Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

You will choose an organization, and apply your research to the analysis and development of a network design which would be suitable for the organization and the needs that it has for its network. Additional information and the deliverables for each Individual Project will be given in the assignment explanation for the project. This is the course's Key Assignment which you will make contributions to each week.

Project Selection:

The initial step will be to choose an organization as the target for your network design and architecture proposal document. This organization will be employed as the basis for each of the assignments all through the course and must conform to the given guidelines:

• Nontrivial: The selected organization must be big enough to permit reasonable exercise of the network design process.

• Domain Knowledge: You must be familiar adequate with the organization to permit for focus on the project's tasks devoid of the significant time required for domain education.

• Accessibility: You must have good access to the people and other information associated to the organization because this will be a significant part of the process.

The selected organization might already have a distributed network in place; however it can still be employed as the basis for the projects in this course.

The selected organization should have a need for some type of distributed network computing as part of their operations. Thus, you might identify a hypothetical organization which meets such requirements. Any essential assumptions might be made to fulfill the needs of organization selection process.

Choose an existing organization, or recognize a hypothetical organization which fits these requirements

Assignment:

For the assignments in this course, you will not be implementing a distributed network; however you will be developing a comprehensive network design and architecture proposal document. Your very first task in this process will be to select an organization or recognize a hypothetical organization to use as the basis of your project. You will as well create the shell document for the final project deliverable which you will be working on during each unit. As you proceed via each project phase, you will add content to each section of the final document to gradually complete the final project deliverable. Proper research must be conducted to support the development of your proposal document, and assumptions might be made when necessary.

The project deliverables are as shown below:

A) Submit the network design and architecture proposal document shell

i) Use Word

ii) Title page

•    Course number and name
•    Project name
•    Student name
•    Date

iii) Table of contents

•    Use auto generated TOC
•    Separate page
•    Maximum of 3 levels deep
•    Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

iv) Section headings (create each heading on a new page with TBD as content except for sections listed under new content below)

•    Project Outline
•    Distributed Network Requirements Analysis
•    Communication Protocols Analysis and Recommendations
•    Network Traffic Analysis and Recommendations
•    Network Design and Architecture
•    Future Needs Analysis and Recommendations

PART I:

Project outline and requirements

A) Brief explanation of the organization (can be hypothetical) where the network will be implemented
B) Comprise company size, location(s), and other pertinent information.
C) Summary of the advantages that the company would realize via distributed networking.
D) Material can be taken from the approved proposal which was submitted to the instructor.
E) Make sure that this project is approved by the instructor.

Distributed network requirements analysis:

A) describe at least 5 major areas of functionality required by the organization which can be provided via distributed networking.
B) For each area of functionality, comprise information to identify capacity and performance requirements.
C) Recognize connectivity and security needs for the proposed network.
D) Comprise any other needs which will affect your design and architecture, like the use of existing network infrastructure, budget limitations, existing applications and operating systems, and so forth.

PART II:

The Communication Protocols Analysis and Recommendations section must comprise the following:

Analysis:

A) For each of the requirements recognized in the Requirements Analysis section of the previously created proposal, list and describe the communication protocol(s) that are essential to support the requirement.
B) Include a explanation of which parts of the network and network applications would utilize the protocol(s).

Recommendations:

A) Based on the analysis which was performed in the previous step, prepare a recommendation for protocol(s) to use with the network.
B) Justify the selection of such protocol(s) by using a explanation of the operational characteristics which best match the analysis results.

Be sure to update your table of contents before submission.

PART III:

Update the network design and architecture proposal document title page with new date and project name.

Update the previously completed sections based on the instructor feedback.

Network Traffic Analysis and Recommendations section:

Analysis:

A) Summarize each of the main uses of the distributed network.
B) For each use, recognize the traffic estimates.
C) Include an analysis of peak traffic times and levels.
D) Identify any other issues which will produce congestion on the network.

Recommendations:

A) Based on the analysis which you performed in the previous step, prepare a recommendation of the software and infrastructure which would be needed to handle the projected traffic.
B) Offer recommendations for software which can be used to manage potential network congestion, and describe how the software works.

Update your table of contents before submission.

PART IV:

Update the network design and architecture proposal document's title page with new date and project name.

Update the previously completed sections based on the instructor feedback.

The Network Design and Architecture section should comprise the following:

Infrastructure:

A) describe the network architecture which is suitable for this distributed network.
B) Include at least 1 visual model of the system that identifies the main components.
C) Justify the physical design of the system with reference to the requirements established in previous part of the proposal.
D) Summarize the estimated cost of the network infrastructure.

Software:

A) describe the software needed for the network.
B) Include the operating systems and other software applications which are needed to meet the functional and operational requirements established in previous parts of the proposal.
C) Summarize the estimated cost of the network software.

PART V:

Update the network design and architecture proposal title page with new date and project name.

Update the previously completed sections based on the instructor feedback.

The Future Needs Analysis and Recommendations section must comprise the following:

A) Research current and future trends in the distributed networking.
B) Summarize at least three potential modifications in distributed networking which might affect your company.
C) Give a modified design and architecture, and discuss the changes from the original design proposal which would be needed to support the new requirements.

Network design and architecture proposal:

A) Review the whole document for any changes and enhancements you would like to make.

B) Make sure this final version of the plan is adequately detailed to permit the organization to confidently move forward with a distributed network implementation which is based on your recommendations.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9772

Have any Question? 


Related Questions in Computer Network & Security

Task - provide short answers to the following six

Task - Provide short answers to the following six questions: Question 1: Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type. Question 2: Explain why th ...

Question 1 explain about snort rules create rules and test

Question 1: Explain about Snort Rules, create rules and test the created rules. Question 2: Kerberos Authentication Protocol You are required to do personal research to complete the following questions regarding this top ...

Cyber crime and security 2168alleged computer hacker gary

Cyber Crime and Security (2168) Alleged computer hacker Gary McKinnon of the United Kingdom has publicly admitted to compromising computer systems belonging to NASA and the Department of Defense. Using information from y ...

Any encryption algorithm like caesar cipher algorithmshould

Any Encryption algorithm (like caesar cipher algorithm)should be used and implemented for the information given in the document. Cryptography Assignment Given the following S-Boxes: S1= [ 15        10            2        ...

Project- sample cyber security profileevery organization

Project- Sample Cyber Security Profile Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents the curre ...

Instructionsexplain your argument in a brief and precise

Instructions Explain your argument in a brief and precise way. Give your answers in the order in which the questions are given below. Problem 1. We consider the alphabet A= {0,1,2,3,4} and the space of messages consists ...

The handbook must be original student content and workin

The handbook must be original student content and work. In addition to describing the company to which the employee handbook applies, also address the issues of privacy, employee or applicant testing, and performance eva ...

Project- information security standards csialearning

Project- Information Security Standards CSIA Learning Objectives After completing this project, students will be able to: 1. Identify recognized US Standards Organizations 2. Describe at least two technical standards 3. ...

Wb and data securitysubject web and data securitytopic

Web and Data Security Subject: Web and Data Security Topic: various types of Utility and its use to secure the data 8 pages start with executive summary, introduction, examples, its use in data security and conclusion.

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate