Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

You will choose an organization, and apply your research to the analysis and development of a network design which would be suitable for the organization and the needs that it has for its network. Additional information and the deliverables for each Individual Project will be given in the assignment explanation for the project. This is the course's Key Assignment which you will make contributions to each week.

Project Selection:

The initial step will be to choose an organization as the target for your network design and architecture proposal document. This organization will be employed as the basis for each of the assignments all through the course and must conform to the given guidelines:

• Nontrivial: The selected organization must be big enough to permit reasonable exercise of the network design process.

• Domain Knowledge: You must be familiar adequate with the organization to permit for focus on the project's tasks devoid of the significant time required for domain education.

• Accessibility: You must have good access to the people and other information associated to the organization because this will be a significant part of the process.

The selected organization might already have a distributed network in place; however it can still be employed as the basis for the projects in this course.

The selected organization should have a need for some type of distributed network computing as part of their operations. Thus, you might identify a hypothetical organization which meets such requirements. Any essential assumptions might be made to fulfill the needs of organization selection process.

Choose an existing organization, or recognize a hypothetical organization which fits these requirements

Assignment:

For the assignments in this course, you will not be implementing a distributed network; however you will be developing a comprehensive network design and architecture proposal document. Your very first task in this process will be to select an organization or recognize a hypothetical organization to use as the basis of your project. You will as well create the shell document for the final project deliverable which you will be working on during each unit. As you proceed via each project phase, you will add content to each section of the final document to gradually complete the final project deliverable. Proper research must be conducted to support the development of your proposal document, and assumptions might be made when necessary.

The project deliverables are as shown below:

A) Submit the network design and architecture proposal document shell

i) Use Word

ii) Title page

•    Course number and name
•    Project name
•    Student name
•    Date

iii) Table of contents

•    Use auto generated TOC
•    Separate page
•    Maximum of 3 levels deep
•    Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

iv) Section headings (create each heading on a new page with TBD as content except for sections listed under new content below)

•    Project Outline
•    Distributed Network Requirements Analysis
•    Communication Protocols Analysis and Recommendations
•    Network Traffic Analysis and Recommendations
•    Network Design and Architecture
•    Future Needs Analysis and Recommendations

PART I:

Project outline and requirements

A) Brief explanation of the organization (can be hypothetical) where the network will be implemented
B) Comprise company size, location(s), and other pertinent information.
C) Summary of the advantages that the company would realize via distributed networking.
D) Material can be taken from the approved proposal which was submitted to the instructor.
E) Make sure that this project is approved by the instructor.

Distributed network requirements analysis:

A) describe at least 5 major areas of functionality required by the organization which can be provided via distributed networking.
B) For each area of functionality, comprise information to identify capacity and performance requirements.
C) Recognize connectivity and security needs for the proposed network.
D) Comprise any other needs which will affect your design and architecture, like the use of existing network infrastructure, budget limitations, existing applications and operating systems, and so forth.

PART II:

The Communication Protocols Analysis and Recommendations section must comprise the following:

Analysis:

A) For each of the requirements recognized in the Requirements Analysis section of the previously created proposal, list and describe the communication protocol(s) that are essential to support the requirement.
B) Include a explanation of which parts of the network and network applications would utilize the protocol(s).

Recommendations:

A) Based on the analysis which was performed in the previous step, prepare a recommendation for protocol(s) to use with the network.
B) Justify the selection of such protocol(s) by using a explanation of the operational characteristics which best match the analysis results.

Be sure to update your table of contents before submission.

PART III:

Update the network design and architecture proposal document title page with new date and project name.

Update the previously completed sections based on the instructor feedback.

Network Traffic Analysis and Recommendations section:

Analysis:

A) Summarize each of the main uses of the distributed network.
B) For each use, recognize the traffic estimates.
C) Include an analysis of peak traffic times and levels.
D) Identify any other issues which will produce congestion on the network.

Recommendations:

A) Based on the analysis which you performed in the previous step, prepare a recommendation of the software and infrastructure which would be needed to handle the projected traffic.
B) Offer recommendations for software which can be used to manage potential network congestion, and describe how the software works.

Update your table of contents before submission.

PART IV:

Update the network design and architecture proposal document's title page with new date and project name.

Update the previously completed sections based on the instructor feedback.

The Network Design and Architecture section should comprise the following:

Infrastructure:

A) describe the network architecture which is suitable for this distributed network.
B) Include at least 1 visual model of the system that identifies the main components.
C) Justify the physical design of the system with reference to the requirements established in previous part of the proposal.
D) Summarize the estimated cost of the network infrastructure.

Software:

A) describe the software needed for the network.
B) Include the operating systems and other software applications which are needed to meet the functional and operational requirements established in previous parts of the proposal.
C) Summarize the estimated cost of the network software.

PART V:

Update the network design and architecture proposal title page with new date and project name.

Update the previously completed sections based on the instructor feedback.

The Future Needs Analysis and Recommendations section must comprise the following:

A) Research current and future trends in the distributed networking.
B) Summarize at least three potential modifications in distributed networking which might affect your company.
C) Give a modified design and architecture, and discuss the changes from the original design proposal which would be needed to support the new requirements.

Network design and architecture proposal:

A) Review the whole document for any changes and enhancements you would like to make.

B) Make sure this final version of the plan is adequately detailed to permit the organization to confidently move forward with a distributed network implementation which is based on your recommendations.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9772

Have any Question? 


Related Questions in Computer Network & Security

Term paper chief security officeryou have been hired as the

Term Paper: Chief Security Officer You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security ...

Assignmentyou have been asked by a local charity retail

Assignment You have been asked by a local charity retail organization to install a network in its downtown office. It currently has seven PCs running Windows XP Home Edition. They are configured as follows: Pentium 4 at ...

In order to provide for the new services at the akron ohio

In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and configured. Create a security matrix spreadsheet and security strategy summary. Include the user rol ...

Taskspecific issues that you need to address in the forum

Task Specific issues that you need to address in the forum discussions are provided within the first 3 topics. These questions are posed for you to reflect on in the form of written Discussion Board (forum) posts. As thi ...

What is a dmz is this really a good name for the function

What is a DMZ? Is this really a good name for the function that this type of subnet performs? What is RADIUS? What advantage does it have over TACACS? How does a network-based IDPS differ from a host-based IDPS? What is ...

Assignmentplanning is an important aspect with any

Assignment Planning is an important aspect with any enterprise network structure. However, planning must encompass several aspects including not only the assessment of the technology required, but also keeping the stakeh ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Assignmentyou have been tasked with reconfiguring the

Assignment You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administra ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

Short paperwan technologies paper research point-to-point

Short Paper WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen