Strengths and weaknesses of your proposed network design

Assignment Help Computer Networking
Reference no: EM133796213 , Length: word count:1500

Introduction to Information Networks

Learning outcome 1: Evaluate the main technologies, models and protocols used in data communications and networking.
Learning outcome 2: Explain the purpose and functionality of layered computer network models.

Your Task
This assessment will be completed individually, and you will prepare a written report evaluating an organisation's network architecture and communication protocols. Your report should analyse the existing network setup and provide strategic recommendations to address any identified issues to enhance overall operational efficiency.

Assessment Description
As a network consultant, you are tasked with a critical project to design and evaluate a robust network architecture for a medium-sized financial consulting firm that specialises in real-time financial analytics and secure client communications. This firm is a hub for significant financial transactions and client data interactions that require ultra-reliable and secure network infrastructure.

Background and Current Challenges: The firm has recently experienced several network-related challenges that have impacted its operational efficiency and compromised client trust. Notably, the network has suffered from inconsistent data transmission rates which become particularly acute during peak business hours. This variability in network performance has led to delays in the processing of financial transactions and disruptions in real-time data analysis, which are core to the firm's services.

Initial investigations suggest these issues may stem from insufficient bandwidth allocation and potentially suboptimal network configuration. The current network setup may not be adequately supporting the high volume and velocity of data that the firm requires to function effectively. Moreover, the security protocols in place have also come under scrutiny, as the firm must ensure the highest levels of data integrity and confidentiality for its clients. Book your online assignment help today!

Objective: Your objective is to develop a network design that not only addresses these immediate bandwidth and configuration issues but also scales to support future growth. The design should ensure high availability, fault tolerance, and minimal latency to handle high volumes of data transactions securely and efficiently.

Tasks:
Design a Network Architecture:

Develop a comprehensive network design using the OSI and TCP/IP models, reflecting LAN and WAN integrations.
Choose appropriate network topologies (e.g., star for local area connectivity and partial mesh for WAN) to optimise data flow and resilience.
Use tools such as Draw.io or Microsoft Visio to create detailed network diagrams.
Include your first name, last name, and student ID on all diagrams as a watermark or header/footer element.
Critical Analysis:

Critically evaluate the strengths and weaknesses of your proposed network design.
Based on the scenario provided, analyse the potential causes of fluctuating data transmission rates.
Propose enhancements to the network's design and configuration to improve reliability and performance during peak loads.
Scenario-based Problem Solving:
Suggest networking hardware and software upgrades that could enhance data transmission rates.
Recommend specific configurational changes to existing network setups to alleviate bandwidth congestion, such as introducing specific protocols or upgrading to higher- capacity routers.
Ethical Considerations of Using Generative AI:
Analyse the ethical implications of deploying Generative AI in network communications.
Address potential risks such as biases in AI decision-making processes and privacy concerns.
Propose strategies to mitigate these risks, ensuring ethical use of technology. Consider how Generative AI can simulate network loads and predict potential failures.

Assessment Instructions
Your report should be submitted in Word Document or PDF format and be approximately 1500 words in length, excluding references and appendices.
Report Format: Your submission should be a well-structured report that includes:
An executive summary.
A detailed network design.
Analysis of the problem-solving approach.
Ethical considerations.
Visual Aids: Integrate diagrams and flowcharts to illustrate your network architecture and the data flow within the network.
References: Support your analysis with at least ten academic references.
Process Documentation: Document your thought process and decision-making journey from the initial design to the final recommendations.

Reference no: EM133796213

Questions Cloud

Which is true about cloned progress notes : With the increased use of EHRs and electronic notes, clinicians increased the use of the copy/paste function. Which is true about cloned progress notes?
Which information does the client need to know to administer : A health care provider prescribes transcutaneous electrical nerve stimulation. Which information does the client need to know to administer this treatment?
Define sexual victimization : Define sexual victimization and its scope, including various unwanted sexual behaviors.
What would you prioritize for patient teaching : What would you prioritize for patient teaching? Why is it important to be aware of cultural or societal biases when treating or interviewing this patient?
Strengths and weaknesses of your proposed network design : Network performance has led to delays in the processing of financial transactions and disruptions in real-time data analysis, which are core
Discuss the clinical problems you would expect to see : Discuss the clinical problems you would expect to see due to this severe injury to the exocrine pancreas. Relate these problems to the normal function,
What injury sustained in the region of the thorax : What injury sustained in the region of thorax and abdomen managed with rest and support and treated symptomatically with an X-ray to rule out any complications?
What prevention method is the best for nurse to recommend : The client asks about methods to prevent transmission of gonorrhea in this case. What prevention method is the best for the nurse to recommend to the client?
Which agents is not an appropriate option for this patient : The patient has an intact uterus and is agreeable to receiving hormone therapy. Which agents is NOT an appropriate option for this patient?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd