Discuss network designs, Computer Networking

Assignment Help:

This assignment will assess parts of objectives 2-6 from the subject outline:

1 Explain the principles of logical design

2 Discuss the strengths and weaknesses of various network designs

3 Demonstrate an understanding of network design by presenting their own designs

4 Share and promote own design by means of written communication

The assignment will focus on parts of the following topics from the subject outline:

1 Requirements Analysis

2 Flow Analysis

3 Design Taxonomy

4 Network Management

5 Network Security

6 Routing and Addressing

7 Technology Choices

You have completed the requirements analysis and the flow analysis for the departmental network infrastructure (Assignment 1). You are now ready for the architectural design for the entire network of the department.

This is a group assignment. It is to be completed in groups of three. The Requirements Analysis and

Flow Analysis completed previously should be used as a starting point for this project. This detail may be updated based on collaboration within the group, or based on other information which may have been made available. Your design should be based on your agreed set of requirements within your group.

Your task as the Network Engineering team within the IT group is to provide the logical and physical design, and have it approved by the review committee of the department.

You are to deliver a logical and physical design. The logical design is to include:

1. IP addressing scheme based on RFC1918 addressing,

2. Network and systems management and monitoring design,

3. Routing protocol design,

4. HA design - you need to propose a reasonable network availability SLA which will form the basis of your HA design,

5. WAN connectivity design

6. Security design for the network,

7. Performance design.

The physical design needs to show physical device connectivity for devices within the departmental network. You are not required to specifically identify product types, models or specifications.

Likewise, application hosts and workstations need not be specified, however IP addressing needs to be accommodated in the data centres for up to 100 servers.

The network design needs to accommodate all Australian departmental facilities as described in

Assignment 1. Your network design also needs to include security components, such as firewalls at the various departmental network boundaries; however, your design should not be limited to firewall functionality only.

All other connectivity is as defined in the earlier brief.

Your design needs to identify the management requirements for this type of network. You are to identify the traffic flows for management, and the management requirements.

Your management design also needs to include management systems software and hardware, including the minimum required snmp MIBs.


Related Discussions:- Discuss network designs

Additional bandwidth does each scheme require, Recalling two FEC schemes fo...

Recalling two FEC schemes for internet phone described. Suppose the first scheme generates a redundant chunk for every four original chunks. Suppose the second scheme uses a low-ra

Describe at one disadvantage of a peer to peer network, Describe at one dis...

Describe at one disadvantage of a peer to peer network. When you are accessing the resources that are shared by one of the workstations on the network, that workstation takes

Advantages and disadvantage of computer networking , Advantages and Disadva...

Advantages and Disadvantage of Computer Networking Most of the benefits  of networking  can be  divided into  two  generic categories Connectivity and  sharing. Networks

Explain in dteail about the intranet, Explain in dteail about the intranet ...

Explain in dteail about the intranet The first Web browser was called Mosaic, and the HTML concept, although not a new one, has accelerated data access and research. In short,

Explain the types of security threats, Q. Explain the types of Security Thr...

Q. Explain the types of Security Threats? (a) Normal Flow (b) Interruption: An asset of a system develops into unavailable or unusable. (c) Interception: A few unaut

Subtle point, It is possible for a datagram to generate ICMP errors after i...

It is possible for a datagram to generate ICMP errors after it has been fragmented. For example, suppose that each of two fragments cannot be delivered. Seemingly, this would mean

Netware ipx addressing uses a network number, NetWare IPX addressing uses a...

NetWare IPX addressing uses a network number and a node number. Which  statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digi

What is session layer in osi model, Q. What is Session Layer in osi model? ...

Q. What is Session Layer in osi model? Session Layer : Allows two applications to establish, utilize and disconnect a connection  between them known as a session. Gives for na

Difference among symmetric and asymmetric cryptosystem, what's the differen...

what's the difference among Symmetric and Asymmetric cryptosystem?

Write your own http client to test your server, - The project should includ...

- The project should include a web server, and an example webpage - Webserver should continue to accept multiple requests from client browser - Webserver should print out logs: how

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd