Network redesign and demonstration

Assignment Help Computer Networking
Reference no: EM132216996 , Length: word count:1000

Network requirement analysis and plan

Purpose of the assessment (with ULO Mapping) This assignment is designed to assess students' knowledge and skills related to the following learning outcomes:

d. Apply concepts and theories of human factors as related to network design and implementation;
e. Evaluate performance metrics and dimensions according to specifications.

Assignment Description

Project Scope: A typical network layout diagram of a medium sized firm is given below. Provided the advantages, the firm wants to redesign its network adapting a layered approach (core, distribution and access) in the design. The network design requirements are a) three layered network design (core, distribution and access) b) redundancy required in the core layer.

Gathering information about the existing network (such as IP addressing scheme, traffic restriction polices, applications used etc.) is paramount for any network redesign for seamless transition. In this regard, the staff members and IT staffs can be invaluable sources of information. A carefully designed questionnaire can be instrumental in gathering the information.

2347_figure.png

Figure. Network layout of a firm

Part I: Information collection
Develop a questionnaire to gather requirements from staff members, IT members and management. The followings are to be covered in this section.
– What kinds of questions would you ask to better understand their environment to each group of users?

– For the Quality of Service (QoS) requirements, it is mandatory to acquire the information about the traffic types from the IT staffs and set the bandwidth requirement accordingly. Specifically, for the new design the followings criteria have to be satisfied.
For real time traffic, bandwidth percent should be set to 70 of the available bandwidth. For ftp traffic, bandwidth should be set is 200 kbps.
For SNMP traffic, bandwidth should be set to 800 kbps.

Note that the traffic information is important and will be used for QoS. QoS reflects on the performance evaluation of the design.

– How would you validate and verify the gathered information?

Part II: Network redesign and Demonstration
This is a network redesign and demonstration section. The following are to be covered.
– A three-layered network design (consisting of the Core, Distribution and Access) is needed.
– The new design must be the transformation of the existing design show in the figure above (i.e., IP addressing, number of departments etc., should remain intact in the new design).

For demonstration, the format would be a) no more than 2 persons in a group, b) at least 3 viva voce questions related to the design, and c) demo and viva voce duration 5 - 7 minutes (at max). The following is to be covered.
– Demonstration of a part of the design in Week 11 lab class (hardware platform)

Reference no: EM132216996

Questions Cloud

Market strategies to promote healthier cereals : Market strategies to promote healthier cereals were the focus of discussions among industry insiders.
Context in which intercultural conflict occurs : Why is it important to understand the context in which intercultural conflict occurs?
Write a brief response of the given discussion : Please write a brief response to the following discussion by using one Nursing Peer-reviewed journal not older than 5 years. APA format required without cover.
Prepare a report for the audit senior : For each account and assertion identified in requirement 3, design and describe an audit procedure that would provide relevant evidence for this
Network redesign and demonstration : Advanced Network Design - Individual written report and group demonstration - Evaluate performance metrics and dimensions according to specifications
How have the given findings changed your nursing practice : Identify two areas of nursing practice, which evidence-based practice has improved patient outcomes. State the study and its impact on patient care.
Conflict as an opportunity : How does the "conflict as an opportunity" orientation differ from the "conflict as destructive" orientation?
Examine a problem you have seen in nursing : Nursing research is used to study a dilemma or a problem in nursing. Examine a problem you have seen in nursing. Why should it be studied?
Explain the different elements of property rights : Explain the different elements of property rights. Provide an example of how the US economy infringes on each.

Reviews

len2216996

1/16/2019 10:39:45 PM

Demonstration Logic is clear Consistent Mostly Adequate Argument is (10) and easy to logic and consistent cohesion and confused and follow with convincing logic conviction disjointed strong convincing arguments IEEE Reference Clear styles Clear Generally Sometimes Lacks style with excellent referencing good clear consistency (5) source of style referencing referencing with many references style style errors

len2216996

1/16/2019 10:39:37 PM

Evaluation i.e., Demonstrated Demonstrated Demonstrated Demonstrated Did not validation and excellent excellent an average an average demonstrate verification of the questionnaire (5) ability to think critically and sourced reference ability to think critically but did not source material ability to think critically and sourced reference ability to think critically but did not sourced the ability to think critically and did not material appropriately material reference sourced appropriately appropriately material reference appropriately material appropriately Network All elements Components Components Most Lacks design and its applications (10) are present and very well integrated present with good cohesion presented and mostly well integrated components present and an average components and not integrated integration well

len2216996

1/16/2019 10:39:27 PM

Grades HD 80% and above D 70 - 79% CR 60 - 69% P 50 - 59% Fail <50% Questionnaire prepared (10) Concise and specific to the project Topics relevant and soundly analysed Generally relevant and analysed Some relevance and briefly presented Not relevant to the assignment topic Questionnaire purpose (10) Demonstrated excellent ability to think critically and sourced reference Demonstrated excellent ability to think critically but did not source material appropriately Demonstrated an average ability to think critically and sourced reference Demonstrated an average ability to think critically but did not sourced reference Did not demonstrate the ability to think critically and did not sourced

len2216996

1/16/2019 10:39:20 PM

Demonstration Demonstration of the part of the network in hardware platform in lab • Work progression record and consultation will be on week 9 and 10 by the lab tutor. • Demonstration of a part of the design in Week 11 lab (hardware platform) Demonstration marks will be awarded in regards to the stage of the completion of the demo and viva. 10 References Follow IEEE style referencing 5 Total 50

len2216996

1/16/2019 10:39:14 PM

Section to be included in the report Description of the section Marks Questionnaire prepared Are question prepared for: • Users • Management • IT staffs 10 Purpose of each question Are questions valid for gathering the information from stakeholders? 10 Validation and Verification plan Is there a plan to verify the gathered requirements from various stakeholders? 5 Network design with proper explanation and justification A clear network design (use netsim only) and proper labelling 10

len2216996

1/16/2019 10:39:04 PM

Due Date Week 11, 1, 11:55 PM, submit individual report on Moodle, demonstration of part of a design in hardware lab Week 11. Submission Guidelines • All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Describe the domain local global and universal group scopes

Describe domain local, global, and universal group scopes. Detail concepts related to nesting of these groups for proper assignment of permissions to resources.

  Provide an information security assessment

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no m..

  Describe the wireless spectrum

Describe the wireless spectrum. Describe how interference can distort and weaken a wireless signal. Describe the Frequency-Hopping Spread Spectrum (FHSS) and Direct-Sequence Spread Spectrum (DSSS) spread spectrum technologies

  Explain stop-and-wait error control

Explain Stop-and-Wait Error Control and Sliding Window Error Control techniques.

  Describe the components of rfid systems

Explain RFID and describe the components of RFID systems. Include in your discussion some of various RFID security and privacy threats.

  Which networking model can the network now support

In Question 11, suppose one computer is upgraded from Windows 7 Professional to Windows Server 2012 R2. Which networking model can the network now support.

  Discuss about the types of topology

Wireless communication, generally, useless three configuration topologies (1) point to point; (2) point to multipoint; and (3) multi-point to point. In this paper, (a) define each topology, (b) provide a scenario for using each topology, and (c) ..

  How might you assess the various network technologies in

question youve been hired to be part of the team building a mission control and reporting system for a new uav system

  Create an appropriate framework and standard for the network

Create an appropriate framework and standards for the planned network. Write a detailed setup of network devices only for a LAN.

  Producing list of mac addresses and ip addresses

You have been asked in order to produce a list of the MAC addresses and the corresponding IP addresses and computer names within your network. Suggest at least two methods in order to complete this task.

  How ips anomaly detection differ from misuse detection

How does IPS anomaly detection differ from misuse detection? - What is computer forensics? - What is a honey pot? - What is desktop management?

  Under what conditions should the page be copied locally

That page is initially remote, and it takes C nsec to copy it locally. Under what conditions should the page be copied locally in the absence of significant use by other processors?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd