Modern network for a sydney central station to support byod

Assignment Help Computer Network Security
Reference no: EM132359432

Assessment - Detailed design of a modern network for a Sydney Central Station to support BYOD.

Unit Learning Outcomes covered in This assessment The purpose of this assignment is to design and develop NETWORK requirements for bring your own device (BYOD,) which can be implemented with LAN/WLAN/WAN services for Australia's largest railway depot, Central Station which is the country's busiest transportation hub, serving as a key interchange point between trains, buses, coaches and trams. The design of network and service must be specific so that it can be used for a purpose of full support to customers, employees and other entitled users to effectively practice BYOD.

After the assignment, students are expected to learn not only the knowledge and current technical aspects of advanced networking but also research, data collection, analysis and writing skills, which are very important and helpful.

The following ULOs:
a. Model and critically compare LAN and WAN network technologies, topologies and implementation;
b. Configure, test and troubleshoot various network devices including routers and switches
c. Evaluate, different WAN protocols; such as HDLC, PPP, Frame Relay, DHCP, ISDN, NAT and PAT in a network environment, and configure, verify, troubleshoot related equipment;

Assignment Description:
Research and propose a Modern Network for the Sydney Central station with internet and wireless access. Details description is as under.

Description:
Australia's Busiest Transportation Hub Requires Strong, Scalable and Manageable Internet Connectivity to Support Bring-Your-Own-Device (BYOD) Phenomenon

ABOUT THE AUSTRALIA'S LARGEST RAILWAY DEPOT
As Australia's largest railway depot, Central Station has accommodated the people of Sydney, New South Wales (NSW) and Australia for more than 100 years. Central Station is also the country's busiest transportation hub, serving as a key interchange point between trains, buses, coaches and trams. More than 180,000 travelers pass through Central Station every day.

CHALLENGES
– The bring-your-own-device (BYOD) phenomenon created a growing demand for high-quality public Internet connectivity among the thousands of daily visitors passing through Central Station. The implementation of Wi-Fi for wireless broadband access would satisfy travelers' Web-access needs.
– In addition to acquiring Internet access, Central Station needed to be able to manage the bandwidth and ensure an optimum connection and an equal share for each user.

BYOD
BYOD is the emerging trend of people/employees/customers/crowd using their personal devices, like smartphones, tablets, laptops etc, to remotely access any organizational network to carry out work. BYOD encompasses BYOP (Bring Your Own Phone), BYOT (Bring Your Own Technology) and BYOPC (Bring Your Own PC) and is now encouraged by companies and organization all over the world.

REQUIRED RESULTS
A significant improvement is required in the following facilities/services;
– Quality of Service
– Productivity
– Scalability
– Connectivity and Roaming
– Analytics

THE REPORT
You are required to propose a detailed solution for the above discussed problem addressing all the challenges and write a report about it.

There are three (3) areas to consider for advanced network design in this assignment.
1. Propose a detailed design/layout for the station/platforms having multiple indoor and outdoor locations;
2. Design/Propose LAN (including Wireless LAN) and WAN services for the users
3. Research about LAN, wireless LAN and WAN technologies (Equipment, protocols and services)
4. Report must include:
– Introduction
– Site map/diagram (this need to be virtually assumed according to you own assumption/thinking)
– Scopes and Limitations
– Solution/Design
a. Logical Design and physical Design
b. Network structure/topologies
– Protocols, technologies and services
c. IP addressing
d. Security features, policies, redundancy
e. Provision of wired and wireless internet for staff and student
– WAN and LAN Services design and analysis
– Internet
– Summary
– References

Reference no: EM132359432

Questions Cloud

How do you manage your privacy and self-disclosures online : How do you manage your privacy and self-disclosures online? Do you think it is ethical for school officials or potential employers to make admission
Define the ethical dilemma : Define the ethical dilemma in your scenario and include specific information about the laws, regulations, or ethics that were violated in the state
Design of multirate signal processing and their applications : ME606 - Digital Signal Processing - Study of decimation and interpolation techniques - Measure the frequency of the real part of the output and see whether
Compare emerging tools and techniques for system management : MN506 - System Management - System Management Tools for Administration - Compare emerging tools and techniques for system management
Modern network for a sydney central station to support byod : ME504 - Advanced Networking - Detailed design of a modern network for a Sydney Central Station to support BYOD - design and develop NETWORK requirements
Scope management and health checks : Submit a scope statement to the town council for the July 4th parade and picnic he has volunteered to project manage - Scope Management and Health Checks
What is leaders role in creating high performance workplace : What is the leaders role in creating high performance workplace and What role does clear communication play in high performance workplaces
What are the principal features of us health policy : What are the principal features of U.S. health policy, and what are the various stages in the policy cycle? What is the role of public opinion in policy making
Determine referrals for collaborative care : MN577 - Women's Health Focus - Purdue University Global - Include relevant subjective and physical objective findings and List at least three differential

