Wireless computer desktop layout plan

Assignment Help Computer Networking
Reference no: EM132482670 , Length: word count:2500

MITS5003 - Wireless Networks and Communication - Victorian Institute of Technology

Case Study - A Wireless network Infrastructure design for enterprise network: A request for proposal (RFP) to design a new Wireless Local Area Network LAN and Backbone wide area network (WAN) network design report.

You should supply the following information in response to the request for Proposal (RFP):

Part 1 Project requirements brief can be derived from Objectives and Scope of Work section of the RFP. A requirement brief is usually an itemized list of the client's requirements derived from the RFP.

Part 1) Wireless LAN design for a typical floor, which includes the following information:-
i. Wireless computer desktop layout plan with network topology for a typical floor level.
ii. Wireless Access Point location on a typical floor, vertical cable paths and lengths between the floors. Switch/Access Point functional specifications. Assume the floor to ceiling height as 3 meters approximately including the false ceiling.

Part 3 Recommendation and justification of the structured backbone cabling, Access Point (AP), Switches i.e. distribution layer, building backbone cabling and media type to be used for a typical floor level and for the connection across the road to the existing LAN.

Part 4 List of equipment and the wireless specifications, technical and cabling specifications. Note: Specifications/Technical details should be included in the Appendix.

Part  5 You need to outline design rules for a computer WLAN & WAN network and describe it in detail. Your description should include:

a. Detailed steps required in the network design process,

b. methods used to form estimates of network performance for each access point taking into account the types of antennae and wireless protocol,

c. An example of a basic sample design showing proposed wireless desktop floor plan, assumptions, justifications and calculations.

d. Assumptions of backbone connectivity using wireless media needs to be reported.

e. Your new design should include IP addressing strategy for both the acquired new buildings

Write a report of maximum 3000 words, not including diagrams and pictures (you can write a good report in around 1500 words).

Attachment:- Wireless Networks and Communication.rar

Reference no: EM132482670

Questions Cloud

Evaluate the literature on development and operations : Evaluate the literature on development and operations within the context of infrastructure management, deployment and automation
What is the adjusting journal entry made by abc company : At the end of the accounting period, ABC owes the bank three months of interest. What is the adjusting journal entry made by ABC Company? Explain.
Detailed steps required in the network design process : Outline design rules for a computer WAN network - Recommendation and justification of the structured backbone cabling, Access Point
Compute valero return on equity : Determine and Compute Valero's return on equity (ROE) for 2016 and 2015. Valero Energy stockholders' equity in 2014 was $20,677 million.
Wireless computer desktop layout plan : Recommendation and justification of the structured backbone cabling, Access Point (AP), Switches i.e. distribution layer, building backbone cabling and media
Design for enterprise network : Design for enterprise network - A request for proposal (RFP) to design a new Wireless Local Area Network LAN and Backbone wide area network (WAN) network design
What is the maximum he will receive as an employer : Highly compensated employee who earns $225,000, what is the maximum he will receive as an employer match from Monarch if the ADP of the NHC is 4%
Determine the gross profit for april and ending inventory : Determine the gross profit for April and ending inventory on April 30 using the first-in, first-out (FIFO); last-in, first-out (LIFO)
How do get common stock with the information : how do get Common Stock with the given information. Prepare a 2018 balance sheet for Rogers Corp. based Cash = $139,000; Patents and copyrights = $630,000;

Reviews

Write a Review

Computer Networking Questions & Answers

  Prevent from the loss of confidentiality caused by malware?

1. Cybercirminals can use malware to steal files and information from computer, if this happens have loss of confidentiality. Explain how antivirus can be help to prevent from the loss of confidentiality caused by malware?

  Explain way handshake process use to initiate tcp connection

Explain the three-way handshake process used to initiate TCP connections. Describe the three basic types of network topologies and provide a sample diagram.

  Describe von neumann architecture

Describe Von Neumann architecture

  Analyse and compare various server management systems

MN506 System Management Assignment - Server Availability Monitoring and Metrics, Melbourne Institute of Technology, Australia

  Strategy planning for corporate

In another year, after all assignments are completed, you consider to convert back to a volunteer basis with AllTechComm, and to discover more profitable employment, preferably with a major company.

  Describe the function or purpose of a virtual machine

Which of the following is the best definition/description of the chroot jail Linux/Unix security control?

  What type of web sites offer these tools

Search the Web to find places to download password cracking tools - What type of Web sites offer these tools?

  Literature review on internet of things

Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art - current or future

  Advantages of the three main topologies- ring bus and star

Write a paper detailing the advantages and disadvantages of the three main topologies: Ring, Bus, and Star

  Find out why ip addresses cannot replace cookies

Find out why IP addresses cannot replace cookies. Find out about Web mirroring, in which caching is done at the server site instead of the client site.

  Find maximum value of l if tcp sequence number not exhausted

Determine the maximum value of L such that TCP sequence numbers are not exhausted? Recall that TCP sequence number field has 4 bytes.

  How to install dns and configure it including dns tree

How to install DNS and configure it including DNS tree. Explain ongoing monitoring and management of server installation. Recommendations for utilizing Hyper-V.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd