0% found this document useful (0 votes)
11 views

Final Assignment_Complex Engineering Problem

Uploaded by

Liman Shams
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Final Assignment_Complex Engineering Problem

Uploaded by

Liman Shams
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Assignment Final - EEE 4551 (Winter 2024-25)

Complex Engineering Problem


Instructions:
• Utilize credible open-access internet resources, books, and research articles for drafting your
responses. However, direct copying from the Internet, using AI-generated content (e.g., ChatGPT,
Gemini, or similar tools), paraphrasing software, or copying from other students is strictly
prohibited. Plagiarism and AI-detection tools will be used to verify originality.
• Your answers must be written in your own words. Any form of content duplication will result in
zero marks for all involved students.
• Incorporate relevant visuals such as images, diagrams, flowcharts, and tables to improve clarity and
reinforce your explanations. Ensure that all visuals are properly labeled and cite their sources when
applicable.
• Cite all external sources using the IEEE reference format both in the text and in a separate reference
section at the end of your assignment.

Formatting and Submission Guidelines:


• Document Format: Submit your assignment as a PDF document with clear explanations, well-
structured content, and properly formatted references.
• Cover Page: Include a cover page with your name, student ID, course title, assignment title, and
submission date.
• Organization: Structure your responses in a logical and professional manner with appropriate
headings, subheadings, and bullet points where necessary. Please include Page Numbers.
• Citation & Referencing: Follow academic citation guidelines consistently throughout your
assignment.

Grading Criteria:
Your assignment will be evaluated based on the following:
• Depth and Clarity of Explanations – Demonstrating a strong understanding of networking and data
communication concepts.
• Use of Correct Terminology – Applying relevant technical terms accurately and effectively.
• Integration of Visual Aids – Including diagrams, tables, and flowcharts to enhance comprehension
and presentation.
• Proper Citations and Referencing – Following IEEE citation standards to acknowledge all external
sources.
• Analytical Approach – Evaluating communication mechanisms, technologies, and their impact in
networking.
• Creativity and Innovation – Presenting challenges, solutions, and future trends in a structured and
insightful manner.

Additional Notes:
• Avoid plagiarism and strictly adhere to the given guidelines. Submissions that violate academic
integrity policies will result in disciplinary actions.
• Use open-access educational materials and effective presentation techniques to improve
readability and understanding.

Submit your feedback regarding this assignment by filling out the Google Form.

⚡ Best of luck with your assignment! ⚡

Page 1 of 9
Part 1:
Apply theoretical concepts to real-world scenarios emphasizing scalability,
security, and performance considerations in modern network designs.

Question 1: Develop and Justify a Scalable University Campus Network

Scenario:
A new university is being established in Dhaka, Bangladesh, with a modern campus consisting of three
academic buildings, one administrative block, one library, and student dormitories. The university initially
aims to accommodate 5,000 students and 300 faculty members, with scalability plans to expand to 10,000
students and 500 faculty members over the next five years. The network should support online learning,
video conferencing, research collaborations, cloud-based applications, library access systems, and secured
administrative transactions.

Your Design Task:


• Develop a secure, high-performance, and scalable network architecture that meets both current and
future demands.
• Justify the selection of network topology, communication protocols, security measures, and
scalability strategies.
• Design a logical network diagram that illustrates device interconnections, bandwidth allocation,
and failover mechanisms.
• Analyze the role of wired and wireless solutions in different campus areas.
• Evaluate how the proposed network ensures low latency, redundancy, and data protection.

Design Criteria:
Your design should consider:
• Number of users and devices, including student laptops, faculty desktops/workstations, tablets, and
IoT-based smart devices.
• Application types such as Learning Management Systems (LMS), video streaming, VoIP, research
data transfers, and online assessments.
• Bandwidth allocation to balance academic and administrative traffic.
• Wireless and wired connectivity for different zones of the campus.
• Network security against unauthorized access and cyber threats.
• Scalability for future expansion.

Your network design should include:


• End devices (student laptops, faculty desktops, mobile devices, IoT sensors)
• Network infrastructure (switches, routers, wireless access points, firewalls)
• Transmission media (fiber optic backbone, Ethernet, Wi-Fi coverage)
• Security architecture (firewalls, VPNs, authentication mechanisms, User-IDs/User-IPs)
• Traffic management and QoS strategies for critical applications.
• Detailed network diagrams illustrating topologies, device interconnections, and data flow.

