Solent
University
Coursework Assessment Brief
Assessment
Details
Module
Title: |
Networks |
Module
Code: |
COM712 |
Module
Leader: |
Warren
Earle |
Level: |
7 |
Assessment
Title: |
Report
Referral |
Assessment
Number: |
AE3 |
Assessment
Type: |
Report |
Restrictions
on Time/Word Count: |
1500 |
Consequence
of not meeting time/word count limit: |
There
is no penalty for submitting below the word/count limit, but students should
be aware that there is a risk they may not maximise their potential mark. |
Individual/Group: |
Individual |
Assessment
Weighting: |
50% |
Issue
Date: |
21st
September 2020 |
Hand
In Date: |
18th December 2020 |
Planned
Feedback Date: |
22nd
January 2021 |
Mode of Submission: |
on-line |
Number of copies to be
submitted: |
Where
on-line submission via ‘Solent Online Learning’ is used, students are not
required to submit a hard copy. |
Anonymous
Marking
|
This assessment:
(a) Will
be marked anonymously or (b) Is
exempt from anonymous marking. (delete as
appropriate)
|
Assessment
Task
The assessment task is to write a report to
answer 3 questions about computer network design,
Please see enclosed details
Assessment criteria
The
Assessment criteria and grading rubric are at the end of the brief see below
Learning
Outcomes
This
assessment will enable students to demonstrate in full or in part the learning
outcomes identified in the Module descriptors.
Late
Submissions
Students
are reminded that:
i.
If this assessment is submitted late i.e.
within 5 working days of the submission deadline, the mark will be capped at
40% if a pass mark is achieved;
ii.
If this assessment is submitted later
than 5 working days after the submission deadline, the work will be regarded as
a non-submission and will be awarded a zero;
iii.
If this assessment is being submitted as a
referred piece of work then it must be submitted by the deadline date; any
Refer assessment submitted late will be regarded as a non-submission and will
be awarded a zero.
Extenuating
Circumstances
The
University’s Extenuating Circumstances procedure is in place if there are
genuine circumstances that may prevent a student submitting an assessment. If
students are not 'fit to study’, they can either request an extension to the
submission deadline of 5 working days or they can request to submit the
assessment at the next opportunity (Defer).
In both instances students must submit an EC application with relevant
evidence. If accepted by the EC Panel
there will be no academic penalty for late submission or non-submission
dependent on what is requested. Students
are reminded that EC covers only short term issues (20 working days) and that
if they experience longer term matters that impact on learning then they must
contact the Student Hub for advice.
Please
find a link to the EC policy below:
Academic Misconduct
Any
submission must be students’ own work and, where facts or ideas have been used
from other sources, these sources must be appropriately referenced. The
University’s Academic Handbook includes the definitions of all practices that
will be deemed to constitute academic misconduct. Students should check this link before
submitting their work.
Procedures
relating to student academic misconduct are given below:
Ethics Policy
The work being carried out by students
must be in compliance with the Ethics Policy. Where there is an ethical issue,
as specified within the Ethics Policy, then students will need an ethics
release or an ethical approval prior to the start of the project.
The Ethics Policy is contained within
Section 2S of the Academic Handbook:
Grade marking
The University uses a letter grade
scale for the marking of assessments. Unless students have been specifically
informed otherwise their marked assignment will be awarded a letter grade. More
detailed information on grade marking and the grade scale can be found on the
portal and in the Student Handbook.
Guidance for online submission through Solent Online Learning (SOL)
http://learn.solent.ac.uk/onlinesubmission
Part
1 (70 Marks) Create an approach for network address implementation and testing
Research question (RQ1):
If layered network reference models are applied to
implementing the network of routers and switches and end devices does this
assist the network engineer?
Figure 1Venuestream Network
1.1 Perform a
literature search relating to the research question above (RQ1) and document
the results of your relevant literature in a bibliography.
1.2 Write a review of
the important literature you have identified in the literature search in 1.1.
1.3 Formulate an
approach for documenting, implementing and testing the network addressing of
the computer network in figure 1 show and describe this approach appropriately
in your assessment submission.
1.4 Rigorously justify
the use of this approach for implementing and testing the network addressing of
the computer network in figure 1 by writing a justification in the report.
According to the Cisco Netacad Introduction to
Networks module
· 3.2.4.1 The Benefits of Using a Layered
Model
The
benefits to using a layered network reference model to describe network
protocols and operations include:
- Assisting in protocol
design because protocols that operate at a specific layer have defined
information that they act upon and a defined interface to the layers above
and below.
- Fostering competition
because products from different vendors can work together.
- Preventing technology or
capability changes in one layer from affecting other layers above and
below.
- Providing a common
language to describe networking functions and capabilities.
Cisco do not provide any evidence in the form of
research with primary or reference to secondary data to justify these
statements in section 3.4.2.1 (Cisco Netacad).
Therefore you should identify quality literature
sources which include the topic of the main network reference models by
performing a literature search using the Solent Library and academic sources.
Specify and use a criterion to exclude sources which
are not relevant to the research question.
Write a literature review of up to 20 quality
literature sources of information you have found about network reference
models.
Reference the sources you have reviewed in a
bibliography using the Solent Harvard method of referencing.
Formulate an approach for implementing and testing the
network addressing of the computer network in figure 1. The approach may take
the form of an original diagram or table or narrative which you have created
yourself.
Describe, explain and justify this approach by analyzing
findings from the literature review performed.
Part 2 (30 marks) Complete the IPv6
Addressing of the Computer Network
For the network topology in figure 1 you must design
an IPv6 Addressing scheme and complete the documentation by completing the
following tables. The network is classed as one site and is allocated the
following IPv6 address Global Routing Prefix
2001:DB8:ACAD::/48
· 7.2.4.1 Structure of an IPv6 Global
Unicast Address (Cisco Netacad)
Figure 2 Structure of an IPv6 address
Your first task is to calculate and allocate 4 IPv6
subnets by appending a subnet ID to the Global Routing Prefix you have been
given and to document the IPv6 subnets in the table below
To calculate your first Subnet ID convert the last 4
Decimal numbers of your student number into a 4 digit hexadecimal number (16
bits) and use them as the 1st Subnet ID in the table in Figure 3
below
For example if your student number is 16777215 in decimal
The last 4 decimal digits are 7215
your subnet ID will be 1c2f in hexadecimal
Write Your Subnet ID in Hexadecimal ………………..
Allocate consecutive IPv6 Subnet IDs to the following
4 subnetworks for the HQ and Branch LANs starting at your calculated subnet ID
and incrementing each new subnet ID by 1 (adding 1).
Write all IPv6 addresses in the compressed format
following the rules to help reduce the notation.
· 7.2.2.2 Rule 1 – Omit Leading 0s
· 7.2.2.3 Rule 2 – Omit All 0 Segments
Hosts’ IPv6 addresses and Network Interfaces’ IPv6
interface IDs must be allocated using IEEE EUI-64 standard.
· 7.2.4.5 EUI-64 Process and Randomly
Generated
Choose
an appropriate prefix length for IEEE EUI-64
Subnet Description |
Subnet Id |
IPv6 Network
Prefix /Prefix Length |
HQ LAN1 |
|
|
HQ LAN 2 |
|
|
Branch IoT LAN |
|
|
Branch CCTV LAN |
|
|
Figure 3 IPv6 Subnet Addresses
Document the Global unicast IPv6 addresses to the network interfaces of the Router devices in the Interface
Address table in Figure 4 using the MAC addresses given in the table.
All IPv6 addresses
are configured as EUI-64 all addresses should be written in the
compressed format.
The following is an example of configuration of EUI-64
IPv6 addresses for subnet ID 0000 :
HQ(config-if)# interface g0/0
HQ(config-if)# ipv6 address 2001:db8:acad::/64
eui-64
Document the IPv6 Link Local addresses of the LAN
network Interfaces of the router devices by completing the table Link Local
address column.
All addresses should be written in the compressed
format.
Interface |
MAC Address |
Global IPv6 Address/Prefix Length |
Link Local Address |
|
HQ BR1 |
G0/0 |
0003.E498.9E01 |
|
|
G0/1 |
0003.E498.9E02 |
|
|
|
Branch |
G0/0 |
0001.632C.B901 |
|
|
BR2 |
G0/1 |
0001.632C.B902 |
|
|
Figure 4 IPv6 Interface address table
For end devices such as PCs and IOT devices, IPv6
addresses will be allocated automatically using IEEE EUI-64 standard.
Complete the Device address table in Figure 5 with
Device IPv6 Address and Address Prefix Length and Link Local address of the End
Devices using the MAC addresses given in the table. All IPv6 addresses should
be written in the compressed format.
End Device |
MAC Address |
IPv6 Device
Address /Prefix Length |
Link Local
Address |
HQ1 |
00D0.BCDD.315B |
|
|
HQ2 |
0060.473E.585C |
|
|
HQserver |
0060.47C8.7111 |
|
|
BR IoT Device |
00D0.58A6.7034 |
|
|
BR CCTV
Camera |
0060.5CDD.DE36 |
|
|
BRServer |
0030.A328:56A0 |
|
|
Figure 5 IPv6 Device Address Table
Grading Criteria
|
F3-F1 |
D3-D1 |
C3-C1 |
B3-B1 |
A4-A1 |
1.1 Perform
a literature search relating to the research question above (RQ1) and
document the results of your relevant literature in a bibliography. (15%) |
A literature
search marginally below the required minimum number of results ( < 5
) related to network reference models
displayed and referenced. The results are displayed incorrectly. Search terms
are not documented clearly |
A minimum
number of results ( >5 <10 )
from you search of literature related to network reference models some
are displayed and referenced correctly. The search terms could be improved. |
An
average number of results ( >10 < 15 )
from search of literature related to network reference models
displayed and referenced. Some are not documented clearly or are referenced
incorrectly. |
A
good number of relevant results ( >15 <17) from the search of literature related to
network reference models displayed and referenced. They are documented
clearly and referenced correctly. |
A large number of relevant results ( =>20
) from you search of literature
related to network reference models displayed and referenced. They are
documented clearly and referenced correctly. An innovative search method with excellent search
terms and informed by a literature search methodology. |
1.2 Write a review of the important literature you
have identified in the literature search (15%) |
Sources
are incorrectly described or summarised, there are mistakes in the narrative
Academic style in inappropriate |
Concisely
summarise 5-10 relevant sources from your literature, writing in an
appropriate academic style. |
Identifies
a range of relevant key themes, using appropriately cited sources, and using
to support analysis and conclusions. |
Systematically
analyses a wide range of appropriate sources, organising the findings to
identify patterns, analysing the sources to produce a rational for
application of the reference models. |
Develop a preliminary synthesis of findings to
interpret the application and effectiveness of network reference models. An interesting and inciteful narrative which
systematically analyses a wide range of appropriate sources, organising the
findings to identify patterns, analysing the sources to produce a rational
for application of the reference models. |
1.3 Formulate an approach for documenting,
implementing and testing the network addressing of the computer network (20%) |
No
design approach is described |
A
basic design approach is described with poor documentation. |
A design approach is documented clearly and
briefly described. |
Formulate
a computer network design approach with a preliminary synthesis of findings
from the studies identified in the literature review. |
A
model which clearly demonstrates the design approach for documenting
implementing and testing. Described or documented with a high academic and
professional standard. |
1.4 Rigorously justify the use of this approach for
implementing and testing the network addressing of the computer network (20%) |
Define
Computer Network Design No design approach is justified |
Justify
a network design approach by referencing one or two relevant quality sources
of information. |
Justify
a basic design approach by referencing a good selection of quality sources or
studies relevant to computer network reference models. |
Justify
a computer network design approach with a preliminary synthesis of findings
from the studies identified in the literature review. |
An
advanced design approach is justified by a narrative synthesis, the
robustness of the approach is assessed and fully evidenced by findings
identified from the studies in the literature review. |
2.1 Calculate and allocate IPv6 subnets by
appending a subnet ID to the Global Routing Prefix you have been given and to
document the IPv6 subnets in the table (10%) |
The
IP address table is complete but there are no correct addresses in the table
however there are possible IPv6 network addresses in the table. |
There
are errors in the network table which would stop the network from functioning
however there are many correct addresses, The IPv6 addresses are documented
correctly in compressed format |
The
IPv6 addresses are documented correctly in compressed format There are errors
in the network table which means the network would partially function correctly. |
A IP
network address table has errors however, the IPv6 addresses are documented
correctly in compressed format and the network would still function
correctly. |
The
IP network address table is correct, the IPv6 addresses are documented
correctly in compressed format and the IP networks would function correctly. The
IP network address table correct except minor errors, the IPv6 addresses are
documented correctly in compressed format and the networks would function
correctly. |
2.2 Document
the Global unicast IPv6 addresses to the network interfaces of the Router
devices in the Interface Address table(10%) |
A
Complete IP address table but there are no correct addresses in the table
however there are possible IPv6 network addresses in the network device interface
table. |
There
are errors in the Network device interface table which would stop the devices
from functioning however there are many correct addresses, The IPv6 addresses
are documented correctly in compressed format |
Correctly
documented IPv6 addresses are in compressed format There are errors in the network
device table which means the network would partially function correctly. |
IP
network interface address table with errors however, the IPv6 addresses are
documented correctly in compressed format and the network would still
function correctly. |
Correct
IP network interface address table, the IPv6 addresses are documented
correctly in compressed format and the IP devices would function correctly. The
IP network device interface address
table is correct except one minor error, the IPv6 addresses are documented
correctly in compressed format and the networks would function correctly. |
2.3 Complete the Device address table with Device
IPv6 Addresses and Address Prefix Length and Link Local address of the End
Devices (10%) |
A
Complete IP address table but there are no correct addresses in the table
however there are possible IPv6 network addresses in the end device table. |
There
are errors in the end device table which would stop the devices from
functioning however there are many correct addresses, The IPv6 addresses are
documented correctly in compressed format |
Correctly
documented IPv6 addresses are in compressed format There are errors in the end
device table which means the network would partially function correctly. |
IP end
device address table with errors however, the IPv6 addresses are documented
correctly in compressed format and the network would still function
correctly. |
Correct
IP end device address table, the IPv6 addresses are documented correctly in
compressed format and the IP devices would function correctly. The IP end device address table is correct except
one minor error, the IPv6 addresses are documented correctly in compressed
format and the networks would function correctly. |
Report (50% of unit mark) Marking scheme
0 comments:
Post a Comment