Data Communication and Computer Networks Group Assignment
Data Communication and Computer Networks Group Assignment
General Instructions
This assignment is to be completed in groups of 3 to 5 members.
Conduct thorough research on your questions.
Ensure the content is accurate, relevant, and aligned with the provided questions.
Focus on including key points, examples, and real-world applications to enhance
understanding.
Use a clean and professional answers for your questions.
Follow these design principles:
Use bullet points to summarize information.
Incorporate visual elements (e.g., charts, images, graphs) to support the text.
Maintain font size and color contrast for readability.
Every group member must actively participate and contribute to the final
submission.
Each group is required to include a contribution log detailing the specific tasks
completed by each member.
Copying from another group is strictly forbidden.
Any evidence of copying, collusion, or plagiarism will result in a zero result for all
parties involved.
Use of AI-generated content is prohibited and will lead to immediate disqualification of
the assignment and All content must be original and properly referenced.
Assessment Criteria
You are hired as a network consultant to design a secure and scalable network for a
university with:
a. 4 Colleges
b. 1 administrative block
c. 1 student dormitory area
Your Task:
a. Propose a network topology for each building and justify your choice.
b. Choose appropriate LAN and WAN technologies for intra- and inter-building
communication.
c. Assign IPv4 addresses using both classful and CIDR (classless) addressing.
d. Perform subnetting for each faculty and block, ensuring:
i. At least 200 hosts per subnet
ii. Efficient address allocation
e. Use VLSM (Variable Length Subnet Masking) if necessary.
➤ Draw the network diagram clearly indicating switches, routers, and their connections.
2. Packet Journey Analysis: Choose a simple web-based activity (e.g., opening a webpage
or sending an email), and describe how the packet travels from source to destination
using the OSI model.