Prepare a technical report that justifies your design choices and explains how the network will support
academic and administrative functions.

Evaluation Criteria:
• Scalability and Future Growth Considerations (20%) – The network should accommodate more
students, faculty, and devices over time.
• Efficiency and Performance (15%) – Proper bandwidth allocation, congestion control, and Quality
of Service (QoS) should be implemented.
Page 2 of 9
• Security and Data Protection (15%) – Solutions should include authentication mechanisms,
firewalls, intrusion detection, and encryption.
• Network Topology Diagrams and Connectivity (30%) – The design should include clear network
topology diagrams covering wired and wireless infrastructure.
• Justification of Design Choices (20%) – A well-written report should explain why specific
networking devices, protocols, and transmission media were selected.

Solution Hints:
• Use a hybrid topology (star for wired, mesh for Wi-Fi zones) to ensure reliability and performance.
• Deploy VLANs for different departments (faculty, students, admin) to improve security and traffic
management.
• Implement firewalls, VPNs, and role-based access control for security.
• Use fiber-optic backbone connections for high-speed data transfer and Wi-Fi for wireless access.
• Design the IP addressing scheme (subnetting) to allocate sufficient IPs per department and future
expansion.

Question 2: Design a Smart City Traffic Management Network

Scenario:
A city municipality is deploying an AI-powered smart traffic management system to reduce congestion,
improve road safety, and optimize traffic flow. The system should integrate real-time traffic monitoring, AI-
driven traffic lights, emergency vehicle prioritization, and public transportation tracking. The network
should connect 300 traffic sensors, 50 surveillance cameras, 20 emergency response centers, and city-wide
control stations.

Your Design Task:


• Design a fault-tolerant, low-latency network infrastructure to enable real-time communication
between traffic sensors, control centers, and emergency services.
• Develop a guideline for implementing a hybrid networking approach using 5G, fiber-optic
connections, and IoT-based (Low Power) LPWAN technologies.
• Create network topology diagrams demonstrating sensor connectivity, traffic data flow, and
redundancy measures.
• Justify how Quality of Service (QoS), bandwidth allocation, and encryption techniques ensure
reliability and security.
• Evaluate the system’s resilience, congestion management capabilities, and adaptability to future
traffic expansions.

Design Criteria:
Your design should consider:
• Latency-sensitive communication for real-time traffic updates and emergency alerts.
• Wireless and wired communication between different city zones.
• High availability and redundancy to avoid single points of failure.
• Security measures against cyber threats, data tampering, and unauthorized access.
• Scalability for future expansion with additional IoT devices and smart infrastructure.

Your network design should incorporate:


• End devices (traffic sensors, surveillance cameras, control panels, GPS trackers)
• Networking infrastructure (switches, routers, LTE/5G base stations, fiber optic links)
• Communication protocols (4G/5G, LPWAN (Low Power Wide Area Network) or LoRaWAN for IoT
sensors)
• Security layers (firewalls, data encryption, intrusion detection)
Page 3 of 9
• Real-time monitoring and management system (dashboards, data analytics)
• Visual Representation: Detailed network diagrams illustrating topologies, device interconnections,
and data flow.
• Structured Justification: Evaluate, compare, and justify the selection of choices.

Prepare a technical report that explains your design choices and how the network ensures uninterrupted
smart traffic operations.

Evaluation Criteria:
• Real-Time Data Processing and Fault Tolerance (20%) – The network should support low-latency
communication for instant traffic updates.
• Scalability and IoT Device Management (20%) – The network should accommodate more sensors,
cameras, and AI-driven traffic systems over time.
• Security and Data Integrity (10%) – Encryption and authentication should be in place to prevent
tampering with traffic signals.
• Network Topology Diagrams and Connectivity (30%) – The design should include clear network
topology diagrams covering wired and wireless infrastructure.
• Justification of Design Choices (20%) – A well-written report should explain why specific
networking devices, protocols, and transmission media were selected.

Solution Hints:
• Use a combination of LPWAN and 5G for IoT-based traffic sensors and video surveillance.
• Implement hierarchical routing (local processing at edge nodes, central control at cloud).
• Employ dynamic routing to manage traffic congestion and prioritize emergency vehicles.
• Apply data encryption (TLS, AES) and authentication (SSL certificates, VPNs) for security.
• Utilize edge computing for processing local traffic data to reduce latency before sending it to cloud
servers.

Part 2:
Apply theoretical networking concepts to practical scenarios in TCP/IP
model implementation, data transmission, and network security.

Question 3: Apply and Justify the TCP/IP Model in Enterprise Network Deployment

Scenario:
A multinational company has successfully implemented its network across multiple cities and countries,
connecting corporate headquarters, regional offices, data centers, and remote employees. Given the
increasing demand for real-time collaboration and high-volume data transfers, the company requires a
TCP/IP-based network architecture that ensures secure, efficient, and scalable communication.

Your Design Task:


• Apply the TCP/IP model to design a multi-site enterprise network, ensuring seamless data
transmission and security.
• Analyze how each TCP/IP layer manages data flow between devices across the enterprise.
• Justify the choice of TCP vs. UDP protocols for different applications (e.g., VoIP, cloud storage,
financial transactions, audio and video conference).
• Develop a data encapsulation and transmission model, illustrating how network packets move
across layers.
• Evaluate the network’s ability to handle fault tolerance, cybersecurity threats, and performance
optimization.
Page 4 of 9
Design Criteria:
As the network architect, your task is to justify the use of the TCP/IP model and demonstrate its application
in securing and optimizing the company’s operations. Your design should consider:
• Scalability: How the TCP/IP model supports the company’s increasing number of users and devices.
• Security: Implementing encryption, authentication, and secure communications.
• Performance: Ensuring optimal data transmission efficiency and minimizing latency.
• Network Services: DHCP, DNS, FTP, and HTTP/HTTPS integration.
• Routing and Addressing: IPv4/IPv6 addressing, subnetting, routing table, and traffic management.

Your network design should include:


• Justify why the four-layer TCP/IP model was chosen over the traditional seven-layer OSI model for
this network.
• Explain how each layer of the TCP/IP model contributes to the enterprise network.
• Describe data encapsulation and decapsulation within the TCP/IP model, focusing on Protocol Data
Units (PDUs), headers, and trailers.
• Illustrate how data flows from the Application Layer (message) to the Link Layer (frame) in both
sending and receiving processes.
• Identify the TCP/IP layers responsible for routing and describe how packets travel across different
network segments.
• Justify why the Transport Layer is considered the "core" of the TCP/IP model in ensuring reliable
communication.
• Compare and contrast TCP and UDP, explaining their use cases in an enterprise environment.
• Explain how IP addressing, subnetting, and subnet masks impact network performance and
security in your network.
• Prepare a technical report that explains your design choices.

Evaluation Criteria:
• Accuracy of TCP/IP Layer Functionality Explanation (25%) – Each layer’s role should be clearly
defined and relevant to the enterprise.
• Correct Justification for Choosing TCP/IP over OSI (15%) – The report should demonstrate why
TCP/IP suits enterprise needs better.
• Understanding of Protocol Data Units (PDUs) and Data Encapsulation (20%) – The explanation of
packet-encapsulation and headers should be technically sound.
• Network Security and Reliability Considerations (15%) – Firewall configurations, VPNs, and
transport-layer security should be addressed.
• Clarity of Network Diagram and Report Organization (25%) – The network should be visually well-
represented, with a structured explanation.

Solution Hints:
• Explain why TCP/IP is preferred over OSI (flexibility, real-world implementation, simplicity).
• Show data encapsulation with headers/trailers in TCP/IP, demonstrating how application-layer
messages move through network layers.
• Use firewalls, IDs/IPs, and TLS-based encryption for secure enterprise communication.
• Justify why TCP is used for email, HTTPS, and file transfers, while UDP is used for VoIP and
streaming.
• Design a subnetting plan using IPv4/IPv6 to efficiently allocate IP addresses within the enterprise.

Page 5 of 9
Question 4: Develop and Secure a Smart City IoT Network using TCP/IP Model

Scenario:
A smart city infrastructure has been approved for deployment, integrating IoT-enabled traffic sensors,
surveillance cameras, and emergency response systems. The network should facilitate real-time data
transmission, cloud services, and secure remote monitoring while ensuring high availability and scalability.

