0% found this document useful (0 votes)
8 views

Data Communication and Computer Networks Group Assignment

This document outlines a group assignment for students at Adama Science and Technology University focused on Data Communication and Computer Networks. It includes instructions for conducting research, designing a hybrid network for a medium-sized enterprise, and creating a secure network for a university campus, along with assessment criteria. The assignment emphasizes originality, collaboration, and adherence to design principles while covering topics such as network topology, multiplexing strategies, and network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Data Communication and Computer Networks Group Assignment

This document outlines a group assignment for students at Adama Science and Technology University focused on Data Communication and Computer Networks. It includes instructions for conducting research, designing a hybrid network for a medium-sized enterprise, and creating a secure network for a university campus, along with assessment criteria. The assignment emphasizes originality, collaboration, and adherence to design principles while covering topics such as network topology, multiplexing strategies, and network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Adama Science and Technology University

College of Electrical Engineering and Computing


Department of Computer Science & Engineering
Data Communication and Computer Networks (CSEg3204) Group Assignment

General Instructions
 This assignment is to be completed in groups of 3 to 5 members.
 Conduct thorough research on your questions.
 Ensure the content is accurate, relevant, and aligned with the provided questions.
 Focus on including key points, examples, and real-world applications to enhance
understanding.
 Use a clean and professional answers for your questions.
 Follow these design principles:
 Use bullet points to summarize information.
 Incorporate visual elements (e.g., charts, images, graphs) to support the text.
 Maintain font size and color contrast for readability.
 Every group member must actively participate and contribute to the final
submission.
 Each group is required to include a contribution log detailing the specific tasks
completed by each member.
 Copying from another group is strictly forbidden.
 Any evidence of copying, collusion, or plagiarism will result in a zero result for all
parties involved.
 Use of AI-generated content is prohibited and will lead to immediate disqualification of
the assignment and All content must be original and properly referenced.

Assessment Criteria

 Depth of Analysis: Demonstrates a thorough understanding of Data Communication and


Computer Networks principles.
 Practical Application: Shows the ability to apply theoretical concepts to real-world
scenarios.
 Clarity and Structure: Presents ideas logically, with clear explanations and well-
structured arguments.
1. Design a hybrid network for a medium-sized enterprise with three departments:
Computer Science and Engineering, Civil Engineering, and Mechanical Engineering,
spread across two buildings in different cities.
a. Topology Selection
b. Propose a network topology (e.g., star, mesh, hybrid) for the enterprise. Justify your
choice based on scalability, reliability, and cost.
c. Discuss how the chosen topology supports both LAN and WAN technologies.
d. Draw a detailed network diagram showing devices, connections, and transmission
media
e. Compare the OSI and TCP/IP models in the context of your network design.
Highlight how each layer of the TCP/IP model maps to your implementation.
f. Discuss the advantages of using the TCP/IP model for this enterprise.
2. Multiplexing Strategy
a. Recommend a multiplexing technique (e.g., TDM, FDM, or WDM) for optimizing
bandwidth across the WAN link between the two buildings. Explain why this
technique is suitable.
b. Calculate the bandwidth requirements assuming 50 users per department, with each
user requiring 10 Mbps for data and 5 Mbps for VoIP.
3. Case Study Scenario: Network Design for a University Campus

You are hired as a network consultant to design a secure and scalable network for a
university with:

a. 4 Colleges
b. 1 administrative block
c. 1 student dormitory area

Your Task:

a. Propose a network topology for each building and justify your choice.
b. Choose appropriate LAN and WAN technologies for intra- and inter-building
communication.
c. Assign IPv4 addresses using both classful and CIDR (classless) addressing.
d. Perform subnetting for each faculty and block, ensuring:
i. At least 200 hosts per subnet
ii. Efficient address allocation
e. Use VLSM (Variable Length Subnet Masking) if necessary.

➤ Draw the network diagram clearly indicating switches, routers, and their connections.
2. Packet Journey Analysis: Choose a simple web-based activity (e.g., opening a webpage
or sending an email), and describe how the packet travels from source to destination
using the OSI model.

Your Response Should Include:

a. Layer-by-layer breakdown of responsibilities (from Application to Physical).


b. Role of switches (Layer 2) and routers (Layer 3) during the journey.
c. Mapping of IP to MAC addresses using ARP (Address Resolution Protocol).

3. Network Security Review:

a. Identify three common threats that can affect a university network.


b. Map these threats to corresponding OSI layers.
c. Propose network security measures and protocols at each vulnerable layer (especially
Transport, Network, and Application).

➤ Reference technologies like firewalls, encryption, authentication protocols, etc.

You might also like