Professional expectations in data communication

Assignment Help Other Subject
Reference no: EM132375542

Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to exercise and develop skills required to analyse and design networks to address the need of clients. Students will be able to:

1. Discuss the need of electronic data communication and networking to achieve business goals.

2. Explain and apply various networking and data communication technologies in the context of a specific business need.

3. Evaluate and assess hardware and software requirements of a data communication and networking infrastructure.

4. Define, prioritise and evaluate the requirement of the business to provide data communication and networking requirements.

5. Understand, evaluate and describe importance of network and data communication for a business operation and assess and suggest troubleshooting suggestions for a data communication and networking problem.

6. Communicate using an effective oral and written communication, act in a professional conduct, be an effective team member or team leader and be creative and innovative.

7. Understand the ICT profession and professional expectations in data communication and networking.

Assignment Requirements:

Purpose of this assignment: In this assignment, you are required to identify the resources needed to design and setup a network infrastructure for the new campus for Holmes Institute in Melbourne. You also deal with problem solving which includes the identification and determining the specification of the problem, strategies for its solution. You have to critically evaluate the solution provided through the reflective report writing. Then present and justify an appropriate networking solution to meet specified requirements.

Holmes has provided you with the following details:
• The campus occupies five (5) three storey shop lots
• There are two (2) schools for Melbourne Campus:
o School of Information Systems (60 PCs)
o School of Cyber Security (90 PCs)
o School of Business
o School of Fashion (45 PCs)
• Each School has two subnets: staff subnet and student subnet.
• There are six (6) departments:
o Student Services (30 Hosts)
o Higher Education (60 Hosts)
o Exam and Accreditation (15 Hosts)
o Maintenance and Logistics
o Finance
o Human Resource

Your task is to come up with a logical, efficient and scalable network design that will be suitable for the new campus. Holmes Institute has allowed an adequate budget to purchase any equipment that may be required, yet obviously does not want to spend more than necessary.

Requirements:

Assume that the network described Assignment 1 is expanded to include two new schools and an IT centre. A new IT centre has just opened up. It aims to provide student labs, provide computers for its education and administrative staff and set up a web server. Holmes has just purchased one Metro Ethernet connection from HLNET providing 10Mbps for upload and download. It has also purchased the 202.175.177.128/26 network from HLNET.

Part 1:

In terms of PCs, the IT centre has the following plans:

1. It wants to setup one web server to host the center's website and
2. It wants to setup one file server on which its students can access course materials from home in addition to E-mail and an FTP servers,
3. Each of these will be allocated a different DNS name
4. The IT center wants to set up three computer labs, containing (60 PCs), (90 PCs) and (45 PCs) with each having internet connectivity
5. Additionally it wants to allocate 7 PCs, each of which will be placed in different classrooms and are to be used by the course tutor. These PCs also require internet connectivity
6. 2 PCS will be given to the system administrator, with the facility to provide any type of Internet services on them
7. Also, 5 PCs will be made available for administration and another 3 for tutors Please note that management has decided that these PCs should not get internet connectivity but should still be able to access the web and file server
8. A wireless network should be made available to students which can allow students internal access to the file and web server but not to the internet
9. Furthermore, authorized users of the network are able to login remotely (e.g. from their homes, Internet cafes) via a Virtual Private Network (VPN)
a. Provide two (2) possible security requirements for the new network design
b. State two (2) possible rules in the security policy document for the new network. For each rule, explain its rationale (i.e. why the rule is in place)
10. Provide one (1) test objective and its corresponding acceptance criterion that are relevant to the newly designed network. List out the complete test script for the test. In your report, provide a drawing of the logical network diagram of the new network by incorporating any additional devices such as protocol analyzers to illustrate the testing environment. You do not need to do this in Packet Tracer. In addition to the testing environment, the diagram should also depict the entire setup of the new network
a. Types of test to run Performance tests - Throughput - Delay - Delay variation - Response time - Efficiency Stress tests - Decreased service when the load increases Failure analysis - Network availability and accuracy - Causes of outages Other tests - Manageability, usability, adaptability, security, regression
11. Explain what regression testing is and give one (1) example of this type of testing for the above network design scenario.
12. Propose one (1) method to further improve the security of the new network
13. What aspects of network management related to fault and accounting that can be implemented on the new network?
14. You have to design the network topology. At this stage, you have to provide evidence of the system setup by stating and overview network topology and details of every departmental network design
15. Estimation Costing
a. Produce a listing of equipment and implementation cost. This includes software license, installation, operation and maintenance cost

Part 2:

You have to write ONE (1) report that on ONE (1) current trends of network technologies below. Case studies can be included. Each group member MUST NOT have overlapped topic. The suggested topics but NOT limited to:
1. Content Distribution Networks (CDN)
a. Is CDN meeting the challenge of distributing massive amount of video streaming
2. Network Congestion Control
a. The causes and the costs of congestion
b. Approaches to congestion control
3. Software Define Network (SDN)
a. How SDN different from conventional network design and implementation?
4. Dynamic Adaptive Streaming (DASH) over HTTP
a. Implementation of DASH in the Internet
b. How is DASH different from other streaming protocol?
5. Multiprotocol Label Switching (MPLS)
a. Study at surface level why MPLS is replacing Frame Relay and Asynchronous Transfer Mode (ATM)
6. Data Center Networking
a. A brief introduction to data center setup on providing cloud application
7. Wireless and Mobile Networks
a. CDMA b. 802.11
c. Cellular 4G: LTE
8. Security in Networks
a. Authentication protocols
b. Pretty Good Privacy (PGP)
9. Multimedia Networking
a. Voice-over-IP (VoIP)
b. Real-time Transport Protocol (RTP) and Session Initiation Protocol (SIP)
c. Quality of Service (QoS)

Your write up should not be more than 1000 words, excluding diagrams and references.

