[go: up one dir, main page]

0% found this document useful (0 votes)
427 views19 pages

7049-1712772561911-Unit-02 - Networking Assignment - 2024

dgdgdgdf

Uploaded by

vidunmindaja2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
427 views19 pages

7049-1712772561911-Unit-02 - Networking Assignment - 2024

dgdgdgdf

Uploaded by

vidunmindaja2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Higher Nationals - Summative Assignment Feedback Form

Student Name/ID

Unit Title Unit 02: Networking

Assignment Number 1 Assessor


Date Received
Submission Date
1st
submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine networking principles and their protocols

Pass, Merit & Distinction Descripts P1 P2 M1

LO2 Explain networking devices and operations.

Pass, Merit & Distinction Descripts P2 M2 D1

LO3 Design efficient networked systems.

Pass, Merit & Distinction Descripts P3 P4 M3 D2

LO4 Implement diagnose and demonstrate prepared networked systems.

Pass, Merit & Distinction Descripts P5 M4 M5

D3

* Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grades decisions have been agreed at the assessment board.
Assessor Feedback:

Grade: Assessor Signature: Date:


Resubmission Feedback:

• Please note resubmission feedback is focussed only on the resubmitted work

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

• Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grades decisions have been agreed at the assessment board.

BTEC HN Summative Assignment Feedback Form


Issue Date: June 2021 Owner: HN QD
DCL1 Public (Unclassified) Version 1.0
Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before
mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not
be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may
apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be
asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD
referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced
to A REFERRAL or at worst you could be expelled from the course
12. Use word processing application spell check and grammar check function to help editing your
assignment.
13. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page
Number on each page. This is useful if individual sheets become detached for any reason.
STUDENT ASSESSMENT SUBMISSION AND
DECLARATION
When submitting evidence for assessment, each student must sign a declaration confirming that the
work is their own.
Student name: Assessor name:

Issue date: Submission date: Submitted on:

Programme: Pearson BTEC HND in Computing

Unit: 2 -Networking
LAN Design & Implementation for BlueScope Steel Corp.

Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students who break
the rules, however innocently, may be penalized. It is your responsibility to ensure that you understand
correct referencing practices. As a university level student, you are expected to use appropriate references
throughout and keep carefully detailed notes of all your sources of materials for material you have used in
your work, including any material downloaded from the Internet. Please consult the relevant unit lecturer or
your course tutor if you need any further advice.

Guidelines for incorporating AI-generated content into assignments:

The use of AI-generated tools to enhance intellectual development is permitted; nevertheless,


submitted work must be original. It is not acceptable to pass off AI-generated work as your own.

Student Declaration
Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of
plagiarism. I understand that making a false declaration is a form of malpractice.

Student signature: Date:


UNIT 2 – NETWORKING
ASSIGNMENT BRIEF

Student Name/ID Number

Unit Number and Title Unit 2 – Networking

Academic Year
Unit Tutor

Assignment Title LAN Design & Implementation for BlueScope Steel Corp.

Issue Date
Submission Date

Submission Format
The submission should be in the form of an individual report written in a concise, formal style using
single spacing (refer to the assignment guidelines for more details) and a formal presentation with 8-
10 slide.

Individual Report

You are required to make use of headings, paragraphs, and subsections as appropriate, and all work
must be supported with research and referenced using Harvard referencing system. Please provide in-
text citation and a list of references using Harvard referencing system. The recommended word count
is 3,000–3,500 words for the report excluding annexures, although you will not be penalised for
exceeding the total word limit, although you will not be penalized for exceeding the total word limit.

Presentation

A formal 10–15-minutes presentation (8-10 slides as a guide, with supporting speaker notes) to
communicate an investigation to a non-technical audience discussing the key features and
characteristics of a range of network types, topologies, hardware, and software that you have been used
for the new network implementation and demonstrate your network blueprint and the packet tracer
simulation.

Unit Learning Outcomes


LO1. Examine networking principles and their protocols.

LO2. Explain networking devices and operations.

LO3. Design efficient networked systems.

LO4. Implement diagnose and demonstrate prepared networked systems.

Transferable skills and competencies developed


• Computational thinking (including its relevance to everyday life)
• Demonstrate knowledge and understanding of essential facts, concepts, principles, and
theories relating to computing and computer applications.
• Use such knowledge and understanding in the modelling and design of computer-based systems
for the purposes of comprehension, communication, prediction, and the understanding of trade-
offs.
• Recognize and analyze criteria and specifications appropriate to specific problems, and plan
strategies for their solutions.
• Critical evaluation and testing: analyze the extent to which a computer-based system meets the
criteria defined for its current use and future development.
• Methods and tools: deploy appropriate theory, practices and tools for the design,
implementation, and evaluation of computer-based systems.

Computing-related practical skills:


• The ability to specify, design and construct reliable, secure, and usable computer-based
systems.
• The ability to evaluate systems in terms of quality attributes and possible trade-offs
presented within the given problem.
• The ability to deploy effectively the tools used for the construction and documentation
of computer applications, with particular emphasis on understanding the whole process
involved in the effective deployment of computers to solve practical problems.
• The ability to critically evaluate and analyze complex problems, including those with
incomplete information, and devise appropriate solutions, within the constraints of a
budget.

Generic skills for employability


• Intellectual skills: critical thinking; making a case; numeracy and literacy.
• Self-management: self-awareness and reflection; goal setting and action planning.
• Independence and adaptability; acting on initiative; innovation and creativity.
• Interaction: reflection and communication.
• Contextual awareness, e.g. the ability to understand and meet the needs of individuals, business,
and the community, and to understand how workplaces and organisations are governed.
Assignment Brief and Guidance:

BlueScope is an Australian based Sheetmetal manufacturer based in Melbourne. The


company manufactures sheet metal and other steel-based products, and CEO plan to
expand the company operations in Darwin and management decided to open new branch
office in Darwin with the data center. The company is planning to expand their business
operations with their latest branch at Darwin and wants it to be one of the most prominent
tech-oriented offices in Darwin with the latest tech facilities such as IoT and smart devices
such as auto lighting and physical security solutions smart gates and new ERP software.

You have been appointed as the junior network administrator of BlueScope and your task
is to, design and restructure the existing network. Prepare a network architectural design
and implement it with your suggestions and recommendations to meet the company
requirements.
The floor plan of the head office in Melbourne is as follows:
Floor 1:
• Reception area (5 employees)
• Sales & Marketing Department (20 employees)
• Customer Services Area – with Wi-Fi facilities
• Factory area (30 employees)
• Warehouse and the distribution (25 employees)

Floor 2:
• Director suits (5 suits)
• Boardroom with Video conferencing facility and Wi-Fi.
• Administration Department (25 Employees)
• HR Department (6 employees)
Floor 3:
• Accounting & Finance Department (15 employees)
• IT Department (6 employees)
• The Server Room
The newly established floor plan of the Darwin is as follows:
Floor 1:
• Reception area (2 employees)
• Customer Services Area– with Wi-Fi facilities
• Factory area (35 employees)
• Warehouse and the distribution (20employees)

Floor 2:
• Administration Department (15 Employees)
• HR Department (7 employees)
• Accounting & Finance Department (18 employees)
• IT Department (6 employees)
• The Server Room

T he followi ng requ irement s are gi ven by t he M anagement .


• All the departmen ts mu st be separated with uniqu e su bnet s.

• T he co nferenci ng roo m o f t he head office and Cu stomer Servic es Areas


of e ach b ran ch are to be equ ipped wit h Wi -Fi connecti ons .

• Connec ti vi t y between t wo branc hes (Melbourne and Darwin) which


would allow in tr a -br an ch conne ctivity between departments. (Use of VPN
or Inte r VLAN r out ing)

• T he necessary IP ranges must be de cided by the network designe r and


should be used for all t he dep artments and subne tting calculations m ust
be provided with in the report ex cept t he server room .

• T he number of servers requi red for t he Server room need s to be


de cided by the Net work des igne r and should be assigned with
192. 168. 10. 0/ 24 subne t . (Uses st atic IP s)

• T he Sales and Market i ng Te am also nee ds to access Ne twork resources


u si ng W IFI con ne ct ivity .

( N o t e : C l e a r l y s t at e yo u r a s s u m pt i o ns . Y o u a r e a l l o w e d t o d e s i g n t h e n e t w o r k
a c c o r d i n g t o y o u r a ssu m p t i o ns , b u t m a i n r e q u i r e m e nt s s h o ul d no t be v io l a te d )

Acti vit y 01
• Discuss the benef it s and constraints of d iffe rent ne twork sy stem types that
can be imp lemen ted in the Darwin office . Furtherm ore discuss the type of
ne twor ks re commended for the restructuring of Melbourne and Adelaide
offices .

• Discuss the d if fere nt pr otocols utilized for the comm unication and the
conne ct iv ity of t he 3 off ices which can be imp lemente d in the Darwin
b ranch an d t he main IEEE Ethernet standards that can be used in ab ove
LAN and WLAN de sign of Blue Scop e.

• Discuss t he imp ort an ce and impact of network topologie s and assess the
main net work protocol s uite s that are used in ne twork design using
examp les . Re commend s uitable network topolog ies and network protocols
for the ab ove s ce nario an d ev aluate your answe r with valid p oints.

Acti vit y 02
• Discuss the ope rat ing pr in ciple s of network dev ice s (Ex: Route r, Switch,
Etc.) and se rver t ypes t hat can be used for above sce nario while exp loring
d ifferen t se rve rs th at are av ailable in tod ay’s marke t with their
sp ecifications an d recommend se rver/serve rs for the above scenario and
justify your se le ct ion wit h v alid p oints.

• Discuss t he inte r -depe nden ce of workstation hard ware and ne tworking


software and provide ex amp les for networking software that can be used in
the above net work des ign .

Acti vit y 03
• P r e p ar e a wr i tt e n net w o r k d e s i gn p l a n to m e et t h e a b o v e - men t i on e d u s e r
r e q u ir e me n t s i nc l ud i ng a b l u ep ri n t d r a w n us i n g a m od el i n g to o l (E x : M ic r o s of t
V i s i o, E d r a wM a x ) a nd t e s t a n d e v al u a t e t he p r op o s ed d e s i gn b y an a l y si n g u s e r
f e e d b a c k w i t h t he a im o f o p t i mi z i n g y o u r d e s ig n a n d i mp r ov in g e f fi c ie n c y .

• ( S u p p o rt y o u r a n s w er b y p r ov id i n g t h e V L A N a n d I P s u b n et t in g s c h e m e fo r th e
a b o v e s c en a r io a n d t h e l i s t o f d ev ic e s , n e t wo rk c o m p on e nt s a n d s o ftw a r e u s e d t o
d e s i g n t h e n et w or k f o r a b o v e s c e n a ri o a nd whi l e j u s t i fy i n g y o ur s e lec t i on s . )

• Install and conf ig ure Net work serv ices, de vices and app lications (Ex:
VLAN, WiFi, DNS, Proxy , Web , Etc.) according to the p rop osed design to
accomplish t he user req uireme nts and desig n a detailed Maintenance
sche d ule for above Net work.

*Not e: - Screen shots of Co nfi gurati on sc ript s shou ld be present ed i n you r


document. Yo ur packet trac er fi le mu st be submitt ed t o t he c lou d dri ve and
share t he li nk in t he appendix of document for t he assessor verification
purposes.
Acti vit y 04
• Impleme nt a net worked sy stem based on y our prep ared desig n with valid
ev iden ce .

• Prep are 10 -15 min utes p resentation which includes the de sign (Ne twork
type , topolog ies , devices , and software you use d for the implementation ,
and y ou need to just if y with the v alid reasons. The pre sentation should
include y our b luepr in t of t he de sign and the packe t tracer demonstration
with tes ting in terf ace pinging’s and trace routes). Add you r present ati on
sli des i n t he appendix o f t he report .

• Deve lop tes t cases and con duct ve rification (Ex: Ping , e xtended ping , trace
route , telnet , SSH, et c.) t o te st the above Network and analyse the test
re sults again st the exp ected results.

• Re commend p oten tial f ut ure e nhancements for the ne tworked system with
v alid jus tificat ion s and critically refle ct on the imp lemented network,
includin g t he p lan , des ign , config urations, tests, and the de cisions made
to enhan ce the sy stem .
Recommended resources
Please note that the resources listed are examples for you to use as a starting point in your research – the
list is not definitive.
Weblinks:
• https://blog.netwrix.com/ (2022) Network Devices Explained [online] Available at:
https://blog.netwrix.com/2019/01/08/network-devices-explained/ [Accessed 1 August 2022]
https://www.checkpoint.com/ (n.d.) What is a Firewall? [online] Available at:
https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/ [Accessed 1 August
2022]
• https://www.checkpoint.com/ (n.d.) What is an IoT Gateway? [online] Available at:
https://www.checkpoint.com/cyber-hub/network-security/what-is-iot/what-is-an-iot gateway/
[Accessed 1 August 2022]
• https://www.cloudflare.com/en-gb/ (n.d.) A global network built for the cloud [online] Available at:
https://www.cloudflare.com/en-gb/learning/network-layer/internet-protocol/ [Accessed 1 August
2022]
• https://www.comparitech.com/ (2020) Variable Length Subnet Mask (VLSM) Tutorial [online]
Available at: https://www.comparitech.com/net-admin/variable-length-subnet-mask-vlsm tutorial/
[Accessed 1 August 2022]
• https://www.comptia.org/ (n.d.) What Is a Network Protocol, and How Does It Work? [online]
Available at: https://www.comptia.org/content/guides/what-is-a-network-protocol [Accessed 1
August 2022]
• https://www.ibm.com/uk-en (2021) Networking [online] Available at: https://www.ibm.com/uk-
en/cloud/learn/networking-a-complete-guide [Accessed 1 August 2022]
• https://www.ibm.com/uk-en (2022) TCP/IP protocols [online] Available at:
https://www.ibm.com/docs/en/aix/7.2?topic=protocol-tcpip-protocols [Accessed 1 August 2022]
• https://www.lifewire.com/ (2022) What Is Bandwidth? Definition, Meaning, and Details [online]
Available at: https://www.lifewire.com/what-is-bandwidth-2625809 [Accessed 1 August 2022]
• https://www.ncsc.gov.uk/ (2019) Secure design principles [online] Available at:
https://www.ncsc.gov.uk/collection/cyber-security-design-principles [Accessed 1 August 2022]
• https://www.serverwatch.com/ (2021) Network Server [online] Available at:
https://www.serverwatch.com/servers/network-server/ [Accessed 1 August 2022]
• https://www.techtarget.com/ (2022) IoT gateway [online] Available at:
https://www.techtarget.com/iotagenda/definition/IoT-gateway [Accessed 1 August 2022]
• https://www.univention.com/ (2022) Brief Introduction: DHCP and DNS [online] Available at:
https://www.univention.com/blog-en/brief-introduction/2019/03/brief-introduction-dhcp dns/
[Accessed 1 August 2022]
Virtual Network Simulators:
• https://www.adobe.com/ (n.d.) DNS/DHCP/EMAIL VIA PACKET TRACER [online] Available at:
https://express.adobe.com/page/7ogipygZfOh0B/ [Accessed 1 August 2022]
• https://techgenix.com/ (2019) Tips and tools for simulating a complex network in a virtual lab
[online] Available at: https://techgenix.com/simulating-network-in-virtual-lab/ [Accessed 1 August
2022]
• https://www.eve-ng.net/ (2022) EVE - The Emulated Virtual Environment For Network, Security
and DevOps Professionals [online] Available at: https://www.eve-ng.net/ [Accessed 1 August
2022]
• https://www.gns3.com/ (2022) The software that empowers network professionals [online]
Available at: https://www.gns3.com/ [Accessed 1 August 2022] https://www.netacad.com/ (n.d.)
Cisco Packet Tracer [online] Available at: https://www.netacad.com/courses/packet-tracer
[Accessed 1 August 2022]

Journal articles.
• Agyemang, J., Kponyo, J. and Klogo, G., 2022. The State of Wireless Routers as Gateways for
Internet of Things (IoT) Devices. [online] Pubs.sciepub.com. Available at: [Accessed 1 August
2022].
• Oje, A. (2021) Optimization and analysis of the packet switched network with focus on the 3G
network. Journal of Physics: Conference Series, Volume 1734, International Conference on Recent
Trends in Applied Research doi:10.1088/1742-6596/1734/1/012037 Available at:
https://iopscience.iop.org/article/10.1088/1742-6596/1734/1/012037/meta [Accessed 1 August
2022].
• Tyagi, A. (2020) TCP/IP Protocol Suite. International Journal of Scientific Research in Computer
Science Engineering and Information Technology doi:10.32628/CSEIT206420 Available at:
https://www.researchgate.net/publication/346829282_TCPIP_Protocol_Suite [Accessed 1 August
2022].
• Van der Toorn et al. (2022) Addressing the challenges of modern DNS a comprehensive tutorial.
Computer Science Review, Volume 45, 2022, 100469,
https://doi.org/10.1016/j.cosrev.2022.100469
• Xu, G. (2021) Research on the Application of the IPv6 Network Protocol. Journal of Physics:
Conference Series doi:10.1088/1742-6596/2031/1/012040 Available at:
https://iopscience.iop.org/article/10.1088/1742-6596/2031/1/012040/pdf [Accessed 1 August
2022].
• ZHUKOVYTS’KYY, Igor & PAKHOMOVA, Victoria. (2018). Research of token ring network options in
automation system of marshalling yard. Transport Problems. 13. 149-158.
doi:10.20858/tp.2018.13.2.14.
Reading:
• Bonaventure, O. (2011) Computer Networking: Principles, Protocols and Practice, The Saylor
Foundation, Available at: https://resources.saylor.org/wwwresources/archived/site/wp
content/uploads/2012/02/Computer-Networking-Principles-Bonaventure-1-30-31-OTC1.pdf

You might also like