0% found this document useful (0 votes)
82 views4 pages

Networks 511 Assignment

Uploaded by

lwanelemayimele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views4 pages

Networks 511 Assignment

Uploaded by

lwanelemayimele
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

FACULTY OF INFORMATION TECHNOLOGY

NETWORKS 511 ASSIGNMENT

Name & Surname: _ ICAS / ITS No:

Qualification: Semester: Module Name:

Date Submitted:

ASSESSMENT CRITERIA MARK EXAMINER MODERATOR


ALLOCATION MARKS MARKS

MARKS FOR CONTENT


QUESTION ONE 30
QUESTION TWO 30
QUESTION THREE 30
TOTAL 90
MARKS FOR TECHNICAL ASPECTS
TABLE OF CONTENTS 2
Accurate numbering according to the numbering
in text and page numbers.
CODE 5
Program text indentation
Use of constant, variable and structure names
Comments
REFERENCES 3
According to the Harvard Method
TOTAL 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:

Moderator’s Comments:

Signature of Examiner: Signature of Moderator:


Assignment Instructions

1. All assignment must be typed, not handwritten.


2. Every assignment should include the cover page, table of contents and a reference list or
bibliography at the end of the document
3. A minimum of five current sources (references) should be used in all assignments and these
should reflect in both in-text citations as well as the reference list or bibliography
4. In-text citations and a reference list or bibliography must be provided. Use the Harvard Style for
both in-text citations and the reference list or bibliography
5. Assignments submitted without citations and accompanying reference lists will be penalized.
6. Students are not allowed to share assignments with fellow students. Any shared assignments will
attract stiff penalties.
7. The use of, and copying of content from websites such as chegg.com, studocu.com,
transtutors.com, sparknotes.com or any other assignment-assistance websites is strictly
prohibited. This also applies to Wiki sites, blogs and YouTube.
8. Any pictures and diagrams used in the Assignment should be properly labelled and referenced.
9. Correct formatting as indicated on the Cover Page should be followed (font-size 12, font-style
Calibri, line spacing of 1.0 and margins justified).
10. All Assignments must be saved in PDF using the correct naming-convention before uploading on
Moodle. E.g. StudentNumber_CourseCode_Assignment (402999999_WBT512A_Assignment).
11. For Programming modules, paste the screenshot of the output. Below this
screenshot, paste all the code for that particular question.
Question One [30 Marks]
1.1 Richfield is opening a new branch office, and you are tasked with designing the network
infrastructure. Outline the key considerations, such as topology, equipment, and security
measures, for this new office. (15 Marks)

1.2 A network backbone refers to the primary infrastructure that interconnects various smaller
networks within an organization or between different locations. It serves as the main pathway
for data traffic, connecting different network segments and ensuring the overall integrity and
efficiency of the network. The backbone is crucial for facilitating communication and data
exchange between devices, subnetworks, and the broader internet. What are some key
aspects of a network backbone? (15 Marks)

Question Two [30 Marks]


2.1.1 Richfield is experiencing intermittent network connectivity. Users report that sometimes
they can access resources, while other times they cannot. How would you approach this issue
using the OSI model? (5)
2.1.2 Mr. John and his Team are experiencing a security breach, and unauthorized access to
sensitive data is suspected. Explain how you would use the OSI model to identify and mitigate the
security breach. (5)
2.1.3 A multinational corporation with offices in different continents is experiencing significant
latency in communication between its branches. How would you use the OSI model to diagnose
and address the latency issues? (5)
2.2 Users in a corporate network are complaining about slow internet speeds and difficulty
accessing external websites. The network administrator suspects there may be an issue with the
TCP/IP configuration. Describe how you would approach troubleshooting this problem and
identify potential solutions. (15)

Question Three [30 Marks]


3.1 A medium-sized company is expanding its office space and needs to upgrade its network
infrastructure to accommodate the increased number of employees and devices. The IT team is
considering the deployment of Ethernet technology. Discuss the key Ethernet specifications and
considerations that the team should take into account when planning the network upgrade.
Address aspects such as data transfer speed, cable types, and potential challenges. (10)
3.2. Network connecting devices play a crucial role in facilitating communication and data transfer
within computer networks. Demonstrate your understanding by answering the following
questions.
3.2.1 A hotel is planning to provide wireless internet access to guests in its lobby and rooms.
Design a strategy for placing wireless access points to ensure optimal coverage, considering
potential interference and security considerations. (5)
3.2.2 A company is setting up a new branch office and needs to establish a connection with the
main office. Describe the configuration steps and considerations involved in setting up a router to
connect the branch office to the main office network securely. (5)
3.2.3 A hotel is planning to provide wireless internet access to guests in its lobby and rooms.
Design a strategy for placing wireless access points to ensure optimal coverage, taking into
account potential interference and security considerations. (5)
3.2.4 A medium-sized business wants to enhance its network security by implementing firewalls.
Outline the steps involved in configuring a firewall to protect against unauthorized access and
potential cyber threats. (5)

***THE END***

You might also like