Assessment 1 In this assessment, students must demonstrate their understanding of critical thinking in an IT context by examining given problems and proposing solutions using the methods explored in...

1 answer below »
I have attached word file of question for the Assessment


Assessment 1 In this assessment, students must demonstrate their understanding of critical thinking in an IT context by examining given problems and proposing solutions using the methods explored in the unit. Students will choose a solution, then implement and evaluate their solution. Students must submit a report that outlines the steps they followed to solve the problems. Approximate word length is up to 1500 words with topology diagrams. The report should be presented with supporting material as appendices, such as the calculations for the IP addressing scheme. Practical Assignment brief: Smith Company is an enterprise Australian company based in Sydney. It is growing fast, and the company is aiming to expand their business in other cities in Australia and also in Singapore. Sydney building (70000 users), Melbourne building (52000 users), Brisbane building (30000 users) and Singapore building (20000 users) The company uses 12.33.0.0/8 at the company headquarters in Sydney and need to use a subnetting structure to incorporate the new cities. Adhering to the subnetting scheme and using VLSM, assign a subnet address to the networks and their links. Each branch's offices have 8 levels of building and access to the Internet is crucial for each office, as well as inter-branch-office networking. Each branch has 6 servers which are located on the Fifth floor of each branch. The large company headquarter is in Sydney and the new subnets must have connectivity from Sydney and other cities in Australia and Singapore. You need to think about cost effectiveness and also Smith Company is aiming to create an intranet for its branches in Australia and Singapore. You need to think about creating a VPN for this company. The company is facing with different cyber- attacks annually and also, they are facing with some insider attack. Find some solutions to mitigate these types of attacks. Elements: Your goal is to design, deploy and successfully implement their business requirements using all of the following: · Switches · Routers · Workstations · IP addressing hosts, subnet addresses, broadcast addresses · Default routes · Cables Solution: You are required to design the topology for the four new sub-networks and their connection to the Sydney office. You must document each step you have taken, including your research sources. You need to come with a design report and send it to your technical manager. Report: The report must contain the following sections: 1. Introduction: Critical analysis of networking requirements 2. Local Area Network (LAN): Design and description of Local Area Network for all subnets which must include: a. Network topology: Discuss the reasons for choosing the particular network topology. LAN design connections to the servers, connection to other subnets and also the internet/intranet 3. Hardware: Provide a complete description of all interconnecting devices (switches, routers, hubs, and access points) and wiring used to build the network. Justify your choice. 4. Conclusion: Comprehensive summary of the work done and recommendations.
Answered Same DayApr 29, 2022

Answer To: Assessment 1 In this assessment, students must demonstrate their understanding of critical thinking...

Anandkumar answered on Apr 29 2022
92 Votes
Network Diagram:
Hardware Configuiration:
· Unmanaged Shared Media Ethernet hubs: $10-20 per port
· Switched Ethernet hub (10/100): $100-150 per port
· Server-class computer.
· Terminals
· Router IP addres
s, 12.33.0.0/8
Bridging Connectivity structure between two stations,
Introduction: Critical analysis of networking requirements
The process of network requirement analysis can be classified into two different types, The first is the process of analysing the requirements and the second is the process of analysing the flow behind the requirement. While gathering the needed requirements are classified under the section of requirement gathering whereas analysis of how the data is been taken through across the system is classified as flow analysis process.
Some among the subjectable impacts in the requirement analysis process are as below,
1) Determining the entities of the process
2) Identifying the methodology involved.
3) Ensuring the process of collecting and identifying the most essential information alone.
Some among the key process to be performed in the requirement analysis are determining the actor and users involved. This process could be comparatively easy for a small network whereas the process is much more complex when the size of the network increases. Process like value chain analysis can be helpful in analysing and identifying the users. Also the switches have the capability to check whether the data prone before getting the data forwarded. This is one big advantage with this systems because it helps to avoid transmission of error prone packets forward. So the broadcast domain remains the same and the switch divides domain hosts. Though the small scale networks doesn’t match the size of large networks there are instances in which the issue faced by both the sections match. These are discussed in the below section,
· Assessing functional requirements: A transparent knowledge of what the system is intended to work on is a gripping necessity. The architects must have a clear knowledge on this scale. What functions are expected with the system is a very...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here