SlideShare a Scribd company logo
1 of 6
COMP1609(2022/23) Network and Internet Technology and Design
Faculty Header ID:
COMP1609(2022/23)Network and Internet Technologyand DesignFaculty Header
ID:11562Contribution:100% of thecourseCourse Leader:Jason ParkeNetSim
CourseworkDeadline Date:Monday 04/12/2022This coursework should take an average
student who is up to date with tutorial workapproximately 50 hours Feedback and grades
are normally made available within 15 working days of the coursework deadlineLearning
Outcomes:A. Demonstrate knowledge of network communication, OSI and TCP/IP model.B.
Demonstrate a critical understanding of the top network model with related key protocols,
services, and applications.C. Evaluate common network problems (malfunction, poor
performance), and adopt a systematic approach to troubleshooting and resolving the
problem.D. Be competent in the use of tools designed to analyse and simulate network
functionality.Plagiarism is presenting somebody else’s work as your own. It includes
copying information directly from the Web or books without referencing the material;
submitting joint coursework as an individual effort; copying another student’s coursework;
stealing coursework from another student and submitting it as your work. Suspected
plagiarism will be investigated and, if found to have occurred, will be dealt withaccording to
the university’s procedures. Please see yourstudent handbook for further details of what
is/isn’t plagiarism.All material copied or amended from any source (e.g., internet, books)
must be referenced correctly accordingto the reference style you are using.Your work will
be submitted for plagiarism checking. Anyattempt to bypass our plagiarism detection
systems will be treated as a severe Assessment Offence.The coursework detailed
specification:This is an individual assessment. Your investigation shouldnot be shared
among other students.The objective of the coursework is to simulate a client-server model
communication over an IP network and to investigatean application and network
performance in multiple providedscenarios.This assessment requires to use NetSim
simulator.The network architecture overview:The company’s headquarters are in
Greenwich (UK). They have recently opened regional offices in New York (USA), and Dubai
(Dubai). The main service provided by the New York and Dubai offices will be gathered and
distributed monthly and annual reports describing sales managed by theheadquarters in
Greenwich, UK. The company has decided to perform a simulation in case they will expand
with anadditional call centre.Greenwich HQ LAN: The network is undefined and needs to be
designed by the student with justifications,this implies justification of several nodes, users,
andapplications.New York office LAN: It consists of 35 users connected to a core switch,
Local printer, and email. They are connected to the Internet via a backbone link. Some
applications run by users including printers and databases are local and others like web
browsing and MS OneDrive are supported including remote desktops, in Greenwich, UK.
Additionally, 8 users work from home using MS Teams & Zoom with all
supportedservices.Dubai Office LAN: It consists of 25 users connected to a core switch,
Local printer, and email. They are connected to the Internet via a backbone link. Some
applications run by users including printers and databases are local and others like web
browsing and MS OneDrive are supported remotely, in Greenwich, UK. Additionally, 8 users
work from home using MS teams & Zoom for voice and video calls.Network Operations
Centre (NOC): It would consist of 15 users connected to a core switch, Local printer, and
email. They are connected to the Internet via a backbone link. Some applications run by
users including printers and databases are local and others like web browsing and MS
OneDrive aresupported remotely, in Greenwich, UK. All users run MS Teams & Zoom
conferencing applications with Dubai Office.The tasks:The objective is to perform group
literature research, individually build a NetSim simulation model based on the network
architecture given and evaluate the behaviour of network parameters gained by simulating
the use cases. The design, implementation and simulation discussion imply theinclusion of
graphs and justification of made decisions or the results achieved through the
simulation.The tasks:1. The objective is to perform group literature research.Perform
literature research on the technologies that are used in a modern network. CHOOSE 3 from
thefollowing list of network technologies: –i. 5G and WiFi 6 technologyii. Artificial
Intelligence (AI) and Machine Learning(ML)iii. Augmented reality and virtual realityiv.
Cloud computingv. DevOpsvi. Digital transformationvii. Intent-based networking (IBN)viii.
Internet of Things (IoT)ix. Data Securityx. SD-WANThere are multiple providers of such
services, someexamples, are Amazon AWS, CrowdStrike and CISCO (BUT NOT LIMITED TO).
Critically discuss these technologies concerning the scalability and transparency of
communication, providing examples. Identify two or more commercial risks arising due to
the failure of such cloud services. The discussion should be documented and should be
approximately 700 words. The group should consist of two roles:Risk assessor: The risk
assessor evaluates the potential threats.Upgrade engineer: The upgrade engineer must
review the technologies from a benefit point of view. [GROUPTASK] 10%2. Design,
implement and simulate your model in the NETSIM simulator guided by the given network
architecture overview. The design requires detailed documentation on the application and
performance settings in the NETSIM simulator for each user and these settings
justifications. Following the implementation, you are required to simulate yourscenario.
[INDIVIDUAL TASK] 20%3. The documentation must contain subnetting schemes for each
LAN/WAN/MAN. Note: You should configure NetSim to use these subnets. You must
provide the following: Network Address, Broadcast Address, Usable Addresses, and IP
Address assignments to hosts. You must use at least two classes from the PrivateAddress
Space. [INDIVIDUAL TASK] 20%4. Investigate the behaviour of the network performance in
a variety of cases. The analysis must be done regarding your expectations. Discuss the
scenario and hypothesize on the possible outcomes of provided use cases followed by the
analysis of the results that werereceived from the simulation. [INDIVIDUAL TASK]20%5.
You must review the following [INDIVIDUAL TASK]20%:i. Utilization of the backbone link.ii.
Cloud Storage (OneDrive) average file download timeiii. Web Server page response time.iv.
The behaviour of MS Teams/Zoom applicationsv. Ethernet delay on the network
(bottlenecks)vi. Simulate the following use case: The new NOC will communicate with New
York and Dubai offices. It is planned that 10 users will communicate with the Dubai office
and 5 users will communicate with the New York office. All offices willcommunicate via MS
Teams or Zoom. Investigate the behaviour of the MS Teams vs Zoom in the given
scenario.vii. Evaluate the network performance in a use-case, where you would introduce at
least one of the improvements that you have identified.6. Provide a critical reflection on the
tasks you carried out.[INDIVIDUAL TASK] 5%7. The document must include your
concluding comments.[INDIVIDUAL TASK] 5%Note:Perform the analysis of the results
starting from the first minute. This should be done, to reduce the noise from the data caused
by the initialization of network devices such as routers and switches which may have an
impact onyour investigation.The group assessment should be completed in pairs and
mustinclude the following: –1. You must provide the names of all participants who
contributed to the group work.2. Your submission must include exact copies of the
groupwork.Deliverables (No more than 3000 words):A good structure report must include
the following:• A literature review on the technologies used in a provided network
architecture and the benefits ofusing cloud services. Refer to Task 1.• Description of the
designed and implemented scenarios, including the justifications for the design and choice
ofperformance parameters. Refer to Task 2.• Documentation on the investigation of
required features and use cases, including graphs and analysis of the results of the
simulation. Refer to Tasks 3, 4, and 5 and the subcategories.• Based on the results;
recommend your choice of consideration to improve the network model.• A critical
reflection that is both evaluative and reflective.Refer to Task 6.• Concluding comments.
Refer to Task 7.Assessment Criteria:1. Review of technologies and cloud services
discussion.(Task 1)10%2. Justified design and simulation of the network architecture and
applicationmodels.(Task 2)20%3. Investigation and analysis of the results.(Task 3 + Task 4
+ Task 5)55%4. Recommendation of your choice for improvement of network
architecture.(Task 5 vii)5%5. Critical reflection(Task 6)5%6. Conclusion(Task 7)5%>80%
ExcellentEvidence of in-depth understanding, detailed investigation and analytical
explanation of the results, critical and evaluative conclusion. The analysis must include a
graphical representation of the results and any relevant network diagrams and
identification of trends in the data. All sections were completed to an excellent
standard.GoodEvidence of clear understanding, good analysis of the results and some
critical and justified evaluation in the conclusion. The analysis must include a graphical
representation of the results and any relevant network diagrams and identification of
trends in the data. All sections are completed to a consistently good
standard.AverageEvidence of an understanding of the networking fundamentals, some
results attained and presented. Correct but not incredibly detailed analysis, limited
evaluation (but there must be some), all sections attempted and provided.PassLimited data
samples and results, shallow analysis, or evaluation. Some essential elements may be
missing. The provided documentation must be correct. Conclusions must be included and
must be justifiable.PoorA poorly written report without structure. The essential elements
are missing, insufficient data samples. Little or no evidence of having devised or conducted
research and experiments. Little evidence of understanding, poor orincorrect analysis or
the conclusion.Criteria forAssessment90-100Exceptional80-89Excellent70-79Very Good60-
69Good50-59Satisfactory30-49Fail0-29FailAssessmentdomain 1(Knowledge)Demonstrate
acriticalunderstanding ofthe technicalchallenges posedby current mobile systems and
wirelesscommunications.Demonstrates anexceptionalsystematicunderstanding of Network
and InternetTechnology and Design and theirtechnicalchallenges. Themotivation and
rationale of a chosenarea isunderpinned by an exceptionalunderstanding of relevant theory
and best practices andengagement with the literature.Demonstrates an
excellentsystematicunderstanding of Network and InternetTechnology and Design and
theirtechnicalchallenges. Themotivation and rationale of a chosen area areunderpinned by
an excellentunderstanding of relevant theory and best practices andengagement with the
literature.Demonstrates a very goodunderstanding of Network and InternetTechnology and
Design and theirtechnicalchallenges. There is evidence thatrelevant theory and best
practices have been appliedeffectively in the choice of area, and there is theengagement
with the literature.Demonstratesoverall a goodunderstanding of Network and
InternetTechnology and Design and theirtechnicalchallenges. There is some evidence that
relevanttheory and best practices have been appliedeffectively in the choice of area, and
there is someengagement with the literature.There issatisfactoryevidencethat at least
someNetwork and InternetTechnologyand Designand practiceshave beenapplied
andsupported by theliterature.There is a lack ofunderstanding of Networkand
InternetTechnologyand Designand theirtechnicalchallenges.The choice of the
researchproblem lacksjustificationsand is notsupported bythe literature.There is hardly any
engagementwith relevanttechnologies,technicalchallenges,and best practices.The choice
ofthe researchproblem is not based onengagementwith theliterature.Assessment domain
2(Research)Be able tounderstand andevaluate the key security threats that relate
todifferentThe assignmentprovidesexceptionallystrong andconsistentevidence ofcritical
evaluationwhenconsideringthe securityThe assignmentprovidesexcellentevidence ofcritical
evaluationwhen consideringthe securityvulnerabilityorvulnerabilitiesofThe
assignmentprovides verygood evidence ofcritical evaluationwhen consideringthe
