ICT102 Technology And Networks :
Assignment 1 Individual Assignment Weightage 30%
1. ICT102 Technology And Networks Aim
The aim of this assignment is to assess the basic concepts of networking.
2. Learning Outcomes Assessed
The following course learning outcomes are assessed by completing this assignment task:
- LO1. Understand the fundamentals and principles of networking protocols and
- LO2.Identify reference models and Layered architectures in Networking.
- LO3. Recognize Network topologies, media types and network components.
3. Submission Details
This is an individual assignment. There are six questions in this assignment and each question carry five marks. You will write the answers in a report and will submit it in a word or pdf format. The report length should be not less than 1500 words and not more than 2000 words. This assignment carries 30% weightage and is marked out of 30. Report will be submitted on the Turnitin link available on the moodle. Similarity index of your report should be less than 20%. Write in your own words and do not copy from the internet. You must give citations in APA format. The deadline to submit the report is by midnight Sunday 7 May 2023. Submitting your work late will attract a 10% reduction of mark for each day beyond the due date. A delay of more than 5 days will result in being granted a 0.
4. Assessment Details.
The Sydney International School of Technology and Commerce (SISTC) recently had gone through a partial renovation. The school has now 4 levels. According to the new layout, the level one has 10 Personal Computers (PCs) in a reception room and 15 PCs in a conference room. The second level has a classroom with 30 PCs, a computer laboratory with 40 PCs, and five staff offices consisting of 5 PCs. The third level has two research laboratories for doctorate (PhD) students, with 20 PCs (each having 10 PCs). The fourth level has 8 staff offices and a lecture room. There are 8 PCs in staff offices and 7 PCs in the lecture room. All PCs are equipped with two types of connectivity to the internet i.e., wireless and wired connectivity. The SISTC plans to carry out multimedia sessions (lectures and labs sessions) within the building where the staff can deliver lectures to students that are located at the second level.
SISTC requires new Local Area Network (LAN) architecture for these levels along with new applications for multimedia lectures and labs sessions and other network applications. Imagine you are the network manager of SISTC and are required to write a report answering the following questions:
- Draw a network topology using Packet Tracer that represent
- Each level has its own switch that connects all the computers. Each switch can only connect 20 computers, hence, with a total of 75 computers on level 2, it will require a total of 4 switches. These 4 switches are connected to another core switch at the second level.
- Each PC is connected via Straight-through cable with the switch.
- There are two core switches; switch-1 connects level one and level two switches, switch-2 connects level three and level four switches. These switches are connected via Cross-over cables.
- There is one main switch that connects the two core switches (as described above in “C”) via Cross-over cable.
- Write a paragraph that explains the above topology, additionally, the report must be accompanied with the screenshot of the topology from Packet Tracer.
- Staff and students in the SISTC building would like to use the internet. What device would SISTC needs for this purpose? This device will work on which layer (s) of the TCP/IP model? Briefly explain your answer. Where would you place this device in the topology diagram of Question 1?. Take screenshot of the device placement from Packet Tracer and provide it in your report.
- This LAN of SISTC requires both wired and wireless connectivity. Provide a comparative analysis of the appropriateness of different media types which may be used to enable network connectivity. Discuss different types of media suitable for the above scenario with illustrations. Comparative analysis must be recommended in terms of speed, cost, and security (use table for comparison).
- List any 5 network applications (e.g., Web Browser, Outlook etc) that will be used by SISTC and answer the following questions.
- Which application layer protocol does each application use?
- Which transport layer protocol does a specific application use i.e., indicate either TCP, UDP?
- For each of the applications, write their Quality-of-Service (QoS) requirements, in terms of Packet loss, throughput, and delay (time sensitivity).
- Sam (student of SISTC) is sitting at level 2 of the SISTC building. He writes “www.google.com” in his web browser and presses enter. List and briefly explain the application layer and transport layer protocols that will be used by Sam’s machine to download this webpage.
- Robert (lecturer at SISTC) sitting in his office at the fourth level of SISTC building would like to download a file from a Microsoft server, which resides in London, England. Explain how Robert’s request is fulfilled by showing the packet format at each layer of the TCP/IP model. You must briefly explain the encapsulation and de- encapsulation process at both Roberts machine and at the Microsoft server.
Marking Rubric Total Marks = 30
|Questions||High Distinction (85- 100%||Distinction (75-84%)||Credit (65-74%)||Pass (50-64%)||Fail (0-49%)|
|Question 1 Topology Diagram and Explanation (5 marks)||Topology Diagram is rightly drawn. Explanation is clear and well written||Topology Diagram has minor issues. Explanation is clear but has minor errors.||Topology diagram has one major error and /or one major omission. Explanation has one major error and/or one major omission.||Topology diagram has more than one major error and/or more than one major omission. Explanation has more than one major error and/or more than one major omission||Topology diagram is missing or poorly drawn. Explanation is missing or poorly written|
|Question 2 Device for Internet Connectivity (5 marks)||Device is correctly placed in the topology diagram. Working of Device is nicely explained.||Device is correctly placed in the topology diagram. Working of device has few minor errors.||Device is correctly placed in the topology diagram. Working of device has one major error and /or one major omission.||Device is correctly placed in the topology diagram. Working of Device has more than one major error and more than one major omission.||Device is not correctly placed in the topology diagram or topology diagram is missing.|
|Question 3 Media types for LAN (5 marks)||Comparative Analysis of various media types is complete, accurate and well written.||Comparative Analysis of various media types is well written but has some minor errors and/or minor omissions.||Comparative Analysis of various media types has one major error and/or one major omission.||Comparative Analysis of various media types has more than one major error and more than one major omission.||Comparative Analysis of various media types is missing or is poorly written.|
|Question 4 Protocols and QoS requirements of applications (5 marks)||Protocols and QoS requirements of applications are accurate and well explained.||Protocols and QoS requirements of applications are well explained but there are minor errors.||Protocols and QoS requirements of applications have one major error and /or one major omission.||Protocols and QoS requirements of applications have more than one major error and more than one major omission.||Protocols and QoS requirements of applications are missing or are poorly written|
|Question 5 Application and Transport Layer protocols for webpage download||Application and transport layer protocols needed are accurately listed with no errors and omissions.||Application and transport layer protocols needed have minor error and/or minor omission.||Application and transport layer protocols needed have one major error and/or one major omission.||Application and transport layer protocols needed have more than one major error and more than one major omission||Application and transport layer protocols are missing or poorly written.|
|Question 6 File Download Scenario (encapsulation, de- encapsulation and packet format at each layer of TCP/IP model)||Encapsulation, de- encapsulation process and packet format at each layer of the TCP/IP model are accurately and clearly explained.||Encapsulation, de-encapsulation process and packet format at each layer of the TCP/IP model have minor errors and/or minor omission.||Encapsulation, de- encapsulation process and packet format at each layer of the TCP/IP model have one major error and /or one major omission.||Encapsulation, de- encapsulation process and packet format at each layer of the TCP/IP model have more than one major error and more than one major omission.||Encapsulation, de- encapsulation process and packet format at each layer of the TCP/IP are missing or are poorly written.|
- The assignment is to be submitted via the Assignment 1 submission link in LMS.
- You need to provide references in APA format, if necessary.
7. General Assessment Requirement
- Incomprehensible submissions
Assessments provide the opportunity for students to demonstrate their knowledge and skills to achieve the required standard. To do this, assessment responses need to be both clear and easy to understand. If not, SISTC cannot determine that students have demonstrated their knowledge and skills. Assessments will, therefore, be marked accordingly including the potential for 0 (zero) marks where relevant.
· Check with marking rubric
Before submitting your ICT102 Technology And Networks assessment, you should check it against the assessment criteria and the marking rubric included in this assignment brief to ensure that you have satisfactorily addressed all the criteria that will be used to mark your submission.
- Feedback will be supplied through Moodle.
- Authoritative results will be published on Moodle.
9. Academic Misconduct
- To submit your assessment task, you must indicate that you have read and understood, and comply with, the Sydney International School of Technology and Commerce Academic Integrity and Student Plagiarism policies and procedures.
- You must also agree that your work has not been outsourced and is entirely your own except where work quoted is duly acknowledged. Additionally, you must agree that your work has not been submitted for assessment in any other course or program.