Review available network technologies

Assignment Help Computer Networking
Reference no: EM132471438

ICTICT401 - Determine and confirm client business requirements - Academies Australasia

Assessment Task 1- Project Activity Report

In this assessment task, you are required to gather, determine and confirm client requirement and review available network technologies, devices and protocols to build WLAN (Wireless Local Area Network) for small office or home office network by choosing appropriate hardware and software in accordance to business and technical requirements including installation plan, network design and security.

Introduction:
Devon Education is a growing educational provider. It has been operating since 2010. Its main business is to provide vocational training and education for international students. With further growth in business, BEG has decided to open new office in Brisbane.

Key Project objectives:

Furthermore, after your meetings and interviews with Andre, Johnson and Angela, following information were collected.
• Each staff member will have complete desktop, access to printer, wireless and NAS
• Staff should be able to use the network securely.
• Data in Network Access Storage (NAS) should be able to share between all staff.
• Hardware and software should be of industry standards.
• Router and WAP must be regularly monitored and backed up.

Tasks:Prepare a Report

Research and prepare a report for Brisbane Education Group to satisfy the business requirements for BEG,
You report must contain:
• Cover page
• Table of Contents (Refer to sample Table of Content)
• Number all pages at the bottom centre of the page
• Include your course, name and student number as a header at the top of each page.
• Use 1.5 line spacing (other guides may prefer double spacing)
• Use the Times New Roman font at either 11pt or 12pt size
• Either have a line space between paragraphs or indent the first line of each Paragraph.1. Introduction:
This section should cover what the report is all about, and what are the main areas the report will cover that may include specifications, features, functionalities, prices etc.

2. Data Gathering Techniques:

Discuss your findings on the data gathering techniques used to gather critical business and systems requirements.This section must cover the following:
• List two different techniques/methods used in this information gathering and explain
• What are the questions?
• List the issues uncovered in this investigation
• What changes are required to the current infrastructure to implement new systems
Complete the attached Appendix 1.

3. Request System Access
Draft an email to be sent to IT manager requesting to be given access to server systems.

4. Network Infrastructure:
Create a hardware and software requirements details based on various data gathering techniques used. You should include all the required hardware (including WAN, LAN, Wireless and cabling), and software requirements. (including application software and Operating System).

5. Cabling Requirements:
The Brisbane office has 7 rooms al located on the first floor. The floor size for each room is shown in the below floor plan.

In this section you will need to answer the following:
• Type of cable to be used
• Approximate length of the cable
• List the OH&S issues that must be looked into
• List the building and government guidelines to consider during the cabling

6. Design Considerations:

The Brisbane office currently has an existing LAN network with 7 PC's. The infrastructure requirements must address the following:
• List the network design consideration which should be considered so that the existing network does not have any impact on the proposed new network.
• List the WAN design consideration based on organisational guidelines
• List the Wireless Network design consideration based on organisational guidelines

7. Hardware and Software Evaluation:
Based on the client requirements, compare and evaluate Two (2) each of the hardware recommended in terms of their:
• Performance
• Functionalities
• Cost
• Licencing

For costing, you must include quotation. Please see the Appendix 2provided.
You will need to contact vendors and refer to appropriate resources to obtain technical specifications and cost of the hardware and software required.

8. Network Diagram - (Should include Router/WAP, Clients, and Printers)

9. Topology:
In this section, you will need to provide information about the topology to be used in the scenario provided. 

10. Network Configuration (IP Addressing scheme)
In this section you will need to plan and answer the following:
• Class network address
• Network address
• Host address
• Subnet mask
• Services to be installed, for instance, File Service, Print Service, DHCP, DNS etc.
• Suitable protocols to be used with the capabilities and features, TCP/IP for instance

11. Internet (WAN) connection
In this section, you will need to provide recommendation about the Internet Service Providersas per the client's requirements. Include the following:
• Cost of service per month
• Download bandwidth per month
• Vendor
• Contractual agreements

12. Security Threat Detection and Testing
In this section, you will need to investigate on possible security issues the business might face in future and recommend on strategies to avoid such risks. You must include the following:
• List the risks
• Discuss on the strategies to implement to avoid those risks such as
o Intrusion Detection and penetration testing techniques
o Authentication methods
o Network protocols and data encryption

13. Backup Plan
In this section, you will need to recommend on the back up strategies as per the client requirements. Discuss on the recommendation such as Daily backup, Incremental backup, Differential backup, or Cloud backup etc.