Deliverables

The team must prepare a proposal to explain about the suitable solution proposed. You are requested to depict the network setup by means of diagrams showing the division of the networks and their interconnections. You are free to choose the format of the network diagram as long as it has the required information. You can see samples by searching Google Images with the keywords "sample university network diagram".

The suggested proposal structure is as below:
• Introduction and Review
• Build a document giving all the necessary network designs (enough information should be provided that would allow any technician to build your network structure from scratch)
• Produce an overview for the services provided, this will include the review of the current technologies and services available
• Resource Requirements
o Produce a write up on the recommended technology, which includes the software and hardware requirements
o Details of cost should be included in the next section. Elaborate on the decision of the choice
• Network design
o Construct the network design in Cisco Packet Tracer simulator
o Use appropriate addressing scheme for the network devices and ensure that all the host names and network addresses are well and clearly labelled.

Assignment Submission PART 1
The assignment submission should take the form of a report that thoroughly details the reasons for decisions made, as well as the actual decisions made. The total length of the report is 1500 words. You should include a Title Page, Index Page, the full report and all references. All information sources must be appropriately acknowledged and a full bibliography is required.

PART 2
The total length of the report is 1000 words. You should include a Title Page, Index Page, the full report and all references. All information sources must be appropriately acknowledged and a full bibliography is required.

Packet Tracer
Save and summit Packet Tracer files using .pkt format

Reference no: EM132375542

Questions Cloud

Writing assignments the nature of algorithm : Writing assignments the nature of algorithm. read Lesson 3.2 about the nature of algorithms in chapter 3 from An Introduction to Computer Science with Java,
What is the approximate risk premium for common stocks : What interest rate would you expect on U.S. government T-bills? What is the approximate risk premium for common stocks implied by these data?
What is an interpretation of the case study conclusion : What is an interpretation of the case study's conclusion that "the vocational rehabilitation intervention program may be effective at promoting full-time.
What are the three practices of american studies : According to Manfred Steger, what is the very short definition of globalization? What are the three practices of American Studies?
Professional expectations in data communication : Communicate using an effective oral and written communication, act in a professional conduct, be an effective team member or team leader and be creative
Implementation of authentication process : Implementation of Authentication Process. Design and document a secure wireless local area network (WLAN) authentication process.
Show that C does not contain any open interval : MATH3969/4069: Measure Theory and Fourier Analysis (Advanced) Assignment, The University of Sydney, Australia. Show that C does not contain any open interval
Explain your interpretation of what occurred in the dialogue : Explain your interpretation of what occurred in the dialogue, including social work practice theories, and explain how it might relate to diversity or cultural.
What is one share worth today at a required rate : What is one share worth today at a required rate of return of 14 percent?

Reviews

len2375542

9/24/2019 3:15:44 AM

PART 1 The assignment submission should take the form of a report that thoroughly details the reasons for decisions made, as well as the actual decisions made. The total length of the report is 1500 words. You should include a Title Page, Index Page, the full report and all references. All information sources must be appropriately acknowledged and a full bibliography is required. PART 2 The total length of the report is 1000 words. You should include a Title Page, Index Page, the full report and all references. All information sources must be appropriately acknowledged and a full bibliography is required.

Write a Review

Other Subject Questions & Answers

  Show effect of technological change on lodging industry

Write an essay on the effect of technological change on the lodging industry, and how businesses should best respond. Consider the question from both sides the effect on how the business is run

  Explain aristotles theory of the golden mean

Explain Aristotle’s theory of the Golden Mean. In your answer make sure you explain how his theory relates to reason. Why is Aristotle’s theory ineffective when we attempt to apply it to new moral problem

  Create or access data has had a significant effect

The proliferation of mobile devices to create or access data has had a significant effect on the security concerns surrounding personal and corporate data.

  Did you discover that illness and stress amplified

Did you discover that illness and stress amplified the spiritual concern and needs of your interviewee? Explain your answer with examples.

  Internal and external validity in quantitative research

Identify a potential ethical issue in quantitative research and explain how it might influence design decisions - Internal and external validity

  Why is it so difficult for the two major political parties

ground rules your response to the question below should be 3-4 pages in length double-spaced using regular 12 point

  Is there significance in the names of some of the characters

Using the book Psychology A concise Introduction in your text as a guide, diagnose and elaborate on any of the   characters' mental illnesses. Is there significance in the names of some of the characters, i.e., Nurse Ratched, Nurse Pilbo, Billy Bib..

  Develop understanding of the system development life cycle

Design an internet of things solution for a specific company - develop your understanding of the System Development Life Cycle (Chapter 9), security

  Compare the veldt by ray bradbury and harrison bergeron

Compare and Contrast Essay based on "The Veldt" by Ray Bradbury and "Harrison Bergeron" by Kurt Vonnegut

  Discuss about the police department budgeting

After reading Police Department Budgeting: A Guide for Law Enforcement Chief Executives , critique the strategies suggested there and explain how you would apply them to creating a police budget in your own community.

  Who in the film represents the asian native cultural values

What is the major Asian American issue in the film? How is the Asian/Korean native culture played out in the film? Who in the film represents the Asian native cultural values

  Discuss the differences between fraud and abuse

Discuss the differences between fraud and abuse. During your discussion, provide examples of each and how health care managers might deal with them.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd