IT Networking and Communication Assignment-3 (ICT504) Assignment Help
Referencing guides
You must reference all the sources of information you have used in your assessments. Please use the IEEE referencing style in your assessments in this unit. Refer to the library’s referencing guides for more information.
Academic misconduct
VIT enforces that the integrity of its students’ academic studies follows an acceptable level of excellence. VIT will adhere to its VIT Policies, Procedures and Forms, which explain the importance of staff and student honesty about academic work. It outlines the behaviours that are “academic misconduct”, including plagiarism.
Late submissions
In cases where there are no accepted mitigating circumstances as determined through VIT Policies, Procedures and Forms, late submission of assessments will lead automatically to the imposition of a penalty. Penalties will be applied as soon as the deadline is reached.
Short extensions and special consideration
Special Consideration is a request for:
• Extensions of the due date for an assessment other than an examination (e.g. assignment extension).
• Special Consideration (Special Consideration concerning a Completed assessment, including an end-of-unit Examination).
Students wishing to request Special Consideration for an assessment the due date of which has not yet passed must engage in written emails to the teaching team to Request Special Consideration as early as possible and before the start time of the assessment due date, along with any accompanying documents, such as medical certificates.
Inclusive and equitable assessment
Reasonable adjustments in assessment methods will be made to accommodate students with a documented disability or impairment. Contact the unit teaching team for more information.
Contract Cheating
Contract cheating usually involves the purchase of an assignment or piece of research from another party. This may be facilitated by a fellow student or friend or purchased on a website. Other forms of contract cheating include paying another person to sit an exam in the student’s place.
Contract cheating warning:
• By paying someone else to complete your academic work, you don’t learn as much as you could have if you did the work yourself.
• You are not prepared for the demands of your future employment.
• You could be found guilty of academic misconduct.
• Many of for pay contract cheating companies recycle assignments despite guarantees of “original, plagiarism-free work” so similarity is easily detected by TurnitIn.
• Penalties for academic misconduct include suspension and exclusion.
• Students in some disciplines are required to disclose any findings of guilt for academic misconduct before being accepted into certain professions (e.g., law).
• You might disclose your personal and financial information in an unsafe way, leaving yourself open to many risks including possible identity theft.
• You also leave yourself open to blackmail – if you pay someone else to do an assignment for you, they know you have engaged in fraudulent behaviour and can always blackmail you.
Grades
We determine your grades to the following Grading Scheme:
Grade |
Percentage |
A |
80% – 100% |
B |
70% – 79% |
C |
60% – 69% |
D |
50% – 59% |
F |
0% – 49% |
Assessment 3: Case Study
Overview
Assessment 3* |
Weight |
Word limit |
Due date |
ULO |
Submission File Types |
Part A- Design |
20% |
1000 |
Session 9 |
ULO2, 3, 4 |
Word |
Part B- Implementation |
40% |
1000 |
Session 13 |
ULO2, 3, 4 |
Word, Video presentation, Cisco Packet Tracer file |
Note: * denotes ‘Hurdle Assessment Item’ that students must achieve at least 40% in this item to pass the unit.
Introduction
This is a Group assessment comprised of 5 Students. All group members must have to present their part in the demonstration/presentation.
Part A (Detailed Design): In this group assignment, you will assess the given case study to design a multi-level subnetting and provide a subnetted IP design plan. You must create a network topology using a network simulator (Cisco Packet Tracer) with the necessary labels and write a report on the design rationale. Each group must submit a report with the IP design plan, network topology screenshot and network design rationales.
Part B (Detailed Topology, Configuration and Demonstration): Using the network simulator (Cisco Packet Tracer), your group should configure the network designed for Part A. Each group must submit a report containing configuration commands and their descriptions and present the network demonstration.
Task
Mr. Sam, the IT director at Sydney Hospital, manages the network. Mr. Sam has requested your help proposing a network solution that meets the hospital’s requirements. The hospital is growing, and the management has approved funds for network improvements.
The medical staff would like to be able to access medical systems using laptops from any of the patient rooms. Doctors and nurses should be able to access patient medical records, x-rays, prescriptions, and recent patient information. Mr Sam purchased new servers and placed them in the data centre. The wireless LAN (WLAN) has approximately 50 clients, with about 50 more due in six months. The servers must have high availability. Furthermore, an IP Telephony solution will be deployed, and IP addresses should be allocated for the 50 IP phones per floor.
Patient rooms are on floors 6 through 10 of the hospital building. Doctors should be able to roam and access the network from any floor. A wireless radio-frequency (RF) survey report mentions that three access points placed in the main hallways on each floor can provide full wireless coverage.
The current network has ten segments, with LAN switches and fast Ethernet ports that reach a single router that also serves the WAN. Only a single link is used from the floorsto the core router. The router is running the EIGRP routing protocol, and they want to move to a standards-based routing protocol. The new back-end servers are in the same segment as those used on floor 1. Mr. Sam mentioned that users complained of slow access to the servers. He also hands you a table with the current IP addresses (see Table 1).
Table 1: Current IP Addresses
Floor |
Servers |
Clients |
IP Network |
1 |
15 |
40 |
200.100.1.0/24 |
2 |
0 |
43 |
200.100.2.0/24 |
3 |
0 |
39 |
200.100.3.0/24 |
4 |
0 |
42 |
200.100.4.0/24 |
5 |
0 |
17 |
200.100.5.0/24 |
6 |
0 |
15 |
200.100.6.0/24 |
7 |
0 |
14 |
200.100.7.0/24 |
8 |
0 |
20 |
200.100.8.0/24 |
9 |
0 |
18 |
200.100.9.0/24 |
10 |
0 |
15 |
200.100.10.0/24 |
Mr Sam would like a proposal to upgrade the network with updated switches that support Gigabit Ethernet to the desktop, redundant 10 Gigabit Ethernet (10GE) fibre uplinks, and Power over Ethernet (PoE), and to provide 10 Gigabit Ethernet access to the servers. The proposal should also cover secure WLAN access with centralised management on floors 6 through 10. Include an IP addressing scheme that reduces the number of Class C networks the hospital uses. Mr. Sam wants to reduce the number of networks leased from the Internet service provider (ISP).
Provide the answers to the following questions/directives in Part A and verify them in Part B by implementing it in cisco packet tracer: 1) What are Sydney Hospital’s business requirements?
2) Are there any business-cost constraints?
3) What are the network’s technical requirements?
4) What are the network’s technical constraints?
5) Prepare a logical diagram of the current network.
6) Does the hospital use IP addresses effectively?
7) What do you recommend for improving the switching speed between floors?
8) What IP addressing scheme would you propose Based on the number of servers and clients provided?
9) What routing protocols do you recommend?
10) What solution do you recommend for WLAN access and the network upgrade?
11) Recommend and explain appropriate security measures.
12) Draw the proposed network solution.
The report must follow the marking guide. Please note that citation of sources is mandatory and must be in the IEEE style. Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop- boxes will not be considered. Submissions must be made by the end of session 9 and 12 Sunday 11:59PM. The Turnitin similarity score will be used in determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles, online resources, and your peer’s submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the appropriate drop-box. If your similarity score is of concern, you will have a chance to change your assessment and resubmit. However, re-submission is only allowed prior to the submission due date and time. After the due date and time have elapsed VIT’s late submission penalty applies.
Please Note: All work is due by the due date and time. Late submissions will be penalized at the rate of 20% of the assessment final grade per day including weekends.
Marking Guide (Part A): 20 Marks
Task |
Description |
Marks |
Report Layout |
The report layout, language and structure should be appropriate. The report should include title, table of contents, table of figures, sections and subsections heading and numbering, figures and tables numbers, citing tables, figures and references in the body text. The reference section will add the references in IEEE format. |
2 |
Requirement Analysis |
Detailed Requirement analysis with justification. |
2 |
Network Design |
Detailed Network design considering all the questions/directives. |
8 |
Critical Analysis |
Critical analysis with a focus on the design of the network. |
2 |
Constraints and Limitations |
The constraints and limitations are explained exceptionally well, and a workaround is provided. |
2 |
Conclusion |
Provided an excellent summary of the assessment. |
2 |
References |
Follow the IEEE Style. |
2 |
Marking criteria/Rubric
You will be assessed on the following marking criteria/Rubric:
Assessment criteria |
Exceptional >=80% |
Admirable 70% – 79% |
Creditable 60% – 69% |
Acceptable 50% – 59% |
Unsatisfactory <=49% |
Report Layout 2 points |
Extremely well structured and organized report; use of professional language; guidelines have been followed. |
Well-structured and organized report; use of professional language; guidelines have been followed. |
Structured and organised report; use of language is appropriate; guidelines have been followed. |
Structured and organised report; use of language could be improved; guidelines have been followed partially. |
Choppy and confusing; the format was difficult to follow; language needs to be proofread; Plenty of errors; guidelines have not been followed. or |
Not Submitted or Academic Misconduct. |
|||||
Requirement Analysis 2 points |
The requirement analysis is in-depth and detailed. All of the hospital’s requirements have been considered, and the functional and non-functional requirements are explained exceptionally well. |
The requirement analysis is in-depth and detailed. Most hospital requirements have been considered, and the functional and non-functional requirements are explained well. |
The requirement analysis is provided; most of the hospital’s requirements have been considered, and the functional and non-functional requirements are explained. |
A requirement analysis has been carried out; some functional and non-functional requirements have been discussed. |
A requirement analysis has not been carried out; the requirements have been briefly discussed or Not Submitted or Academic Misconduct. |
Network Design 8 points |
The network design covers all hospital areas, is straightforward to understand, and is exceptionally well designed. |
The network design covers all areas of the hospital; the network design is straightforward; the network is well designed. |
The network design covers most hospital areas; the network is well-designed. |
The network design covers most hospital areas. |
The network design seems incomplete and does not cover all areas or Not Submitted or Academic Misconduct. |
Critical Analysis 2 points |
Provided an excellent critical analysis focusing on the network’s design; the critical analysis provided great reasoning for the selection of the |
It provided a good critical analysis, focusing on the network’s design; the critical analysis provided reasonable reasoning for the |
The critical analysis focused on the network’s design and provided reasonable reasoning for the selection of the |
The critical analysis focused on the design of the network; some reasoning was provided. |
The critical analysis lacks depth and detail and does not cover the limitations of the proposed wireless devices or Not |
networking devices and the design. |
selection of the networking devices and the design. |
networking devices and the design. |
Submitted or Academic Misconduct. |
||
Constraints and Limitations 2 points |
The constraints and limitations are explained extremely well. A workaround for the constraints and limitations is provided, and the effect of the constraints and limitations is discussed. |
The constraints and limitations are explained very well; a workaround for the constraints and limitations is provided; the effect of the constraints and limitations is discussed. |
An explanation of the constraints and limitations is provided, a workaround for the constraints and limitations is provided, and the effect of the constraints and limitations is discussed. |
An explanation of the constraints and limitations is provided, and a brief workaround is discussed. |
The constraints and limitations are hardly explained, a workaround is not discussed, and the effects have not been highlighted or Not Submitted or Academic Misconduct. |
Conclusion 2 points |
Provided an excellent summary of the assessment, covering all aspects of the assessment. |
Provided a good summary of the assessment, covering most aspects of the assessment. |
Provided a summary of the assessment; somewhat covered the aspects of the assessment. |
Provided a summary of the assessment. |
The conclusions failed to summarise the assessment or Not Submitted or Academic Misconduct. |
References 2 points |
The references followed IEEE Style; the references were cited and complete. |
The references followed IEEE Style; most of the references were cited and complete. |
Most references followed IEEE Style; some were cited and complete. |
Most references followed IEEE Style; the references were not cited. |
The references did not follow IEEE Style and were not cited and incomplete or Not Submitted or Academic Misconduct. |
Marking Guide (Part B): 40 Marks
Assessment criteria |
Exceptional >=80% |
Admirable 70% – 79% |
Creditable 60% – 69% |
Acceptable 50% – 59% |
Unsatisfactory <=49 |
Network Topology 5 marks |
It comprehensively explains the physical and logical structure of a network. It maps how different nodes on a network— including switches and routers—are placed and interconnected and how data flows. |
Thoroughly explain the physical and logical structure of a network. It maps how different nodes on a network— including switches and routers—are placed and interconnected and how data flows. |
Mostly, it explains the physical and logical structure of a network. It maps how different nodes on a network– including switches and routers– are placed and interconnected and how data flows. |
Provide some explanation of how the physical and logical structure of a network. It maps how different nodes on a network– including switches and routers– are placed and interconnected and how data flows. |
Misconduct. Not submitted Poor or limited implementation. |
Network design configurations and testing of features 15 marks |
Comprehensively explain how your network is configured, including what the configurations are doing and alternative options. |
Thoroughly explain how your network is configured, including what the configurations are doing and alternative options. |
Mostly explain how your network is configured, including what the configurations are doing and alternative options. |
Some explanations of how your network is configured, including what the configurations are doing and alternative options. |
Misconduct. Not submitted Poor or limited implementation. |
Discussion 5 marks |
Comprehensive discussion, evaluation, results and conclusion. |
Very good discussion, evaluation, results and conclusion. |
Average discussion |
Limited discussion, evaluation, results and conclusions. |
Misconduct. Not submitted |
evaluation, results and conclusion. |
Poor or limited findings. |
||||
Explain what you learned in this assignment. 5 marks |
Comprehensively explain what you learned from this assessment, ranging from new tools, routing, switching, addressing, encryption techniques and implementation. |
Sufficiently explain what you learned from this assessment, ranging from new tools, routing, switching, addressing, encryption techniques and implementation. |
Some explanation of what you learned from this assessment, ranging from new tools, some routing, switching, addressing, encryption techniques and implementation. |
Limited explanation of what you learned from this assessment, ranging from new tools, some routing, switching, addressing, encryption techniques and implementation. |
Misconduct. Not submitted Poor or limited implementation. |
Demonstrate/pre sent your network design and be able to defend your configuration. 10 marks |
Comprehensively explained and successfully demonstrated the implementation of at least his/her contribution/part/port ion per group member. |
Thorough explanation and successful demonstration of implementing at least his/her contribution/part/port ion per group member. |
Good explanation and some successfully demonstrated implementation of at least his/her contribution/part/ portion per group member. |
Some explanations and limited success in the demonstration of the implementation of at least his/her contribution/part/port ion per group member. |
Misconduct. Not submitted Poor or limited implementation. |
Leave A Comment