0% found this document useful (0 votes)
41 views

Computer Networks Help Spring - Winter 2022

This document provides guidance for a network design assignment. It outlines 6 tasks: 1) describing a business and its network needs, 2) planning a logical topology, 3) securing the network, 4) designing the network diagram, 5) choosing a network operating system, and 6) providing a network recommendation. The tasks include identifying real-world communication protocols and OSI layers, designing logical and physical network topologies, addressing security threats, and selecting hardware and software components like firewalls, switches, and proprietary or open-source network operating systems. The recommendation summarizes the network design, hardware/software costs, security aspects, remote access solutions, and impacts of implementing voice over IP (VOIP).

Uploaded by

Edwin Gideon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

Computer Networks Help Spring - Winter 2022

This document provides guidance for a network design assignment. It outlines 6 tasks: 1) describing a business and its network needs, 2) planning a logical topology, 3) securing the network, 4) designing the network diagram, 5) choosing a network operating system, and 6) providing a network recommendation. The tasks include identifying real-world communication protocols and OSI layers, designing logical and physical network topologies, addressing security threats, and selecting hardware and software components like firewalls, switches, and proprietary or open-source network operating systems. The recommendation summarizes the network design, hardware/software costs, security aspects, remote access solutions, and impacts of implementing voice over IP (VOIP).

Uploaded by

Edwin Gideon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Computer Networks

Assignment title:
SME Network Design Spring – Winter 2022
Assignment Help Document
Task 1 – Business Communication – 20 Marks – 600 words
a) Identify a business of your choice and briefly discuss your choice.
Describe a business in any of the following categories: retail, manufacturing, hospitality, health and
education. Write about the organization, when it started, what is does, the number of employees, their
customer base, the types of information systems and technology they use. And finally the various uses
they have for their network.

b) Discuss the network requirements of your chosen business.


Based on your selection of business sector discuss their general network requirements e.g. expected
network hardware setup. If employees work at a central office, your network will consist of a server
surrounded by a LAN, either wired or Wi-Fi. You will need a connection to the internet with protective
devices that surround your network.
c) Identify FOUR (4) real world uses of how they may use technology to communicate within their business.
Social Media Platforms, Blogs, Vlogs, Live Video, Conferencing Technology, Group Wikis, Group Forums,
Collaborative Documents, Podcasts, Wearable Technology, Smart Speakers, Web Chat, Email

i) For each of the FOUR (4) real world communications you provide you need to also explain which protocol
is likely used.
Example: Email = SMTP IMAP POP3
ii) For each protocol you must identify the OSI layer this protocol operates within and provide an
explanation for each unique OSI layer identified.
SMTP is an application layer protocol (layer 7).
Explanation of the layer
The application layer is used by end-user software such as web browsers and email clients. It provides
protocols that allow software to send and receive information and present meaningful data to users. A
few examples of application layer protocols are the Hypertext Transfer Protocol (HTTP), File Transfer
Protocol (FTP), Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain Name
System (DNS).
Computer Networks
Assignment title:
SME Network Design Spring – Winter 2022
Assignment Help Document

Task 2 – Planning a Network – 10 Marks – 300 words


Explain the term logical topology. Identify, illustrate and justify the most suitable logical network topology for
your selected business. Make clear where wireless technologies can be used with an explanation of TWO (2)
wireless standards that would allow fast and reliable networking capability.
a) Explain the term logical topology.
You need to explain the term Logical Topology
b) Using the business selected in Task 1, identify, illustrate and justify which logical topology would
likely be used.
In relation to Task 1, kindly identify (in words), Illustrate (in diagram) and justify which logical
topology would likely be used.
c) In your topology make clear where wireless technology could be used
You need to reproduce the diagram to indicate which section you would place your wireless network.
d) Explain TWO (2) wireless standards that would allow fast and reliable networking capability.
Computer Networks
Assignment title:
SME Network Design Spring – Winter 2022
Assignment Help Document

Task 3 – Secure the Network – 15 Marks – 450 words


Describe TWO (2) types of firewall and explain THREE (3) common network threats identifying an effective
countermeasure for each threat.

Explain the function of a VPN with discussion of how it might be used to secure network communications. Discuss
advantages and disadvantages with relevant example use cases to support your answer.

 Describe TWO (2) types of firewall.


Describe the types of firewall. Topic 9 Slide 20 can help significantly
 Explain THREE (3) common network threats and identify an effective countermeasure for each threat.
You are to explain the 3 common network threats and identify an effective countermeasure for each threat.
Topic 8 from slide 10 has all the information you need
 Explain the function of a VPN and its use in secure network communications.
Topic 12 has all the information you need to complete this section of the assignment.
 Discuss advantages and disadvantages of VPN with relevant examples of use cases to support your answer.
Produce some advantages and disadvantages of VPN with relevant examples of use cases to support your
answer. The example should describe how your stated organization may need to use VPN.

Task 4 – Design the Network – 20 Marks – 600 words


To help businesses understand what a ‘good’ network looks like, draw a logical network diagram to illustrate a typical
network design for your chosen business sector.

Within the design you must:

 Clearly label each component in your diagram.


You are to draw the logical diagram of the network and label it just like the diagram below:

 Allocate a suitable IPv4 based IP address scheme (IP Address & Subnet mask) to allow up to TWO-HUNDRED
(200) users and devices to connect to the network using a single subnet. You must justify your scheme.
Allocate IP addresses to all the computers
You must you must reproduce the diagram and this time you need to add the IP address and the subnet mask
just like the diagram below
Computer Networks
Assignment title:
SME Network Design Spring – Winter 2022
Assignment Help Document

 Discuss the best choice of physical cabling to be used to for cheap and reliable fast network connections that
are easy to use.
What kind of cables will you recommend for the network? Please note it need to be cheap but it must be UTP
 Select and discuss what hardware would be needed to allow employees to connect their BYOD devices to the
network. Discuss any concerns you may have about allowing employees to connect their own devices to a
business network.
What network equipments will be needed to allow employees to connect their mobile devices to the
network. Hint: wireless router and VPN.
 Explain the protocol that enables devices to obtain an IP address automatically when connecting to the
network.
What protocol enables us to automatically obtain IP addresses on our network. Explain the protocol and it’s
functions.
Computer Networks
Assignment title:
SME Network Design Spring – Winter 2022
Assignment Help Document

Task 5 – Network Operating Systems – 15 Marks – 450 words


Research modern, common Network Operating Systems (NOS) and identify a proprietary OS and an
open-source OS.
In addition, you must state FOUR (4) general features of NOS and for each NOS you must provide
advantages and disadvantages of each, providing a conclusion justifying your overall choice of NOS
that would be suitable for the network designed in Task 4.
 Research and identify ONE (1) proprietary NOS and ONE (1) open-source NOS.
Identify the ONE (1) proprietary NOS and ONE (1) open-source NOS (Network Operating
System) Lecture 10 should help
 State FOUR (4) features of a NOS.
Lecture 10 should help
 For each NOS you identified in Task 5a), provide its advantages and disadvantages.
Provide the advantages and disadvantages of the NOS you have identified in 5A
 State which NOS would be suitable for the network designed in Task 4. Justify your answer.

Please indicate which NOS would be suitable for the network designed in Task 4 with
Justification.
Computer Networks
Assignment title:
SME Network Design Spring – Winter 2022
Assignment Help Document

Task 6 – Network Recommendation – 20 Marks – 600 words


Using information produced for the earlier tasks, make a recommendation by summarising:
 The type of network suitable for your chosen business sector explaining how scalability for
growth has been considered.
What kind of network will be suitable for your network? How have you included scalability for
growth in your network? How have you made room for future expansion?
 List of the hardware with acknowledgement of how it will be connected to the network and
software required for desktops / servers etc, research and provide estimated costs.
List all the hardware used in your network and describe how they will be connected to your
network. E.g. switches, desktop computers, laptops……………
What kind of software will be needed on the desktop / servers on your network?
Provide cost estimate of the hardware and software required for your network.
 FOUR (4) key aspects of your design that will secure the network from common threats.
State four key aspect of your network that will secure the network from any kind of attack.
E.g. Firewall
 How a VPN solution could be implemented into the network for remote working?
How will you setup a VPN for remote Working? HINT E.g. will you use hardware or software
VPN?

 How a VOIP solution could impact network design if required for the network and explain
why VOIP uses UDP instead of TCP.
What are some of the impact of implementing a VOIP solution on your Network?

You might also like