Identify the principles of LAN design

Assignment Help Computer Network Security
Reference no: EM132535318

Network Design Assignment

Assessment Objective

The report helps you grasp the fundamental concept of network design and acquire the knowledge on the techniques required for developing both logical and physical network designs.

The presentation enables presentation, oral communication and team skills to be exercised as well as providing an opportunity to research a specific topic.

Learning Outcomes
K4. Describe the technologies and architecture of LANs, Wireless LANs and WANs.

K5. Identify the principles of LAN design.
A1. Analyse and design LAN architecture for organisational requirements.
S1- Analyse data communication and networking technologies in today's Internet.

Network Design Case

Assume Ballarat Technology Park, Mt Helen Campus, Federation University, Australia owns 300 employees with a 150-computer network. The park has two adjacent buildings: (i) a five- story office building comprising 120 rooms and (ii) a single-story administration building with 20 rooms. The office building houses 120 computers, with additional 30 computers in the administration building. The current network is old and needs to be replaced.
The new network will house a data centre, the e-commerce edge, and 12 printers. 10 printers will be installed in the different rooms of the office building, while the other two are to be installed in the administration building. An employee is allowed to have printing service with any printer through the new network. Employees will bring their own mobile devices (e.g., laptops, smartphones, tablets) to work. Employees will use them to access required information such as their work email, required documents, and Internet through wireless communication facilities (Wi-Fi access points).
Note, there are no other campuses, so you can omit WAN access. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way.
Requirements
There are two parts of the requirements for this assignment - a) Report and b) Presentation. Hand drawn layouts for both logical and physical designs are fine. However, if you like, you would use ConceptDraw or SmartDraw or any other network design software to draw the layout of logical and physical network designs.

a) Report
The report should be no more than 10 pages and needs to consider the following design tasks:

Design Tasks:
T1. Using the building-block network design process, develop a logical design of the new network for this enterprise campus that considers the seven network architecture components. Remember to consider the expected growth of the company. For the

logical
design, you need to consider the following items:
1. Network architecture components
2. Application systems
3. Network users
4. Categorizing network needs
5. Deliverables

2. T2. Design the physical design of the network based on the logical design completed in Task T1. Note, you do not need to develop an alternative design. For the physical design, you need to consider the following items:

1. Designing client and servers
2. Designing circuits
3. Network design tools
4. Deliverables
3. T3. Briefly describe how you will minimise the interference from Wi-Fi access points (APs) on different floors.
4. T4. You will make some assumptions; therefore, document your assumptions and explain why you have designed the network in this way.

b) Presentation

You need to produce a presentation consisting of eight PowerPoint slides based on your report and the relevant assessment criteria. The presentation time is 10 minutes. The presentation will be given in Week 12's timetabled tutorial.

Online students can provide the presentations through either an appropriate online video conferencing technique (e.g., Skype) or adding voice-over to their PowerPoint presentation slides.

Attachment:- network design assignment.rar

Reference no: EM132535318

Questions Cloud

Requirements for announcing federal contract awards : Evaluate requirements for announcing federal contract awards. Establish responsibilities of the Contracting Officers Representative (COR) for this contract.
Determine why funding is needed for the company : Determine why funding is needed for the company. Determine the sources of funding. Considerself-funding, borrowing, equity, venture capital, etc.
Inventory turnover for the year : Its inventory balance at the end of the year is $500,000. What is its inventory turnover for the year?
What is its return on equity : A company has assets of $2,000,000, net sales of $3,000,000, and $1,500,000 in equity. Its net income is $7,500,000. What is its return on equity?
Identify the principles of LAN design : Describe the technologies and architecture of LANs, Wireless LANs and WANs and Analyse and design LAN architecture for organisational requirements
Stock worth today at a 12 percent discount rate : CEPS Group announced today that it will begin paying annual dividends next year. The first dividend will be OMR 0.52 a share. The following dividends
Discuss the merits of performance appraisal : Discuss the merits of performance appraisal. Cite true life examples in which performance reviews helped or hurt job performance.
Why do think rita crunwell committed the crime : Why do you think Rita Crunwell committed this crime? Explain your answer in detail (e.g., don't just say she was greedy and leave it at that.)
Analyze the key influences : Analyze the key influences that the theorretical and practical aspects of public leadership may exert upon a public leader's performance.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Create and submit a security policy

Create and submit a security policy for McBride Financial Services, located in the Virtual Organizations. Develop a policy based on perceived needs associated within the loan department and issues in implementing online loan applications.

  Describe the process used in restoring the scrambled bits

You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment. Describe the process used in restoring the scrambled bits and insert plain text in the assignment

  Explain how to make the file transfer process more secure

Explain how your layered design compensates for possible device failures or breaches in network security. Determine whether any possible bottlenecks exist in your design. Explain how to make the file transfer process more secure.

  Provide a historical timeline of homeland security events

Provide a historical timeline of homeland security incidents along with the call for improved preparedness, response and recovery needs that lead to the creation of National Incident Management Systems and the National Response Framework documents..

  Mobile computing has dramatically changed how information

mobile computing has dramatically changed how information is accessed and shared. wireless networking has been an

  What is a proxy firewall and how is it different

COIS23001 - Network Security - What is a proxy firewall and how is it different from a network (or transparent) firewall and what does NAT stand for, and how does the mechanism work? Describe what, if any, security NAT provides (or fails to provide).

  What is the name of the certificate issuing authority

What is the login name and password used for connecting to the ftp server - What files were downloaded? Give their complete download path and their sizes.

  Describe methods for determining if user frustration

Describe methods for determining if user frustration is caused by poor system design

  Disadvantages of your remote access solution

Describe the advantages and disadvantages of your remote access solution. Describe the network protocols that will be used on your suggested network.

  Discuss the importance of nonrepudiation

Explain the importance of using ACLs. Discuss the importance of nonrepudiation. Identify some of the vulnerabilities that affect cryptographic systems.

  Evaluate cyber-defense tools in given situations

Evaluate cyber-defense tools that are used to proactively mitigate the risk of attack by a malicious insider. Explore strategies available to organizations.

  Difference between an insider attack and an outsider attack

What is the difference between an insider attack and an outsider attack? What is this defense in depth approach to security that we keep hearing about

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd