TECH2100 Network Design and Implementation Project Assignment Help
Assessment 3 Information
Your Task
This assessment challenges you to apply theoretical concepts from your course to a practical network design and simulation project. You are expected to create a comprehensive network using Cisco Packet Tracer, a network simulation software. This project will test your ability to integrate knowledge across several networking domains, including network layer models, addressing and routing, transport layer protocols, wireless networking, network security, and Quality of Service (QoS).
Assessment Description
Part 1. Network Design Documentation
• Purpose: To outline your entire network design process, from inception to implementation. This document will serve as a comprehensive blueprint of your network, detailing each decision and its justification.
• Content:
o Introduction: Describe the purpose and expected outcomes of the network. o Design Choices: Discuss the selection of network models (OSI or TCP/IP layers) and their suitability for your scenario.
o Addressing Scheme: Provide a detailed IP addressing plan.
o Routing Protocols: Detail which routing protocols (e.g., RIP, OSPF, BGP) are used and the rationale behind their selection.
o Network Security Measures: Outline the security protocols (e.g., firewalls, VPNs) to protect the network.
o Quality of Service (QoS): Explain your strategy for managing network traffic and ensuring quality of service.
o Simulation Outline: Describe what will be demonstrated in the Cisco Packet Tracer simulation. You must use the Network Scenario Generators: Custom GPT: Network Scenario Generator to assist in generating and refining your network scenario. This tool is integral to creating realistic and challenging network environments for simulation.
Part 2. Network Simulation
• Purpose: To practically implement and troubleshoot your network design in a simulated environment using Cisco Packet Tracer.
• Setup Requirements:
Network Construction: Construct a network that includes:
o Three Routers: Configured to manage traffic between different network segments. o Three Switches: Connecting devices within the same network segment. o Wireless Devices: Implement wireless access points as studied in Weeks 7 – 9. o Three Hosts: Devices (e.g., PCs) that generate and receive traffic.
o One Rogue Device: Simulate security threats using a rogue laptop.
o Modules: Include HWIC-2T (two-port serial high-speed WAN) modules in routers as part of Week 7-9’s workshop.
Naming Convention: The first router should be named using your first name (e.g., Router_John) and the second router with your last name (e.g., Router_Doe). • Suggested IP Address Table:
For students new to subnetting, here is a suggested IP address table. These IP addresses are recommendations, and you can modify them based on your network scenario. Alternatively, use the Network Scenario Generators Custom GPT to generate other valid IP address schemes.
This table uses placeholders for Network A to indicate that specific IP addresses will be allocated from the unique list provided by the facilitator.
DeviceDefault Gateway
Rogue Laptop Wireless 192.168.4.50 255.255.255.0 192.168.4.1
Notes:
• “XX” in IP addresses for Network A indicates that specific IPs will be provided to each student from the unique list of IPs during Week 11 to ensure individual configurations.
• Router Naming: Replace Router_[Your_First_Name] and Router_[Your_Last_Name] with your actual first and last names as specified in the assessment.
• Network C: This network can be an additional segment if you want to simulate more advanced configurations or connect additional departments/locations.
• Wireless Configuration: Access Points should have their own IP addresses within the respective network segments, and security settings (WPA2) should be configured for wireless access.
Configuration and Testing:
• Router and Switch Configuration: Configure router interfaces and switch ports based on the addressing table above. Ensure all interfaces are enabled, and IP addressing is correctly set up.
• Wireless Network Settings: Integrate wireless access points by configuring SSID, authentication, and performance metrics (signal strength, throughput).
• Port Security: Configure port security on switches to restrict unauthorised access. Ensure port security is blocking rogue traffic while allowing legitimate devices to connect.
• Testing and Verification: Use ping and diagnostic commands to test connectivity between devices and ensure smooth communication between routers, switches, and wireless devices.
3. Presentation
• Purpose: To comprehensively articulate the process, decisions, and outcomes of your network design and simulation.
• Format: Present your assessment as a video recording of 8 minutes detailing the network design and simulation stages using the format given below.
o Introduction: Discuss the project scope and objectives.
o Walk-through: Explain the network design in detail.
o Demonstration: Highlight key functionalities within the simulation.
o Challenges and Resolutions: Discuss any challenges faced and their resolutions.
o Conclusion: Suggest potential improvements or future network expansions.
This assessment aims to achieve the following subject learning outcomes:
Assessment Instructions
• The documentation should be submitted as a Word or PDF file via MyKBS. It must be well organized, professionally formatted, and include all necessary diagrams and descriptions as outlined in the assessment description.
• Upload the Cisco Packet Tracer file (.pkt)
• Submit the presentation as a video recording for 8 minutes (+/- 10 %). Ensure it is informative and adheres to the specified format.
• You will be evaluated on your ability to communicate complex technical information clearly and effectively to a non-technical audience.
• Demonstrate a deep understanding of the network design and simulation concepts covered in the course.
• You should provide at least ten (10) academic references to support your discussion. • Please refer to the assessment marking guide to assist you in completing all the assessment criteria.
Important Study Information
Academic Integrity and Conduct Policy
KBS values academic integrity. All students must understand the meaning and consequences of cheating, plagiarism, and other academic offenses under the Academic Integrity and Conduct Policy.
Please read the policy to learn the answers to these questions:
• What is academic integrity and misconduct?
• What are the penalties for academic misconduct?
• How can I appeal my grade?
Late submission of assignments (within the Assessment Policy)
Length Limits for Assessments
Penalties may be applied for assessment submissions that exceed prescribed limits.
Study Assistance
Students may seek study assistance from their local Academic Learning Advisor or refer to the resources on the MyKBS Academic Success Centre page. Further details can be accessed at
Submission Requirements
All assessments, including draft copies, must be written and submitted in English. The use of translation tools is not permitted.
Generative AI Traffic Lights
Please see the level of generative AI that this assessment has been designed to accept:
Assessment Marking Guide
F2 (Fail)
Marking Criteria
F1(Fail)
P(Pass)
C(Credit)
D(Distinction)
HD (High Distinction)
| 40 marks
Documentation|
0 –24%:
25 – 49%
50 -64%
65–74%
75 -84%
85 – 100%
7 marks
You have provided
incomplete or largely
incorrect
documentation with
little understanding of
network design
concepts.
You have provided documentation that is somewhat
complete but lacks several critical
details.
You have provided basic documentation with minor omissions.
You have provided basic and
comprehensive
You have provided thorough and detailed documentation.
including all required elements.
You have provided exceptionally detailed and complete
documentation,
exceeding the basic requirements.
Leave A Comment