[Recommended]Computer communication

Computer communication Exam Type: Assignment 1 & 2 Semester: 382 Course Code CS415 Course Title Compute Communications Assignment Date 2/4/2018 Duration 10 Weeks Students are…

Computer communication
Exam Type: Assignment 1 & 2 Semester: 382
Course Code
CS415
Course Title
Compute Communications
Assignment Date
2/4/2018
Duration
10 Weeks
Students are requested to comply with all JUC examination rules and regulations strictly.
PART I
TO BE FILLED BY THE STUDENT
STUDENT’S NAME
ID. No.
Course Section
TO BE FILLED BY THE CONCERNED DEPARTMENT
PART II
Question No.
Max Marks
Actual Marks
Comments/Remarks
I
10
Written Report
Submission of the assignment:
Week 13
II
10
Presentation
Week 14&15
Total
20
Name:
Signature:
Description: sh3ar2 Royal Commission for Jubail and Yanbu
FX-ACA-002
Issue 0 Rev. 1
January 2, 2014
i
Jubail University College
Computer Science & Engineering Department
Cover Page
Assignment 1&2, CS415, Sem 382, JUC Female Branch
Group members
For this project, you can work alone or with 1 or 2 other people (i.e., the maximum group size is 3). You must submit your group members as soon as possible. Both individuals and groups will be graded the same. You may choose your own partners, but please choose wisely! After you have formed your group, you may not change/drop partners.
You can think of a possible company that you are going to design a network.
NETWORK DESIGN PROJECT PROPOSAL
in
COMPUTER COMMUNICATIONS
I. Project Title: Title of the Project
II. Introduction
-Discussing about the project and the goal of the project
III. Project Scope
The Scope Statement is an essential element of any project. Project managers use the Scope Statement as a written confirmation of the results your project will produce and the constraints and assumptions under which you will work. Both the people who requested the project and the project team should agree to all terms in the Scope Statement before actual project work begins.
A good Scope Statement includes the following information:
•Justification: A brief statement regarding the business need your project addresses. (A more detailed discussion of the justification for the project appears in the project charter.)
•Product scope description: The characteristics of the products, services, and/or results your project will produce.
•Acceptance criteria: The conditions that must be met before project deliverables are accepted.
•Deliverables: The products, services, and/or results your project will produce (also referred to as objectives).
•Project Exclusions: Statements about what the project will not accomplish or produce.
•Constraints: Restrictions that limit what you can achieve, how and when you can achieve it, and how much achieving it can cost.
•Assumptions: Statements about how you will address uncertain information as you conceive, plan, and perform your project.
IV. Project Goals and Objectives
3.1. Goals: The project goal refers to achieving a desired outcome (performance goal) at a specific end date (time goal) employing a specific amount of resources (resource goal).
3.2. Objectives: Objectives are lower level statements that describe the specific, tangible products and deliverables that the project will deliver.
V. Implementation Plan and Methodology
Consists of the following with their corresponding days or weeks that you are working on the project:
· Prepare
· Plan
· Design
· Implement/Operate
· Optimize (continuous)
VI. Project Approach
The Project Approach provides information regarding the high-level structure of the project. It includes major phases, stages, their relationships in defining the work to be done, and techniques.
VII. Project Design: Project design is an early phase of the project where a project’s key features, structure, criteria for success, and major deliverables are all planned out. The point is to develop one or more designs which can be used to achieve the desired project goals.
VIII. Cost Benefit Analysis
-Estimated value of the H/W, S/W, and other equipment’s used in the design project.
IX. Security Strategy
10.1. Technical Security Solutions (if it is applicable)
· Firewall Management
· Antivirus Management
· Antivirus S/W
· Secure Wireless
· Updates and Patches
X. Recommended Security Policies
· Acquisition Assessment Policy- Monitoring the behavior of hosts, the network, internet, etc.
· Remote Access Policy-VPN, authorized users, external resources, personal equipment’s
· Wireless Communication Policy-General requirements, isolated wireless device, and home wireless device requirements.
XI. Related Literature: A literature review is an evaluative report of information found in the literature related to your selected area of study. The review should describe, summarize, evaluate and clarify this literature. It should give a theoretical base for the research and help you (the author) determine the nature of your research. Note: Description of related work, including references to at least five relevant papers (Use the IEEE and EBSCO websites in the library)

The post Computer communication appeared first on ExpertCustomWritings.
Assignment status: Solved by our experts

>>>Click here to get this paper written at the best price. 100% Custom, 0% plagiarism.<<<

Leave a Reply

Your email address will not be published. Required fields are marked *