TECH2100 Network Design and Implementation Project Assignment Help

Assessment 3 Information  

Subject Code: 

TECH2100

Subject Name: 

Introduction to Information Networks

Assessment Title: 

Network Design and Implementation Project

Assessment Type: 

Individual

Assessment Length: 

1,500 

Words (+/-10%) 

Weighting: 

40 %

Total Marks: 

40

Submission: 

MyKBS 

Due Date: 

Week 13


Your Task 

This assessment challenges you to apply theoretical concepts from your course to a practical network  design and simulation project. You are expected to create a comprehensive network using Cisco Packet  Tracer, a network simulation software. This project will test your ability to integrate knowledge across several  networking domains, including network layer models, addressing and routing, transport layer protocols,  wireless networking, network security, and Quality of Service (QoS).

Assessment Description  

Part 1. Network Design Documentation 

Purpose: To outline your entire network design process, from inception to implementation.  This document will serve as a comprehensive blueprint of your network, detailing each decision  and its justification. 

Content: 

o Introduction: Describe the purpose and expected outcomes of the network. o Design Choices: Discuss the selection of network models (OSI or TCP/IP layers) and  their suitability for your scenario. 

o Addressing Scheme: Provide a detailed IP addressing plan. 

o Routing Protocols: Detail which routing protocols (e.g., RIP, OSPF, BGP) are used  and the rationale behind their selection. 

o Network Security Measures: Outline the security protocols (e.g., firewalls, VPNs) to  protect the network. 

o Quality of Service (QoS): Explain your strategy for managing network traffic and  ensuring quality of service. 

o Simulation Outline: Describe what will be demonstrated in the Cisco Packet Tracer  simulation. You must use the Network Scenario Generators: Custom GPT: Network  Scenario Generator to assist in generating and refining your network  scenario. This tool is integral to creating realistic and challenging network environments for simulation. 

Part 2. Network Simulation 

Purpose: To practically implement and troubleshoot your network design in a simulated  environment using Cisco Packet Tracer. 

Setup Requirements

Network Construction: Construct a network that includes: 

o Three Routers: Configured to manage traffic between different network segments. o Three Switches: Connecting devices within the same network segment. o Wireless Devices: Implement wireless access points as studied in Weeks 7 – 9. o Three Hosts: Devices (e.g., PCs) that generate and receive traffic. 

o One Rogue Device: Simulate security threats using a rogue laptop.

o Modules: Include HWIC-2T (two-port serial high-speed WAN) modules in routers as  part of Week 7-9’s workshop. 

Naming Convention: The first router should be named using your first name (e.g.,  Router_John) and the second router with your last name (e.g., Router_Doe). Suggested IP Address Table: 

For students new to subnetting, here is a suggested IP address table. These IP addresses are  recommendations, and you can modify them based on your network scenario. Alternatively,  use the Network Scenario Generators Custom GPT to generate other valid IP address schemes. 

This table uses placeholders for Network A to indicate that specific IP addresses will be allocated  from the unique list provided by the facilitator.

Device 

Router_[Your_First_Name] Fa0/0 Router_[Your_Last_Name] Fa0/0 

Router_[Student_ID] 

Switch 1 

Switch 2 

Switch 3 

PC-A 

PC-B 

PC-C 

Access Point 1 

Access Point 2 

Interface 

Network 

IP Address 

Subnet Mask

Default  

Gateway 

 

 

 

 

 

 

 

 

 




Network A 192.168.1.XX 255.255.255.0 N/A



Network B 192.168.2.1 

255.255.255.0 N/A

Fa0/0

Network  C

192.168.3.1 

255.255.255.0 N/A

Network  A



192.168.1.XX 255.255.255.0 192.168.1.XX

Network  B


192.168.2.2 

255.255.255.0 192.168.2.1

Network  C


192.168.3.2 

255.255.255.0 192.168.3.1

NIC 



Network A 192.168.1.XX 255.255.255.0 192.168.1.XX

NIC 



Network B 192.168.2.10 255.255.255.0 192.168.2.1

NIC

Network  C


192.168.3.10 255.255.255.0 192.168.3.1

Network  A



192.168.1.XX 255.255.255.0 192.168.1.XX

Network 



192.168.2.20 255.255.255.0 192.168.2.1


Interface 

Network 

IP Address 

Subnet Mask

B






DeviceDefault  Gateway 

Rogue Laptop Wireless 192.168.4.50 255.255.255.0 192.168.4.1 

Notes

“XX” in IP addresses for Network A indicates that specific IPs will be provided to each student  from the unique list of IPs during Week 11 to ensure individual configurations.

Router Naming: Replace Router_[Your_First_Name] and Router_[Your_Last_Name] with  your actual first and last names as specified in the assessment. 

Network C: This network can be an additional segment if you want to simulate more advanced  configurations or connect additional departments/locations. 

Wireless Configuration: Access Points should have their own IP addresses within the  respective network segments, and security settings (WPA2) should be configured for wireless  access. 

Configuration and Testing

Router and Switch Configuration: Configure router interfaces and switch ports based on the  addressing table above. Ensure all interfaces are enabled, and IP addressing is correctly set  up. 

Wireless Network Settings: Integrate wireless access points by configuring SSID,  authentication, and performance metrics (signal strength, throughput). 

Port Security: Configure port security on switches to restrict unauthorised access. Ensure port  security is blocking rogue traffic while allowing legitimate devices to connect.

Testing and Verification: Use ping and diagnostic commands to test connectivity between  devices and ensure smooth communication between routers, switches, and wireless devices. 

3. Presentation 

Purpose: To comprehensively articulate the process, decisions, and outcomes of your network  design and simulation.

Format: Present your assessment as a video recording of 8 minutes detailing the network  design and simulation stages using the format given below. 

o Introduction: Discuss the project scope and objectives. 

o Walk-through: Explain the network design in detail. 

o Demonstration: Highlight key functionalities within the simulation. 

o Challenges and Resolutions: Discuss any challenges faced and their resolutions.

o Conclusion: Suggest potential improvements or future network expansions. 

This assessment aims to achieve the following subject learning outcomes:

LO1 

Evaluate the main technologies, models, and protocols used in data communications and networking.

LO2 

Explain the purpose and functionality of layered computer network models.

LO3 

Identify problems that emerge among the networks that constitute today’s internet architecture.


Assessment Instructions  

The documentation should be submitted as a Word or PDF file via MyKBS. It must be well organized, professionally formatted, and include all necessary diagrams and descriptions as  outlined in the assessment description. 

Upload the Cisco Packet Tracer file (.pkt) 

Submit the presentation as a video recording for 8 minutes (+/- 10 %). Ensure it is informative and adheres to the specified format. 

You will be evaluated on your ability to communicate complex technical information clearly  and effectively to a non-technical audience. 

Demonstrate a deep understanding of the network design and simulation concepts covered  in the course. 

You should provide at least ten (10) academic references to support your discussion. Please refer to the assessment marking guide to assist you in completing all the assessment criteria.

Important Study Information 

Academic Integrity and Conduct Policy 

KBS values academic integrity. All students must understand the meaning and consequences of cheating,  plagiarism, and other academic offenses under the Academic Integrity and Conduct Policy. 

Please read the policy to learn the answers to these questions: 

What is academic integrity and misconduct? 

What are the penalties for academic misconduct? 

How can I appeal my grade? 

Late submission of assignments (within the Assessment Policy)

Length Limits for Assessments 

Penalties may be applied for assessment submissions that exceed prescribed limits. 

Study Assistance 

Students may seek study assistance from their local Academic Learning Advisor or refer to the resources on the MyKBS Academic Success Centre page. Further details can be accessed at  

Submission Requirements 

All assessments, including draft copies, must be written and submitted in English. The use of translation tools is not permitted.


Generative AI Traffic Lights 

Please see the level of generative AI that this assessment has been designed to accept:

Traffic Light 

Amount of Generative Artificial Intelligence  (GenerativeAI) usage 

Evidence Required

This  

assessment  ()

Level 1

Prohibited: 

No GenerativeAI allowed 

This assessment showcases your individual  knowledge, skills and/or personal experiences  in the absence of Generative AI support.

The use of generative AI is prohibited for  this assessment and may potentially result  in penalties for academic misconduct,  including but not limited to a mark of zero  for the assessment.


Level 2

Optional: 

You may use GenerativeAI for research and content generation that is appropriately  referenced. 

See assessment instructions for details 

This assessment allows you to engage with  Generative AI as a means of expanding your  understanding, creativity, and idea generation  in the research phase of your assessment and  to produce content that enhances your  assessment. I.e., images. You do not have to  use it.

The use of GenAI is optional for this  assessment. 

Your collaboration with GenerativeAI must  be clearly referenced just as you would  reference any other resource type used. Click on the link below to learn how to  reference GenAI.  

In addition, you must include an appendix  that documents your GenerativeAI  

collaboration including all prompts and  responses used for the assessment.  

Unapproved use of generative AI as per  assessment details during the content  generation parts of your assessment may  potentially result in penalties for academic  misconduct, including but not limited to a  mark of zero for the assessment. Ensure  you follow the specific assessment  

instructions in the section above.


Level 3

Compulsory: 

You must use GenerativeAI to complete  your assessment 

See assessment instruction for details 

This assessment fully integrates Generative  AI, allowing you to harness the technology’s  full potential in collaboration with your own  expertise. 

Always check your assessment instructions  carefully as there may still be limitations on  what constitutes acceptable use, and these  may be specific to each assessment. 

You will be taught how to use generative  AI and assessed on its use.  

Your collaboration with GenerativeAI must  be clearly referenced just as you would  reference any other resource type used. Click on the link below to learn how to  reference GenAI.  

In addition, you must include an appendix  that documents your GenerativeAI  

collaboration including all prompts and  responses used for the assessment.  

Unapproved use of generative AI as per  assessment details during the content  generation parts of your assessment may  potentially result in penalties for academic  misconduct, including but not limited to a  mark of zero for the assessment. Ensure  you follow the specific assessment  

instructions in the section above.

()

Assessment Marking Guide 

F2 (Fail) 

Marking Criteria 

F1(Fail) 

P(Pass) 

C(Credit) 

D(Distinction)  

 HD (High Distinction) 

| 40 marks 

Documentation| 

0 –24%: 

25 – 49% 

50 -64% 

65–74% 

75 -84%  

85 – 100% 

7 marks You have provided  

incomplete or largely  

incorrect  

documentation with  

little understanding of  

network design  

concepts. 

You have provided  documentation that  is somewhat  

complete but lacks  several critical  

details. 

You have provided basic documentation with minor omissions. 

You have provided  basic and  

comprehensive   

You have provided  thorough and detailed documentation.  

including all required elements. 

You have provided  exceptionally detailed  and complete  

documentation,  

exceeding the basic requirements.

Application of  Security  

Measures and  Testing | 6  

Marks

You have failed to  apply basic security  measures or conduct any meaningful testing.

You have applied  some basic security  measures, but they  are largely ineffective or incorrectly tested.

You have applied  

necessary security  measures and  

conducted basic testing  demonstrating  

understanding.

You have effectively applied and tested  security measures,  showing a good level of understanding and  implementation.

You have applied and been rigorously tested  

advanced security  

measures, showing high  competency and  

thoroughness.

You have applied and  expertly tested cutting edge security  

measures, setting a  benchmark for  

excellence and  

comprehensive  

understanding.

Configuration  and  

Implementation Details| 15  

marks

No valid configuration  present, or incorrect  setup. No evidence of  understanding  

technical or  

configuration  

requirements.

The configuration and setup is mostly  

inaccurate with  

notable errors. 

Demonstrates  

minimal technical  understanding.  

Critical elements are  missing or  

misapplied.

The configuration and  network setup shows a  basic understanding  with minor errors or  omissions and limited  functionality.

The configuration and  network are generally  accurate. The  

configurations are  robust with working  components (e.g.,  addressing). Lacks  depth or minor  

functional issues.

The configuration is  mostly accurate,  

functional, and includes  appropriate technical  elements such as IP  addressing, subnetting,  and routing. You have set up the network with  excellent configurations,  demonstrating advanced  understanding.

The configuration and  technical details are  highly accurate,  

flawless, fully  

functional, and well  optimised.  

Demonstrates  

exceptional skills and  creativity through  

advanced features.

References|4  Marks

Failed to provide any  references or citation

Few sources have  been provided and  most of them are not  credible. Minimal or  missing citations.

Some reliable  

references have been  used. Some citations  were omitted or with  minor errors in  

formatting.

References are  

generally appropriate  with a range of  

sources, but the in-text citations may be  

incomplete or omitted.

References are mostly  credible and relevant with a good range of sources. Most citations have been  provided in the correct  format.

All references are highly credible, relevant, and  current from a wide  variety of sources. 

Proper citation has  been used.

Presentation  and Delivery| 8  marks

Unclear or inaudible  presentation. 

Appears unprepared or  very nervous. No eye  contact, monotone  voice. Presentation is  hard to understand or  follow. 

Presentation is  

difficult to follow due  to volume or pace.  Minimal eye contact  with heavy reliance  on notes. Frequent  use of pauses.

The delivery is unclear. Limited eye contact,  frequent reading from  notes. Body language is stiff or unnatural. 

Understandable  

delivery but lacks  variation in tone. 

Some inconsistency  in eye contact.  

Mildly nervous.

Generally confident and  clear. Minor issues with  volume or pace. Good  eye contact and body  language. 

Clear, confident, and  engaging delivery  

throughout. Excellent  voice and tone.  

Maintains eye contact  and appears fully  

prepared.