TECH2100 Network Design and Implementation Project Assignment Help

Assessment 3 Information

Subject Code:

TECH2100

Subject Name:

Introduction to Information Networks

Assessment Title:

Network Design and Implementation Project

Assessment Type:

Individual

Assessment Length:

1,500

Words (+/-10%)

Weighting:

40 %

Total Marks:

40

Submission:

MyKBS

Due Date:

Week 13

 

Your Task

This assessment challenges you to apply theoretical concepts from your course to a practical network  design and simulation project. You are expected to create a comprehensive network using Cisco Packet  Tracer, a network simulation software. This project will test your ability to integrate knowledge across several  networking domains, including network layer models, addressing and routing, transport layer protocols,  wireless networking, network security, and Quality of Service (QoS).

Assessment Description

Part 1. Network Design Documentation

• Purpose: To outline your entire network design process, from inception to implementation.  This document will serve as a comprehensive blueprint of your network, detailing each decision  and its justification.

• Content:

o Introduction: Describe the purpose and expected outcomes of the network. o Design Choices: Discuss the selection of network models (OSI or TCP/IP layers) and  their suitability for your scenario.

o Addressing Scheme: Provide a detailed IP addressing plan.

o Routing Protocols: Detail which routing protocols (e.g., RIP, OSPF, BGP) are used  and the rationale behind their selection.

o Network Security Measures: Outline the security protocols (e.g., firewalls, VPNs) to  protect the network.

o Quality of Service (QoS): Explain your strategy for managing network traffic and  ensuring quality of service.

o Simulation Outline: Describe what will be demonstrated in the Cisco Packet Tracer  simulation. You must use the Network Scenario Generators: Custom GPT: Network  Scenario Generator to assist in generating and refining your network  scenario. This tool is integral to creating realistic and challenging network environments for simulation.

Part 2. Network Simulation

• Purpose: To practically implement and troubleshoot your network design in a simulated  environment using Cisco Packet Tracer.

• Setup Requirements:

Network Construction: Construct a network that includes:

o Three Routers: Configured to manage traffic between different network segments. o Three Switches: Connecting devices within the same network segment. o Wireless Devices: Implement wireless access points as studied in Weeks 7 – 9. o Three Hosts: Devices (e.g., PCs) that generate and receive traffic.

o One Rogue Device: Simulate security threats using a rogue laptop.

o Modules: Include HWIC-2T (two-port serial high-speed WAN) modules in routers as  part of Week 7-9’s workshop.

Naming Convention: The first router should be named using your first name (e.g.,  Router_John) and the second router with your last name (e.g., Router_Doe). • Suggested IP Address Table:

For students new to subnetting, here is a suggested IP address table. These IP addresses are  recommendations, and you can modify them based on your network scenario. Alternatively,  use the Network Scenario Generators Custom GPT to generate other valid IP address schemes.

This table uses placeholders for Network A to indicate that specific IP addresses will be allocated  from the unique list provided by the facilitator.

Device

Router_[Your_First_Name] Fa0/0 Router_[Your_Last_Name] Fa0/0

Router_[Student_ID]

Switch 1

Switch 2

Switch 3

PC-A

PC-B

PC-C

Access Point 1

Access Point 2

Interface

Network

IP Address

Subnet Mask

Default

Gateway

Network A 192.168.1.XX 255.255.255.0 N/A

Network B 192.168.2.1

255.255.255.0 N/A

Fa0/0

Network  C

192.168.3.1

255.255.255.0 N/A

Network  A

192.168.1.XX 255.255.255.0 192.168.1.XX

Network  B

192.168.2.2

255.255.255.0 192.168.2.1

Network  C

192.168.3.2

255.255.255.0 192.168.3.1

NIC

Network A 192.168.1.XX 255.255.255.0 192.168.1.XX

NIC

Network B 192.168.2.10 255.255.255.0 192.168.2.1

NIC

Network  C

192.168.3.10 255.255.255.0 192.168.3.1

Network  A

192.168.1.XX 255.255.255.0 192.168.1.XX

Network

192.168.2.20 255.255.255.0 192.168.2.1

 

Interface

Network

IP Address

Subnet Mask

B

DeviceDefault  Gateway

Rogue Laptop Wireless 192.168.4.50 255.255.255.0 192.168.4.1

Notes:

• “XX” in IP addresses for Network A indicates that specific IPs will be provided to each student  from the unique list of IPs during Week 11 to ensure individual configurations.

• Router Naming: Replace Router_[Your_First_Name] and Router_[Your_Last_Name] with  your actual first and last names as specified in the assessment.

• Network C: This network can be an additional segment if you want to simulate more advanced  configurations or connect additional departments/locations.

• Wireless Configuration: Access Points should have their own IP addresses within the  respective network segments, and security settings (WPA2) should be configured for wireless  access.

Configuration and Testing:

• Router and Switch Configuration: Configure router interfaces and switch ports based on the  addressing table above. Ensure all interfaces are enabled, and IP addressing is correctly set  up.

• Wireless Network Settings: Integrate wireless access points by configuring SSID,  authentication, and performance metrics (signal strength, throughput).

• Port Security: Configure port security on switches to restrict unauthorised access. Ensure port  security is blocking rogue traffic while allowing legitimate devices to connect.

• Testing and Verification: Use ping and diagnostic commands to test connectivity between  devices and ensure smooth communication between routers, switches, and wireless devices.

3. Presentation

• Purpose: To comprehensively articulate the process, decisions, and outcomes of your network  design and simulation.

• Format: Present your assessment as a video recording of 8 minutes detailing the network  design and simulation stages using the format given below.

o Introduction: Discuss the project scope and objectives.

o Walk-through: Explain the network design in detail.

o Demonstration: Highlight key functionalities within the simulation.

o Challenges and Resolutions: Discuss any challenges faced and their resolutions.

o Conclusion: Suggest potential improvements or future network expansions.

This assessment aims to achieve the following subject learning outcomes:

LO1

Evaluate the main technologies, models, and protocols used in data communications and networking.

LO2

Explain the purpose and functionality of layered computer network models.

LO3

Identify problems that emerge among the networks that constitute today’s internet architecture.

 

Assessment Instructions

• The documentation should be submitted as a Word or PDF file via MyKBS. It must be well organized, professionally formatted, and include all necessary diagrams and descriptions as  outlined in the assessment description.

• Upload the Cisco Packet Tracer file (.pkt)

• Submit the presentation as a video recording for 8 minutes (+/- 10 %). Ensure it is informative and adheres to the specified format.

• You will be evaluated on your ability to communicate complex technical information clearly  and effectively to a non-technical audience.

• Demonstrate a deep understanding of the network design and simulation concepts covered  in the course.

• You should provide at least ten (10) academic references to support your discussion. • Please refer to the assessment marking guide to assist you in completing all the assessment criteria.

Important Study Information

Academic Integrity and Conduct Policy

KBS values academic integrity. All students must understand the meaning and consequences of cheating,  plagiarism, and other academic offenses under the Academic Integrity and Conduct Policy.

Please read the policy to learn the answers to these questions:

• What is academic integrity and misconduct?

• What are the penalties for academic misconduct?

• How can I appeal my grade?

Late submission of assignments (within the Assessment Policy)

Length Limits for Assessments

Penalties may be applied for assessment submissions that exceed prescribed limits.

Study Assistance

Students may seek study assistance from their local Academic Learning Advisor or refer to the resources on the MyKBS Academic Success Centre page. Further details can be accessed at

Submission Requirements

All assessments, including draft copies, must be written and submitted in English. The use of translation tools is not permitted.

 

Generative AI Traffic Lights

Please see the level of generative AI that this assessment has been designed to accept:

Traffic Light

Amount of Generative Artificial Intelligence  (GenerativeAI) usage

Evidence Required

This

assessment  (✓)

Level 1

Prohibited:

No GenerativeAI allowed

This assessment showcases your individual  knowledge, skills and/or personal experiences  in the absence of Generative AI support.

The use of generative AI is prohibited for  this assessment and may potentially result  in penalties for academic misconduct,  including but not limited to a mark of zero  for the assessment.

Level 2

Optional:

You may use GenerativeAI for research and content generation that is appropriately  referenced.

See assessment instructions for details

This assessment allows you to engage with  Generative AI as a means of expanding your  understanding, creativity, and idea generation  in the research phase of your assessment and  to produce content that enhances your  assessment. I.e., images. You do not have to  use it.

The use of GenAI is optional for this  assessment.

Your collaboration with GenerativeAI must  be clearly referenced just as you would  reference any other resource type used. Click on the link below to learn how to  reference GenAI.

In addition, you must include an appendix  that documents your GenerativeAI

collaboration including all prompts and  responses used for the assessment.

Unapproved use of generative AI as per  assessment details during the content  generation parts of your assessment may  potentially result in penalties for academic  misconduct, including but not limited to a  mark of zero for the assessment. Ensure  you follow the specific assessment

instructions in the section above.

Level 3

Compulsory:

You must use GenerativeAI to complete  your assessment

See assessment instruction for details

This assessment fully integrates Generative  AI, allowing you to harness the technology’s  full potential in collaboration with your own  expertise.

Always check your assessment instructions  carefully as there may still be limitations on  what constitutes acceptable use, and these  may be specific to each assessment.

You will be taught how to use generative  AI and assessed on its use.

Your collaboration with GenerativeAI must  be clearly referenced just as you would  reference any other resource type used. Click on the link below to learn how to  reference GenAI.

In addition, you must include an appendix  that documents your GenerativeAI

collaboration including all prompts and  responses used for the assessment.

Unapproved use of generative AI as per  assessment details during the content  generation parts of your assessment may  potentially result in penalties for academic  misconduct, including but not limited to a  mark of zero for the assessment. Ensure  you follow the specific assessment

instructions in the section above.

(✓)

Assessment Marking Guide

F2 (Fail)

Marking Criteria

F1(Fail)

P(Pass)

C(Credit)

D(Distinction)

 HD (High Distinction)

| 40 marks

Documentation|

0 –24%:

25 – 49%

50 -64%

65–74%

75 -84%

85 – 100%

7 marks
You have provided

incomplete or largely

incorrect

documentation with

little understanding of

network design

concepts.

You have provided  documentation that  is somewhat

complete but lacks  several critical

details.

You have provided basic documentation with minor omissions.

You have provided  basic and

comprehensive

You have provided  thorough and detailed documentation.

including all required elements.

You have provided  exceptionally detailed  and complete

documentation,

exceeding the basic requirements.

Application of  Security

Measures and  Testing | 6

Marks

You have failed to  apply basic security  measures or conduct any meaningful testing.

You have applied  some basic security  measures, but they  are largely ineffective or incorrectly tested.

You have applied

necessary security  measures and

conducted basic testing  demonstrating

understanding.

You have effectively applied and tested  security measures,  showing a good level of understanding and  implementation.

You have applied and been rigorously tested

advanced security

measures, showing high  competency and

thoroughness.

You have applied and  expertly tested cutting edge security

measures, setting a  benchmark for

excellence and

comprehensive

understanding.

Configuration  and

Implementation Details| 15

marks

No valid configuration  present, or incorrect  setup. No evidence of  understanding

technical or

configuration

requirements.

The configuration and setup is mostly

inaccurate with

notable errors.

Demonstrates

minimal technical  understanding.

Critical elements are  missing or

misapplied.

The configuration and  network setup shows a  basic understanding  with minor errors or  omissions and limited  functionality.

The configuration and  network are generally  accurate. The

configurations are  robust with working  components (e.g.,  addressing). Lacks  depth or minor

functional issues.

The configuration is  mostly accurate,

functional, and includes  appropriate technical  elements such as IP  addressing, subnetting,  and routing. You have set up the network with  excellent configurations,  demonstrating advanced  understanding.

The configuration and  technical details are  highly accurate,

flawless, fully

functional, and well  optimised.

Demonstrates

exceptional skills and  creativity through

advanced features.

References|4  Marks

Failed to provide any  references or citation

Few sources have  been provided and  most of them are not  credible. Minimal or  missing citations.

Some reliable

references have been  used. Some citations  were omitted or with  minor errors in

formatting.

References are

generally appropriate  with a range of

sources, but the in-text citations may be

incomplete or omitted.

References are mostly  credible and relevant with a good range of sources. Most citations have been  provided in the correct  format.

All references are highly credible, relevant, and  current from a wide  variety of sources.

Proper citation has  been used.

Presentation  and Delivery| 8  marks

Unclear or inaudible  presentation.

Appears unprepared or  very nervous. No eye  contact, monotone  voice. Presentation is  hard to understand or  follow.

Presentation is

difficult to follow due  to volume or pace.  Minimal eye contact  with heavy reliance  on notes. Frequent  use of pauses.

The delivery is unclear. Limited eye contact,  frequent reading from  notes. Body language is stiff or unnatural.

Understandable

delivery but lacks  variation in tone.

Some inconsistency  in eye contact.

Mildly nervous.

Generally confident and  clear. Minor issues with  volume or pace. Good  eye contact and body  language.

Clear, confident, and  engaging delivery

throughout. Excellent  voice and tone.

Maintains eye contact  and appears fully

prepared.