0% found this document useful (0 votes)
73 views12 pages

COMP1609 Coursework 6/12/24

i need a solution to this asap

Uploaded by

Wajiha Haris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views12 pages

COMP1609 Coursework 6/12/24

i need a solution to this asap

Uploaded by

Wajiha Haris
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

COMP1609 (24/25) Network and Internet Faculty Header ID: Contribution:

Technology 32017 100% of the course


and Design
Course Leader: Tetcos NetSim Deadline Date:
Jason Parke Coursework Monday 06/12/2024

This coursework should take an average student who is up to date with tutorial work
approximately 50 hours Feedback and grades are normally made available within 15 working days
of the coursework deadline.

Learning Outcomes:
A. Demonstrate knowledge of network communication, OSI and TCP/IP model.
B. Demonstrate a critical understanding of the top network model with related key protocols,
services, and applications.
C. Evaluate common network problems (malfunction, poor performance), and adopt a systematic
approach to troubleshooting and resolving the problem.
D. Be competent in the use of tools designed to analyse and simulate network functionality.

Plagiarism is presenting somebody else's work as your own. It includes copying information
directly from the Web or books without referencing the material; submitting joint coursework
as an individual effort; copying another student's coursework; stealing coursework from
another student and submitting it as your work. Suspected plagiarism will be investigated and,
if found to have occurred, will be dealt with according to the university's procedures. Please see
your student handbook for further details of what is/isn't plagiarism.

All material copied or amended from any source (e.g., internet, books) must be referenced
correctly according to the reference style you are using.

Your work will be submitted for plagiarism checking. Any attempt to bypass our plagiarism
detection systems will be treated as a severe Assessment Offence.

1
Coursework Submission Requirements

An electronic copy of your work for this coursework must be fully uploaded by the Deadline Date of
Monday 06/12/2024 using the link on the coursework Moodle page for COMP1609.

For this coursework, you must submit a single PDF document. In general, any text in the document
must not be an image (i.e., must not be scanned) and would normally be generated from other
documents (e.g., MS Office using "Save As. PDF"). An exception to this is the handwritten
mathematical notation (e.g., subnetting), but when scanning does ensure the file size is not
excessive.

There are limits on the file size (see the relevant course Moodle page).

Make sure that any files you upload are virus-free and not protected by a password or corrupted
otherwise they will be treated as null submissions.

Your work will not be printed in colour. Please ensure that any pages with colour are acceptable
when printed in Black and White.

You must NOT submit a paper copy of this coursework.

All coursework must be submitted as above. Under no circumstances can they be accepted by
academic staff.

The University website has details of the current Coursework Regulations, including details of
penalties for late submission, procedures for Extenuating Circumstances, and penalties for
Assessment Offences. See https://docs.gre.ac.uk/rep/sas/academic-misconduct-policy-and-
procedure-taught-awards

2
The coursework detailed specification:

This is an individual assessment. Your investigation should not be shared among other students.

The objective of the coursework is to simulate a client-server model communication over an IP


network and to investigate an application and network performance in multiple provided scenarios.

This assessment requires to use Tetcos NetSim simulator.

The network architecture overview:

The company’s headquarters are in Johannesburg (South Africa). They have recently opened
regional offices in Tokyo (Japan) and Sao Paulo (Brazil). The main service provided by the Tokyo and
Sao Paulo offices will be gathered and distributed monthly and annual reports describing sales
managed by the headquarters in Johannesburg (South Africa). The company has decided to perform
a simulation to investigate the feasibility of expanding to an additional call centre.

Johannesburg (South Africa) LAN: The network is undefined and needs to be designed by the
student with justifications, this implies justification of several nodes, users, and applications.

Tokyo (Japan) LAN: This site consists of 5 users connected to a core switch, Local printer, and email.
They are connected to the Internet via a backbone link. Some applications, run by users including
printers and databases, are local and others like web browsing and MS OneDrive are supported
including remote desktops, in Johannesburg. Additionally, 10 users work from home using MS Teams
and Zoom with all supported services.

Sao Paulo (Brazil) Office LAN: This site consists of 5 users connected to a core switch, Local printer,
and email. They are connected to the Internet via a backbone link. Some applications, run by users
including printers and databases, are local and others like web browsing and MS OneDrive are
supported remotely, in Johannesburg. Additionally, 5 users work from home using MS Teams and
Zoom for voice and video calls.

Network Operations Centre (NOC): This site consists of 5 users connected to a core switch, Local
printer, and email. They are connected to the Internet via a backbone link. Some applications run by
users including printers and databases are local and others like web browsing and MS OneDrive are
supported remotely, in Johannesburg. All users run MS Teams and Zoom conferencing applications
with Sao Paulo Office.

3
The tasks:

The objective is to perform group literature research, individually build a Tetcos NetSim simulation
model based on the network architecture given and evaluate the behaviour of network parameters
gained by simulating the use cases. The design, implementation and simulation discussion imply the
inclusion of graphs and justification of made decisions or the results achieved through the
simulation.

The tasks:

1. The objective is to perform group literature research.


Perform literature research on the technologies that are used in a modern network.
CHOOSE 3 from the following list of network technologies: -
i. 5G and WiFi 6 technology
ii. Artificial Intelligence (AI) and Machine Learning (ML)
iii. Augmented reality and virtual reality
iv. Cloud computing
v. DevOps
vi. Digital transformation
vii. Intent-based networking (IBN)
viii. Internet of Things (IoT)
ix. Data Security
x. SD-WAN
There are multiple providers of such services, some examples, are Amazon AWS,
CrowdStrike and CISCO (BUT NOT LIMITED TO). Critically discuss these technologies
concerning the scalability and transparency of communication, providing examples. Identify
two or more commercial risks arising due to the failure of such cloud services. The discussion
should be documented and should be approximately 700 words. The group should consist of
two roles:
Risk assessor: The risk assessor evaluates the potential threats.
Upgrade engineer: The upgrade engineer must review the technologies from a benefit point
of view. [GROUP TASK] 10%

2. Design, implement and simulate your model in the Tetcos NETSIM simulator guided by the
given network architecture overview. The design requires detailed documentation on the
application and performance settings in the Tetcos NETSIM simulator for each user and
these settings justifications. Following the implementation, you are required to simulate
your scenario. [INDIVIDUAL TASK] 15%

3. The documentation must contain a table of your subnetting schemes for each
LAN/WAN/MAN. Note: You should configure Tetcos NetSim to use these subnets and show
evidence of this. You must provide the following: Network Address, Broadcast Address,
Usable Addresses, and IP Address assignments to hosts. You must use at least two classes
from the Private Address Space. [INDIVIDUAL TASK] 15%

4
4. Conduct an analysis of the behaviour of the network performance in a variety of cases. The
analysis must be done regarding your expectations. Discuss the scenario and hypothesize on
the possible outcomes of provided use cases followed by the analysis of the results that
were received from the simulation.
[INDIVIDUAL TASK] 20%

5. For additional marks include analysis on each of the following


[INDIVIDUAL TASK] 20%:

i. Utilization of the backbone link.


ii. Cloud Storage (OneDrive) average file download time
iii. Web Server page response time.
iv. The behaviour of MS Teams/Zoom applications.
v. Ethernet delay on the network (bottlenecks)

6. Simulate the following expansion use case: The new NOC will communicate with the Tokyo
and Sao Paulo offices. It is planned that 4 new users will communicate with the Sao Paulo
office and 3 new users will communicate with the Tokyo office. All offices will communicate
via MS Teams or Zoom. Investigate the behaviour of the MS Teams vs Zoom in the given
scenario. [INDIVIDUAL TASK] 5%

7. Evaluate the network performance, where you introduce improvements based on what you
have identified.
[INDIVIDUAL TASK] 5%

8. Provide a critical reflection on the tasks you carried out.


[INDIVIDUAL TASK] 5%

9. The document must include your concluding comments.


[INDIVIDUAL TASK] 5%

5
Note:

Perform the analysis of the results starting from the first minute. This should be done, to reduce
the noise from the data caused by the initialization of network devices such as routers and
switches which may have an impact on your investigation.

The group assessment should be completed in pairs and must include the following: -

1. You must provide the names of all participants who contributed to the group work.
2. Your submission must include exact copies of the group work.

6
Deliverables (No more than 2000 words):

A good structure report must include the following:

• A literature review on the technologies used in a provided network architecture and the
benefits of using cloud services. Refer to Task 1.
• Description of the designed and implemented scenarios, including the justifications for the
design and choice of performance parameters. Refer to Task 2.
• Documentation on the investigation of required features and use cases, including graphs and
analysis of the results of the simulation. Refer to Tasks 3, 4, and 5 and the subcategories.
• Based on the results; recommend your choice of consideration to improve the network
model. Refer to Task 7
• A critical reflection that is both evaluative and reflective. Refer to Task 8.
• Concluding comments. Refer to Task 9.

