Assignment title: Information
Your assignment should be completed according to the General Guidelines for Presentation of Academic Work. 1. Write a report based on the above Case study to address the following parts to demonstrate critical-thinking abilities: a. Top-down design: How would you carry out the process of top-down network design for the network in the above Case study. What possible disadvantages could arise if a structured design approach is not followed? b. Characterise the internetwork and network traffic in the designed network: Why is it necessary to estimate the amount of network traffic in the designed network? Explain with the help of research the process of estimating the average expected traffic in the SkyView Tech network. Also, research the different types of traffic flows expected to be present in the overall network of SkyView Tech. c. Network Design with security proposal: Network security is a major consideration that needs to be taken into account in the design. Research and explain technically the choices that you make to implement security in the wired as well as the wireless parts of the SkyView Tech network. Also, you need to critically review the case study and propose both the logical network design and physical network design. This section should have detailed diagrams on the layout of the overall network. Clearly show the building(s), the cabling layout, the devices and their location. Your design should also include detailed IP subnetworking and address allocations, design issues, and routing protocols selected for the proposal. The diagrams should be accompanied by a description of how it all comes together and works. How would you carry out a performance study of your designed network? d. Network applications: What are the expected applications to be used in the company's network and the user communities? How will this information be helpful in the network design? Your report should document the system requirements for these applications and if the system will meet the requirements or not. If not, then what is proposed solution? You should also prepare a table showing the name and type of the applications, their criticality and other necessary comments