We can work on QA BSc Computing Technologies Coursework – Network Design and Troubleshooting Individual Written Report: Case Study Analysis

 

QA BSc Computing Technologies

Coursework – Network Design and Troubleshooting

Individual Written Report: Case Study Analysis

 

Academic year and term:
2020/21 – Semester-1, Year 2

Module title:
Network Design and Troubleshooting

Module code:
 

Module Convener:
 

Module Learning Outcomes
Students who successfully complete this module will be able to:

1. Identify, analyse and communicate principles and processes of Network Design.

2. Critically analyse and evaluate business and technical Requirements.

3. Plan and design a Network Infrastructure (LAN/WAN/MAN).

4. Design and evaluate a management and implementation Strategy for a Network.

5. Collect and synthesise information to inform a choice of vendor solutions, with the module assignment providing a good opportunity to test this area.

6. Evaluate a range of information comparing alternative methods and techniques used in Network Design.

7. Be able to troubleshoot and maintain integrated, complex networks.

Learning outcomes assessed within this piece of work as agreed at the programme level meeting
This assignment will assess the following learning outcomes:

1. Demonstrate a broad understanding of the knowledge base of this module, and its terminology and discourse

8. Evaluate network devices to be used for a particular area in the network in relation to requirement

9. Design and implement a fully functional network infrastructure based on requirement given in the assignment brief

10. Demonstrate autonomous learning context and draw on prior experiences reflecting and evaluating on new leaning outcome.

Weighting
60% of the total module marks

Type of assessment:
1. Individual Written Report: case study analysis and design using network simulation

11. Recommended maximum words (2500 words)

Assessment deadline:
 

 

 

Assignment Task

This is an individual assignment based on the case study scenario presented below. This assignment will assess your understanding of the principles of network design and the ability to analyse, design and create a network infrastructure fully configured and tested which reflects understanding of network design and troubleshooting.

Scenario

Network Security is paramount especially when considering the digital network climate nowadays. You are a new computer network engineer hired to study and evaluate the existing network of sysco.co.uk, a small company consists of 3 departments (HR, Finance, General users) each of the department uses a file server that is dedicated for the allocated department. The company uses three other servers DNS, web (sysco.co.uk) and email (sysco-mail.co.uk) servers by which all department have access to. The web and email server should be accessible via the internet (external access). The floor diagram shown in Figure 1, illustrates the existing network provided by a third-party company.

 

Figure 1: Existing floor diagram

The original design should fulfil the requirement listed as follows:

Department
Hosts
Security Requirements

HR
5
Need a complete isolation from all users of other groups

Finance
4
Need a complete isolation from all users of other groups

Users
16
Need a complete isolation from all users of other groups

File Servers
3
Each department will use a dedicated server.

Web, email, dns Servers
3
Web and email servers will be used by all users including external access.

Table 1: users and servers distribution

 

 

The existing network has been configured with the following consideration:

The number of users are limited (25 users)and hence no VLANs created
To reduce the server management each and every server will be located as close to the users as possible hence servers will be managed by the department staff
The backup services will be performed automatically on an external Hard Disk Drive, the backup device will be placed as close to each server as possible and will be secured in a local cabinet.

 

The company director expressed concerns and asked you to evaluate the security and design better security solutions. Table 1 shows the users distribution and requirement according to sysco.co.uk policy.

The company uses private network address of 10.20.30.0/24, and a public IP address of 203.204.205.160/28. Security, Availability and scalability are paramount and hence your design and configuration must be based on these criteria.

NOTE:

All computers will use a Microsoft product such as servers and workstations
LAN Network needs to be physical redundant at least at wiring / Switches level

 

 

Deliverables

 

The network given in above scenario may have many areas of network security concerns. Evaluate the given network design in terms of security, availability and scalability. Your evaluation should include discussion of the potential security impact of the given network.

With the aid of diagram, design a new secured and reliable network, your network design should include:

Description of the topology used
Description of all devices used,
Description of technology used to fulfil the requirements
Consideration the following area of concern, Spanning Tree Protocol (STP), Demilitarised Zone (DMZ)
Sample related configuration of Switches, Routers (a full configuration must be attached in  the appendix)
Sample security configuration and implementation with description
Devices configuration tables including end devices
Technology related configuration such as (VLANs, bandwidth aggregation, Trunking, VTP, DHCP, etc.)
Test the web, email and dns servers
Test the connectivity across network & to/from DMZ.

Please include all configuration scripts and network simulation file in your assignment appendices.

 

 

 

 

 

 

 

 

Assessment criteria / Marking scheme

Assessment Criteria
Description

Introduction
Introduction

6
Introduction to the context and/or background to the topic indicating the purpose of the report.
10 Marks

4
The introduction includes some definitions of complex terminology or acronyms and ideas  which link to the conclusion of the report

Knowledge and understanding
Knowledge and understanding

6
Demonstrate an effective approach to studying and research, including explanation and discussion of subject concepts, exploring functional and non-functional requirements of given assignment.
10 Marks

4
The discussion includes relevant information which is paraphrased / interpretation of credible sources, summarising and accurate understanding of sources

Application and Analysis
Applying knowledge and analysis

7
Discussion, examination and analysis of different network components, exploring the relationship between different selected components.
15 Marks

5
Discussion include reasoning of device/components selection based on priori-knowledge, backed by evidence of research from sound sources

3
Discussion and analysis of different network models

Evaluation and judgement
Evaluation of different components and network model

8
Demonstrates effective assessment and judgement in selecting components demonstrate understanding of issues based on evaluating and comparing different network components supported by literature and relevant theories
15 Marks

7
Evaluation of different technologies and/or protocols such as VLANs, Trunking, Access control, DHCP, STP, VTP etc.

Design and Implementation
Network implementation and design

10
A description and network diagram, summarising the network design, including implementation and configuration of all network components and protocol with evidence (please provide sample network configuration scripts only).
20 Marks

6
Accommodated the plan with necessary devices and accounted for the unforeseen

4
Evidence related to the work carried out in designing and implementation is apparent and demonstrate autonomy and independence.

Testing and documentation
Testing and documentation

6
A well-defined document that reflect testing of given requirements, protocol, and selected components used.
10 Marks

4
Demonstrate and present network testing using appropriate technical language evidently related to the work carried

Presentation / reflection
Presentation, document structure and reflection

6
The document has an academic style and uses appropriate academic language, presenting information and discussion using many presentation methods including graphs, texts and diagrams where applicable
10 Marks

4
The report reflects a level of autonomy and creativity including an insight reflection of learning supported by theory

Referencing
Academic integrity and referencing

6
References are correctly presented using an appropriate academic style and are relevant to the subject
10 Marks

4
References are from multiple sources (Books, journals, periodicals, technical reports, etc,,) and used to support the discussion within the report and properly cited.

TOTAL:
100
 
 

 

Assignment Preparation Guidelines

All components of the assignment (text, diagrams. code etc.) must be submitted in one word file (hand written text or hand drawn diagrams are not acceptable), any other accompanied materials such as simulation file, code, etc. should be attached in appendices.
Standard and commonly used fonts such as Times New Roman, Arial or Calibri should be used, font size must be within the range of 10 to 15 points including the headings, body text and any texts within diagrams,
Pay attention to the Assessment criteria / Marking scheme, the report is to be concise and technical. Try to analyse, compare and evaluate rather than simply describe.
All figures, screenshots, graphs and tables must be numbered and labelled.
Material from external sources must be properly referenced and cited within the text using the Harvard referencing system,
The report should be logically structured, the core of the report may start by defining the problem / requirements, followed by the proposed solution including a detailed discussion, analysis and evaluation, leading to implementation and testing stage, finally a conclusion and/or personal reflection on learning.
Screenshots without description / discussion does not constitute understanding and maybe assumed irrelevant.
Please access your Turnitin Test Page via Dashboard or My modules to learn more about Turnitin and to make a test submission and to check your similarity score before uploading your final version
You will have opportunity to submit as many times to your module pages as you want up until the deadline.
Make sure to make backup of your work to avoid distress for loss or damage of your original work, use multiple storage media (memory stick, cloud and personal computer).

Plagiarism and Collusion

Plagiarism: occurs when you present somebody else’s work as your own, whether that work is an idea, graphs, figure, illustration or a pure text. Be it available in web, textbooks, reports or otherwise.
Collusion: occurs when copying another student’s report (Text, Figures, Illustration etc..) and submitting it as your own.
Plagiarism will be dealt with firmly and can lead to serious consequences and disciplinary procedures.
Wholesale use of text and diagrams from websites is considered as plagiarism when not acknowledged.
Academic Integrityis a matter that is taken very seriously at the university and student should endeavour to enforce it to all their assignments. In other words, plagiarism, collusion (working and copying from another student) and ghost writing will not be tolerated and will result in sanctions eg: capped resit, suspension and/or withdrawal.

Submission and Late submission

Students must ensure that their work is satisfactory and fit for purpose, both academically and free from any plagiarism.
Students must use an appropriate coversheet, which must include the subject, assignment title, student ID and date-time.
Tutors, lecturers and module convenors do not have the authority to extend the submission deadlines nor the exam time/date. In case of any mitigating circumstances, students should fill in the relevant mitigating circumstances form(s) available at —— Student Services —–
The marking of the assignment will be capped to 40 if the assignment is submitted within first seven (7) days after the deadline, any submission late than 7 days will be ignored.
The Submission File should be appropriate to the topic/title of the assignment and contain the Student ID, (Student ID-Assignment title)
All coursework related material must be attached as an appendix in the final coursework/assignment document, including any computer generated document, software/ code, simulation file etc..

Kind reminder: it is student’s full responsibility to ensure that all assignments are submitted on the correct link and on time (before 2pm). Failure to do so may result in CAPPED Resit and/or failure of the module.

Is this question part of your assignment?

Place order