ctivity 1 (Marks: 20)

You are a Technology Specialist in your organisation. You have been tasked to run a workshop on network system design specifically looking into the requirements and constraints. You have decided to approach the task by studying the components of a network system and the relationship between network systems and related areas.
Thus far, you have realised that you will base your workshop on the exhibit extracted from Serpanos and Wolf (2011).
Exhibit: Requirements and constraints for network system design
the design is network Protocols, functional requirements, network systems, performance requirements, network traffic, implementation constraints, embedded systems
Prepare for this workshop by completing the following questions.

Q.1.1
Identify a suitable network scenario/case that can be used to explain and discuss the relationship of concepts in the exhibit. Ensure that you provide details of the following aspects of the scenario:
A. Description of the scenario.

A. The scenario for discussing the relationship of concepts in the exhibit could be a large multinational company with multiple offices located in different countries. Each office has a Local Area Network (LAN) connected through wide-area networks (WANs) to ensure communication and data sharing between the offices. The scenario could also involve remote workers who need secure access to the company's network resources.

In this scenario, the network protocols are essential for establishing communication between devices within the LAN and for transferring data over the WANs. The functional requirements include services such as email, file sharing, and remote access for employees. The network systems refer to the combination of hardware and software components (routers, switches, servers, firewalls) that make up the company's network infrastructure.

Performance requirements involve ensuring that the network can handle the expected traffic volume and provide sufficient bandwidth for efficient communication between the offices. Network traffic refers to the data transmitted between devices in the network, including email messages, file transfers, and access to shared resources.

Implementation constraints could include the need for security measures such as encryption, authentication, and access control to protect sensitive company data. Embedded systems could be used for monitoring network performance, detecting and mitigating network threats, and managing network resources effectively.

A. The scenario for the network system design workshop could be a company setting up a new office location. The company wants to establish a reliable and efficient network infrastructure to support their daily operations. This network will need to connect various devices such as computers, printers, and servers, and it should also provide internet connectivity for all employees. The company also wants to ensure that the network can handle the anticipated network traffic and meet the performance requirements. Additionally, there are implementation constraints, such as budget limitations and physical limitations of the building, that need to be considered during the design process.