14. Review and Sign off Form
In this task, you need to conduct a meeting with IT manager. Your trainer will act as an IT manager.
You need to present the prepared report to IT manager to collect feedback and update the report. Once the feedback has been collected, update the report.

Attachment:- ICTICT401 Determine and confirm client business requirements.rar

Reference no: EM132471438

Questions Cloud

Write a letter of opplogy for plagiarism to the disciplinary : Write a letter of opplogy for plagiarism to the disciplinary board.
Determine values of price-income-advertising elasticities : At the equilibrium, determine the values of the price, income, and advertising elasticities of demand. With respect to price, is cigarette demand elastic
Explain key supporting points for alternate side of issue : Explain a balanced view of the issue by reviewing valid points from the two sides (common ground). Explain key supporting points for the alternate side of issue
Estimating the passenger demand for airline travel : Imagine you work as an economist for a particular airline (A). Your job entails estimating the passenger demand for airline travel provided by A.
Review available network technologies : Determine and confirm client requirement and review available network technologies, devices and protocols to build WLAN for small office or home office network
Discuss who does the first amendment protect : According to this article, who does the First Amendment protect? (hint: two groups). Do you think AI should have the right to speak freely? Justify your answer.
Influence the demand for cigarettes : As an analyst for the FDA, your boss requests that you determine the factors likely to influence the demand for cigarettes.
Identify a disruptive innovation in healthcare : Identify a disruptive innovation in healthcare (i.e. one that completely changed the market). Why was t revolutionary? How did it change healthcare
Problem of technological unemployment : Would the problem of technological unemployment be eased if the competitive market system was allowed to function more completely?

Reviews

Write a Review

Computer Networking Questions & Answers

  What is the subnet mask of the subblocks

COIT12206 TCP/IP Principles and Protocols Written Assessment. Calculate the subnetworks and answer the following questions for all three of the subblocks. Make sure you show detailed calculations to get full marks in this question. What is the subn..

  What are some common risks found in the lan-to-wan domain

What are some common risks, threats, and vulnerabilities found in the LAN-to-WAN domain that must be mitigated through a layered security strategy

  Assignment - design a detailed network in netsim

MN503 - Network design with configuration - Overview of Internetworking - Implement a process to support the administration and management of internetworking

  Data integrity for input strings and security issue

What are some problems with not adding data integrity for your input strings? Example: If you are asking for an amount and when you can put in a letter. What is one security issue that can take place with an interface? Explain why.

  Create a three-screen wireframe that demonstrates your ideas

Create a 2- to 3-screen wireframe that demonstrates your ideas for the product or service to the organization.

  How to develop a successful project team

How to develop a successful project team. The core of the case is a description of an actual team development situation - characteristic stages of team development

  Write paper on functions of dns and dhcp in windows server

Write a 350- to 500-word paper on the functions of DNS and DHCP in Windows Server 2012 for Wadley, Inc. You will cover how to install DNS and configuration it, including the DNS tree.

  Contrast the various types of servers or services

Contrast the various types of servers or services that can be placed at the access, distribution, and core layers. The response must be typed.

  Performance and deployment issues for networked applications

Analyse performance and deployment issues for networked applications - Compare appropriate industry tools and techniques to manage networked applications

  Designit plans to relocate three servers already configured

DesignIT plans to relocate three servers already configured. DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance.

  Create a cloud app

CS 496: Cloud and Mobile Software Development. You can create the PDF anyway you like. But see homework #1 for tips on one good way to create a PDF.

  What protocol similarly provides a network layer address

The neighbor discovery protocol (NDP) is used to look up a link layer address when one has only an address for some layer above the link layer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd