0% found this document useful (0 votes)
127 views8 pages

Project Cover Sheet-CSF 4203 Project (25%) : Higher Colleges of Technology

This document outlines a project for designing a telecommunications network and security system for a client company with multiple locations. Students must propose a design connecting at least 3 sites using technologies like Frame Relay and VPN. The design must incorporate security controls such as firewalls, authentication, and syslog/NTP. Students will submit a project report documenting the requirements, proposed topology, and security implementation, as well as a Packet Tracer file demonstrating the designed network. An oral defense will also be required to explain the solution and demonstrate knowledge of the technologies used.

Uploaded by

engrrhasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views8 pages

Project Cover Sheet-CSF 4203 Project (25%) : Higher Colleges of Technology

This document outlines a project for designing a telecommunications network and security system for a client company with multiple locations. Students must propose a design connecting at least 3 sites using technologies like Frame Relay and VPN. The design must incorporate security controls such as firewalls, authentication, and syslog/NTP. Students will submit a project report documenting the requirements, proposed topology, and security implementation, as well as a Packet Tracer file demonstrating the designed network. An oral defense will also be required to explain the solution and demonstrate knowledge of the technologies used.

Uploaded by

engrrhasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

HIGHER COLLEGES OF TECHNOLOGY

Project Cover Sheet- CSF 4203 Project [25%]


Course Name CSF 4203 Faculty Name Dr. Mohammed Saleh

Project Title Telecommunications and Due Date Week 13


WAN Security

Section/Semester Date Submitted

Student Name 1. Student ID 1.


2. 2.
3 3
4 4
5 5

This assessment will assess the following Learning outcomes:

Declaration; Individual:
 No part of this assignment has been copied from another source, (not from another group or student, an
internet source or a book)
 When another person’s words are used, this is shown in the text with “…” and referenced.
 No part of this assignment has been written for me by any other person.
 I have a copy of this assignment that I can produce if the first copy is lost or damaged.

Name …………………………………………… Signature ………………………………………

Declaration; Group:
 No part of this assignment has been copied from another source, (not from another group or student, an
internet source or a book)
 When another person’s words are used, this is shown in the text with “…” and referenced.
 No part of this assignment has been written by anyone other than the members of the group named below.
 We have a copy of this assignment that we can produce if the first copy is lost or damaged.
Names and Signatures :

Name 1……………………………………………………… Signature …………………………………

Name 2……………………………………………………… Signature …………………………………

Name 3……………………………………………………… Signature …………………………………


Name 4……………………………………………………… Signature …………………………………

Name 5……………………………………………………… Signature …………………………………

N.B. The marker may choose not to mark this assignment if the above declaration is not signed.

 If the declaration is found to be false, appropriate action will be taken.


 Plagiarism is copying and handing in someone’s work as your own. Any student found guilty of this type of
cheating will be dismissed from the college.

Received By……………………………………………… Date ……………………………


201920 CSF 4203 Project

Introduction
You are part of a telecommunication company that provides network and
security solutions. You have been called by a client to plan and design the
network system and the needed security controls for the company. The idea of
this project is to create a full connectivity network infrastructure across
multiple locations. Your job is to propose and design an integrated solution
based on the following requirement.

The Network Requirements


The client is a UAE based company that has different and remote locations.
During the network design, the team should take into consideration the
following networking techniques that may be used all or be used partially
according to the company size and requirements:
 At least 3 different sites (in different cities or countries). You can propose
more location. However, you must be sure that all of them are connected
in one network.
 Frame Relay networking between sites.
 PPP Networking between sites.

In the other side, and regardless of the company size all companies require high
level of security to be achieved. Here are the set of security techniques that you
must use in the design and implementation of the company network:
 PPP with Authentication between any two sites.
 Firewall Server.
 Syslog and NTP.
 VPN technology (Site-to-Site VNP).

The aforementioned techniques are mandatory to be used in the design and


implementation of the network security as part of the project.
Moreover, the students may use more security techniques, such as
implementing AAA server or deploying Intrusion Detection System (IDS) for
securing the company network. This will be considered as bonus and the
students will have additional marks during grading.

P a g e | 2 of 8
201920 CSF 4203 Project

The Deliverables
This is a team project with the following deliverables:
 The Project Design and Document (25%)
 The Project Solution –Packet Tracer File (25%)
 The Project Demo and Oral Defence (50%)

The Project Design and Document (25 marks)


In order to have a consistent and robust documentation for the project. The
team should create a document report that includes:
Introduction: Write a 150-word introduction that provides a technical but
brief overview of the project.
The Client: Write a 150-word description of an actual or a fictitious company
with focus on their IT infrastructure and networking needs.
Requirements and Constraints: This is the main body of your project
document. Client requirements and constraints are WAN and Security
technologies (Site-to-Site VPN, AAA, Frame Relay, Firewall & PPP). Discuss
each topic by stating how the technology applies to your client (why should
they implement it?), and then a brief (100-150 words) but clear and technical
description of the technology. This is based on research so cite articles and
journals.

In the same project document, add the following sections as part of the
design you are proposing:
Network Topology: Provide a clear network topology/map with description of
each network device and what technology is used on that device.
Addressing Table(s): Provide an addressing table with interfaces, IP
addresses, subnet masks, gateways, etc.
WAN Security: Describe how security controls specified (such as Site-to-Site
VPN, Firewall, AAA) were applied on the different components of the WAN.
What is being protected and how. Be sure that these security controls satisfy
the requirements and constrains mentioned in the previous section.
Assumptions and Limitations: A brief discussion of your assumptions and
design limitations.

Important Notes for better design and documentation:

P a g e | 3 of 8
201920 CSF 4203 Project

 Your research topics should include all elements listed in the Network
Requirements section above.
 Use APA style formatti ng.
 You should include a references page and in-text citation.
 You may cite the course and the textbook but it’s not enough. The
textbook/course should be accompanied by another reference.

The Project Solution (25 marks)


The proposed design must be implemented using Packet Tracer.
The Packet Tracer File: You must submit a Packet Tracer file with the
proposed design fully implemented and configured to Bb Learn site.

Important Notes:
 Ensure that all components are working
 Ensure you’re using a recent version of Packet Tracer

The Project Demo and Oral Defense (50 marks)


Each team is required to demo their solution highlighting the technology
implemented and configuration details.

Important Notes:
 Students will be assessed individually on their knowledge of the design
and the solution

Deadline Week 14, Tuesday, April 27, 2020

Submission Requirements
 Submit before midnight
 You must submit one folder (zipped) with all files to Bb Learn site.
 Your folder must contain two files
o One project report
o One Packet Tracer file
 Your zipped folder should be named as per names of team members

P a g e | 4 of 8
201920 CSF 4203 Project

o Example: Mohamad-Ismail-Salem
 Each file in the folder must also have the same naming format:
o Example: name-name-name
 Your project report should include a cover page sheet must also have the
same naming format:
o Example: name-name-name

Project Marking Rubric

P a g e | 5 of 8
201920 CSF 4203 Project

Project Document & Demo. Articulates requirements and


constraints technologies based on research (descriptive) and
1 application (analytical and evaluative). There is strong
synergy between the body of knowledge and client
requirements and constraints.
0 1 2 3
Absent EMERGING COMPETENT MASTERING

Introduction Provides a technical but brief overview of the project.


Score Too brief and does Good introduction Provided a brief
not clearly that is both clear but clear analysis
articulate what the and technical. in terms of the
3 project is all about. need for such
projects with
appropriate
references.

The Client A description of the client with focus on their IT infrastructure


and networking needs.
Score Not enough Clear emphasis on Successfully and
emphasis on IT IT infrastructure clearly linked
infrastructure and and networking client’s needs to
2 networking needs. needs. the technology
discussed in the
introduction.

Requirements A discussion of project technologies as client’s requirements


and and constraints.
Constraints
Score Some technologies A proper discussion Other than the
are not discussed, includes the WHAT required
or the discussion is and the WHY with technologies,
too brief and the use of additional
10
minor inaccuracies references. technologies and
exist. solutions are
introduced.

P a g e | 6 of 8
201920 CSF 4203 Project

Project Design. Provides an effective solution that fit the


2 client’s requirements and constraints. The design is effective
and is clearly presented and explained.
0 1 2 3 4 5
Absent EMERGING COMPETENT MASTERING

Topology Provides a clear network topology/map with description of


each network device and what technology is used on that
device.
Score Proposed solution Effective and Assumptions,
is not clear or complete design limitations, and
incomplete. that is clearly justifications are
articulated and included as part of
10
explained. the solution.

Addressing An addressing table with interfaces, IP addresses, subnet


masks, gateways, etc..
Score Incomplete or has Complete but has Complete and error
3 errors or more. errors (<3). free.

5
WAN Security A description of how security was applied on the different
components of the WAN.
Score Incomplete A description of Additional analysis
description or what is being of risks of
elements of protected and how. successful exploits.
ambiguity exist.
5
Project Solution. Provides an implemented solution in the
3 form of a Packet Tracer file.
0 1 2 3 4 5
Absent EMERGING COMPETENT MASTERING

PT Solution 1 mark is deducted for incomplete items or errors.


Score Number of errors: Number of errors: Complete and error
free.

15

P a g e | 7 of 8
201920 CSF 4203 Project

Project Demo & Discussion. The group will demo the solution
and describe different parts of the WAN and its components.
4 However, students will be marked individually and will be
assessed on their knowledge based on 4 questions for each.
Students should be competent in all aspects of the solution.
0 1 2 3 4 5
Absent EMERGING COMPETENT MASTERING

Student 1 Name:
Score Remarks: Remarks: Remarks:

50

Student 2 Name:
Score Remarks: Remarks: Remarks:

50

Student 3 Name:
Score Remarks: Remarks: Remarks:

50

P a g e | 8 of 8

You might also like