Your Design Task:


• Develop an IoT-based network infrastructure following the TCP/IP model.
• Design a logical communication architecture for IoT devices, ensuring efficient data flow and
minimal latency.
• Apply IPv6 addressing, MQTT or CoAP protocols, and edge computing to enhance real-time
processing.
• Justify the selection of network security measures, including firewalls, encryption, and
authentication protocols.
• Evaluate the ability of the network to scale, handle congestion, and maintain cybersecurity.

Design Criteria:
As the network engineer, your task is to apply the TCP/IP model to establish an efficient, secure, and
scalable network for smart city operations. Key considerations include:
• IoT Data Flow: Secure transmission of sensor data to control centers.
• Reliability and Latency: Ensuring real-time communication for traffic management.
• Security and Authentication: Preventing unauthorized access and cyber threats.
• IPv6 Adoption: Addressing the vast number of connected IoT devices.
• Cloud Integration: Ensuring seamless interaction between IoT devices and cloud servers.

Your network design should include:


• Justify the selection of TCP/IP over OSI for managing IoT-enabled smart city infrastructure.
• Explain how each layer of the TCP/IP model functions in handling IoT device communications.
• Describe data encapsulation and decapsulation when an IoT sensor sends real-time data to a
control center.
• Explain how UDP-based communication is preferred in certain IoT applications, while TCP-based
communication is used in others.
• Discuss how IPv6 addressing supports large-scale IoT deployments in a smart city.
• Identify the TCP/IP layers responsible for routing IoT data between different city zones.
• Explain how the Transport Layer manages congestion and reliability in an IoT network.
• Discuss how firewalls, VPNs, and encryption techniques secure IoT-based communications in the
city.

Evaluation Criteria:
• Integration of TCP/IP with IoT Communication (25%) – Explanation of how the IoT network uses
different TCP/IP layers.
• Routing and Addressing for IoT Devices (20%) – Justification for using IPv6, subnetting, and
protocol selection.
• Handling Real-Time IoT Traffic and Latency Reduction (20%) – Effective use of protocols like
MQTT, CoAP, or LPWAN-based communication.
• Security Considerations for IoT Networks (10%) – Discussion of IoT encryption, authentication, and
intrusion detection.
• Illustration and Documentation Quality (25%) – Well-structured explanation, diagrams, and
justification for design choices.

Page 6 of 9
Solution Hints:
• Use IPv6 addressing for scalable IoT networks.
• Implement MQTT for lightweight IoT communication instead of HTTP.
• Deploy edge computing to reduce the load on cloud servers and improve real-time decision-making.
• Secure IoT communication using AES encryption, VPNs, and firewall policies.
• Design a hierarchical IoT network (local processing at traffic lights, cloud-based control centers).
• Use firewalls, IDs/IPs, and TLS-based encryption for secure enterprise communication.
• Design a subnetting plan using IPv4/IPv6 to efficiently allocate IP addresses within the enterprise.

Part 3:
Apply theoretical concepts to real-world scenarios emphasizing Routing
Strategy Optimization and Routing Algorithm Selection

Question 5: Analyze and Justify Routing Algorithm Selection for a Large-Scale Enterprise
Network

Scenario:
A multinational enterprise with multiple branch offices, regional hubs, and data centers needs an optimal
routing strategy to handle large-scale data transfers, cloud applications, and real-time services. The
company seeks a routing algorithm that maximizes efficiency, reliability, and fault tolerance.

Your Design Task:


• Analyze and compare different routing algorithms (Shortest-Path, Distance-Vector, Link-State,
Hierarchical, Flow-Based, and Flooding).
• Justify the selection of the most suitable routing strategy, considering network size, traffic patterns,
and redundancy.
• Develop a routing flowchart showing data traffic paths, congestion handling, and failover
mechanisms.
• Evaluate the algorithm’s performance in handling real-time traffic, security concerns, and future
scalability.
• Create a plan for implementing Quality of Service (QoS) and load balancing techniques.

Design Criteria:
As the network engineer, your responsibility is to analyze and determine the most suitable routing
algorithm(s) for the company's expanding network. Consider the following factors:

• Network Size and Complexity: Multiple geographic locations with varying bandwidth capacities.
• Traffic Prioritization: Critical business applications require low-latency routing.
• Real-Time Communication: Video conferencing and VoIP services demand stable and reliable
connections.
• Network Resilience: The routing strategy should handle link failures and ensure minimum
downtime.
• Scalability: The network should accommodate future expansions without significant performance
degradation.

Page 7 of 9
Your network design should include:
• A detailed comparison of at least two candidate algorithms in terms of their advantages and
limitations.
• Justification for your choice, considering network size, traffic priorities, and resilience
requirements.
• An explanation of how your selected routing algorithm(s) will ensure efficient data transfer.
• Diagrams illustrating routing paths between key locations, showcasing redundancy and failover
strategies.
• An assessment of scalability, explaining how your chosen approach accommodates future
expansion.

Evaluation Criteria:
• Comparison and Analysis of Routing Algorithms (30%) – At least two algorithms should be
compared in-depth.
• Justification for the Selected Algorithm(s) (15%) – A clear explanation of why certain algorithms
were chosen for enterprise networking.
• Scalability and Fault Tolerance Considerations (10%) – The solution should demonstrate
adaptability to network growth.
• Traffic Management and Prioritization (15%) – The algorithm should optimize high-priority
business applications.
• Clarity of Routing Flow Diagrams and Report Explanation (30%) – The routing design should be
visually well-represented.

Solution Hints:
• Use Link-State for internal enterprise routing due to its efficiency and scalability.
• Gateway Protocol may be used for external routing between branch offices and data centers.
• Implement QoS for prioritizing VoIP, video conferencing, and cloud applications.
• Show a routing topology with failover paths to ensure resilience.

Question 6: Design and Optimize Routing Strategies for a Smart City IoT Network

Scenario:
A smart city has implemented an IoT-based traffic management system, integrating roadside sensors,
surveillance cameras, and emergency response systems. The system requires an optimized routing
mechanism to ensure low-latency data transmission, efficient congestion management, and real-time
incident detection.

Your Design Task:


• Design an IoT-optimized routing strategy, selecting from Shortest-Path, Flooding, Hierarchical, and
Multicast techniques.
• Develop a network model that efficiently routes IoT data between control centers, sensors, and
emergency services.
• Justify the selection of multicast routing for traffic updates, hierarchical routing for scalability, and
adaptive routing for congestion control.
• Create a network topology visualization, demonstrating packet flow, redundancy, and failover
strategies.
• Evaluate how the routing approach enhances real-time data delivery, energy efficiency, and
network security.

Page 8 of 9
Design Criteria:
As the lead network architect, your task is to identify and implement the most effective routing approach
to handle high-speed, low-latency IoT data transmission across city-wide infrastructures. The following
considerations should be addressed:
• High-speed real-time data: Emergency alerts and traffic updates should be delivered instantly.
• Energy-efficient routing: Battery-powered IoT devices should minimize communication overhead.
• Network resilience: Data should reroute dynamically in case of link failures.
• Scalability: The routing solution should support future IoT expansion across different city zones.
• Multicast Communication: Data from sensors should be distributed efficiently to multiple control
centers.

For your selection should provide:


• A comparative analysis of at least two routing algorithms suitable for IoT-based smart city
networks.
• Justification for the chosen algorithm(s) based on latency, energy efficiency, and resilience.
• A routing model demonstrating real-time traffic management, including dynamic rerouting during
congestion or emergencies.
• A security assessment explaining how the routing approach ensures secure IoT communication.
• An evaluation of multicast routing techniques, explaining how traffic updates can efficiently be sent
to multiple control centers.

Evaluation Criteria:
• Comparison and Justification of Routing Strategies (30%) – The best-suited algorithm(s) should be
well-defended.
• Handling of Real-Time Data and Congestion Control (10%) – The routing should minimize latency
and adapt to traffic conditions.
• Multicast and Hierarchical Routing Considerations (20%) – IoT networks should efficiently send
updates to multiple devices.
• Security and Fault Tolerance (10%) – The network should prevent unauthorized access and ensure
redundancy.
• Clarity of Routing Tables, Routing Maps, Diagrams, and Solution Explanation (30%) – The routing
strategy should be visually well-represented.

Solution Hints:
• Use hierarchical routing to segment the smart city network into zones.
• Deploy multicast routing for efficient traffic updates to multiple control centers.
• Implement flooding with control mechanisms for emergency notifications.
• Use shortest-path routing for normal traffic management and adaptive routing for congestion
control.

Page 9 of 9

You might also like