Thursday, 4 February 2021

Networks


 Assessment Task  

The assessment task is to write a report to answer 3 questions about computer network design, 

Please see enclosed details  

Assessment criteria  

 

The Assessment criteria and grading rubric are at the end of the brief see below 

 

 

Learning Outcomes 

 

This assessment will enable students to demonstrate in full or in part the learning outcomes identified in the Module descriptors. 

Late Submissions 

 

Students are reminded that: 

 

  1. If this assessment is submitted late i.e. within 5 working days of the submission deadline, the mark will be capped at 40% if a pass mark is achieved; 

  1. If this assessment is submitted later than 5 working days after the submission deadline, the work will be regarded as a non-submission and will be awarded a zero; 

  1. If this assessment is being submitted as a referred piece of work then it must be submitted by the deadline date; any Refer assessment submitted late will be regarded as a non-submission and will be awarded a zero. 

 

 

Extenuating Circumstances 

The University’s Extenuating Circumstances procedure is in place if there are genuine circumstances that may prevent a student submitting an assessment. If students are not 'fit to study’, they can either request an extension to the submission deadline of 5 working days or they can request to submit the assessment at the next opportunity (Defer).  In both instances students must submit an EC application with relevant evidence.   If accepted by the EC Panel there will be no academic penalty for late submission or non-submission dependent on what is requested.  Students are reminded that EC covers only short term issues (20 working days) and that if they experience longer term matters that impact on learning then they must contact the Student Hub for advice. 

 

Please find a link to the EC policy below: 

 

 

Academic Misconduct 

Any submission must be students’ own work and, where facts or ideas have been used from other sources, these sources must be appropriately referenced. The University’s Academic Handbook includes the definitions of all practices that will be deemed to constitute academic misconduct.  Students should check this link before submitting their work. 

 

Procedures relating to student academic misconduct are given below: 

 

 

 

Ethics Policy 

The work being carried out by students must be in compliance with the Ethics Policy. Where there is an ethical issue, as specified within the Ethics Policy, then students will need an ethics release or an ethical approval prior to the start of the project. 

 

The Ethics Policy is contained within Section 2S of the Academic Handbook: 

 

 

Grade marking 

The University uses a letter grade scale for the marking of assessments. Unless students have been specifically informed otherwise their marked assignment will be awarded a letter grade. More detailed information on grade marking and the grade scale can be found on the portal and in the Student Handbook. 

 

 

 

Guidance for online submission through Solent Online Learning (SOL) 

 

 

 

 

 

Part 1 (70 Marks) Create an approach for network address implementation and testing 

Research question (RQ1): 

If layered network reference models are applied to implementing the network of routers and switches and end devices does this assist the network engineer? 

A close up of a map

Description automatically generated 

Figure 1Venuestream Network 

1.1 Perform a literature search relating to the research question above (RQ1) and document the results of your relevant literature in a bibliography.  

1.2 Write a review of the important literature you have identified in the literature search in 1.1.  

1.3 Formulate an approach for documenting, implementing and testing the network addressing of the computer network in figure 1 show and describe this approach appropriately in your assessment submission. 

1.4 Rigorously justify the use of this approach for implementing and testing the network addressing of the computer network in figure 1 by writing a justification in the report. 

According to the Cisco Netacad Introduction to Networks module  

The benefits to using a layered network reference model to describe network protocols and operations include: 

  • Assisting in protocol design because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below.  

  • Fostering competition because products from different vendors can work together.  

  • Preventing technology or capability changes in one layer from affecting other layers above and below.  

  • Providing a common language to describe networking functions and capabilities. 

Cisco do not provide any evidence in the form of research with primary or reference to secondary data to justify these statements in section 3.4.2.1 (Cisco Netacad). 

Therefore you should identify quality literature sources which include the topic of the main network reference models by performing a literature search using the Solent Library and academic sources.  

Specify and use a criterion to exclude sources which are not relevant to the research question. 

Write a literature review of up to 20 quality literature sources of information you have found about network reference models. 

Reference the sources you have reviewed in a bibliography using the Solent Harvard method of referencing.  