securityvulnerability orvulnerabilitiesofthe chosenThe assignmentprovides some good
evidence ofcritical evaluationwhen consideringthe securityvulnerability
orvulnerabilitiesofthe chosenThere is someevidence thatat least someof the securityaspects
of the chosenconfigurationhave beenconsidered.There is a lack ofunderstanding of
thesecurityaspects of the chosenconfiguration.No evidenceThere is hardly any
engagementwithunderstandingthe securityaspects of thechosenconfiguration.No
evidenceofNetwork andInternetTechnology andDesign, as well as
appropriatecountermeasures.vulnerability orvulnerabilities of the chosenconfiguration and
the appropriatecountermeasures. Theunderstanding is supported byextensiveliterature.the
chosenconfiguration and the appropriatecountermeasures. Theunderstanding is supported
byextensiveliterature.configuration and the appropriatecountermeasures.
Theunderstanding is supported by the appropriateliterature.configuration and the
appropriatecountermeasures. Theunderstanding is supported bysome
literature.Theunderstanding is supported by someliterature.of
supportingliterature.supportingliterature.Assessmentdomain 3(Evaluation)Understand
andcommunicate theperformance,costs, overheadsand trade-offs ofdifferent wireless and
mobilecommunicationtechnologies.The assignmentprovidesexceptionallystrong
andconsistentevidence ofcritical evaluation when considering the
adequatelychosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies.
The results of the analysis have beenclearlypresented inaccordancewithThe
assignmentprovidesexcellentevidence ofcritical evaluation when considering the
adequatelychosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies.
The results of the analysis have been clearlypresented inaccordance withthe
providedguideline.The assignmentprovides verygood evidence of critical evaluation when
considering the chosenperformancemetrics, cost,overhead andtrade-offs of
theusedtechnologies. The results of the analysis have beenpresented in accordance with the
providedguideline.The assignmentprovides somegood evidence of critical evaluation when
considering the chosenperformancemetrics, cost,overhead andtrade-offs of
theusedtechnologies. The results of the analysis have been presentedmostly inaccordance
withthe providedguideline.There is someevidence ofevaluationwith respect
toperformancemetrics, cost,overhead andtrade-offs ofthe usedtechnologies.The analysis is
not veryconclusive.Satisfactorypresentationofthe results.Theassignmentprovides
littleevidence ofevaluationwith respecttoperformancemetrics, cost,overhead and trade-offs
of the usedtechnologies. Notsatisfactorypresentationofthe results.The assignmentlacks
evidenceof evaluationwith respect toperformancemetrics, cost,overhead andtrade-offs of
the usedtechnologies. No results havebeen provided.the
providedguideline.Assessmentdomain 4(Communication) Be able
tocommunicateavailabletechnologies forthe design andimplementationof mobile
andwireless networksaccording to userrequirements.Communicates an
exceptionalsystematicunderstanding of Network andInternetTechnology andDesign
processes based on userrequirements.Theunderstanding is supported by
extensiveliterature.Communicates an excellentand systematicunderstanding of Network
andInternetTechnology andDesign processes based on
userrequirements.Theunderstanding is supported by extensiveliterature.Communicates a
very goodunderstanding of Network and InternetTechnology and Design processesbased on
userrequirements.Theunderstanding is supported by
theappropriateliterature.Communicatesoverall a goodunderstanding of Network and
InternetTechnology and Design processesbased on the
userrequirements.Theunderstanding is supported by someliterature.There
issatisfactoryevidence thatat least someuserrequirementshave beenCommunicate d in
Network and InternetTechnologyand Designprocesses and is supported
bysomeliterature.There is a lack ofunderstanding of Networkand InternetTechnologyand
Designprocessesbased on userrequirements.No evidenceof supportingliterature.There is
hardlyany engagementwith anunderstandingof Network andInternetTechnology and
Designprocesses based on userrequirements.No evidence of
supportingliterature.Assessmentdomain
5(Referencing)Determiningappropriateresources.Sources used areacknowledgedin the text
andreference listusing correctacademic citationEvidence ofdetermining anextensive list of
outstandingresources. Allsources used areacknowledged.Evidence
ofdeterminingexcellentresources. Allsources used areacknowledged.Evidence
ofdetermining very good resources. All sources usedareacknowledged.Good evidence of
determiningappropriateresources. Allsources used areacknowledged.Some evidence of
determiningappropriateresources.Most sourcesused areacknowledgedPoor evidence
ofdeterminingappropriateresources.Most sourcesused are notacknowledgedNo evidence
ofdeterminingappropriateresources.Sources usedare notacknowledgedAssessmentdomain
6(Employability)Developingtransferable skills suchinterpersonalskills and human relations
withinteamwork,organisation, andcommunication.Also, timemanagement and commitment
to meeting goals, both short-term andlong-term.Ability to reflect on these skills.Outstanding
and effective groupdynamics.Outstandingeffort tocommunicate,motivate andinspire
membersfrom the CWgroup.Outstandingevidence ofability toreflect on group
work.Outstanding timemanagement and meeting goals ahead of the planned
time.Excellentparticipationwithin groupwork.Excellenteffort tocommunicate,motivate
andcollaborate withmembers from theCW group.Excellentevidence ofability to reflect on
group work.Excellent good group dynamics.Excellent timemanagement.Very
goodparticipationwithin groupwork. Very good effort tocommunicate andcollaborate
withmembers from the CWgroup.Very goodevidence ofability to reflect on group work.Very
good groupdynamics. Very good timemanagementwith noissues incommitting to
meetinggoals.Goodparticipationwithin groupwork. Goodeffort tocommunicate
andcollaborate withmembers from theCW group. Goodevidence ofability to reflect on group
work. Good groupdynamics with minorissues.Good timemanagementwith minor issues in
committing to meetinggoals.Someparticipationwithin groupwork.Limitedeffort
tocommunicateandcollaboratewith membersfrom theCW group.Some evidence of ability
toreflect ongroup work.Groupdynamicshaving areas of concern. Ok timemanagementwith
someissues incommittingto

