Principles of networking protocols and standards

Assignment Help Computer Networking
Reference no: EM133049616

ICT102 Technology and Networks - Sydney International School of Technology

Assessment - Network Basics

Overview
The purpose of this assignment is to assess the basic concepts of networking.

Please include SISTC's assessment cover page at the beginning of the submitted work.

Learning Outcome 1: Understand the fundamentals and principles of networking protocols and standards.
Learning Outcome 2: Identify reference models and Layered architectures in Networking.
Learning Outcome 3: Recognize Network topologies, media types and network components.

Assessment Details

Background

The SISTC recently had gone through a partial renovation. The school has 4 floors. According to new layout the ground floor has a reception room with 6 desks and a lecture hall. The first floor has a computer cluster with 30 PCs, computer laboratory with 20 workstations with computer facility, a lecture hall and five staff offices. The second floor has two research labourites for research and post- doctoral researchers. This floor had 8 staff offices and conference room. All workstations need two data points to get connected to internet. Each floor also requires wireless connectivity to enable the staff and students to get connected to internet.

SISTC requires new LAN architecture for these floors. Imagine you are the network manager of the school and required to write a report with the flowing section:

1. An introduction section to describe the background and outline the report.


2. To discuss interoperability issues for seamless connectivity to each floor, draw OSI layered architecture, discuss the OSI model, its history, the functioning of each layer.

3. Detailed comparison of OSI and TCP/IP models.

4. Explain the protocols working at OSI layers, briefly discuss their functionalities, and identify their standardising bodies

5. This LAN network requires both wired and wireless connectivity. Provide a comparative analysis of appropriateness of different media types which may be used to enable network connectivity. Discuss different types of media suitable for the above scenario with illustrations. Comparative analysis must be recommended in terms of speed, cost, and Security (use table for comparison).

6. A conclusion, summarise the overall contribution.

7. References must follow APA Format.

Attachment:- Network Basics.rar

Reference no: EM133049616

Questions Cloud

What is the risk exposure of abs building society : NG Bank owns $300 million of variable-rate notes yielding BBR plus 4 per cent. What is the risk exposure of ABS Building Society
At what amount should the land be recorded : On the same day, another piece of land on the same block sold for $237,290. At what amount should the land be recorded
System analyst queries : Assume you are employed as a systems analyst at your organization. Your organization has a number of in-house developed software solutions
Determine the market price of the one of the bonds : Coupon rate is set at 8% per annum and will be paid quarterly. The face value of one of the bonds is $1,000. Determine the market price of the one of the bonds
Principles of networking protocols and standards : Understand the fundamentals and principles of networking protocols and standards and Identify reference models and Layered architectures in Networking
How much cash is to be invested by bray : Bray is to be credited with a 1/3 interest in the partnership and is to invest cash. How much cash is to be invested by Bray
Determine chris taxable income and regular tax liability : Chris sold two pieces of equipment used in its business for total sales proceeds of $400,000. Determine Chris taxable income and regular tax liability
Different or attractive to the consumer : What are the overarching benefits they have to offer the consumer? What do they offer that is different or attractive to the consumer?
Why are they so dangerous to e-commerce : How are botnets, identity theft, DoS attacks, and website hijackings perpetrated? Why are they so dangerous to e-commerce?

Reviews

Write a Review

Computer Networking Questions & Answers

  Find the domain name associated with an if address

The standard suggests that when a program needs to find the domain name associated with an IF address, it should send an inverse query to the local server.

  How many cells-octets and bits can be present on a fiber

How many cells, octets, and bits can be present on a fiber that connects to an ATM switch if the fiber is 3 meters long? 100 meters? 3000 meters?

  Wireless access points in your company''s warehouse

As the Project Manager, you have been assigned a project to deploy ten (10) wireless access points in your company's warehouse and break room within the next ninety (90) days. You are free to make assumptions that satisfy the scope of the proje..

  Sorne of me internets biggest companies le cones

sorne of me internets biggest companies le. cones hilcrosoffahnobdquo yak and vedsign are working on a new single

  Describing a network management system

Write a two-and-a-half-page paper describing a network management system identified on a currently dated vendor website on HP

  Demonstrate a network design based on a real time scenario

Demonstrate a Network design based on a real time scenario - Network Design Report and Presentation - design report and send it to your technical manager

  Write a simple client-server network application

Socket Programming and Concurrency - write a client-server java program for transferring some file from the server to the client

  Find the minimized boolean function

Construct a truth table and find the minimized Boolean function to implement the logic telling the CSU staff when to approve. Draw a circuit diagram for the Boolean function.

  Define reaction-diffusion models

It has been discussed in the introduction that reaction-diffusion models (RDM) have been used to provide explanations of many observed phenomena.

  Discuss the main features of osfp implementation

Discuss the main features of OSFP implementation around summarization of topology and summarization of reachability information

  Literature review on modern network applications

MN504 - Networked Application Management - Cryptocurrency giants-Ethereum and Bitcoin - Perform a literature review on modern network applications

  Explain the layer-2 network concepts

Explain the layer-2 network concepts - Why does a full-duplex switch behave like a shared hub immediately after start-up?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd