Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Network Design Exercise

Design Project -

Objective - The task is to develop a network for a multi site company.

This exercise attempts to give experience of a real world design that you may be asked to do in your future employment. As a result, only minimal guidance is given. You will need to fall back on all the experience that you have gained from the previous exercises. You will be assessed based on the decisions you made in each stage of the project.

Overview

The network to be designed connects computers across three sites. The main site, called "Base" has four floors connected via a fast backbone network. One external site is connected using FDDI, and the other uses a T3 link through the Internet (protected with a firewall).

165_figure.png

The network should be analyzed and improvements recommended. An option to relocate some of the servers can be considered. The backbone network upgrade from serial to partially meshed should also be evaluated.

Tasks -

  • Requirements analysis - create a detailed design requirement specification
  • Project Planning - evaluate required tasks, plan task execution sequence and estimate individual task duration.
  • Applications and profiles modeling - identify scenarios needed to complete the project.
  • create a hierarchical network in Riverbed Modeler
  • simulate scenarios
  • modify the network to validate potential improvements
  • create a project report

Assessment -

This is an individual project. You will be assessed as follows:

  • Initial network planning (show your work)
  • network topology
  • network address spaces planning
  • applications modeling methods (show your work)
  • profiles modeling
  • simulation and results
  • report

For a successful assessment:

  • ensure all included screen clips are readable
  • every image has a reason to be included, and a description (not just a name)
  • include screen clips showing each application and profile configuration detail
  • include the DES Log, and a description of warnings and errors listed
  • include traffic plots for individual applications/profiles that show how accurate the model is.

Project Report Structure Suggestion -

Project Overview:

- What is this project about?

- What is the project goal?

- Why this project?

- What is achieved?

Design Decisions:

- Design specification

- Functional block diagram

- Design architecture

- Verification plan

Design Decisions:

- Design specification

what models are needed

what is the functionality

- Functional block diagram

identify blocks and data flow

explain each block functionality

- Design architecture

explain each block implementation plan

- Verification plan

how to prove the unit is operating correctly

Design Implementation:

- Explain each block implementation specifics

- Include schematics

- May include simulation data or diagrams

Design Issues:

- Highlight core issues

- What was easy to implement?

- What was difficult to implement?

- What works as planed?

- What does not work as planed?

- What is not implemented?

Test Report:

- Explain each test:

what functionality is addressed?

what is the pass/fail criteria?

what is the test result (pass or fail)?

include relevant diagrams.

Conclusion:

- Summary:

what was the project goal?

what is achieved?

what worked or did not work?

what could be done to improve the design functionality?

what could be done to improve the design implementation?

Attachment:- Assignment File.rar

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92321391

Have any Question?


Related Questions in Computer Network & Security

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

Data communications and networks assignment -aim a library

Data Communications and Networks Assignment - Aim: A library research and industry related project is to be carried out on a topic of your choice. The project topic must be related to Data Communications and Networking. ...

Toms income is 480and he spends it on two goods x and y his

Tom's income is $480and he spends it on two goods, X and Y. His utility function is U = XY. Both X and Y sells for $8 per unit.   a. Use lagrangian function to calculate Tom's utility-maximizing purchases of X and Y.  b. ...

A develop a caesar cipher-type encryption algorithm with a

a. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the amount of the key value. V ...

Assignment1 consider a tcp connection between host a and

Assignment 1, Consider a TCP connection between Host A and Host B. Suppose that the TCP segments traveling from Host A to Host B have source port number 10526 and destination port number 80. What are the source and desti ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Part auniversity of neverland offers more than 300

Part A University of Neverland offers more than 300 undergraduate programs. The Bachelor of Dreams is one of the highly regarded program offered by the University. The University tries to improve all its programs by intr ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced wireless networks assignment -wlan design project

Advanced Wireless Networks Assignment - WLAN Design Project - Description: You need to form a group of at most four students, and select one of the case studies provided in Assessment module on VU Collaborate. In this pr ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As