Site Survey Types for WLAN deployment? What survey technique could best for Wifi-Edge and why (provide your analysis)?

1.2 Audit and intrusion detection systems is one of the key considerations for wireless network survey.

Describe the Requirements of IDS in Wireless Network and Wireless Intrusion Prevention System?

1.3 "Auditing and penetration testing techniques" is one of the key considerations for wireless network survey.

List some penetration testing techniques for wireless network and describe them with example?

1.4 "Bandwidth and quality of service" is one of the key considerations for wireless network survey.

Discuss bandwidth and quality of service in wireless network? How can you configure your home router for Quality of service, explain with screen shoot?

1.5 Discuss the factors affecting wireless LAN's signal quality?

1.6 Discuss key technical considerations for designing a wireless network?

Your consideration could be on following points:

a) features of antenna design

b) layer 2 and layer 3 design issues

c) impact of radio frequency

d) problems associated with topography and obstacles in radio transmission path

e) wireless topologies

f) wireless local area networks (WLAN) and wireless metropolitan access network (WMAN) solutions

1.7 Discuss the key client organisation considerations when designing a wireless network?

Your consideration could be on following points:

a) small office home office (SOHO) and enterprise local area networks (LANs)

b) transmission control protocols or internet protocols (TCP/IP) and applications

c) wireless security strategies

d) security threats

1.8 Discuss the software consideration when designing a wireless network?

Your consideration could be on following points:

a) network protocols and operating systems

b) security protocols, standards and data encryption.

Assessment 2 - Performance Assessment (Skills)

Requirements - Read the case study carefully then answer the questions following. You may assume any information that has not been mentioned in the case study, however any assumptions you make must be clearly identified as assumptions.

Case Study/ Practical implementation: Enterprise Wireless Local Area Network

A well-known International college, Abbey college Australia, wants to deploy the latest technological advancements to their campus using an Information and communication technology plan. They have different departments like the staff department, their head being Kate, the academic department, its head being Joe, and the Student service department, headed by Smith.

They all have specific requirements of the network designer who aims to incorporate all of them and provide other relevant features, if possible.

They want to develop their own area network for students and staff so that it is fast, reliable and easily available throughout the campus building. (Level-1 100 m², Level-2 400 m² and Level-6 400 m².

Abbey college wants to develop its own Wi-Fi network for all staff members and students so that they can bring their own device to use internet and access their learning management system.

They want to implement multiple wireless LAN according to educational departments (Level1, Level2, Level 6-Telecom, Business), Stuffs (Marketing at Level 6, Student service level 2), Guests at all level.

Abbey college also wants to implement secure network to limit the usage of internet and wants to restrict access according to users (Guests, Stuffs and students) in order to ensure everyone, use the internet facility correctly.

Kate, Joe and Smith will assist in gathering the information required by the ICT designer. They will also go through the plan to check if all the requirements have been met or not.

2.1 Assess wireless network performance requirements for the Abbey college?

2.2 Measure and diagnose wireless working environment and determine number of Access points, Routers and other network devices to full all requirements.

2.3 Produce wireless network designs and component lists? Provide real Market quotation for components to analysis cost and specification features.

2.4 Deploy the wireless network for Abbey college in Cisco Packet tracer to meet all requirements mentioned? (Show related device configuration)

Build Network topology and show diagram.

Show IP address allocation for all departments (Static and DHCP).

Configure routes (Routing to connect internet and intranet, DHCP pool for departments) and wireless Access points, DNS and LMS.

Annotate the diagram (including IP Addressing).

List all SSIDs, security level and password according to your configuration.

Show all configuration to your trainer. (the packet tracer simulation).

2.5 Document a formal technical report which starts by addressing the requirements of Abbey college and then explains your proposed solution to meet those requirements. This report will be presented to the client for review and approval.

2.6 Test all your configuration and show it to your Assessor for acceptance (Additionally, attach your test screen shot here)

Assessment 3 - Presentation

Introduction - Presentation is the process of showing and explaining the content of a topic to an audience. It is often used to assess student learning in individual or group research projects.

