MIS102_Assessment 1 Brief_Written Essay XXXXXXXXXXPage 1 of 5 Task Summary Based on the case scenario provided, write a 1200 words essay and create a supporting network topology diagram showing the...

1 answer below »
Price please


MIS102_Assessment 1 Brief_Written Essay Page 1 of 5 Task Summary Based on the case scenario provided, write a 1200 words essay and create a supporting network topology diagram showing the architecture and distribution of data. This written essay should include comparisons of existing network topologies and provide recommendations based on the communication protocol stacks used. Context This assessment gives you the opportunity to apply the knowledge and theories you’ve learnt in Module 1: Basics of Data and Networking and in Module 2: IP Protocols and Network Administration. In doing so, you are required to analyse the case scenario and provide reviews and recommendations of the communication protocol stacks. Task Instructions 1. Please read the case scenario below: Xerlasian University Australia is planning to expand and set up a second campus in Australia. In doing so, they would like to get your input and advice as a data and networking specialist in developing the new university network. The university would like to connect the users of ASSESSMENT 1 BRIEF Subject Code and Title MIS102 Data and Networking Assessment Written Essay Individual/Group Individual Length 1200 words Learning Outcomes The Subject Learning Outcomes demonstrated by successful completion of the task below include: a) Describe and analyse the architecture and distribution of data. b) Compare and review communication protocol stacks and generate recommendations. Submission Due by 11:55pm AEST Sunday end of Module 2.2 (Week 4) Weighting 25% Total Marks 100 marks MIS102_Assessment 1 Brief_Written Essay Page 2 of 5 the new university network to the Internet using a router. However, the data should first go through the university proxy server for copyright reasons. The university would also like to have separate hubs for the class computers and the university staff computers. To gain access to the computers, users must enter their Xerlasian ID and the password into a custom-made application showing the Xerlasian University logo. Different access rights needs to be given to students and staff members. Students should only have access to student software and should not be allowed to install software in computers. However, the staff members need to be given all the access rights of a student as well as access to software licenses specific to staff only, such as a PDF editing software. The student e-mail server should also be different from the staff e-mail server. 2. Review the learning resources provided in Modules 1 & 2. 3. Write a 1200 word essay and develop a network topology diagram to; (1) describe and analyse the data distribution and architecture based on the case scenario and (2) review the existing network topology and provide recommendations based on your knowledge of the communication protocol stacks such as the appropriate network devices. 4. Please ensure that your written essay answers the following guide questions:  Describe and analyse the data distribution and architecture of the university network based on the case scenario. o Comment on the basic flow of data and the network architecture requested by the university. You need to be able to use the terms mentioned in Module 1 and Module 2 essential resources proficiently. o Are there any missing features in the network topology diagram that you think could be added or modified in order to create a better Xerlasian university network for the new campus?  Review the existing network topology and provide recommendations based on your knowledge of the communication protocol stacks. o Relate the flow of data to the communication protocol stacks. Make sure that all the relevant communication protocol stacks and how they operate are mentioned in your essay. o Are you able to specify the layer where the hubs and routers mainly function? For the log-in application, can you identify what communication protocol stack the log- in application operates and why? o Is there anything else that you wish to improve in any of the communication protocol stacks? Please provide recommendations for at least two communication protocol stacks. Recommendations needs be well supported and clearly justified. Word count and layout  The total word count for the written assay should be no more than 1200 words.  Please follow the following structure when writing the essay: o Introduction or background information: Start with the background information on your role as a data and networking specialist for this case scenario and a summary of what you intend to do. MIS102_Assessment 1 Brief_Written Essay Page 3 of 5 o Body. This would contain your response including the answers to the guide questions. o Conclusion. Briefly summarize your key contributions and recommendations. o References. Referencing Please use at least 3 academic references. It is essential that you use appropriate APA style for citing and referencing research. Please see more information on referencing here http://library.laureate.net.au/research_skills/referencing Submission Instructions Please submit the written essay via the Assessment link within Assessment 1. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades. http://library.laureate.net.au/research_skills/referencing MIS102_Assessment 1 Brief_Written Essay Page 4 of 5 Assessment Rubric Assessment Attributes Fail (Yet to achieve minimum standard) 0-49% Pass (Functional) 50-64% Credit (Proficient) 65-74% Distinction (Advanced) 75-84% High Distinction (Exceptional) 85-100% Knowledge and understanding of data architecture and the communication protocol stacks 40% Demonstrates a partially- developed understanding of the data architecture and the communication protocol stacks Essential components of the protocol stacks are not mentioned. Basic flow of the information and data networking has not been identified. Demonstrates a functional knowledge of the data architecture and the communication protocol stacks Only one or two essential components of the protocol stacks are mentioned. Basic flow of the information and data networking has not been identified. Demonstrates proficient knowledge of the data architecture and the communication protocol stacks Mentions essential components but not the complete protocol stacks. Basic flow of the information and data networking has been identified but has significant errors. Demonstrates advanced knowledge of the data architecture and the communication protocol stacks Mentions all essential components of the complete protocol stacks but has difficulty explaining their differences. Basic flow of the information and data networking has been identified but has consistent multiple minor errors. Demonstrates exceptional knowledge of the data architecture and the communication protocol stacks Mentions all essential components of the complete protocol stacks and can explain their differences. Basic flow of the information and data networking has been identified and has no or very few errors. Analysis and application with synthesis of new knowledge 30% Limited synthesis and analysis. Limited application or recommendations based upon analysis. Demonstrated analysis of new knowledge with application. Shows the ability to interpret relevant information and literature. Well-developed analysis and synthesis with application of recommendations linked to analysis. Thoroughly developed and creative analysis and synthesis with application and justified recommendations linked to analysis. Highly sophisticated and creative analysis, synthesis of new with existing knowledge. Strong application by way of well-supported and clearly justified recommendations. MIS102_Assessment 1 Brief_Written Essay Page 5 of 5 Evaluation of information such as recommendations based on the case scenario 20% Limited understanding of key concepts required to support the case scenario. Confuses logic and emotion. Information taken from reliable sources but without a coherent analysis. Viewpoints of experts are taken as fact with little questioning.
Answered Same DayOct 08, 2021MIS102

Answer To: MIS102_Assessment 1 Brief_Written Essay XXXXXXXXXXPage 1 of 5 Task Summary Based on the case...

Deepti answered on Oct 10 2021
154 Votes
Network Topology
Contents
Introduction    2
Network Architecture & Data Flow    2
Features    3
Communication Protocol Stack    3
Recommendations    4
Conclusion    5
References    5
Introduction
This essay explains the interconnection of devices such as rou
ters, switches and hubs for the new target campus of Xerlasian University in Australia. The essay proposes a network through which the users of the new university network can connect to the internet. The basic network architecture and flow of data are demonstrated in the following sections along with a network diagram. Communication protocol stack and data flow is described along with recommendation of certain features that shall enhance the efficiency and performance of the university network. The communication protocol stack for login application is also discussed.
Network Architecture & Data Flow
The basic data flow is demonstrated using the Open System Interconnect Model. The basic network architecture is shown in the diagram below. The basic flow of data is discussed below in accordance with the OSI network layers where each of the network components reside. The router shall reside in the network layer, switch in data link layer and hubs in the physical layer.
Physical Layer- The hubs for class computers and for University staff computers would be Layer 1 multi-station devices that will receive and send bits 0s and 1s. They will simply forward bits from one port to another. Hubs do not make intelligent decisions regarding packet transmission.
Data Link Layer- Switch will be Layer 2 device which will connect devices together with one port per device. It has broadcast throttling capability in order to control network traffic over the university network. This is accomplished by forwarding packets on the basis of destination MAC address which is recorded in a table by the switch. The addresses are located when a device first communicates over the network. Switch forwards all broadcast packets and multicast packets addressed to a group of ports or hub. Those addressed to class computers will be sent to class computers hub and those addressed to staff computer will be sent to their hub. If MAC address is unknown, the packet is forwarded to all ports and when recipient replies, the MAC address is recorded in the table.
Figure 1: Network Topology- Xerlasian University
Features
The features that can be added to the Xerlasian University network to make it safer are
· Switch should be...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here