StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Implementation of Network Management System in the Surrey University Network - Term Paper Example

Cite this document
Summary
The paper "Implementation of Network Management System in the Surrey University Network" explores in detail the wired network, wireless connectivity of Wembley and Harrow SITES, wireless LAN design for Camden, network management system design, and network monitoring system of the named project…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Implementation of Network Management System in the Surrey University Network
Read Text Preview

Extract of sample "Implementation of Network Management System in the Surrey University Network"

Download file to see previous pages

Surrey University needs an infrastructure that supports all the demanded needs and also manages future trends of rising technologies. Many Universities have implemented a Campus area network for online learning. In fact, this is more feasible because it connects two or more than two networks of the educational institution, universities, or corporate campus. The connectivity includes a library, sections, student halls of residence (Campus Area Network. 2007). The network devices and computing equipment have to be consistent and extendable if the faculty staff increases.

Surrey University has 4 sites or branches which are Harrow, Wembley, Leicestershire, and Camden. The governing body has determined to implement an IP based network. The network layout of Surrey University needs an expandable and efficient network that will fulfill the requirements of the Surrey University staff. The Surrey University will activate studies on a new innovative technology named as Virtual Learning Environment (VLE). “According to a JISC’s Introduction to managed learning environments, the term ‘virtual learning environment’ (VLE) refers to the components in which learners and tutors participate in online interactions of various kinds, including online learning” (, what is a VLE? at UKCLE).

The presence of this technology will certainly change the trends in education and research. Student will participate in a particular lecture or test from home or from a remote location. The progress of a student and test schedules will be available on the site. The inbound communication of staff for Surrey University will be conducted by Surrey University’s internet. The VLE will provide virtual learning features along with video and voice communication features within the Surrey University branches as well as from the IP telephony.

2 ProfileSurrey University requires a redundant computer network that adequately manages network operations, student management, and business processes. Moreover, the university that is categorized into two sites needs to cope up with the new technological trends, in order to avoid network security threats and vulnerabilities.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Designing Networks Thesis Example | Topics and Well Written Essays - 7750 words”, n.d.)
Designing Networks Thesis Example | Topics and Well Written Essays - 7750 words. Retrieved from https://studentshare.org/information-technology/1403492-thesis-project-computer-network-lan-design
(Designing Networks Thesis Example | Topics and Well Written Essays - 7750 Words)
Designing Networks Thesis Example | Topics and Well Written Essays - 7750 Words. https://studentshare.org/information-technology/1403492-thesis-project-computer-network-lan-design.
“Designing Networks Thesis Example | Topics and Well Written Essays - 7750 Words”, n.d. https://studentshare.org/information-technology/1403492-thesis-project-computer-network-lan-design.
  • Cited: 0 times

CHECK THESE SAMPLES OF Implementation of Network Management System in the Surrey University Network

Network Security and Its Business Impact in Educational Institutions

network Security and Its Business Impact in Educational Institutions By Mohammed Abdul Rahman Supervisor: Dr.... Student Particulars Name: Mohammed Abdul Rahman Student Id: xxxxxxxxxx Project Title: network Security and Its Business Impact in Educational institutions Student Declaration I declare that 1.... I extend all my thanks to all the network administrators and the supporting staff in the computer department of various colleges in Sultanate of Oman, who despite of their busy schedule help me in providing the information and technical details, without which this project could not have be done by me....
56 Pages (14000 words) Dissertation

Firewall and Internet Security

However, since the category of this itself provides a large scope for a complex and more time-consuming analysis, the research question is further refined such that it focuses mainly on the following topic -  why implementation of personal firewalls in every system in an enterprise is considered to be a difficulty when compared to the  implementation of network firewalls.... The reason that could be given for the choice of this topic is that irrespective of the number of advancements in firewall technologies, no proper solutions have been found yet, to understand the continued ignorance of affording personal firewalls to every system user in an enterprise instead of network firewalls, which are always considered as the preferred option....
9 Pages (2250 words) Research Proposal

Understanding of Network

Understanding of network There is power in connection and building of relationship in today's society where many people have appreciated the value of a network.... From the past, a businessman for instance has strong reliance on successfully creating a network because of the associated benefits with it for his business.... While it is true that a network could exactly do this, its general meaning does not literally mean that one must confine its application in the business context alone....
6 Pages (1500 words) Essay

Wireless Communications - Benefits and Risks

Wireless technologies allow end users to remain connected to their business services much more than wired technologies especially when the users are mobile.... Modern businesses demand more mobility of people in the form of either travelling or else moving extensively in Office or Campus environments....
13 Pages (3250 words) Essay

Network and computer intrusion threats

nbsp; This research proposal is pertaining to collaborative assessment of network and computer intrusion threats by carrying out intrusion profiling.... ame and HyperlinkTable 1Format of analysis of the outcome of surveyTABLE 2The proposed time table for the researchIntroduction:This research is targeted to establish a detailed methodology of network intrusion profiling such that security policies on collaborative IDPS frameworks can be implemented.... This paper “network and computer intrusion threats” was developed to assist the researcher and his dissertation committee grasps the understanding and scope for the proposed study, which allowed the core functionality of the direction of the research....
39 Pages (9750 words) Essay

Factors Influencing Company Use of Virtual Private Networks

The bulk of facts highlighted in the paper would be from qualitative research methodology, whereby a survey is carried out by giving questionnaires to network Administrators, network Managers.... This report would be useful for decision-making by a group of experts including Networks Administrators, network Managers, Executives and most importantly all the people involved in the network Technology decision-making in the Universities....
10 Pages (2500 words) Dissertation

FAA and the Implementation of En Route Automation Modernization

From this research paper "FAA and the implementation of En Route Automation Modernization" it is clear that one of the most complex and challenging programs the FAA has ever implemented is the transition from En Route Host computer and backup system to ERAM.... This paper focuses on the current FAA progress-to-date in the development and implementation of ERAM.... The focus also included the benefits of the implementation of the ERAM program to the FAA and the flying world in general....
34 Pages (8500 words) Research Paper

Voice over IP Communication Systems

Unauthorized access attacks on the other hand imply that attackers gain the ability to access resources on a given network although they lack the legal authority to do it.... etwork consolidation as part of the VoIP technology has been known to enable the transmission of data, voice, and video over one single network....
12 Pages (3000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us