More Related Content

Similar to Network and Internet Technology and Design Faculty Header.docx

Mis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comMis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comStephenson185
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design Muhd Mu'izuddin
 
Appalanaidu_4.4 Years Exp in DotNet Technology
Appalanaidu_4.4 Years Exp in DotNet TechnologyAppalanaidu_4.4 Years Exp in DotNet Technology
Appalanaidu_4.4 Years Exp in DotNet TechnologyAPPALANAIDU KONDALA
 
1 IT 340 Final Project Guidelines and Rubric O.docx
1  IT 340 Final Project Guidelines and Rubric  O.docx1  IT 340 Final Project Guidelines and Rubric  O.docx
1 IT 340 Final Project Guidelines and Rubric O.docxhoney725342
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguideYahye159
 
1 SDEV 460 – Homework 4 Input Validation and Busine
1  SDEV 460 – Homework 4 Input Validation and Busine1  SDEV 460 – Homework 4 Input Validation and Busine
1 SDEV 460 – Homework 4 Input Validation and BusineVannaJoy20
 
IT 200 Network DiagramBelow is the wired network configurat.docx
IT 200 Network DiagramBelow is the wired network configurat.docxIT 200 Network DiagramBelow is the wired network configurat.docx
IT 200 Network DiagramBelow is the wired network configurat.docxpriestmanmable
 
IRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database TechniquesIRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database TechniquesIRJET Journal
 
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.comCyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.comUOPCourseHelp
 
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
Cyb 360 cyb360 cyb 360 education for service   uopstudy.comCyb 360 cyb360 cyb 360 education for service   uopstudy.com
Cyb 360 cyb360 cyb 360 education for service uopstudy.comUOPCourseHelp
 
Cmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.comCmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.comWilliamsTaylorza49
 
CMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPERCMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPERHamesKellor
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it DomainIRJET Journal
 
Corporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docxCorporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docxvanesaburnand
 
REP.01 NETW3205 Network Management
REP.01 NETW3205 Network ManagementREP.01 NETW3205 Network Management
REP.01 NETW3205 Network ManagementRicardo Pereira
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxrosemariebrayshaw
 
Assessment Details and Submission Guidelines Unit Co.docx
Assessment Details and Submission Guidelines Unit Co.docxAssessment Details and Submission Guidelines Unit Co.docx
Assessment Details and Submission Guidelines Unit Co.docxdavezstarr61655
 
CMIT 265 Education Redefined / snaptutorial.com
CMIT 265  Education Redefined / snaptutorial.comCMIT 265  Education Redefined / snaptutorial.com
CMIT 265 Education Redefined / snaptutorial.comMcdonaldRyan211
 
K N Avinash_ MBA_ BA
K N Avinash_ MBA_ BAK N Avinash_ MBA_ BA
K N Avinash_ MBA_ BAavinashmba
 

Similar to Network and Internet Technology and Design Faculty Header.docx (20)

Mis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.comMis 589 Massive Success / snaptutorial.com
Mis 589 Massive Success / snaptutorial.com
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
 
En35793797
En35793797En35793797
En35793797
 
Appalanaidu_4.4 Years Exp in DotNet Technology
Appalanaidu_4.4 Years Exp in DotNet TechnologyAppalanaidu_4.4 Years Exp in DotNet Technology
Appalanaidu_4.4 Years Exp in DotNet Technology
 
1 IT 340 Final Project Guidelines and Rubric O.docx
1  IT 340 Final Project Guidelines and Rubric  O.docx1  IT 340 Final Project Guidelines and Rubric  O.docx
1 IT 340 Final Project Guidelines and Rubric O.docx
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguide
 
1 SDEV 460 – Homework 4 Input Validation and Busine
1  SDEV 460 – Homework 4 Input Validation and Busine1  SDEV 460 – Homework 4 Input Validation and Busine
1 SDEV 460 – Homework 4 Input Validation and Busine
 
IT 200 Network DiagramBelow is the wired network configurat.docx
IT 200 Network DiagramBelow is the wired network configurat.docxIT 200 Network DiagramBelow is the wired network configurat.docx
IT 200 Network DiagramBelow is the wired network configurat.docx
 
IRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database TechniquesIRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database Techniques
 
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.comCyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
 
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
Cyb 360 cyb360 cyb 360 education for service   uopstudy.comCyb 360 cyb360 cyb 360 education for service   uopstudy.com
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
 
Cmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.comCmit 265 Success Begins / snaptutorial.com
Cmit 265 Success Begins / snaptutorial.com
 
CMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPERCMIT 265 NETWORK DESIGN PAPER
CMIT 265 NETWORK DESIGN PAPER
 
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
IRJET-  	  Implementation of Dynamic Internetworking in the Real World it DomainIRJET-  	  Implementation of Dynamic Internetworking in the Real World it Domain
IRJET- Implementation of Dynamic Internetworking in the Real World it Domain
 
Corporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docxCorporate Embezzlement Imagine you are employed by a large c.docx
Corporate Embezzlement Imagine you are employed by a large c.docx
 
REP.01 NETW3205 Network Management
REP.01 NETW3205 Network ManagementREP.01 NETW3205 Network Management
REP.01 NETW3205 Network Management
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
 
Assessment Details and Submission Guidelines Unit Co.docx
Assessment Details and Submission Guidelines Unit Co.docxAssessment Details and Submission Guidelines Unit Co.docx
Assessment Details and Submission Guidelines Unit Co.docx
 
CMIT 265 Education Redefined / snaptutorial.com
CMIT 265  Education Redefined / snaptutorial.comCMIT 265  Education Redefined / snaptutorial.com
CMIT 265 Education Redefined / snaptutorial.com
 
K N Avinash_ MBA_ BA
K N Avinash_ MBA_ BAK N Avinash_ MBA_ BA
K N Avinash_ MBA_ BA
 

More from 4934bk

You are the information technology manager of an.docx
You are the information technology manager of an.docxYou are the information technology manager of an.docx
You are the information technology manager of an.docx4934bk
 
Your parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docxYour parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docx4934bk
 
Writing in the social sciences.docx
Writing in the social sciences.docxWriting in the social sciences.docx
Writing in the social sciences.docx4934bk
 
to questions.docx
to questions.docxto questions.docx
to questions.docx4934bk
 
Write an essay on the colonial.docx
Write an essay on the colonial.docxWrite an essay on the colonial.docx
Write an essay on the colonial.docx4934bk
 
Write about interactions in the premodern world.docx
Write about interactions in the premodern world.docxWrite about interactions in the premodern world.docx
Write about interactions in the premodern world.docx4934bk
 
Write about Frontline Video or.docx
Write about Frontline Video or.docxWrite about Frontline Video or.docx
Write about Frontline Video or.docx4934bk
 
World War II.docx
World War II.docxWorld War II.docx
World War II.docx4934bk
 
work and Chicano.docx
work and Chicano.docxwork and Chicano.docx
work and Chicano.docx4934bk
 
Write a literary essay based on the.docx
Write a literary essay based on the.docxWrite a literary essay based on the.docx
Write a literary essay based on the.docx4934bk
 
Why are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docxWhy are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docx4934bk
 
Why and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docxWhy and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docx4934bk
 
Why did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docxWhy did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docx4934bk
 
Why and how did the loom large in.docx
Why and how did the loom large in.docxWhy and how did the loom large in.docx
Why and how did the loom large in.docx4934bk
 
What similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docxWhat similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docx4934bk
 
Who invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docxWho invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docx4934bk
 
Which is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docxWhich is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docx4934bk
 
What.docx
What.docxWhat.docx
What.docx4934bk
 
What was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docxWhat was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docx4934bk
 
What stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docxWhat stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docx4934bk
 

More from 4934bk (20)

You are the information technology manager of an.docx
You are the information technology manager of an.docxYou are the information technology manager of an.docx
You are the information technology manager of an.docx
 
Your parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docxYour parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docx
 
Writing in the social sciences.docx
Writing in the social sciences.docxWriting in the social sciences.docx
Writing in the social sciences.docx
 
to questions.docx
to questions.docxto questions.docx
to questions.docx
 
Write an essay on the colonial.docx
Write an essay on the colonial.docxWrite an essay on the colonial.docx
Write an essay on the colonial.docx
 
Write about interactions in the premodern world.docx
Write about interactions in the premodern world.docxWrite about interactions in the premodern world.docx
Write about interactions in the premodern world.docx
 
Write about Frontline Video or.docx
Write about Frontline Video or.docxWrite about Frontline Video or.docx
Write about Frontline Video or.docx
 
World War II.docx
World War II.docxWorld War II.docx
World War II.docx
 
work and Chicano.docx
work and Chicano.docxwork and Chicano.docx
work and Chicano.docx
 
Write a literary essay based on the.docx
Write a literary essay based on the.docxWrite a literary essay based on the.docx
Write a literary essay based on the.docx
 
Why are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docxWhy are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docx
 
Why and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docxWhy and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docx
 
Why did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docxWhy did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docx
 
Why and how did the loom large in.docx
Why and how did the loom large in.docxWhy and how did the loom large in.docx
Why and how did the loom large in.docx
 
What similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docxWhat similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docx
 
Who invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docxWho invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docx
 
Which is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docxWhich is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docx
 
What.docx
What.docxWhat.docx
What.docx
 
What was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docxWhat was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docx
 
What stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docxWhat stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docx
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 

Network and Internet Technology and Design Faculty Header.docx

  • 1. COMP1609(2022/23) Network and Internet Technology and Design Faculty Header ID: COMP1609(2022/23)Network and Internet Technologyand DesignFaculty Header ID:11562Contribution:100% of thecourseCourse Leader:Jason ParkeNetSim CourseworkDeadline Date:Monday 04/12/2022This coursework should take an average student who is up to date with tutorial workapproximately 50 hours Feedback and grades are normally made available within 15 working days of the coursework deadlineLearning Outcomes:A. Demonstrate knowledge of network communication, OSI and TCP/IP model.B. Demonstrate a critical understanding of the top network model with related key protocols, services, and applications.C. Evaluate common network problems (malfunction, poor performance), and adopt a systematic approach to troubleshooting and resolving the problem.D. Be competent in the use of tools designed to analyse and simulate network functionality.Plagiarism is presenting somebody else’s work as your own. It includes copying information directly from the Web or books without referencing the material; submitting joint coursework as an individual effort; copying another student’s coursework; stealing coursework from another student and submitting it as your work. Suspected plagiarism will be investigated and, if found to have occurred, will be dealt withaccording to the university’s procedures. Please see yourstudent handbook for further details of what is/isn’t plagiarism.All material copied or amended from any source (e.g., internet, books) must be referenced correctly accordingto the reference style you are using.Your work will be submitted for plagiarism checking. Anyattempt to bypass our plagiarism detection systems will be treated as a severe Assessment Offence.The coursework detailed specification:This is an individual assessment. Your investigation shouldnot be shared among other students.The objective of the coursework is to simulate a client-server model communication over an IP network and to investigatean application and network performance in multiple providedscenarios.This assessment requires to use NetSim simulator.The network architecture overview:The company’s headquarters are in Greenwich (UK). They have recently opened regional offices in New York (USA), and Dubai (Dubai). The main service provided by the New York and Dubai offices will be gathered and distributed monthly and annual reports describing sales managed by theheadquarters in Greenwich, UK. The company has decided to perform a simulation in case they will expand with anadditional call centre.Greenwich HQ LAN: The network is undefined and needs to be designed by the student with justifications,this implies justification of several nodes, users,
  • 2. andapplications.New York office LAN: It consists of 35 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some applications run by users including printers and databases are local and others like web browsing and MS OneDrive are supported including remote desktops, in Greenwich, UK. Additionally, 8 users work from home using MS Teams & Zoom with all supportedservices.Dubai Office LAN: It consists of 25 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some applications run by users including printers and databases are local and others like web browsing and MS OneDrive are supported remotely, in Greenwich, UK. Additionally, 8 users work from home using MS teams & Zoom for voice and video calls.Network Operations Centre (NOC): It would consist of 15 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some applications run by users including printers and databases are local and others like web browsing and MS OneDrive aresupported remotely, in Greenwich, UK. All users run MS Teams & Zoom conferencing applications with Dubai Office.The tasks:The objective is to perform group literature research, individually build a NetSim simulation model based on the network architecture given and evaluate the behaviour of network parameters gained by simulating the use cases. The design, implementation and simulation discussion imply theinclusion of graphs and justification of made decisions or the results achieved through the simulation.The tasks:1. The objective is to perform group literature research.Perform literature research on the technologies that are used in a modern network. CHOOSE 3 from thefollowing list of network technologies: –i. 5G and WiFi 6 technologyii. Artificial Intelligence (AI) and Machine Learning(ML)iii. Augmented reality and virtual realityiv. Cloud computingv. DevOpsvi. Digital transformationvii. Intent-based networking (IBN)viii. Internet of Things (IoT)ix. Data Securityx. SD-WANThere are multiple providers of such services, someexamples, are Amazon AWS, CrowdStrike and CISCO (BUT NOT LIMITED TO). Critically discuss these technologies concerning the scalability and transparency of communication, providing examples. Identify two or more commercial risks arising due to the failure of such cloud services. The discussion should be documented and should be approximately 700 words. The group should consist of two roles:Risk assessor: The risk assessor evaluates the potential threats.Upgrade engineer: The upgrade engineer must review the technologies from a benefit point of view. [GROUPTASK] 10%2. Design, implement and simulate your model in the NETSIM simulator guided by the given network architecture overview. The design requires detailed documentation on the application and performance settings in the NETSIM simulator for each user and these settings justifications. Following the implementation, you are required to simulate yourscenario. [INDIVIDUAL TASK] 20%3. The documentation must contain subnetting schemes for each LAN/WAN/MAN. Note: You should configure NetSim to use these subnets. You must provide the following: Network Address, Broadcast Address, Usable Addresses, and IP Address assignments to hosts. You must use at least two classes from the PrivateAddress Space. [INDIVIDUAL TASK] 20%4. Investigate the behaviour of the network performance in a variety of cases. The analysis must be done regarding your expectations. Discuss the scenario and hypothesize on the possible outcomes of provided use cases followed by the
  • 3. analysis of the results that werereceived from the simulation. [INDIVIDUAL TASK]20%5. You must review the following [INDIVIDUAL TASK]20%:i. Utilization of the backbone link.ii. Cloud Storage (OneDrive) average file download timeiii. Web Server page response time.iv. The behaviour of MS Teams/Zoom applicationsv. Ethernet delay on the network (bottlenecks)vi. Simulate the following use case: The new NOC will communicate with New York and Dubai offices. It is planned that 10 users will communicate with the Dubai office and 5 users will communicate with the New York office. All offices willcommunicate via MS Teams or Zoom. Investigate the behaviour of the MS Teams vs Zoom in the given scenario.vii. Evaluate the network performance in a use-case, where you would introduce at least one of the improvements that you have identified.6. Provide a critical reflection on the tasks you carried out.[INDIVIDUAL TASK] 5%7. The document must include your concluding comments.[INDIVIDUAL TASK] 5%Note:Perform the analysis of the results starting from the first minute. This should be done, to reduce the noise from the data caused by the initialization of network devices such as routers and switches which may have an impact onyour investigation.The group assessment should be completed in pairs and mustinclude the following: –1. You must provide the names of all participants who contributed to the group work.2. Your submission must include exact copies of the groupwork.Deliverables (No more than 3000 words):A good structure report must include the following:• A literature review on the technologies used in a provided network architecture and the benefits ofusing cloud services. Refer to Task 1.• Description of the designed and implemented scenarios, including the justifications for the design and choice ofperformance parameters. Refer to Task 2.• Documentation on the investigation of required features and use cases, including graphs and analysis of the results of the simulation. Refer to Tasks 3, 4, and 5 and the subcategories.• Based on the results; recommend your choice of consideration to improve the network model.• A critical reflection that is both evaluative and reflective.Refer to Task 6.• Concluding comments. Refer to Task 7.Assessment Criteria:1. Review of technologies and cloud services discussion.(Task 1)10%2. Justified design and simulation of the network architecture and applicationmodels.(Task 2)20%3. Investigation and analysis of the results.(Task 3 + Task 4 + Task 5)55%4. Recommendation of your choice for improvement of network architecture.(Task 5 vii)5%5. Critical reflection(Task 6)5%6. Conclusion(Task 7)5%>80% ExcellentEvidence of in-depth understanding, detailed investigation and analytical explanation of the results, critical and evaluative conclusion. The analysis must include a graphical representation of the results and any relevant network diagrams and identification of trends in the data. All sections were completed to an excellent standard.GoodEvidence of clear understanding, good analysis of the results and some critical and justified evaluation in the conclusion. The analysis must include a graphical representation of the results and any relevant network diagrams and identification of trends in the data. All sections are completed to a consistently good standard.AverageEvidence of an understanding of the networking fundamentals, some results attained and presented. Correct but not incredibly detailed analysis, limited evaluation (but there must be some), all sections attempted and provided.PassLimited data samples and results, shallow analysis, or evaluation. Some essential elements may be
  • 4. missing. The provided documentation must be correct. Conclusions must be included and must be justifiable.PoorA poorly written report without structure. The essential elements are missing, insufficient data samples. Little or no evidence of having devised or conducted research and experiments. Little evidence of understanding, poor orincorrect analysis or the conclusion.Criteria forAssessment90-100Exceptional80-89Excellent70-79Very Good60- 69Good50-59Satisfactory30-49Fail0-29FailAssessmentdomain 1(Knowledge)Demonstrate acriticalunderstanding ofthe technicalchallenges posedby current mobile systems and wirelesscommunications.Demonstrates anexceptionalsystematicunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. Themotivation and rationale of a chosenarea isunderpinned by an exceptionalunderstanding of relevant theory and best practices andengagement with the literature.Demonstrates an excellentsystematicunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. Themotivation and rationale of a chosen area areunderpinned by an excellentunderstanding of relevant theory and best practices andengagement with the literature.Demonstrates a very goodunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. There is evidence thatrelevant theory and best practices have been appliedeffectively in the choice of area, and there is theengagement with the literature.Demonstratesoverall a goodunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. There is some evidence that relevanttheory and best practices have been appliedeffectively in the choice of area, and there is someengagement with the literature.There issatisfactoryevidencethat at least someNetwork and InternetTechnologyand Designand practiceshave beenapplied andsupported by theliterature.There is a lack ofunderstanding of Networkand InternetTechnologyand Designand theirtechnicalchallenges.The choice of the researchproblem lacksjustificationsand is notsupported bythe literature.There is hardly any engagementwith relevanttechnologies,technicalchallenges,and best practices.The choice ofthe researchproblem is not based onengagementwith theliterature.Assessment domain 2(Research)Be able tounderstand andevaluate the key security threats that relate todifferentThe assignmentprovidesexceptionallystrong andconsistentevidence ofcritical evaluationwhenconsideringthe securityThe assignmentprovidesexcellentevidence ofcritical evaluationwhen consideringthe