TECH2100 Network Design and Implementation Project Assignment Help
Assessment 3 Information
Subject Code: | TECH2100 | |
Subject Name: | Introduction to Information Networks | |
Assessment Title: | Network Design and Implementation Project | |
Assessment Type: | Individual | |
Assessment Length: | 1,500 | Words (+/-10%) |
Weighting: | 40 % | |
Total Marks: | 40 | |
Submission: | MyKBS | |
Due Date: | Week 13 | |
Your Task
This assessment challenges you to apply theoretical concepts from your course to a practical network design and simulation project. You are expected to create a comprehensive network using Cisco Packet Tracer, a network simulation software. This project will test your ability to integrate knowledge across several networking domains, including network layer models, addressing and routing, transport layer protocols, wireless networking, network security, and Quality of Service (QoS).
Assessment Description
Part 1. Network Design Documentation
• Purpose: To outline your entire network design process, from inception to implementation. This document will serve as a comprehensive blueprint of your network, detailing each decision and its justification.
• Content:
o Introduction: Describe the purpose and expected outcomes of the network. o Design Choices: Discuss the selection of network models (OSI or TCP/IP layers) and their suitability for your scenario.
o Addressing Scheme: Provide a detailed IP addressing plan.
o Routing Protocols: Detail which routing protocols (e.g., RIP, OSPF, BGP) are used and the rationale behind their selection.
o Network Security Measures: Outline the security protocols (e.g., firewalls, VPNs) to protect the network.
o Quality of Service (QoS): Explain your strategy for managing network traffic and ensuring quality of service.
o Simulation Outline: Describe what will be demonstrated in the Cisco Packet Tracer simulation. You must use the Network Scenario Generators: Custom GPT: Network Scenario Generator to assist in generating and refining your network scenario. This tool is integral to creating realistic and challenging network environments for simulation.
Part 2. Network Simulation
• Purpose: To practically implement and troubleshoot your network design in a simulated environment using Cisco Packet Tracer.
• Setup Requirements:
Network Construction: Construct a network that includes:
o Three Routers: Configured to manage traffic between different network segments. o Three Switches: Connecting devices within the same network segment. o Wireless Devices: Implement wireless access points as studied in Weeks 7 – 9. o Three Hosts: Devices (e.g., PCs) that generate and receive traffic.
o One Rogue Device: Simulate security threats using a rogue laptop.
o Modules: Include HWIC-2T (two-port serial high-speed WAN) modules in routers as part of Week 7-9’s workshop.
Naming Convention: The first router should be named using your first name (e.g., Router_John) and the second router with your last name (e.g., Router_Doe). • Suggested IP Address Table:
For students new to subnetting, here is a suggested IP address table. These IP addresses are recommendations, and you can modify them based on your network scenario. Alternatively, use the Network Scenario Generators Custom GPT to generate other valid IP address schemes.
This table uses placeholders for Network A to indicate that specific IP addresses will be allocated from the unique list provided by the facilitator.
Device Router_[Your_First_Name] Fa0/0 Router_[Your_Last_Name] Fa0/0 Router_[Student_ID] Switch 1 Switch 2 Switch 3 PC-A PC-B PC-C Access Point 1 Access Point 2 | Interface | Network | IP Address | Subnet Mask | Default Gateway
|
Network A 192.168.1.XX 255.255.255.0 N/A | |||||
Network B 192.168.2.1 | 255.255.255.0 N/A | ||||
Fa0/0 | Network C | 192.168.3.1 | 255.255.255.0 N/A | ||
Network A | 192.168.1.XX 255.255.255.0 192.168.1.XX | ||||
Network B | 192.168.2.2 | 255.255.255.0 192.168.2.1 | |||
Network C | 192.168.3.2 | 255.255.255.0 192.168.3.1 | |||
NIC | Network A 192.168.1.XX 255.255.255.0 192.168.1.XX | ||||
NIC | Network B 192.168.2.10 255.255.255.0 192.168.2.1 | ||||
NIC | Network C | 192.168.3.10 255.255.255.0 192.168.3.1 | |||
Network A | 192.168.1.XX 255.255.255.0 192.168.1.XX | ||||
Network | 192.168.2.20 255.255.255.0 192.168.2.1 |
Interface | Network | IP Address | Subnet Mask |
B |
DeviceDefault Gateway
Rogue Laptop Wireless 192.168.4.50 255.255.255.0 192.168.4.1
Notes:
• “XX” in IP addresses for Network A indicates that specific IPs will be provided to each student from the unique list of IPs during Week 11 to ensure individual configurations.
• Router Naming: Replace Router_[Your_First_Name] and Router_[Your_Last_Name] with your actual first and last names as specified in the assessment.
• Network C: This network can be an additional segment if you want to simulate more advanced configurations or connect additional departments/locations.
• Wireless Configuration: Access Points should have their own IP addresses within the respective network segments, and security settings (WPA2) should be configured for wireless access.
Configuration and Testing:
• Router and Switch Configuration: Configure router interfaces and switch ports based on the addressing table above. Ensure all interfaces are enabled, and IP addressing is correctly set up.
• Wireless Network Settings: Integrate wireless access points by configuring SSID, authentication, and performance metrics (signal strength, throughput).
• Port Security: Configure port security on switches to restrict unauthorised access. Ensure port security is blocking rogue traffic while allowing legitimate devices to connect.
• Testing and Verification: Use ping and diagnostic commands to test connectivity between devices and ensure smooth communication between routers, switches, and wireless devices.
3. Presentation
• Purpose: To comprehensively articulate the process, decisions, and outcomes of your network design and simulation.
• Format: Present your assessment as a video recording of 8 minutes detailing the network design and simulation stages using the format given below.
o Introduction: Discuss the project scope and objectives.
o Walk-through: Explain the network design in detail.
o Demonstration: Highlight key functionalities within the simulation.
o Challenges and Resolutions: Discuss any challenges faced and their resolutions.
o Conclusion: Suggest potential improvements or future network expansions.
This assessment aims to achieve the following subject learning outcomes:
LO1 | Evaluate the main technologies, models, and protocols used in data communications and networking. |
LO2 | Explain the purpose and functionality of layered computer network models. |
LO3 | Identify problems that emerge among the networks that constitute today’s internet architecture. |
Assessment Instructions
• The documentation should be submitted as a Word or PDF file via MyKBS. It must be well organized, professionally formatted, and include all necessary diagrams and descriptions as outlined in the assessment description.
• Upload the Cisco Packet Tracer file (.pkt)
• Submit the presentation as a video recording for 8 minutes (+/- 10 %). Ensure it is informative and adheres to the specified format.
• You will be evaluated on your ability to communicate complex technical information clearly and effectively to a non-technical audience.
• Demonstrate a deep understanding of the network design and simulation concepts covered in the course.
• You should provide at least ten (10) academic references to support your discussion. • Please refer to the assessment marking guide to assist you in completing all the assessment criteria.
Important Study Information
Academic Integrity and Conduct Policy
KBS values academic integrity. All students must understand the meaning and consequences of cheating, plagiarism, and other academic offenses under the Academic Integrity and Conduct Policy.
Please read the policy to learn the answers to these questions:
• What is academic integrity and misconduct?
• What are the penalties for academic misconduct?
• How can I appeal my grade?
Late submission of assignments (within the Assessment Policy)
Length Limits for Assessments
Penalties may be applied for assessment submissions that exceed prescribed limits.
Study Assistance
Students may seek study assistance from their local Academic Learning Advisor or refer to the resources on the MyKBS Academic Success Centre page. Further details can be accessed at
Submission Requirements
All assessments, including draft copies, must be written and submitted in English. The use of translation tools is not permitted.
Generative AI Traffic Lights
Please see the level of generative AI that this assessment has been designed to accept:
Traffic Light | Amount of Generative Artificial Intelligence (GenerativeAI) usage | Evidence Required | This assessment (✓) |
Level 1 | Prohibited: No GenerativeAI allowed This assessment showcases your individual knowledge, skills and/or personal experiences in the absence of Generative AI support. | The use of generative AI is prohibited for this assessment and may potentially result in penalties for academic misconduct, including but not limited to a mark of zero for the assessment. | |
Level 2 | Optional: You may use GenerativeAI for research and content generation that is appropriately referenced. See assessment instructions for details This assessment allows you to engage with Generative AI as a means of expanding your understanding, creativity, and idea generation in the research phase of your assessment and to produce content that enhances your assessment. I.e., images. You do not have to use it. | The use of GenAI is optional for this assessment. Your collaboration with GenerativeAI must be clearly referenced just as you would reference any other resource type used. Click on the link below to learn how to reference GenAI. In addition, you must include an appendix that documents your GenerativeAI collaboration including all prompts and responses used for the assessment. Unapproved use of generative AI as per assessment details during the content generation parts of your assessment may potentially result in penalties for academic misconduct, including but not limited to a mark of zero for the assessment. Ensure you follow the specific assessment instructions in the section above. | |
Level 3 | Compulsory: You must use GenerativeAI to complete your assessment See assessment instruction for details This assessment fully integrates Generative AI, allowing you to harness the technology’s full potential in collaboration with your own expertise. Always check your assessment instructions carefully as there may still be limitations on what constitutes acceptable use, and these may be specific to each assessment. | You will be taught how to use generative AI and assessed on its use. Your collaboration with GenerativeAI must be clearly referenced just as you would reference any other resource type used. Click on the link below to learn how to reference GenAI. In addition, you must include an appendix that documents your GenerativeAI collaboration including all prompts and responses used for the assessment. Unapproved use of generative AI as per assessment details during the content generation parts of your assessment may potentially result in penalties for academic misconduct, including but not limited to a mark of zero for the assessment. Ensure you follow the specific assessment instructions in the section above. | (✓) |
Assessment Marking Guide
F2 (Fail)
Marking Criteria
F1(Fail)
P(Pass)
C(Credit)
D(Distinction)
HD (High Distinction)
| 40 marks
Documentation|
0 –24%:
25 – 49%
50 -64%
65–74%
75 -84%
85 – 100%
7 marks You have provided
incomplete or largely
incorrect
documentation with
little understanding of
network design
concepts.
You have provided documentation that is somewhat
complete but lacks several critical
details.
You have provided basic documentation with minor omissions.
You have provided basic and
comprehensive
You have provided thorough and detailed documentation.
including all required elements.
You have provided exceptionally detailed and complete
documentation,
exceeding the basic requirements.
Application of Security Measures and Testing | 6 Marks | You have failed to apply basic security measures or conduct any meaningful testing. | You have applied some basic security measures, but they are largely ineffective or incorrectly tested. | You have applied necessary security measures and conducted basic testing demonstrating understanding. | You have effectively applied and tested security measures, showing a good level of understanding and implementation. | You have applied and been rigorously tested advanced security measures, showing high competency and thoroughness. | You have applied and expertly tested cutting edge security measures, setting a benchmark for excellence and comprehensive understanding. |
Configuration and Implementation Details| 15 marks | No valid configuration present, or incorrect setup. No evidence of understanding technical or configuration requirements. | The configuration and setup is mostly inaccurate with notable errors. Demonstrates minimal technical understanding. Critical elements are missing or misapplied. | The configuration and network setup shows a basic understanding with minor errors or omissions and limited functionality. | The configuration and network are generally accurate. The configurations are robust with working components (e.g., addressing). Lacks depth or minor functional issues. | The configuration is mostly accurate, functional, and includes appropriate technical elements such as IP addressing, subnetting, and routing. You have set up the network with excellent configurations, demonstrating advanced understanding. | The configuration and technical details are highly accurate, flawless, fully functional, and well optimised. Demonstrates exceptional skills and creativity through advanced features. |
References|4 Marks | Failed to provide any references or citation | Few sources have been provided and most of them are not credible. Minimal or missing citations. | Some reliable references have been used. Some citations were omitted or with minor errors in formatting. | References are generally appropriate with a range of sources, but the in-text citations may be incomplete or omitted. | References are mostly credible and relevant with a good range of sources. Most citations have been provided in the correct format. | All references are highly credible, relevant, and current from a wide variety of sources. Proper citation has been used. |
Presentation and Delivery| 8 marks | Unclear or inaudible presentation. Appears unprepared or very nervous. No eye contact, monotone voice. Presentation is hard to understand or follow. | Presentation is difficult to follow due to volume or pace. Minimal eye contact with heavy reliance on notes. Frequent use of pauses. | The delivery is unclear. Limited eye contact, frequent reading from notes. Body language is stiff or unnatural. | Understandable delivery but lacks variation in tone. Some inconsistency in eye contact. Mildly nervous. | Generally confident and clear. Minor issues with volume or pace. Good eye contact and body language. | Clear, confident, and engaging delivery throughout. Excellent voice and tone. Maintains eye contact and appears fully prepared. |
Leave A Comment