COMP1609(2022/23) Network and Internet Technology and Design Faculty Header ID:

COMP1609(2022/23)

Network and Internet Technology

and Design

Faculty Header ID:

11562

Contribution:100% of thecourse

Course Leader:

Jason Parke

NetSim Coursework

Deadline Date:

Monday 04/12/2022

This coursework should take an average student who is up to date with tutorial workapproximately 50 hours Feedback and grades are normally made available within 15 working days of the coursework deadline

Learning Outcomes:

A. Demonstrate knowledge of network communication, OSI and TCP/IP model.B. Demonstrate a critical understanding of the top network model with related key protocols, services, and applications.C. Evaluate common network problems (malfunction, poor performance), and adopt a systematic approach to troubleshooting and resolving the problem.D. Be competent in the use of tools designed to analyse and simulate network functionality.

Plagiarism is presenting somebody else’s work as your own. It includes copying information directly from the Web or books without referencing the material; submitting joint coursework as an individual effort; copying another student’s coursework; stealing coursework from another student and submitting it as your work. Suspected plagiarism will be investigated and, if found to have occurred, will be dealt withaccording to the university’s procedures. Please see yourstudent handbook for further details of what is/isn’t plagiarism.

All material copied or amended from any source (e.g., internet, books) must be referenced correctly accordingto the reference style you are using.

Your work will be submitted for plagiarism checking. Anyattempt to bypass our plagiarism detection systems will be treated as a severe Assessment Offence.

The coursework detailed specification:

This is an individual assessment. Your investigation shouldnot be shared among other students.

The objective of the coursework is to simulate a client-server model communication over an IP network and to investigatean application and network performance in multiple providedscenarios.

This assessment requires to use NetSim simulator.

The network architecture overview:

The company’s headquarters are in Greenwich (UK). They have recently opened regional offices in New York (USA), and Dubai (Dubai). The main service provided by the New York and Dubai offices will be gathered and distributed monthly and annual reports describing sales managed by theheadquarters in Greenwich, UK. The company has decided to perform a simulation in case they will expand with anadditional call centre.

Greenwich HQ LAN: The network is undefined and needs to be designed by the student with justifications,this implies justification of several nodes, users, andapplications.

New York office LAN: It consists of 35 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some applications run by users including printers and databases are local and others like web browsing and MS OneDrive are supported including remote desktops, in Greenwich, UK. Additionally, 8 users work from home using MS Teams & Zoom with all supportedservices.

Dubai Office LAN: It consists of 25 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some applications run by users including printers and databases are local and others like web browsing and MS OneDrive are supported remotely, in Greenwich, UK. Additionally, 8 users work from home using MS teams & Zoom for voice and video calls.

Network Operations Centre (NOC): It would consist of 15 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some applications run by users including printers and databases are local and others like web browsing and MS OneDrive aresupported remotely, in Greenwich, UK. All users run MS Teams & Zoom conferencing applications with Dubai Office.

The tasks:

The objective is to perform group literature research, individually build a NetSim simulation model based on the network architecture given and evaluate the behaviour of network parameters gained by simulating the use cases. The design, implementation and simulation discussion imply theinclusion of graphs and justification of made decisions or the results achieved through the simulation.

The tasks:

1. The objective is to perform group literature research.

Perform literature research on the technologies that are used in a modern network. CHOOSE 3 from thefollowing list of network technologies: –

i. 5G and WiFi 6 technologyii. Artificial Intelligence (AI) and Machine Learning(ML)iii. Augmented reality and virtual realityiv. Cloud computingv. DevOpsvi. Digital transformationvii. Intent-based networking (IBN)viii. Internet of Things (IoT)ix. Data Securityx. SD-WAN

There are multiple providers of such services, someexamples, are Amazon AWS, CrowdStrike and CISCO (BUT NOT LIMITED TO). Critically discuss these technologies concerning the scalability and transparency of communication, providing examples. Identify two or more commercial risks arising due to the failure of such cloud services. The discussion should be documented and should be approximately 700 words. The group should consist of two roles:

Risk assessor: The risk assessor evaluates the potential threats.

Upgrade engineer: The upgrade engineer must review the technologies from a benefit point of view. [GROUPTASK] 10%

2. Design, implement and simulate your model in the NETSIM simulator guided by the given network architecture overview. The design requires detailed documentation on the application and performance settings in the NETSIM simulator for each user and these settings justifications. Following the implementation, you are required to simulate yourscenario. [INDIVIDUAL TASK] 20%

3. The documentation must contain subnetting schemes for each LAN/WAN/MAN. Note: You should configure NetSim to use these subnets. You must provide the following: Network Address, Broadcast Address, Usable Addresses, and IP Address assignments to hosts. You must use at least two classes from the PrivateAddress Space. [INDIVIDUAL TASK] 20%

4. Investigate the behaviour of the network performance in a variety of cases. The analysis must be done regarding your expectations. Discuss the scenario and hypothesize on the possible outcomes of provided use cases followed by the analysis of the results that werereceived from the simulation. [INDIVIDUAL TASK]20%

5. You must review the following [INDIVIDUAL TASK]20%:i. Utilization of the backbone link.ii. Cloud Storage (OneDrive) average file download timeiii. Web Server page response time.iv. The behaviour of MS Teams/Zoom applicationsv. Ethernet delay on the network (bottlenecks)vi. Simulate the following use case: The new NOC will communicate with New York and Dubai offices. It is planned that 10 users will communicate with the Dubai office and 5 users will communicate with the New York office. All offices willcommunicate via MS Teams or Zoom. Investigate the behaviour of the MS Teams vs Zoom in the given scenario.vii. Evaluate the network performance in a use-case, where you would introduce at least one of the improvements that you have identified.

6. Provide a critical reflection on the tasks you carried out.

[INDIVIDUAL TASK] 5%

7. The document must include your concluding comments.

[INDIVIDUAL TASK] 5%

Note:

Perform the analysis of the results starting from the first minute. This should be done, to reduce the noise from the data caused by the initialization of network devices such as routers and switches which may have an impact onyour investigation.

The group assessment should be completed in pairs and mustinclude the following:

1. You must provide the names of all participants who contributed to the group work.2. Your submission must include exact copies of the groupwork.

Deliverables (No more than 3000 words):

A good structure report must include the following:

• A literature review on the technologies used in a provided network architecture and the benefits ofusing cloud services. Refer to Task 1.• Description of the designed and implemented scenarios, including the justifications for the design and choice ofperformance parameters. Refer to Task 2.• Documentation on the investigation of required features and use cases, including graphs and analysis of the results of the simulation. Refer to Tasks 3, 4, and 5 and the subcategories.• Based on the results; recommend your choice of consideration to improve the network model.• A critical reflection that is both evaluative and reflective.Refer to Task 6.• Concluding comments. Refer to Task 7.

Assessment Criteria:

1. Review of technologies and cloud services discussion.

(Task 1)

10%

2. Justified design and simulation of the network architecture and applicationmodels.

(Task 2)

20%

3. Investigation and analysis of the results.

(Task 3 + Task 4 + Task 5)

55%

4. Recommendation of your choice for improvement of network architecture.

(Task 5 vii)

5%

5. Critical reflection

(Task 6)

5%

6. Conclusion

(Task 7)

5%

>80% Excellent

Evidence of in-depth understanding, detailed investigation and analytical explanation of the results, critical and evaluative conclusion. The analysis must include a graphical representation of the results and any relevant network diagrams and identification of trends in the data. All sections were completed to an excellent standard.

Good

Evidence of clear understanding, good analysis of the results and some critical and justified evaluation in the conclusion. The analysis must include a graphical representation of the results and any relevant network diagrams and identification of trends in the data. All sections are completed to a consistently good standard.

Average

Evidence of an understanding of the networking fundamentals, some results attained and presented. Correct but not incredibly detailed analysis, limited evaluation (but there must be some), all sections attempted and provided.

Pass

Limited data samples and results, shallow analysis, or evaluation. Some essential elements may be missing. The provided documentation must be correct. Conclusions must be included and must be justifiable.

Poor

A poorly written report without structure. The essential elements are missing, insufficient data samples. Little or no evidence of having devised or conducted research and experiments. Little evidence of understanding, poor orincorrect analysis or the conclusion.

Criteria forAssessment

90-100

Exceptional

80-89

Excellent

70-79

Very Good

60-69

Good

50-59

Satisfactory

30-49

Fail

0-29

Fail

Assessmentdomain 1(Knowledge)Demonstrate acriticalunderstanding ofthe technicalchallenges posedby current mobile systems and wirelesscommunications.

Demonstrates anexceptionalsystematicunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. Themotivation and rationale of a chosenarea isunderpinned by an exceptionalunderstanding of relevant theory and best practices andengagement with the literature.

Demonstrates an excellentsystematicunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. Themotivation and rationale of a chosen area areunderpinned by an excellentunderstanding of relevant theory and best practices andengagement with the literature.

Demonstrates a very goodunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. There is evidence thatrelevant theory and best practices have been appliedeffectively in the choice of area, and there is theengagement with the literature.

Demonstratesoverall a goodunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. There is some evidence that relevanttheory and best practices have been appliedeffectively in the choice of area, and there is someengagement with the literature.

There issatisfactoryevidencethat at least someNetwork and InternetTechnologyand Designand practiceshave beenapplied andsupported by theliterature.

There is a lack ofunderstanding of Networkand InternetTechnologyand Designand theirtechnicalchallenges.

The choice of the researchproblem lacksjustificationsand is notsupported bythe literature.

There is hardly any engagementwith relevanttechnologies,technicalchallenges,and best practices.The choice ofthe researchproblem is not based onengagementwith theliterature.

Assessment domain 2(Research)

Be able tounderstand andevaluate the key security threats that relate to

different

The assignmentprovidesexceptionallystrong andconsistentevidence ofcritical evaluationwhenconsidering

the security

The assignmentprovidesexcellentevidence ofcritical evaluationwhen consideringthe securityvulnerabilityor

vulnerabilitiesof

The assignmentprovides verygood evidence ofcritical evaluationwhen consideringthe securityvulnerability orvulnerabilitiesof

the chosen

The assignmentprovides some good evidence ofcritical evaluationwhen consideringthe securityvulnerability orvulnerabilitiesof

the chosen

There is someevidence thatat least someof the securityaspects of the chosenconfigurationhave been

considered.

There is a lack ofunderstanding of thesecurityaspects of the chosenconfiguration.

No evidence

There is hardly any engagementwithunderstandingthe securityaspects of thechosenconfiguration.

No evidenceof

Network andInternetTechnology andDesign, as well as appropriatecountermeasures

.

vulnerability orvulnerabilities of the chosenconfiguration and the appropriatecountermeasures

. Theunderstanding is supported byextensive

literature.

the chosenconfiguration and the appropriatecountermeasures

. Theunderstanding is supported byextensiveliterature.

configuration and the appropriatecountermeasures

. Theunderstanding is supported by the appropriateliterature.

configuration and the appropriatecountermeasures

. Theunderstanding is supported bysome literature.

Theunderstanding is supported by someliterature.

of supportingliterature.

supportingliterature.

Assessmentdomain 3(Evaluation)Understand andcommunicate theperformance,costs, overheadsand trade-offs ofdifferent wireless and mobilecommunicationtechnologies.

The assignmentprovidesexceptionallystrong andconsistentevidence ofcritical evaluation when considering the adequatelychosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have beenclearly

presented inaccordancewith

The assignmentprovidesexcellentevidence ofcritical evaluation when considering the adequatelychosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have been clearlypresented inaccordance with

the providedguideline.

The assignmentprovides verygood evidence of critical evaluation when considering the chosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have beenpresented in accordance with the providedguideline.

The assignmentprovides somegood evidence of critical evaluation when considering the chosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have been presentedmostly inaccordance withthe providedguideline.

There is someevidence ofevaluationwith respect toperformancemetrics, cost,overhead andtrade-offs ofthe usedtechnologies.The analysis is not veryconclusive.

Satisfactorypresentationof

the results.

Theassignmentprovides littleevidence ofevaluationwith respecttoperformancemetrics, cost,overhead and trade-offs of the usedtechnologies. Notsatisfactorypresentationof

the results.

The assignmentlacks evidenceof evaluationwith respect toperformancemetrics, cost,overhead andtrade-offs of the usedtechnologies. No results havebeen provided.

the providedguideline.

