Assessment Task
The assessment task is to write a report to answer 3 questions about computer network design,
Please see enclosed details
Assessment criteria
The Assessment criteria and grading rubric are at the end of the brief see below
Learning Outcomes
This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the Module descriptors.
Late Submissions
Students are reminded that:
If this assessment is submitted late i.e. within 5 working days of the submission deadline, the mark will be capped at 40% if a pass mark is achieved;
If this assessment is submitted later than 5 working days after the submission deadline, the work will be regarded as a non-submission and will be awarded a zero;
If this assessment is being submitted as a referred piece of work then it must be submitted by the deadline date; any Refer assessment submitted late will be regarded as a non-submission and will be awarded a zero.
Extenuating Circumstances
The University’s Extenuating Circumstances procedure is in place if there are genuine circumstances that may prevent a student submitting an assessment. If students are not 'fit to study’, they can either request an extension to the submission deadline of 5 working days or they can request to submit the assessment at the next opportunity (Defer). In both instances students must submit an EC application with relevant evidence. If accepted by the EC Panel there will be no academic penalty for late submission or non-submission dependent on what is requested. Students are reminded that EC covers only short term issues (20 working days) and that if they experience longer term matters that impact on learning then they must contact the Student Hub for advice.
Please find a link to the EC policy below:
Academic Misconduct
Any submission must be students’ own work and, where facts or ideas have been used from other sources, these sources must be appropriately referenced. The University’s Academic Handbook includes the definitions of all practices that will be deemed to constitute academic misconduct. Students should check this link before submitting their work.
Procedures relating to student academic misconduct are given below:
Ethics Policy
The work being carried out by students must be in compliance with the Ethics Policy. Where there is an ethical issue, as specified within the Ethics Policy, then students will need an ethics release or an ethical approval prior to the start of the project.
The Ethics Policy is contained within Section 2S of the Academic Handbook:
Grade marking
The University uses a letter grade scale for the marking of assessments. Unless students have been specifically informed otherwise their marked assignment will be awarded a letter grade. More detailed information on grade marking and the grade scale can be found on the portal and in the Student Handbook.
Guidance for online submission through Solent Online Learning (SOL)
Part 1 (70 Marks) Create an approach for network address implementation and testing
Research question (RQ1):
If layered network reference models are applied to implementing the network of routers and switches and end devices does this assist the network engineer?
Figure 1Venuestream Network
1.1 Perform a literature search relating to the research question above (RQ1) and document the results of your relevant literature in a bibliography.
1.2 Write a review of the important literature you have identified in the literature search in 1.1.
1.3 Formulate an approach for documenting, implementing and testing the network addressing of the computer network in figure 1 show and describe this approach appropriately in your assessment submission.
1.4 Rigorously justify the use of this approach for implementing and testing the network addressing of the computer network in figure 1 by writing a justification in the report.
According to the Cisco Netacad Introduction to Networks module
The benefits to using a layered network reference model to describe network protocols and operations include:
Assisting in protocol design because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below.
Fostering competition because products from different vendors can work together.
Preventing technology or capability changes in one layer from affecting other layers above and below.
Providing a common language to describe networking functions and capabilities.
Cisco do not provide any evidence in the form of research with primary or reference to secondary data to justify these statements in section 3.4.2.1 (Cisco Netacad).
Therefore you should identify quality literature sources which include the topic of the main network reference models by performing a literature search using the Solent Library and academic sources.
Specify and use a criterion to exclude sources which are not relevant to the research question.
Write a literature review of up to 20 quality literature sources of information you have found about network reference models.
Reference the sources you have reviewed in a bibliography using the Solent Harvard method of referencing.
Formulate an approach for implementing and testing the network addressing of the computer network in figure 1. The approach may take the form of an original diagram or table or narrative which you have created yourself.
Describe, explain and justify this approach by analyzing findings from the literature review performed.
Part 2 (30 marks) Complete the IPv6 Addressing of the Computer Network
For the network topology in figure 1 you must design an IPv6 Addressing scheme and complete the documentation by completing the following tables. The network is classed as one site and is allocated the following IPv6 address Global Routing Prefix
2001:DB8:ACAD::/48
7.2.4.1 Structure of an IPv6 Global Unicast Address (Cisco Netacad)
Figure 2 Structure of an IPv6 address
Your first task is to calculate and allocate 4 IPv6 subnets by appending a subnet ID to the Global Routing Prefix you have been given and to document the IPv6 subnets in the table below
To calculate your first Subnet ID convert the last 4 Decimal numbers of your student number into a 4 digit hexadecimal number (16 bits) and use them as the 1st Subnet ID in the table in Figure 3 below
For example if your student number is 16777215 in decimal
The last 4 decimal digits are 7215
your subnet ID will be 1c2f in hexadecimal
Write Your Subnet ID in Hexadecimal ………………..
Allocate consecutive IPv6 Subnet IDs to the following 4 subnetworks for the HQ and Branch LANs starting at your calculated subnet ID and incrementing each new subnet ID by 1 (adding 1).
Write all IPv6 addresses in the compressed format following the rules to help reduce the notation.
Hosts’ IPv6 addresses and Network Interfaces’ IPv6 interface IDs must be allocated using IEEE EUI-64 standard.
Choose an appropriate prefix length for IEEE EUI-64
Subnet Description | Subnet Id | IPv6 Network Prefix /Prefix Length |
HQ LAN1 |
|
|
HQ LAN 2 |
|
|
Branch IoT LAN |
|
|
Branch CCTV LAN |
|
|
Figure 3 IPv6 Subnet Addresses
Document the Global unicast IPv6 addresses to the network interfaces of the Router devices in the Interface Address table in Figure 4 using the MAC addresses given in the table.
All IPv6 addresses are configured as EUI-64 all addresses should be written in the compressed format.
The following is an example of configuration of EUI-64 IPv6 addresses for subnet ID 0000 :
HQ(config-if)# interface g0/0
HQ(config-if)# ipv6 address 2001:db8:acad::/64 eui-64
Document the IPv6 Link Local addresses of the LAN network Interfaces of the router devices by completing the table Link Local address column.
All addresses should be written in the compressed format.
Network Device | Interface | MAC Address | Global IPv6 Address/Prefix Length | Link Local Address |
HQ BR1 | G0/0 | 0003.E498.9E01 |
|
|
G0/1 | 0003.E498.9E02 |
|
| |
Branch | G0/0 | 0001.632C.B901 |
|
|
BR2 | G0/1 | 0001.632C.B902 |
|
|
Figure 4 IPv6 Interface address table
For end devices such as PCs and IOT devices, IPv6 addresses will be allocated automatically using IEEE EUI-64 standard.
Complete the Device address table in Figure 5 with Device IPv6 Address and Address Prefix Length and Link Local address of the End Devices using the MAC addresses given in the table. All IPv6 addresses should be written in the compressed format.
End Device | MAC Address | IPv6 Device Address /Prefix Length | Link Local Address |
HQ1 | 00D0.BCDD.315B |
|
|
HQ2 | 0060.473E.585C |
|
|
HQserver | 0060.47C8.7111 |
|
|
BR IoT Device | 00D0.58A6.7034 |
|
|
BR CCTV Camera | 0060.5CDD.DE36 |
|
|
BRServer | 0030.A328:56A0 |
|
|
Figure 5 IPv6 Device Address Table
Page Break
0 comments:
Post a Comment