securityvulnerabilityorvulnerabilitiesofThe assignmentprovides verygood evidence ofcritical evaluationwhen consideringthe securityvulnerability orvulnerabilitiesofthe chosenThe assignmentprovides some good evidence ofcritical evaluationwhen consideringthe securityvulnerability orvulnerabilitiesofthe chosenThere is someevidence thatat least someof the securityaspects of the chosenconfigurationhave beenconsidered.There is a lack ofunderstanding of thesecurityaspects of the chosenconfiguration.No evidenceThere is hardly any engagementwithunderstandingthe securityaspects of thechosenconfiguration.No evidenceofNetwork andInternetTechnology andDesign, as well as appropriatecountermeasures.vulnerability orvulnerabilities of the chosenconfiguration and the appropriatecountermeasures. Theunderstanding is supported byextensiveliterature.the chosenconfiguration and the appropriatecountermeasures. Theunderstanding is supported byextensiveliterature.configuration and the appropriatecountermeasures.
  • 5. Theunderstanding is supported by the appropriateliterature.configuration and the appropriatecountermeasures. Theunderstanding is supported bysome literature.Theunderstanding is supported by someliterature.of supportingliterature.supportingliterature.Assessmentdomain 3(Evaluation)Understand andcommunicate theperformance,costs, overheadsand trade-offs ofdifferent wireless and mobilecommunicationtechnologies.The assignmentprovidesexceptionallystrong andconsistentevidence ofcritical evaluation when considering the adequatelychosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have beenclearlypresented inaccordancewithThe assignmentprovidesexcellentevidence ofcritical evaluation when considering the adequatelychosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have been clearlypresented inaccordance withthe providedguideline.The assignmentprovides verygood evidence of critical evaluation when considering the chosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have beenpresented in accordance with the providedguideline.The assignmentprovides somegood evidence of critical evaluation when considering the chosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have been presentedmostly inaccordance withthe providedguideline.There is someevidence ofevaluationwith respect toperformancemetrics, cost,overhead andtrade-offs ofthe usedtechnologies.The analysis is not veryconclusive.Satisfactorypresentationofthe results.Theassignmentprovides littleevidence ofevaluationwith respecttoperformancemetrics, cost,overhead and trade-offs of the usedtechnologies. Notsatisfactorypresentationofthe results.The assignmentlacks evidenceof evaluationwith respect toperformancemetrics, cost,overhead andtrade-offs of the usedtechnologies. No results havebeen provided.the providedguideline.Assessmentdomain 4(Communication) Be able tocommunicateavailabletechnologies forthe design andimplementationof mobile andwireless networksaccording to userrequirements.Communicates an exceptionalsystematicunderstanding of Network andInternetTechnology andDesign processes based on userrequirements.Theunderstanding is supported by extensiveliterature.Communicates an excellentand systematicunderstanding of Network andInternetTechnology andDesign processes based on userrequirements.Theunderstanding is supported by extensiveliterature.Communicates a very goodunderstanding of Network and InternetTechnology and Design processesbased on userrequirements.Theunderstanding is supported by theappropriateliterature.Communicatesoverall a goodunderstanding of Network and InternetTechnology and Design processesbased on the userrequirements.Theunderstanding is supported by someliterature.There issatisfactoryevidence thatat least someuserrequirementshave beenCommunicate d in Network and InternetTechnologyand Designprocesses and is supported bysomeliterature.There is a lack ofunderstanding of Networkand InternetTechnologyand Designprocessesbased on userrequirements.No evidenceof supportingliterature.There is hardlyany engagementwith anunderstandingof Network andInternetTechnology and
  • 6. Designprocesses based on userrequirements.No evidence of supportingliterature.Assessmentdomain 5(Referencing)Determiningappropriateresources.Sources used areacknowledgedin the text andreference listusing correctacademic citationEvidence ofdetermining anextensive list of outstandingresources. Allsources used areacknowledged.Evidence ofdeterminingexcellentresources. Allsources used areacknowledged.Evidence ofdetermining very good resources. All sources usedareacknowledged.Good evidence of determiningappropriateresources. Allsources used areacknowledged.Some evidence of determiningappropriateresources.Most sourcesused areacknowledgedPoor evidence ofdeterminingappropriateresources.Most sourcesused are notacknowledgedNo evidence ofdeterminingappropriateresources.Sources usedare notacknowledgedAssessmentdomain 6(Employability)Developingtransferable skills suchinterpersonalskills and human relations withinteamwork,organisation, andcommunication.Also, timemanagement and commitment to meeting goals, both short-term andlong-term.Ability to reflect on these skills.Outstanding and effective groupdynamics.Outstandingeffort tocommunicate,motivate andinspire membersfrom the CWgroup.Outstandingevidence ofability toreflect on group work.Outstanding timemanagement and meeting goals ahead of the planned time.Excellentparticipationwithin groupwork.Excellenteffort tocommunicate,motivate andcollaborate withmembers from theCW group.Excellentevidence ofability to reflect on group work.Excellent good group dynamics.Excellent timemanagement.Very goodparticipationwithin groupwork. Very good effort tocommunicate andcollaborate withmembers from the CWgroup.Very goodevidence ofability to reflect on group work.Very good groupdynamics. Very good timemanagementwith noissues incommitting to meetinggoals.Goodparticipationwithin groupwork. Goodeffort tocommunicate andcollaborate withmembers from theCW group. Goodevidence ofability to reflect on group work. Good groupdynamics with minorissues.Good timemanagementwith minor issues in committing to meetinggoals.Someparticipationwithin groupwork.Limitedeffort tocommunicateandcollaboratewith membersfrom theCW group.Some evidence of ability toreflect ongroup work.Groupdynamicshaving areas of concern. Ok timemanagementwith someissues incommittingto