Reviews

len2359432

8/22/2019 11:52:07 PM

LAN and WAN services design and analysis Exceptional evaluation of LAN/WAN and core networks services Good evaluation of LAN/WAN and core networks services Internet Identified the requirements and provided excellent and comprehensive solution Identified the requirements and provided good and comprehensive solution Summary Logic is clear and easy to follow with strong arguments Consistency logical and convincing References Clear styles with excellent source of references. Clear referencing style

len2359432

8/22/2019 11:52:00 PM

Marking Rubric Criteria/ Grades [Excellent] >80% [Very Good] 70%-80% Introduction All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Report Layout Exceptional report layout, style and language used Very good report layout, style and language used Scope Demonstrated excellent ability to define the project scope/boundaries /margins and general requirements Demonstrated excellent ability to define the project scope/boundaries/ margins and general requirements Design/Soluti ons Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrated excellent ability to think critically but did not source reference material appropriately Protocols and Technologies Excellent understanding of LAN/WAN and WLAN Architecture and applications Very good understanding of LAN/WAN and WLAN Architecture and applications

len2359432

8/22/2019 11:51:51 PM

Scope Scope of the networking project should be clearly defined with the help of appropriate description and tools (figures and tables) need to be included to properly show the margins and requirements. 10 Design/Solutions This section should include proper headings and contents to propose a solution for the proposed network. Wireless LAN solution needs to be included. LAN and WAN need to be shown with network topology. 15 Protocols and Technologies Analyse and compare protocols, technologies and services for LAN, WLAN and WAN. 10 LAN and WAN services design and analysis LAN/WAN services design and analysis including VPWS, VPLS, VPRN, Ethernet (MEF) services 10 Internet Detailed design for the provision of wired and wireless internet to staff and students 5 Summary A report Summary must be included at the end of the report 5 References Follow IEEE style for the references 5

len2359432

8/22/2019 11:51:42 PM

Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows, whist details marking guide can be seen in the Moodle submission link: Note: The marking criteria varies for each assignment Section to be included in the report Detailed Description of the Criteria Marks Introduction A brief introduction should be included (4-5 sentences) 5 Report Layout The document should include all necessary headings, texts, figures, citations and sections to depict services and network design. Structure (format) and contents quality will be used for markings 5

Write a Review

Computer Network Security Questions & Answers

  Analyze the industry researched for each security model

From the first e-Activity, analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your findings

  Description of the state-of-the-art in your technology

Description of the state-of-the-art in your technology, a discussion of where the sources that you read believe the technology is heading in the near future

  How to manage the file system encryption keys

Setup a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

  Research the issue of iot security and write a report

Research the issue of IoT security and write a report documenting your findings. Explain fundamental information security concepts;

  Develop and ratify borderless cybersecurity policies

Establish international cybersecurity threat operation centers where international partnerships work together under the same roof to thwart cyberspace threats

  How do your privacy protections limit the companys liability

How do your privacy protections limit the company's liability? How do your privacy protections enhance employee motivation and productivity?

  Common information security concepts at the apprentice level

Write about common information security concepts at the apprentice level. Your summary must include an analysis that addresses strategic fit

  Who serves as the overall business manager

CMIT 320- In addition to the owner, who serves as the overall business manager. The example below is of the physical security of a warehouse.

  Potential weaknesses in the companys security posture

The contract requirements also mandate that Sifers-Grayson report cyber incidents to the federal government in a timely manner

  Define the security strategies of defense in depth

In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disadvantages of implementing each security strategy

  Stuxnet virus and choicepoint data breach

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Stuxnet virus and ChoiceP..

  Find the checksum at the sender site

This problem shows a special case in checksum handling. A sender has two data items to send: Ox4567 and OxBA98. What is the value of the checksum?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd