ICT703Assessment Task 2Page1ICT703Network Technology and ManagementAssessment Task 2Assessment and Submission DetailsMarks 35% of the total assessment for the courseDue Date 5pm Monday 15 June 2020, Week 12 (ATMC)Submission detailsPlease submit this assignment as a single MS Word document (.docx) via SafeAssign on Blackboard.All assignments will be checked for plagiarism and/or collusion between individuals. Refer to yourcourse outline or the course Blackboard website for a copy of the Student Misconduct, Plagiarismand Collusion guidelines.Refer to the assignment rubric on Blackboard for the marking criteria and standards. Theassignment will be marked out of a total of 100 marks.Note: Each student MUST retain a copy of the assignment and this copy MUST be produced within24 hours of it being requested by the Course Coordinator. Failure to produce the second copy ofthe assignment when requested may result in loss of marks or a fail grade for the assignment.Requests for an extension to an assignment MUST be made to the Course Coordinator prior to thedue date. Requests made on or after the due date will only be considered in exceptionalcircumstances.ICT703Assessment Task 2Page2BackgroundYou have obtained a contract position at a large organisation. Your contract responsibilities includepreparing a proposal for a data communications network to serve the organisations requirements.Network ScopeThe proposed network needs to serve the organisations Central Office and two of its remoteoffices. The Central Office, located in Brisbane, contains five departments to be served by thisnetwork. Each remote office contains four departments to be served. The North Office is located inNorth Lakes, about 30 Km from the Central Office. The South Office is located in Helensvale, about65 Km from the Central Office. This network is mainly intended for administrative purposes.Objectives of the NetworkThe network to be designed to achieve several specific operational objectives:1. Secure Service: The main objective of this network is to provide secure administrativecomputing service to the Central Office and two adjoint offices. It is to be designed to befunctionally and physically isolated from access by people not employed by theorganisation so as to minimize the risk of unauthorized use.2. Integration and Update: Presently there are many LANs in the organisation, but much ofthe equipment is out of date, many of the LANs are incompatible with each other, andnot connected in a system-wide network. Your proposal should describe a WAN thatintegrates and updates these LANs to support productive collaboration across the system.3. Versatile Information Processing: The network should enable users to retrieve, process,and store ASCII and non-ASCII text, still graphics, audio, and video from any connectedcomputer.4. Collaboration: The network should combine the power and capabilities of diverseequipment across the three offices to provide a collaborative medium that helps userscombine their skills regardless of their physical location. A well-designed network for thisorganisation will enable people to share information and ideas easily so they can workmore efficiently and productively.5. Scalability: The design should be scalable so that more remote offices can be added asfunding becomes available without having to redo the installed network.Intended UsersThe primary users of the network at the Central Office are three administrators, three secretaries,ten members of the Technical Department, eight members of the Human Resource Department,six members of the Finance/Accounting Department, and three members of the ComputerServices Department. At the remote offices the primary users are four administrators, foursecretaries, four members of the Computer Services Department, sixteen members of the HumanResource Department, and two members of the Finance/Accounting Department.Clients and the public are secondary users of the network in that they may receive informationproduced on the network, but they will not directly use the network.ICT703Assessment Task 2Page3Data TypesThe types of data served by the network will be reports, bulletins, accounting information,personnel profiles, and web pages. The majority of the data will be text (ASCII and non-ASCII), butthere will be some still graphics and possibly a small amount of voice and video (primarily for PCbased teleconferencing).Data SourcesData will be created and used at all end stations on the network. The data will be produced bysoftware applications in Windows 10, primarily Dream Weaver and Office 2016 Professional(Word, Excel, Access, PowerPoint, and Outlook). Other data sources to be supported on at least alimited basis will Windows 10 Accessories (Paint, Notepad, etc.), NetMeeting, Media Player, andPhotoshop. Note that the network will be not accessible from outside.Network Needs AnalysisNumbers of Users and Priority LevelsAt the Central Office, the users will be administrators, secretaries, and members of fourdepartments. At the adjoint offices, the users will be administrators, secretaries, and members ofthree departments. The maximum estimated number of users on the network at any given time is100, including 33 regular users in the Central Office, 30 regular users in the North Office, 30regular users in the South Office, and seven otherwise unanticipated users.Three priority levels to be supported: management (top priority), user (medium priority), andbackground (low priority). Note that these designations do not correspond to administrative levelsin the organisation; rather, they are network service levels. Network management processes willreceive top-priority service; most network processes will receive medium-priority service; a fewprocesses (e.g., e-mail transfers, backup, etc.) will be given low-priority service. It should be notedthat network management will usually consume a small amount of the available bandwidth; thismeans that management and user processes will usually enjoy identical support. Backgroundprocesses will also usually receive more than adequate service, but they will be delayed as neededto maintain support for management and user services.Transmission Speed RequirementsThe network is to be transparent to the users. Thus, remotely executed applications, file transfers,and so forth should ideally appear to operate as quickly as processes executed within an endstation. Interviews with users to ascertain their needs and expectations indicate that an averagethroughput of 20 mbps per user within each LAN and 10 mbps per user between LANs will morethan support the needed performance in most cases (teleconferencing being the possibleexception).Load Variation EstimatesInterviews with users and observation of LAN use at the three locations yielded data on hourlyaverage and peak loads from January to March, 2020. The data indicate that the highest averagetraffic volume will occur from 8:00 a.m. to 6:00 p.m., Monday through Friday. The peak networkICT703Assessment Task 2Page4traffic volume is expected at two times during the day: 8:00 a.m. to 12:00 noon and 3:00 p.m. to5:00 p.m. At night and on weekends the network traffic is minimal except for the daily backups ofthe PCs to the LAN servers in the remote offices and several batch data transfers anticipated fromthe remote offices to the Central Office. The data indicate the following network designparameters: The average required throughput on any LAN during work hours (7:00 a.m. to 6:00p.m.) will be only about 0.2 mbps. The average required throughput on the WAN during work hours (7:00 a.m. to 6:00p.m.) will be only 0.04 mbps. The peak expected traffic load on any LAN will be about 10.4 mbps. The peak expected traffic load on the WAN will be about 6.4 mbps.Note: to avoid user complaints, the network should be designed for the peak traffic loads, not theaverage throughput.Storage RequirementsStorage requirements need to be large enough to store all data. Interviews and observations ofusers present and anticipated storage requirements indicate that each user will need an averageof 100 MB of server space (in addition to secondary storage on local PCs); the maximum estimatedserver-side storage requirement per user is about 1 GB. Additionally, the network operating systemwill occupy about 500 MB on each LAN server. Taking price-performance issues into account, eachPC will have a minimum storage capacity of 10 GB, each LAN server will have a minimum storagecapacity of 20 GB. A main data server in the Central Office will have a 36 GB capacity.Reliability RequirementsIn keeping with user expectations and industry standards, both the LANs and the WAN areexpected to operate at 99.9% uptime and an undiscovered error rate of .001%.Security RequirementsFirewalls to be used so unauthorized users will be restricted. Part of the security will be Usersaccounts and passwords that will give limited access. There should be different access capabilitiesfor network managers and users.Design Assumptions Wireless internet access should be made available in all departments. In response to the organisations enquiries regarding their IPv4 needs, their ISP has advisedthat they can use this block of public IPv4 addresses: 184.108.40.206/27 Each department at each location should maintain an individual network, while all thedepartments should be able to communicate with each other, and any necessary internalserver(s), and access the Internet. Network management protocols must be deployed tomake identification and management of network devices easy and convenient.ICT703Assessment Task 2Page5Assignment Requirements and DeliverablesYou are to prepare a formal proposal report for the above organisation, which should include thefollowing details (Activities 1-5) in the main body of the report. The proposal should cover thedetails asked in Activities 1-5 for the above case study and justify suitable technologies to enhancethe organisations communications and networking within and outside the organisation. Be sure toinclude all necessary information and network diagrams.After you have gathered all the appropriate information, it is time to do some research. You mustnow use your knowledge and research skills to propose an appropriate technical solution for theirlimited budget and time requirements. When developing a plan, it is often easier to start at the enduser and then work back toward the network and any shared resources, and then finally, anyexternal connections to the Internet or other networks.Activity 1Develop and demonstrate a complete network layout plan for the organisation. Because theorganisation has limited funds available for this project, it is important that where possible onlyequipment designed for the small business and home markets be used.Activity 2After the network layout has been selected, it is time to look at the workflow and decide on anyshared components and network technology to support this workflow. This can include suchthings as shared printers, scanners, and storage as well as any firewalls, routers, switches, accesspoints and integrated service routers. When planning a network infrastructure, always plan intothe future. For larger companies, because it is usually a substantial investment, the infrastructureshould have a lifetime of about 10 years. For smaller companies and home users, the investment issignificantly less and change occurs more frequently.Using the Internet and locally available resources, research available high-speed colourcopiers/printers/scanners, access points, switches and routers that are suitable for theorganisations offices. In your report include a write-up for at least two devices of each equipmenttype and provide supporting details to justify your selection. Included in the write-up should be adescription of the device, including the manufacturer, the model, the seller, the cost, and a briefsummary of the manufacturer specifications.Activity 3It is necessary to plan the Internet connectivity, and which services are provided by the ISP andwhich services must be provided in-house. Larger companies usually provide services in-house,while small businesses and individuals normally rely on an ISP to provide these services. Most ISPsoffer a variety of services and service levels.In your report include the specifics of internal services (networking and security) that must beoffered by the organisation, and the devices and protocols that provide these services. Providesupporting details to justify your answer.ICT703Assessment Task 2Page6Activity 4After the equipment has been selected and the required services planned, the physical and logicalinstallation is planned out. Physical installation includes the location of equipment and devices,along with how and when these devices are to be installed. In the business environment, it isimportant to minimize disruption of the normal work processes. Therefore, most installations,changes, and upgrades are done during hours when there is minimal business activity. Physicalinstallation should also consider such things as adequate power outlets and ventilation, as well asthe location of any necessary data drops. Planning for physical installation is out of the scope of thisassignment.Equally as important as planning the physical layout of the network and equipment is planning thelogical layout. This includes such things as subnetting, addressing, naming, data flow, and securitymeasures. Servers and some network devices are assigned static IP addresses to allow them to beeasily identified on the network and to also provide a mechanism for controlling access to thesedevices. Most other devices can be assigned addresses using DHCP. Note that both a server and itsbackup server must be accessed via the same public IP address.Devise subnetting and addressing schemes for the organisation. The schemes must provide serversand some other network devices (where necessary) with a static address and allow all other hoststo be configured via DHCP. Identify and list the details of all internal and external subnets and theranges of useable IP addresses (and default gateways) for DHCP within each internal subnet, andalso assign an appropriate IP address (and default gateways) to network devices that should use astatic IP address.Use the following tables to report the required setups for subnetting and addressing.Table 1: Subnetting Table (to be used for all the organisations internal and external subnets) SubnetNetworkAddressSubnetMaskFirst UsableIP AddressLast UsableIP AddressBroadcast Address. . . Table 2: Addressing Table (to be used for all devices/interfaces with static IP addresses) DeviceInterface*IP AddressSubnet MaskDefault Gateway^. . . *Can be NIC, Serial, FastEthernet, etc.^ Use N/A for routers.Note: Show all your workings for subnetting in an appendix.ICT703Assessment Task 2Page7Activity 5The organisation is concerned that their files and resources may be vulnerable through the wiredor wireless networks. Explain how the use of public and private IP addresses together may addressthis concern and provide a security plan that allows only the organisations employees to connectto the network and gain access to company information and resources.Prepare and Present the ProposalAll gathered information and the proposed technical solution must be assembled into a formatthat makes sense to the organisation who has asked you to provide a solution. The formal reportusually contains many different sections, including: Title page Executive Summary Tables of Contents, Figures and Tables Introduction Project proposal, comprising needs statement, goals and objectives, methodology andtimetable, technical solutions and evaluation, budget summary, and future plans. Recommendations and Conclusions Bibliography and List of Refences Appended informationThe report is often presented to various groups for approval. When presenting the report, presentit in a confident, professional, and enthusiastic manner. The report must be technically accurateand free from spelling and grammatical errors.The report must be written in Microsoft Word. Multiple files will not be accepted.Report Structure: The report must be formatted using the following guidelines: Paragraph text: Use 11-point Calibri single line spacing Headings: Use Arial in an appropriate type size Margins: 2.0cm on all margins Header: Report title Footer: Page numbering up to and including the Table of Contents use roman numerals(i, ii, iii, iv), restart numbering using conventional numerals (1, 2, 3, 4) from the first pageafter the Table of Contents. Title Page must not contain headers or footers The report is to be structured as a formal business report. Refer to the following references for details on report structures: Summers, J., Smith, B.(2014), Communications Skills Handbook, 4th Ed., Wiley, AustraliaICT703Assessment Task 2Page8Referencing: The report is to include appropriate references and these references should follow theHarvard method of referencing. Note that ALL references should be from journal articles,conference papers, technical papers, recognized experts in the field or vendors and serviceproviders websites.
ICT703 Network Technology and Management
Pssst…We can write an original essay just for you.
Any essay type. Any subject. We will even overcome a 6 hour deadline.
<< SAVE15 >>
Place your first order with code to get 15% discount right away!