Computer Networks and Security Trimester-1 (ICT5250) Assignment Help

Assessment Overview 

Assessment Task 

Type 

Weighting 

Due 

Length 

ULOs

Assessment 1:

Quiz  

Quizzes assess students’ ability to  understand theoretical materials. The  quiz will be either multiple choice  questions or short questions which are  relevant to the lecture materials.

Individual 

Invigilated

10% 

Weeks 

4, 8

15 minutes 

(equiv. 

500 

words)

ULO1 

ULO2 

ULO4

Assessment 2: Laboratory Practicum Students will complete in-class 

workshop assessments including online situation analyses and practical  

applications of skills.

Individual 

Invigilated

20% 

Weeks 

3, 5, 6, 7

(equiv. 

2000 

words)

ULO1 

ULO2 

ULO4

Assessment 3: Network simulation  Construct an efficient operating  network for a small organisation within  a simulation environment.

Individual 

40% 

Week 

10

1000 

words 

Design 

(equiv. 

2000 

words)

ULO2

Assessment 4: System vulnerabilities  and mitigation  

Each group will research, share, and  report to on recent information security  attacks covering different types of  attacks. The report should detail the  mode and impact and outline potential  mitigation strategies and technologies  that could have prevented such attacks.  

Students should discuss IT security, risk  threats and management to a selected  organization and implement simple  cryptography algorithms.

Group 

30% 

Week 12 

3000 

words

ULO3 

ULO4

Note for all assessment tasks: 

Students can generate/modify/create text generated by AI. They are then asked to modify the  text according to the brief of the assignment.

During the preparation and writing of an assignment, students use AI tools, but may not  include any AI-generated material in their final report. 

AI tools are used by students in researching topics and preparing assignments, but all AI generated content must be acknowledged in the final report as follows: 

Format

I acknowledge the use of [insert the name of AI system and link] to [describe how it was  used]. The prompts used were entered on [enter the date in ddmmyyy:] [list the prompts  that were used]

Example

Tools 

I acknowledge the use of ChatGPT to create content to plan and  brainstorm ideas for my assessment. The prompts used were entered on 18 March 2023: What are some key challenges in running an online business? 

Assessment 1: Quiz 

Due date: 

Week 4, 8

Group/individual: 

Individual-Invigilated

Word count / Time provided: 

500

Weighting: 

10% quizzes

Unit Learning Outcomes: 

ULO-1, ULO-2, ULO-4

Assessment Details: 

This assessment also includes an invigilated quiz that will assess your ability to understand  theoretical materials and your knowledge of key content areas. The quiz will be either multiple  choice questions or short questions that are relevant to the lectures or lecture materials. For  successful completion of the quiz, you are required to study the material provided (lecture slides,  tutorials, and reading materials) and engage in the unit’s activities. The prescribed textbook is the  main reference along with the recommended reading materials.  

Marking information: The assessment will be marked out of 100 and will be weighted 10%. 

Assessment 2: Laboratory Practicum

Due date: 

Weeks 3, 5, 6 7

Group/individual: 

Individual-Invigilated

Word count / Time provided: 

2000

Weighting: 

20% 

Unit Learning Outcomes: 

ULO-1, ULO-2, ULO-4

Assessment Details: 

Practical exercises assess students’ ability to apply theoretical learning to practical, real-world situations on a weekly basis. The practical exercises will improve student’s ability to practice  information security using Linux/Kali Linux platform such as phishing attacks, encryption and  steganography and other functions.  

Students will be required to complete the practical exercises during the workshop and therefore,  attendance is required as part of this assessment. Students will not be assessed on work that is not  produced in the workshop, so attendance is required as part of this assessment. Students are  required to submit the work that they have completed during the workshop session only. The details  of the lab work and requirements are provided on the online learning system. 

Assessment 2 Marking Criteria and Rubric 

Multi-labs will have questions and activities to be completed for a total of 100 marks then  will be scaled to 20%. 

Assessment 2 Marking Criteria and Rubric

Marking Criteria 

Not Satisfactory  (0-49% of the  

criterion mark)

Satisfactory 

(50-84% of the  

criterion mark)

Excellent 

(85-100% of the  criterion mark)

Lab Screenshots  

(40%) 

All Necessary  

Screenshots were  

taken.

Very few  

screenshots, or  

screenshots taken  without time, day  and name shown

Not all necessary  

screenshots have  

been taken

Excellent  

submission, all  necessary  

screenshots were  taken.

Apply Lab  

Reflections (60%) 

Screenshots with  

reflections 

Very few  

screenshots,  

without  

explanation or  

reflection, just  

click next

Not all screenshots  have been explained  and reflected upon

Excellent  

submission, all  screenshots have  been explained  and reflected  

upon

Assessment 3: Network simulation 

Due date: 

Week 10

Group/individual: 

Individual

Word count / Time provided: 

3000

Weighting: 

40%

Unit Learning Outcomes: 

ULO-2

APIC

Assessment Objective  

This assessment enables you to comprehend the fundamental concept of network design  and acquire the skills necessary to develop both logical and physical network designs. The simulation of a Local Area Network (LAN) using Packet Tracer enables you to  comprehend the network architecture and acquire the necessary skills to successfully set up  a LAN. 

Assessment Details

ABC is a global IT company which mainly based in USA. Recently, the company has decided to move  to the Australian market. ABC has decided to establish two main branches (Brisbane and Sydney)  with three networks as follows:  

Brisbane (in a two-story structure): 

o NET-A: 10.10.1XY.0/24, will have up to 300 employees. 

Sydney (in a three-story structure): 

o NET-B: 172.16.1XY.0/24, will have up to 200 employees,  

o NET-C: 192.168.1XY.0/24 will have up to 400 employees. 

Every department has its own server. It is recognised that employees should be able to  communicate with and access data from various servers within the two locations. You are tasked to  design a network (LAN) for the Sydney branch (enterprise campus). The Sydney branch will be  connected to the Brisbane branch. Consequently, you need to incorporate WAN access into the  design of the LAN for the two branches. 

The network will contain a data centre as well as an e-commerce edge. In addition, employees will  bring their own mobile devices to work (e.g., laptops, smartphones, tablets). Wireless  communication facilities (Wi-Fi access sites) will be used by employees to access necessary  information such as their work email, required documents, and the Internet. 

Requirements  

You have been recruited as an IT Administrator in the IT department and tasked with analysing,  designing, configuring, and simulating the new network for the Brisbane and Sydney branches.

There are two parts of the requirements for this assignment, network design and network  simulation.  

a) Network Design Tasks [30 marks] 

Task 1 

Develop a logical design of the Sydney network branch using the building-block network design  process. Consider the anticipated expansion of NDC. You need to consider the following elements  for the logical design:  

Network architecture components. 

Application systems. 

Network users. 

Categorizing network needs  

Task 2 

Design the network’s physical architecture based on the logical architecture completed in Task 1.  Note that you are not required to alternative design. Regarding the physical construction, you need  to consider the following: 

Designing client and servers 

Designing circuits  

Network design tools 

Note: The following drawing tools can be used to create both logical and physical layouts. Concept Draw or  

SmartDraw

Lucidchart  

Cisco Packet Tracer or any other network design software to draw the layout of logical and  physical network designs.  

Task3 

Briefly describe how you will minimise interference from Wi-Fi access points (APs) on separate  floors. 

b) Simulation [70 marks] 

You have been asked to use the Packet Tracer, as shown in Figure 1, for the simulation task.  Simulate and test the configuration using the ping command for both Local delivery (devices within  the same network) and remote delivery (devices within separate networks, such as Brisbane and  Sydney).  

You can use the Lecture notes or VLSM to subnet the networks.

Prepare a report to provide the details configuration for the network for ABC company.  

In this task, you will complete the required information using the IP network diagram shown in  Figure 1. To optimise your grade in this section, address the following points: 

List all assumptions and their explanation. 

Display each calculation for the number of subnets, IP addresses, valid hosts, gateways, and  subnet mask for Tables 1, 2, 3, and 4. 

Table 1. Sydney branch Network (Net-C)

 

Allocated Subnet address and Subnet Mask 

 

Network address 

 

Default Gateway address 

 

Valid host address range 

 

Broadcast address 

 
 

Table 2. Brisbane branch Network

 

Allocated Subnet address and Subnet Mask 

 

Network address 

 

 

Default Gateway address 

 

Valid host address range 

 

Broadcast address 

 

 

Table 3. Network between Sydney to ISP

 

Allocated Subnet address and Subnet Mask 

 

Network address 

 

Valid host address range 

 

Broadcast address 

 

 

Table 4. Network between Brisbane and ISP 

 

Allocated Subnet address and Subnet Mask 

 

Network address 

 

Valid host address range 

 

Broadcast address 

 

Place configuration of each device into a table like the one below. (40 Marks) 

Sydney 

(Copy and paste the device configuration, DO NOT use screenshot from  Packet Tracer)  

S1: enable.  

S1: configure terminal.  

S1: . . . 

Assessment submission 

Your report must include a cover page that includes the student’s name and student ID. You need to submit the design document as outlined above with a working Packet Tracer file. DO NOT ZIP THE SUBMISSION FILES. 

For successful completion of this assessment, you are required to study the material provided  (lecture slides, tutorials, and extra reading materials), engage in the unit’s activities, and in the  discussion forums. The prescribed textbook is the main reference along with the recommended  reading material. Students are expected to discuss their work with the lecturer and to seek support.  In completing this assessment successfully, you will be able to develop networking skills including  design, configuration and testing of a computer network using a simulator. This assessment helps in  achieving ULO-2. 

Marking Criteria and Rubric: The assessment will be marked out of 100 and will be weighted 40%  of the total unit mark.

Marking 

Criteria for  

Task-B

Not satisfactory 

(0-49%) of the  

criterion mark)

Satisfactory 

(50-64%) of the  criterion mark

Good 

(65-74%) of the  criterion mark

Very Good 

(75-84%) of the  criterion mark

Excellent 

(85-100%) of the  criterion mark

Logical design  

(need analysis) 

(10 marks)

The design does not  meet minimum  

requirements.

The design lacks in  multiple critical areas  and requires  

significant  

improvement.

The design meets  some objectives but  needs improvement in  certain areas.

The design meets  most objectives  

effectively.

The design exceeds  expectations in all  areas.

Physical Design  (technology design) (10 marks)

The physical design does  not meet minimum  requirements.

The physical design  lacks in multiple  

critical areas and  

requires significant  improvement.

The physical design  meets some  

objectives but needs  improvement in  

certain areas.

The physical design  meets most objectives  effectively.

The physical design  exceeds expectations  in all areas.

Minimising the  

interference from  Wi-Fi access points (10 marks)

The proposal does not  effectively address  

interference challenges  and lacks an  

understanding of the  topic.

The proposal lacks a  comprehensive  

understanding of  

interference or  

provides incomplete  or ineffective  

solutions.

The proposal partially  addresses  

interference issues  but lacks depth or  innovation

The proposal  

effectively addresses  most interference  challenges with well thought-out  

strategies.

The proposal  

demonstrates an  

exceptional  

understanding of  

interference factors  and provides  

comprehensive,  

innovative solutions.

Subnet allocations,  IP addresses, valid  hosts, gateways subnet mask 

(20 marks)

Lack of evidence of  

understanding of IP  configuration for NET A,  B and C including the  interfaces for RA, RB and  RC with many errors.

Evidence of a basic  understanding of IP  configuration for NET  A, B and C.

Good IP configuration  for NET A, B and C  including the  

interfaces for RA, RB  and RC with some  errors.

very well IP  

configuration for NET  A, B and C including  the interfaces for RA,  RB and RC.

Excellent IP  

configuration for NET  A, B and C including  the interfaces for RA,  RB and RC.

Routers  

Configurations 

(25 marks)

Lack of evidence of  

understanding of  

Configure router RA  interfaces with many  errors.

Evidence of a basic  understanding of  

Configure router RA  interfaces

Good Configure router RA interfaces with  some errors.

Very well Configure  router RA interfaces

Excellent Configure  router RA interfaces

Routing  

configuration 

(15 marks)

Lack of evidence of  

understanding of routing  configuration with no  connections between  hosts

Basic understanding of routing configuration  with errors in the  routing configuration  and no connection  between hosts

Well routing  

configuration with  correct routing  

configuration and  connection between the hosts

Very weak routing  configuration with  simple demonstration  of configuration, and  full network  

connection. 

Excellent explanation  and understudying of  routing protocols and  configuration with  

excellent  

demonstration of  configuration, testing  and full network  

connection. 

Verifications  

(10 marks)

No testing results were  shown or with many  errors. 

(Pinging the local area 

Some connectivity  testing results showed some errors. 

(Pinging is only 

Full connectivity  

testing results showed some errors. 

(Pinging is only 

Full connectivity  

testing results are  shown with minor  errors.

Full connectivity  

testing results are  shown with no errors. (Pinging the local area 

 

 

network and remote  network is not 

successful)

successful with local  area network packet  drops and not remote  networks)

successful with local  area network, not  remote network)

(Pinging the local area  network is successful  and the remote  

network is successful  with packet drops)

network and remote  network is successful)

 

Assessment 4: System vulnerabilities and mitigation 

Due date: 

Week 12

Group/individual: 

Group

Word count / Time provided: 

3000

Weighting: 

30%

Unit Learning Outcomes: 

ULO-3, ULO-4

Assessment Details: 

Your team has recently been hired by a car industry company that employs various types of robotic  systems for tasks ranging from assembly, welding, and painting to inspection. Internet of Things (IoT)  devices are utilized to control the robotic systems both locally and remotely. 

In recent years, there has been a growing focus on the risks associated with the use of simple IoT  devices in services that have access to sensitive information or critical controls. To enhance the  resilience of commercial IoT devices against cyber-attacks, security considerations should be  integrated right from the design stage of new products. However, the wide heterogeneity of IoT  devices poses challenges to the development of well-established security-by-design methods for the  IoT. Choose one of the following IoT devices: 

Arduino 

Raspberry PI 

BeagleBone 

ESP32 and ESP8266 

For the type of IoT device your group has selected, you will need to discuss the following: 

1. Identify and discuss three security vulnerabilities specific to the selected IoT device. 2. Demonstrate the working mechanism of two types of attacks against the selected IoT device. 3. Demonstrate two techniques or security tools that can be used to mitigate/prevent the  identified attacks in point (2). 

4. The objective of computer security is to protect the Integrity, Confidentiality, and Availability  (CIA) of information on the devices that store, manipulate, and transmit the information.  Analyze the attack methods identified in point 2 and the security tools identified in point 3  against CIA. 

5. Demonstrate the main challenges in protecting the selected IoT device. 

The importance of cryptography has increased over time, making it a key defense in securing data  from threat actors. Select one type of cryptographic algorithm that has been developed or proposed  for the selected IoT device and provide its working techniques and features.

In your report, you have to support your discussion with references from recent conferences and  articles published within the last 4 years that are related to the selected IoT device. 

In completing this assessment successfully, you will be able to investigate IS security, risk threats and  propose the suitable security controls, which will help in achieving ULO-3, and ULO-4. 

Marking Information: The applied project will be marked out of 100 and will be weighted 30% of  the total unit mark. 

Marking 

Criteria

Not satisfactory 

(0-49%) of the  

criterion mark)

Satisfactory 

(50-64%) of the  criterion mark

Good 

(65-74%) of the  criterion mark

Very Good 

(75-84%) of the  criterion mark

Excellent 

(85-100%) of the  criterion mark

Introduction 

(10 marks)

Poor Introduction with irrelevant details

Introduction is 

presented briefly 

with some 

relevance and 

missing elements.

Introduction is  

generally presented in good fashion,  

however missing one  element.

Introduction is well  written with clear  discussion.

Introduction is very  well written with very  clear background,  discussion.

Discuss and  

identified three  security  

vulnerabilities 

(15 mark)

Poor discussion with  irrelevant information

Brief discussion about  security vulnerabilities

Generally good 

discussion about 

security vulnerabilities

Very clear security  vulnerabilities 

discussion supported  by recent references.

A very detailed 

and very clear 

security vulnerabilities discussion supported  by recent references.

The use of the  

attack tool and  working  

mechanism 

(10 mark)

Poor discussion with  irrelevant information

Brief discussion about  attack tool and  

working mechanism

Generally good 

discussion about 

attack tool and  

working mechanism

Very clear attack tool  and working  

mechanism

A very detailed 

and very clear 

attack tool and  

working mechanism

Analysis the attack  tool and security  tool against CIA  (20 mark)

Poor analysis with 

irrelevant details.

Brief discussion of the  attack tool and  

security tool against  CIA

Generally good  

discussion of the  

attack tool and  

security tool against  CIA

Very clear discussion of the attack tool and  security tool against  CIA

In-depth and very  clear discussion of the  attack tool and  

security tool against  CIA

Main challenges in  protecting the  

selected IoT device  (10 mark)

Lack of evidence of  

understanding of the  main challenges

Very brief discussion  of the main challenges

Evidence of good  

understanding of the  main challenges that  related to the selected IoT device with limited support references. 

Very clear  

understanding of the  main challenges that  related to the selected IoT device with  

 

support references.

Excellent  

understanding of the  main challenges that  related to the selected IoT device with recent support references.

Cryptography 

developed/propos ed. 

(30 marks)

Lack of evidence of  

understanding of  

Cryptography algorithm  related to the selected  IoT with poor working  techniques and features

Very brief description  of the Cryptography  algorithm related to selected IoT with poor  working techniques  and features.

Evidence of good 

discussion of the  

Cryptography  

algorithm related to  selected IoT with good working techniques  and features.

Very clear discussion  of the Cryptography  algorithm related to  the selected IoT with  

very good working  techniques and  

features supported  with recent  

references.

Excellent discussion of  the Cryptography  algorithm related to the selected IoT with  very good working  techniques and  

features supported  with recent  

references.

Summary  

(5 marks)

Summary not 

relating to the 

report

Brief summary of the report with some 

relevance

Generally good 

summary of the 

report

clearly 

summarizing the 

overall 

contribution

very 

clearly 

summarizing the 

overall 

contribution