Assignment 1Network Requirement Analysis and PlanName of the StudentLEELA ARUN RANDHIStudent IDMIT181959Unit Essay

Assignment 1Network Requirement Analysis and PlanName of the StudentLEELA ARUN RANDHIStudent IDMIT181959Unit CodeMN503Subject NameOVERVIEW OF INTERNETWORKINGName of the UniversityMELBOURNE INSTITUTE OF TECHNOLOGYProject Scope:A thorough investigation on the case scenario of Calasanz School, it has been observed that the school management has expressed to incorporate the facilities of internet into their canvas in order to provide the internet access to the students, which might enhance their interest towards developing a digital education platform. Followed by this objective it is essential to implement an effective wireless network in order to provide the easy accessibility as well as the facility to incorporate other educational devices into the educational network.

According to case study since, the wireless network system is proposed to incorporate into the service structure of a school thus, this must be a cost effective system. Along with the above features it has been also noticed from the case scenario that the school management has expressed to restrict the man power for this system as they do not want to spend a huge amount of money for this start up plan.

Don't use plagiarized sources. Get Your Custom Essay on
Assignment 1Network Requirement Analysis and PlanName of the StudentLEELA ARUN RANDHIStudent IDMIT181959Unit Essay
Order Essay

Followed by the above aspects as well as by considering the proposed application it has been noticed that the approached wireless network system must cover the significant areas of the school since in the few of the areas the effective internet accessibility is very essential. Followed by these feature the system must consist effective security plans by divining the accessibility on internet into different levels such as the teachers will have advance level of access however, the accessibility powers of students will be less. Another significant aspects of this approach is it must have effective modification feature considering the rapid growth of the internet services. Requirements analysis is critical to the success or failure of a systems or software project.Challenges:According to the case study it has mentioned that the approached application of the Calasanz School is in order to deploy a wireless internet feature into the school premises. Analysis on this approach has objectified that there are several benefits of incorporating the internet feature into school environment as it will surely enhance the teaching skills as well as the learning skills however, few challenges has been accounted while implementing the wireless network into the school premises. Since, the approached system needs to incorporated in a school thus it has been suggested by the school authority to implement such network which demands less human involvement to operate this, which is one of the major challenges of the mentioned development as this is essential to implement a cost effective network system. Along with the above aspects it is also essential to deploy the network in such place which will effectively provide equal services to the entire school premises. Apart from that in order to provide an effective network system with efficient disaster recovery feature it must include a redundant device to provide error free services to the educational platform. User-centric design concept:Followed by the case scenario in order to deploy an effective network the user centric framework has been followed as the fundamental objective of this framework is to prove high usability to the faculties as well as to the students. In order to make the network more secure and effective redundancy is essential the network has been structured in such way that several links as well as devices are connected with it which will help to reduce the threat factors as well as help to enhance the work efficiency. Project Hardware Requirement: Name of the Device Features and Ports Series ModelTP-LINK TL-SF1048 48-Port 10/100Mbps, 9.6Gbps Cap Switch, 19-inch Rack mountable 48 10/100Mbps RJ45 portsMAC address self-learning support and auto MDI/MDIX with 4.8 gbps capacity TL -SF1000 Series TL -SF1048TP-LINK Gigabit Load Balance Broadband Router TL-ER5120 Standards and Protocols: IEEE 802.3ab, 802.3, 802.3u, DHCP, NAT, TCP/IP, ICMP, PPPoE, SNTP, HTTP, DNSNetwork Media: 10BASE-T (UTP category 3, 4, 5 cable) (100m), 100BASE-TX: (UTP category 5, 5e cable) (100m), 0BASE-T: (UTP category 5, 5e cable) (100m)Interface: A Fixed 10/100/1000Mbps WAN Port, 3 Changeable 10/100/1000Mbps WAN/LAN Ports, 1 Fixed 10/100/1000Mbps LAN/DMZ Port, 1 Console Port (RJ-45 On RS232) TL -ER5000 Series TL -ER5120AC 5400 Wireless Tri-Band MU-MIMO Gigabit Router 1.8GHz 64-bit quad-core CPU, 3 co-processors and 1GB RAMTri-band with blazing fast speed at 5334 Mbps in totalHomeCare for all-around protectionVPN acceleration for 5 times faster VPN connection TP-Link AC5400 Archer C5400 MU-MIMO RouterNetwork Design: The above network structure consist of Internet Service Provider with is connected with the router and the router is connected with switches in order to distribute the internet access, followed by the main switch is then connected with the sub-switches via which it has connected the departmental network switches. The network switches will then distribute the internet accessibility among the required devices.Cable TypesName of Cable Distance Type of cable Maximum SpeedMultimode and single mode fiber 550 m Fiber 1GbpsSingle mode fiber 70000 meter or 70 km Fiber 1GbpsCAT5e, CAT 6 100 m UTP 1GbpsSingle mode fiber 550 m for multimode fiber and 2000 m for single mode fiber Fiber 1GbpsCAT5, CAT5e, CAT6 100 m UTP 100 MbpsCAT5e, CAT 6 100 m UTP 10 GbpsServersRadius Servero Processor – Intel Core i5 or highero Motherboard – Intel LGA 2066 Core i9/ ATX/ Dual M.2/ Front USB 3.1 /RGB Fusion/Intel LAN /2 Way SLI Motherboardo Memory ” 4 Gb or highero Operating system – Windows Server 2016o Hard Drive – 500GB or highero Raid 7 for SQL Data fileso Raid 5 for SQL LOG filesCaptive Portal Servero Processor – Intel Core i5 or highero Motherboard – Intel LGA 2066 Core i9/ ATX/ Dual M.2/ Front USB 3.1 /RGB Fusion/Intel LAN /2 Way SLI Motherboardo Memory ” 4 Gb or highero Operating system – Windows Server 2016o Hard Drive – 500GB or highero Raid 7 for SQL Data fileso Raid 5 for SQL LOG filesHost PC and Other End Deviceso Windows 10 /8.1/ 7/ Linux / IOS Operating Systemo Safari, Chrome, Firefox, Edge (Browser)o Intel 8th Gen 6-Core 3.6 GHz/4.3 GHz Turbo i5 8600K Coffee Lake LGA 1151(300 Series) Desktop Processor, A9 Chip or Snapdragon 660 or above chipset.o TP-Link TL-WN781ND 150Mbps Wireless N PCI Express Adaptero 2 GB or more memoryo 64 Gb or more free spaceOutcomes: The fundamental purpose of this project is to provide a brief knowledge on the deployment as well as the services of network structures which are sometimes wired and wireless. Followed by the above benefits it will also provide an detail idea about the working principles of Internet Service Providers, Routers as well as the working of Switches in order to effective distribute the internet accessibility among the targeted area. Along with that while developing this project it has also helped me to gain knowledge about how the feature of wireless connectivity has helped to effectively provide internet access to targeted area as well as the objective of this project has provided a brief knowledge about how internet can effectively help the students by improving their learning skills and it has also objectified the impact of internet on the teaching techniques. Thus, it can be stated the by utilizing the mentioned tools and techniques it has effectively deployed the wireless network which consist 2 layers of devices, VTP servers as well as VLAN. Limitations:However, the approached system has offered several benefits to the institutional services the security issues are still there as it is a centralized network. Considering the accounted limitations it has been observed that the due to its centralized structure as well as the management authorities of the Calasanz School. A thorough investigation on the institutional network it has been determined that the limitations related to the unauthorised access has a significant impact on the institutional network, which can be mitigated by incorporation advance security process such as encryption algorithm. Along with that the central network needs to consist a network tracking capability in order to monitor the data flow. Conclusion: After the completion of the proposed paper it can be concluded that considering the case scenario of Calasanz School which has expressed to incorporate the Wireless internet network into the institutional structure, this report has effectively discussed all the aspects of it which is essential to deploy the approached network. It has also provided a brief knowledge about how the incorporation of internet has affected the teaching and learning skills of the students and teachers. Followed by this the report has also consist of the design of the proposed system, as well as it has determined the limitations of the school network and provided effective mitigation techniques to reduce those limitations. Demonstration:Ping Test References[1]. “Introduction to Information Security”, Network Security, vol. 2013, no. 12, p. 4, 2013.[2]. Santana, D. Souza, K. Simon, Fischbach and H. De Moura, Network Science Applied to Enterprise Architecture Analysis: Towards the Foundational Concepts. In Enterprise Distributed Object Computing Conference (EDOC), 2017 IEEE 21st International (pp. 10-19). IEEE, 2017, October.[3]. Arambatzis, Theodoros, Ioannis Lazaridis, and Sotirios Pouros. “Modern Windows Server Operating Systems Vulnerabilities.” In The Third International Conference on Computer Science, Computer Engineering, and Social Media (CSCESM2016), p. 29. 2016.[4]. D. Simon, K. Fischbach and D. Schoder, Enterprise architecture management and its role in corporate strategic management. Information Systems and e-Business Management, 12(1), pp.5-42, 2014. [5]. “The Practice of Network Security Monitoring”, Network Security, vol. 2014, no. 10, p. 4, 2014.[6]. J. Wang, “The Design of Improved Elman Network Intrusion Detection Algorithm in Digital Campus Network”, Advanced Materials Research, vol. 1049-1050, pp. 2096-2099, 2014.[7]. S. Kermanshahi, Y. Shafahi and M. Bagherian, “Application of a new rapid transit network design model to bus rapid transit network design: case study Isfahan metropolitan area”, Transport, vol. 30, no. 1, pp. 93-102, 2013.[8]. E. Yadegari, M. Zandieh and H. Najmi, “A hybrid spanning tree-based genetic/simulated annealing algorithm for a closed-loop logistics network design problem”, International Journal of Applied Decision Sciences, vol. 8, no. 4, p. 400, 2015.[9]. F. Liu and W. Qu, “Design of Campus Network Database Access Based on Encryption”, Applied Mechanics and Materials, vol. 608-609, pp. 331-335, 2014.[10]. A. Hosapujari and A. Verma, “Development of a Hub and Spoke Model for Bus Transit Route Network Design”, Procedia – Social and Behavioral Sciences, vol. 104, pp. 835-844, 2013.

Still stressed from student homework?
Get quality assistance from academic writers!