Assessmentdomain 4(Communication) Be able tocommunicateavailabletechnologies forthe design andimplementationof mobile andwireless networksaccording to userrequirements.

Communicates an exceptionalsystematicunderstanding of Network andInternetTechnology andDesign processes based on userrequirements.

Theunderstanding is supported by extensiveliterature.

Communicates an excellentand systematicunderstanding of Network andInternetTechnology andDesign processes based on userrequirements.

Theunderstanding is supported by extensiveliterature.

Communicates a very goodunderstanding of Network and InternetTechnology and Design processesbased on userrequirements.

Theunderstanding is supported by theappropriateliterature.

Communicatesoverall a goodunderstanding of Network and InternetTechnology and Design processesbased on the userrequirements.

Theunderstanding is supported by someliterature.

There issatisfactoryevidence thatat least someuserrequirementshave beenCommunicate d in Network and InternetTechnologyand Designprocesses and is supported bysome

literature.

There is a lack ofunderstanding of Networkand InternetTechnologyand Designprocessesbased on userrequirements.No evidenceof supportingliterature.

There is hardlyany engagementwith anunderstandingof Network andInternetTechnology and Designprocesses based on userrequirements.

No evidence of supportingliterature.

Assessmentdomain 5(Referencing)

Determiningappropriateresources.Sources used areacknowledgedin the text andreference listusing correct

academic citation

Evidence ofdetermining anextensive list of outstandingresources. Allsources used areacknowledged.

Evidence ofdeterminingexcellentresources. Allsources used areacknowledged.

Evidence ofdetermining very good resources. All sources usedareacknowledged.

Good evidence of determiningappropriateresources. Allsources used areacknowledged.

Some evidence of determiningappropriateresources.

Most sourcesused areacknowledged

Poor evidence ofdeterminingappropriateresources.

Most sourcesused are notacknowledged

No evidence ofdeterminingappropriateresources.

Sources usedare notacknowledged

Assessmentdomain 6(Employability)

Developingtransferable skills suchinterpersonalskills and human relations withinteamwork,organisation, andcommunication.Also, timemanagement and commitment to meeting goals, both short-term andlong-term.

Ability to reflect on these skills.

Outstanding and effective groupdynamics.

Outstandingeffort tocommunicate,motivate andinspire membersfrom the CWgroup.

Outstandingevidence ofability toreflect on group work.Outstanding timemanagement and meeting goals ahead of the planned time.

Excellentparticipationwithin groupwork.Excellenteffort tocommunicate,motivate andcollaborate withmembers from the

CW group.Excellentevidence ofability to reflect on group work.Excellent good group dynamics.Excellent timemanagement.

Very goodparticipationwithin groupwork. Very good effort tocommunicate andcollaborate withmembers from the CWgroup.

Very goodevidence ofability to reflect on group work.Very good groupdynamics. Very good timemanagementwith noissues incommitting to meetinggoals.

Goodparticipationwithin groupwork.   Goodeffort tocommunicate andcollaborate withmembers from the

CW group. Goodevidence ofability to reflect on group work. Good groupdynamics with minorissues.

Good timemanagementwith minor issues in committing to meetinggoals.

Someparticipationwithin groupwork.Limitedeffort tocommunicateandcollaboratewith membersfrom the

CW group.Some evidence of ability toreflect ongroup work.

Groupdynamicshaving areas of concern. Ok timemanagementwith someissues incommittingto

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

patient file

Your final project for this course will be a patient record analysis. You will apply the knowledge of anatomy, physiology, and pharmacology that you have developed during this course in a thorough review of existing patient information in the Final Project Patient File. Specifically, you will review a patient’s history

610 6-1 Discussion: Improve, Part Two—Mitigating Unwanted Consequences

 The Essential Workplace Conflict Handbook. Including the IMPROVE Supplementary Document. Next, in your initial post, address the following: • In what ways do you perceive the Improve phase as being informed by the other phases of DMAIC that you have worked with in the course thus far? • How can

Code of conduct

 For this assignment, Write a paper about employee codes of conduct using information from your textbook and at least two other scholarly sources. First, research employee codes of ethics, especially for the medical field. Next, find some examples of employee codes of ethics from medical facilities and choose the one

Human Growth and Development

Scenario: Simon Whitaker is 42 years old and has suffered from mental illness since his late teens. He lives in a flat in a large housing estate. He lost his job as a warehouse cleaner after he was admitted to hospital the last time he became ill, two years ago.

Exporting Security

Write a 2 page argumentative essay on the links provided below. Link 1: https://www.airuniversity.af.edu/SSQ/Book-Reviews/Article/1292320/exporting-security-international-engagement-security-cooperation-and-the-changi/ Link 2:https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1049&context=nwc-review Link 3: https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1049&context=nwc-review #Exporting #Security

Organizational culture and values

 Details: Prepare a 10-minute presentation (10-15 slides, not including title or reference slide) on organizational culture and values. Describe how alignment between the values of an organization and the values of the nurse impact nurse engagement and patient outcomes. Discuss how an individual can use effective communication techniques to overcome

Document Analysis

Document Analysis (5% – c. 500 words) Primary sources are writings that were produced by individuals or groups at the time of the historical events or issues that they deal with. A number of such documents have been placed on Blackboard, organized by course unit. This assignment requires you to

M3D1: Big Data

The discussion will examine the social interaction of participants regarding an issue or situation and its impact on research data. This discussion addresses the following module outcomes: •MO1: Become familiar with the process of conducting marketing research methods and research tools •MO2: Review the process marketers use for identifying and

Case Study 1 and 2 Pneumonia and Addison diseases

Review the case study and answer all questions with a scholarly response using APA and include 2 scholarly references. Answer both case studies on the same document and upload 1 document to Moodle. Case Studies will be uploaded to Moodle and put through TURN-It-In (anti-Plagiarism program) Turn it in Score

Should schools ban unhealthy snack machines?

 Your outline should include: An explanation of the controversial issue, why is it controversial? Identify which position or side you will take in your paper, and explain why. If you don’t agree with the position you are taking discuss how this could affect your argument on the topic. If you

The Outcome of Inequality of Wealth and Income

Research Topic: Submit an idea for a research study based on a business/economic problem. • Write the title of the study. • Explain your overarching aim for the study. • What is the problem? • What is the significance of it? • Draft at least two research questions. Due 1/27

“practice of professional engineering”

1. “practice of professional engineering” means any act of planning, designing, composing, evaluating, advising, reporting, directing or supervising that requires the application of engineering principles and concerns the safeguarding of life, health, property, economic interests, the public welfare or the environment, or the managing of any such act; (“exercice de

Curriculum Development and Evaluation

 Learning Materials: Keating, S. B. (2011). Curriculum development and evaluation in nursing (2nd ed.). New York: Springer. (Chapter 13) Books are on website Vital Source user name is sred9196@yahoo.com, the password is Bungalow9@ • Exercise #1: Address an educational need among nursing staff at a health care agency. In the

Epidemiology and Surveillance

Research the public health agency in Chicago, IL and develop a presentation on its structure, response capabilities, surveillance tools, and role in emergency management. In your response, include a description of the community served by the department (Chicago), its emergency response structure, surveillance systems that are used at hospitals, biohazard

General Psychology Application

 General Psychology Application Essay Over the course of the class, we have discussed a number of different psychological concepts and theories. For your paper you will be asked to connect a real life experience or observation with a concept or theory from lecture and/or your textbook. Your assignment should include

Issues and Trends in Curriculum Development

 Learning Materials: • Iwasiw, C., Goldenberg, D., & Andrusyszyn, M. (2009). Curriculum development in nursing education (2nd ed.). Boston: Jones & Bartlett. (Chapters 13 and 14) • Keating, S. B. (2011). Curriculum development and evaluation in nursing (2nd ed.). New York: Springer. (Chapters 16 and 17) PowerPoint • Chapter 13

Foundation of Nursing Module 2.1 ( Discussion)

Module 2.1 – Discussion Nursing Theories and Theorists Instructions: After reading the assigned chapters, please post two discussion questions based on the readings along with your answers to the following questions: Did any of the theories or theorist influence your own personal theory of nursing; and consequently, your own view