Formulate an approach for implementing and testing the network addressing of the computer network in figure 1. The approach may take the form of an original diagram or table or narrative which you have created yourself.      

Describe, explain and justify this approach by analyzing findings from the literature review performed. 

 

Part 2 (30 marks) Complete the IPv6 Addressing of the Computer Network 

For the network topology in figure 1 you must design an IPv6 Addressing scheme and complete the documentation by completing the following tables. The network is classed as one site and is allocated the following IPv6 address Global Routing Prefix  

2001:DB8:ACAD::/48  

 

Figure 2 Structure of an IPv6 address 

Your first task is to calculate and allocate 4 IPv6 subnets by appending a subnet ID to the Global Routing Prefix you have been given and to document the IPv6 subnets in the table below 

To calculate your first Subnet ID convert the last 4 Decimal numbers of your student number into a 4 digit hexadecimal number (16 bits) and use them as the 1st Subnet ID in the table in Figure 3 below 

For example if your student number is 16777215  in decimal 

The last 4 decimal digits are 7215  

your subnet ID will be 1c2f in hexadecimal 

Write Your Subnet ID in Hexadecimal ……………….. 

Allocate consecutive IPv6 Subnet IDs to the following 4 subnetworks for the HQ and Branch LANs starting at your calculated subnet ID and incrementing each new subnet ID by 1 (adding 1).  

Write all IPv6 addresses in the compressed format following the rules to help reduce the notation. 

Hosts’ IPv6 addresses and Network Interfaces’ IPv6 interface IDs must be allocated using IEEE EUI-64 standard.  

Choose an appropriate prefix length for IEEE EUI-64 

Subnet Description 

Subnet Id 

IPv6 Network Prefix /Prefix Length 

HQ LAN1 

 

 

HQ LAN 2 

 

 

Branch IoT LAN 

 

 

Branch CCTV LAN 

 

 

Figure 3 IPv6 Subnet Addresses 

 

Document the Global unicast IPv6 addresses to the network interfaces of the Router devices in the Interface Address table in Figure 4 using the MAC addresses given in the table. 

All IPv6 addresses  are configured as EUI-64 all addresses should be written in the compressed format. 

The following is an example of configuration of EUI-64 IPv6 addresses for subnet ID 0000 :  

HQ(config-if)# interface g0/0 

HQ(config-if)# ipv6 address 2001:db8:acad::/64 eui-64 

Document the IPv6 Link Local addresses of the LAN network Interfaces of the router devices by completing the table Link Local address column.  

All addresses should be written in the compressed format. 

Network Device 

Interface 

MAC Address 

Global IPv6 Address/Prefix Length 

Link Local Address 

HQ 

BR1 

G0/0 

0003.E498.9E01 

 

 

G0/1 

0003.E498.9E02 

 

 

Branch 

G0/0 

0001.632C.B901 

 

 

BR2 

G0/1 

0001.632C.B902 

 

 

Figure 4 IPv6 Interface address table 

For end devices such as PCs and IOT devices, IPv6 addresses will be allocated automatically using IEEE EUI-64 standard.   

Complete the Device address table in Figure 5 with Device IPv6 Address and Address Prefix Length and Link Local address of the End Devices using the MAC addresses given in the table. All IPv6 addresses should be written in the compressed format. 

End Device  

MAC Address 

IPv6 Device Address /Prefix Length 

Link Local Address 

HQ1 

00D0.BCDD.315B 

 

 

HQ2 

0060.473E.585C 

 

 

HQserver 

0060.47C8.7111 

 

 

BR IoT Device 

00D0.58A6.7034 

 

 

BR CCTV Camera 

0060.5CDD.DE36 

 

 

BRServer 

0030.A328:56A0 

 

 

Figure 5 IPv6 Device Address Table 

Page Break 

 

UK assignment helper

Author & Editor

We are the best assignment writing service provider in the UK. We can say it with pride that we tend to perceive our client’s requirements better than any other company. We provide assignment writing service in 100+ subjects.

0 comments:

Post a Comment