Assessment Criteria:

A. Review of technologies and cloud services discussion. (Task 1) 10%


B. Justified design and simulation of the network architecture and application models. 15%
(Task 2)
C. A neatly presented subnetwork scheme (Task 3) 15%
D. Investigation and analysis of the results. (Task 4 + Task 5) 40%
E. Expansion use case investigation (Task 6) 5%
F. Recommendation(s) of your choice for improvement of network architecture. 5%
(Task 7)
G. Critical reflection (Task 8) 5%
H. Conclusion (Task 9) 5%

7
>80% Excellent

Evidence of in-depth understanding, detailed investigation and analytical explanation of the results,
critical and evaluative conclusion. The analysis must include a graphical representation of the results
and any relevant network diagrams and identification of trends in the data. All sections were
completed to an excellent standard.

70-79% Very Good

Evidence of clear understanding, good analysis of the results and some critical and justified evaluation
in the conclusion. The analysis must include a graphical representation of the results and any relevant
network diagrams and identification of trends in the data. All sections are completed to a consistently
good standard.

60-69% Good

Evidence of an understanding of the networking fundamentals, some results attained and presented.
Correct but not incredibly detailed analysis, limited evaluation (but there must be some), all sections
attempted and provided.

50-59% Satisfactory

Limited data samples and results, shallow analysis, or evaluation. Some essential elements may be
missing. The provided documentation must be correct. Conclusions must be included and must be
justifiable.

<49% Fail

A poorly written report without structure. The essential elements are missing, insufficient data
samples. Little or no evidence of having devised or conducted research and experiments. Little
evidence of understanding, poor or incorrect analysis or the conclusion.

8
Criteria for 90-100 80-89 70-79 60-69 50-59 30-49 0-29
Assessment Exceptional Excellent Very Good Good Satisfactory Fail Fail
Assessment Demonstrates an Demonstrates an Demonstrates a Demonstrates There is There is a lack There is hardly
Domain 1 exceptional excellent very good overall a good satisfactory of any engagement
(Knowledge) systematic systematic understanding of understanding of evidence that understandin with relevant
Demonstrate a understanding of understanding of Network and Network and at least some g of Network technologies,
critical Network and Network and Internet Internet Network and and Internet technical
understanding of Internet Internet Technology and Technology and Internet Technology challenges, and
the technical Technology and Technology and Design and their Design and their Technology and Design best practices.
challenges posed Design and their Design and their technical technical and Design and their The choice of
by current mobile technical technical challenges. There challenges. There practices have technical the research
systems and challenges. The challenges. The is evidence that is some evidence been applied challenges. problem is not
wireless motivation and motivation and relevant theory that relevant and supported The choice of based on
communications. rationale of a rationale of a and best theory and best by the the research engagement
chosen area is chosen area are practices have practices have literature. problem lacks with the
underpinned by underpinned by been applied been applied justifications literature.
an exceptional an excellent effectively in the effectively in the and is not
understanding of understanding of choice of area, choice of area, supported by
relevant theory relevant theory and there is and there is some the literature.
and best and best engagement with engagement with
practices and practices and the literature. the literature.
engagement with engagement with
the literature. the literature.

Assessment The assignment The assignment The assignment The assignment There is some There is a lack There is hardly
Domain 2 provides provides provides very provides some evidence that of any engagement
(Research) exceptionally excellent good evidence of good evidence of at least some understandin with
Be able to strong and evidence of critical evaluation critical evaluation of the security g of the understanding
understand and consistent critical evaluation when considering when considering aspects of the security the security
evaluate the key evidence of when considering the security the security chosen aspects of the aspects of the
security threats critical evaluation the security vulnerability or vulnerability or configuration chosen chosen
that relate to when considering vulnerability or vulnerabilities of vulnerabilities of have been configuration. configuration.
different. the security vulnerabilities of the chosen the chosen considered. No evidence No evidence of

9
Network and vulnerability or the chosen configuration and configuration and The of supporting supporting
Internet vulnerabilities of configuration and the appropriate the appropriate understanding literature. literature.
Technology and the chosen the appropriate countermeasures countermeasures is supported
Design, as well as configuration and countermeasures . The . The by some
appropriate the appropriate . The understanding is understanding is literature.
countermeasures countermeasures understanding is supported by the supported by
. . The supported by appropriate some literature.
understanding is extensive literature.
supported by literature.
extensive
literature.
Assessment The assignment The assignment The assignment The assignment There is some The The assignment
Domain 3 provides provides provides very provides some evidence of assignment lacks evidence
(Evaluation) exceptionally excellent good evidence of good evidence of evaluation provides little of evaluation
Understand and strong and evidence of critical evaluation critical evaluation with respect to evidence of with respect to
communicate the consistent critical evaluation when considering when considering performance evaluation performance
performance, evidence of when considering the chosen the chosen metrics, cost, with respect metrics, cost,
costs, overheads critical evaluation the adequately performance performance overhead and to overhead and
and trade-offs of when considering chosen metrics, cost, metrics, cost, trade-offs of performance trade-offs of the
different wireless the adequately performance overhead and overhead and the used metrics, cost, used
and mobile chosen metrics, cost, trade-offs of the trade-offs of the technologies. overhead and technologies. No
communication performance overhead and used used The analysis is trade-offs of results have
technologies. metrics, cost, trade-offs of the technologies. The technologies. The not very the used been provided.
overhead and used results of the results of the conclusive. technologies.
trade-offs of the technologies. The analysis have analysis have Satisfactory Not
used results of the been presented been presented presentation satisfactory
technologies. The analysis have in accordance mostly in of presentation
results of the been clearly with the provided accordance with the results. of
analysis have presented in guideline. the provided the results.
been clearly accordance with guideline.
presented in the provided
accordance with guideline.

10
the provided
guidelines.

Assessment Communicates an Communicates an Communicates a Communicates There is There is a lack There is hardly
Domain 4 exceptional excellent and very good overall a good satisfactory of any engagement
(Communication) systematic systematic understanding of understanding of evidence that understandin with an
Be able to understanding of understanding of Network and Network and at least some g of Network understanding
communicate Network and Network and Internet Internet user and Internet of Network and
available Internet Internet Technology and Technology and requirements Technology Internet
technologies for Technology and Technology and Design processes Design processes have been. and Design Technology and
the design and Design processes Design processes based on user based on user Communicate processes Design
implementation based on user based on user requirements. requirements. d in Network based on user processes based
of mobile and requirements. requirements. The The and Internet requirements. on user
wireless networks The The understanding is understanding is Technology No evidence requirements.
according to user understanding is understanding is supported by the supported by and Design of supporting No evidence of
requirements. supported by supported by appropriate some literature. processes and literature. supporting
extensive extensive literature. is supported literature.
literature. literature. by some
literature.
Assessment Evidence of Evidence of Evidence of Good evidence of Some evidence Poor evidence No evidence of
Domain 5 determining an determining determining very determining of determining of determining
(Referencing) extensive list of excellent good resources. appropriate appropriate determining appropriate
outstanding resources. All All sources used resources. All resources. appropriate resources.
Determining resources. All sources used are are sources used are Most sources resources. Sources used
appropriate sources used are acknowledged. acknowledged. acknowledged. used are Most sources are not
resources. acknowledged. acknowledged used are not acknowledged
Sources used are acknowledged
acknowledged in
the text and
reference list
using correct
academic citation

11
Assessment Outstanding and Excellent Very good Good Some Poor Nonparticipatio
domain 6 effective group participation in participation in participation in participation participation n or very poor
(Employability) dynamics. group work. group work. Very group work. within group in group participation
Outstanding Excellent effort to good effort to Good effort to work. Limited work. Little within group
Developing effort to communicate, communicate and communicate and effort to effort to work. No
transferable skills communicate, motivate and collaborate with collaborate with communicate communicate evidence of
such as motivate and collaborate with members of the members of the and and effort to
interpersonal inspire members members of the CW group. Very CW group. Good collaborate collaborate communicate
skills and human of the CW group. CW group. good evidence of evidence of with members with and collaborate
relations within Outstanding Excellent ability to reflect ability to reflect of the members of with members
teamwork, evidence of evidence of on group work. on group work. CW group. the of the
organisation, and ability to reflect ability to reflect Very good group Good group Some evidence CW group. CW group. Very
communication. on group work. on group work. dynamics. Very dynamics with of ability to Poor evidence poor time
Also, time Outstanding time Excellent group good time minor issues. reflect on of ability to management.
management and management and dynamics. management Good time group work. reflect on No evidence of
commitment to meeting goals Excellent time with no issues in management Group group work. the ability to
meeting goals, ahead of the management. committing to with minor issues dynamics have Poor group reflect on group
both short-term planned time. meeting goals. in committing to areas of dynamics with work.
and long-term. meeting goals. concern. Okay, a range of
Ability to reflect time issues. Poor
on these skills. management time
with some management.
issues in
committing to
meeting goals.

12

You might also like