Presentation assessment consists of a topic for the student to research, discuss and present, followed by a question and answer session between a tutor and the presenter(s). This measures the ability of students to respond, think under pressure and manage discussion. It is in this part of the presentation that the student shows his/her in-depth knowledge of the topic and presentation skills.

A good presentation is generally expected to consist of:

Introduction/ Aims/Objectives

Major points and ideas explained and summarised

Results/Related points/Issues/or others depending on the topic

Conclusion - future work

The presentation should be presented in the time allowed

Presentation Requirements - Develop a class presentation of no more than 15 minutes to demonstrate your understanding of Design an enterprise wireless local area network. To do this:

a) Select enterprise wireless network from your studies or from your research.

b) Produce wireless network design, component list and network specifications.

c) Explain design details in your presentation.

Attachment:- Design an Enterprise Wireless Local Area Network Assignment File.rar

Reference no: EM132505505

Questions Cloud

HI5004 Marketing Management Assignment : HI5004 Marketing Management Assignment Help and Solution - Holmes Institute, Australia - Assessment Writing Service - Semester-Long Marketing Plan Project
Research on the current state of DNA COMPUTING technology : Choose one of the following "developments in technology" and do some research on the current state of this technology. Choose "DNA COMPUTING"
Review a single trend related to ADHD : ENG-105 English Composition Assignment Topic - First Draft of a Commentary Assignment - Grand Canyon University, USA. Review a single trend related to ADHD
PROJ 6000 Principles of Project Management Assignment : PROJ 6000 Principles of Project Management Assignment Help and Solution - Laureate International Universities, Australia - Assessment Writing Service
ICTNWK518 - Design an Enterprise Wireless Local Area Network : ICTNWK518 - Design an Enterprise Wireless Local Area Network Assignment Help and Solution - Abbey College Australia - Assessment Writing Service
FIN700 Financial Management Assignment : FIN700 Financial Management Assignment Help and Solution - King's Own Institute, Australia - Financial Mathematics Calculations and Decision-Making
What are the total amount of expenses that katelyn will show : What are the total amount of expenses that Katelyn will show on their income statement for the month of January 2020?
What are the breakeven number of pets that leia has to groom : Leia is opening an elite, What are the breakeven number of pets that Leia has to groom in a month and what would be the total monthly sales?
What would his average selling price per unit need to be : Due to a lack of available time. If Alton wants to generate a profit of $10,000 per month, what would his average selling price per unit need to be?

Reviews

Write a Review

Computer Networking Questions & Answers

  Information security threats impacting security and privacy

1] Describe the information security threats impacting security and privacy. 2] Describe the security control measures to protect information assets.

  Describe in detail all issues associated with layer 2 loops

after evaluating and completing support for high-definition ip cameras to enhance security for devry university you

  Design the datagram for next header fields

Design the datagram and illustrate what contents of each of Next Header fields would contain. You do not have to look up actual numeric value, just explain what it would be referencing next.

  Project management methodologies

ITSU2006 - Project Management - Victorian Institute of Technology -Choose a topic and write a report on one of the Project Management methodologies - LEAN Model

  Compare the features of two types of security devices

Discuss whether the new network security policies, standards, guidelines, and procedures will ensure the integrity of Softsearch's network security.

  Clock controlled access and high-bandwidth internet access

Zippy Car, a medium-sized business wants to house the company-owned web servers in a facility that offers round-the-clock controlled access and high-bandwidth internet access.

  Explaining users a cell can support blocking rate

Find out how many users a cell can support for a 5% call---blocking rate. Assume that each user produces 35mE of load in the busy hour.

  Create a vpn connection

For this project, you will set up a very simple VPN connection between two computers on a LAN. More complex, and therefore more secure, VPN software.

  What kind of ticket is held by kerberos tgs

Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a __________.

  Analyse and describe the http and https transfer processes

Analyse and describe the HTTP and HTTPS transfer processes between client and server, and describe the detail in each packet

  Discuss the advantages and disadvantages of both networks

The address depletion of IPv4 and other shortcomings of this protocol prompted a new version of IP known as IPv6. Explain the advantages of this new IPv6 when compared to IPv4?

  What are the different types of security

What is network security, What are the different types of security and how many are there and Compare small and big networks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd