Academic Integrity Information Holmes Institute is committed to ensuring and upholding academic integrity. All assessment must comply with academic integrity guidelines. Important academic integrity breaches include plagiarism, collusion, copying, impersonation, contract cheating, data fabrication and falsification. Please learn about academic integrity and consult your teachers with any questions. Violating academic integrity is serious and punishable by penalties that range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment.
Format Instructions
  • Most assessments must be in MS Word format with no spacing, 12-pt Arial font and at least 2cm margins on all four sides with appropriate section headings and page numbers.
  • You must name your file with the Unit Code and Student ID (e.g. “HI5003-GWA1995”).
  • Check that you submit the correct document as special consideration is not granted if you make a mistake.
  • Student ID needs to be indicated on the cover page.
  • All work must be submitted on Blackboard by the due date and time along with a completed Assessment Cover Page. Late penalties apply.
  • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using Holmes Institute Adapted Harvard Referencing. Penalties are associated with incorrect citation and referencing.

Assignment Specifications   

You are a Network and Security Engineer for the NetSol Consulting Private Limited, which is a leading network and security provider for the small and medium scaled offices.

Task 1: The company is utilizing a layer-by-layer approach to implement the security. Using your expert knowledge on TCP/IP Model and its layers, sketch the TCP/IP protocols and identify at least one protocol used by each layer. 

Task 2: At each level of the TCP/IP model, there are security vulnerabilities and therefore, security prevention measures that can be taken to ensure that enterprise applications are protected. As a network and security engineer, your task is to identify the security threats, requirements and propose a solution on each layer. 

Task 3: Your task is to propose a network design for the small, scaled company and sketch a basic logical network diagram of the office with 5 departments. You are free to assume: 

  • Name of the Office and Departments 
  • Networking Hardware’s such as routers, switches, hubs, modems wireless access points, firewalls etc. 

The report should be prepared in Microsoft word and uploaded on to the Blackboard. The word limit of the report is 2000 words. The report should be a properly constructed as an academic report. The report should include references in IEEE style.


Prepare your article as below

  1. Go to the IEEE website and download the WORD template for the format. 
  2. Another link for the template: 
  3. Read and familiarise yourself with the instructions carefully.
  4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas about how to start (see section 6). (
  5. Complete the assignment including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
  • Title (maximum 15 words)
  • Abstract (100 – 250 words)
  • Introduction (500 – 1000 words)
  • Literature Review (500 – 1000 words)
  • Main body (400 – 1000 words)
  • Conclusion (200 – 300 words)
  • Future Works (150 – 300 words)
  • References (minimum 5 references)
  1. The article must be a ‘Review’ article, including at least 5 references and not more than 25.
  2. Strictly follow the IEEE reference format for in-body citations and the references section. 
  3. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.
  4. Contents must include:
  • History and background of the topic
  • Challenges and drawbacks
  • Examine the security tools based on your selected topic.
  • Possible options (solutions) and future research areas proposed
  • Include a minimum of two (2) figures to show the overall concept and summarised overview of the topic from the review of minimum 10 – 15 (but not limited to) papers

Remember to strictly follow the template and the instructions above to avoid penalties.

Submission Guidelines

  • The assignment should be submitted on the Moodle in two separate files:
  • The report should be submitted as a Word file
  • Do not use Wikipedia as a source or a reference.
  • Make sure you properly reference any diagram/graphics used in the assignment.
Section to be included in the Detailed Description of the Criteria Mark
  • A contextual sentence about your motivation behind your research topic.
  • Your thesis statements.
  • A descriptive statement about the types of literature used in the review.
  • Summarise your findings.
  • Conclusion(s) based upon your finding
Introduction and background Introduction about your selected topic:

  • State the general topic and give some background.
  • Provide a review of the literature related to the topic.
  • Convince the reader that the research area is significant / important / interesting.
  • Define the terms and scope of the topic.
  • Evaluate the current situation (advantages/ disadvantages) and identify the gap.
Literature review Literature review of your topic:

  • Discussing in your review the approaches, limitations, and conclusions of past reviews.
  • Severe penalties apply for simple listing and describing. It should be a logically support analysis.
Main sections:
  • Information about your selected topic.
  • A general purpose and all relevant methods are stated using the correct scientific terminology.
  • A brief summary of the overall findings in relation to the purpose of the study.
  • Summary of thesis argument with concluding ideas that impact reader.
References section and body citation
  • Must consider at least five current references from journal/conference papers and books.
  • Strictly follow the order and instruction by IEEE. Check when/where to put the citation. See attached files and search the internet for guidelines
Report presentation Writing is clear and relevant, with no grammatical and/or spelling errors – polished and professional. 2