DATA MODELING

Get Expert's Help on MIS102 Data and Networking IT

Introduction:

We all are living in the era where data and information exchanged between us everywhere and it is constantly changing since last decades. The networks play very important role in all this. The Xerlasian University Australia is also following the same approach for their other university campus. There are several types of network and topologies which we can use to get our desired results with the giving scenario. On this assessment, I am working as a data and networking engineer so I have to fulfill the system requirements because I am responsible for developing, implementing, maintaining and supporting the system and networks between both campuses of university. I have to create and provide a simple solution which would work very smooth and fast on the application layer even if both campuses are trying to communicate to each other. The OSI (Open Systems Interconnection) will be used to make a successful network for both campuses of university in setting up, supporting, and maintaining local area networks (LANs), wide area networks (WANs), and other networking systems. The current topology can be seen in figure below:

Body:

The basic flow of data is very simple and clear because university is using the dedicated servers so the hosting and travel speed of data will be very fast. The concept of traffic flow is also very important here since it may be that packets from one flow need to be handled differently from others, by means of separate queues in switches, routers and network adapters, to achieve traffic shaping, fair queueing or Quality of Service. It is additionally an idea utilized in Queueing Network Analyzers (QNAs) or in bundle following (Whitt, 2001). 

In addition, there is strong need to add Network security protocol in the whole system of both campuses so that the outside persons will not be able to reach the data on servers (Zhang, 2004). This is because the protection of data should be our first priority and it should not be leaked anywhere on the network. System security conventions are essentially sort of system convention that guarantees that the respectability and insurance of information in traveling over a system association is maintained. System security conventions characterize the procedures and technique to make sure about system information from any ill-conceived endeavor to audit or concentrate the substance of information (Kleinrock & Short, 1999).

As referenced before, OSI will be used as the primary stack protocol for the two campuses (Sinha, 2017). The OSI Model (Open Systems Interconnection Model) is a theoretical structure used to portray the elements of a systems administration framework. The OSI model describes processing capacities into a widespread arrangement of rules and necessities so as to help interoperability between various items and programming. In the OSI reference model, the correspondences between processing frameworks are dissected into seven diverse deliberation layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application (Zhao, et al., 2018).

Complete Solution

Hire Expert Tutors

Get Professional Tutoring at Low Price in Australia


Professional

Tutoring Services

25,187+

Orders Delivered

4.9/5

5 Star Rating

621

PhD Experts

 

Amazing Features

Plagiarism Free

Top Quality

Best Price

On-Time Delivery

100% Money Back

24 x 7 Support

TOP