Unit-02 - Networking Assignment - 2024 Asry
Unit-02 - Networking Assignment - 2024 Asry
Unit-02 - Networking Assignment - 2024 Asry
Feedback Form
Student Name/ID
Assignment 1 Assessor
Number
Date
Submission Date
Received
1st
submission
Date Received
Re-submission
2nd submission
Date
Assessor Feedback:
D3
* Please note that grade decisions are provisional. They are only confirmed once internal
and external moderation has taken place and grades decisions have been agreed at
the assessment board.
Resubmission Feedback:
Please note that grade decisions are provisional. They are only confirmed once internal
and external moderation has taken place and grades decisions have been agreed at the
assessment board.
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of your
work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You
will then be asked to complete an alternative assignment.
10.If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD
referencing system to avoid plagiarism. You have to provide both in-text citation and a
reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could
be reduced to A REFERRAL or at worst you could be expelled from the course
12.Use word processing application spell check and grammar check function to help
editing your assignment.
13.Use footer function in the word processor to insert Your Name, Subject,
Assignment No, and Page Number on each page. This is useful if individual sheets
become detached for any reason.
Unit: 2 -Networking
LAN Design & Implementation for BlueScope Steel Corp.
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students
who break the rules, however innocently, may be penalized. It is your responsibility to
ensure that you understand correct referencing practices. As a university level student, you
are expected to use appropriate references throughout and keep carefully detailed notes of all
your sources of materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your course tutor if
you need any further advice.
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
Student Date
signature: :
Asry Networking 4|Page
UNIT 2 – NETWORKING
ASSIGNMENT BRIEF
Academic Year
Unit Tutor
Assignment Title LAN Design & Implementation for BlueScope Steel Corp.
Issue Date
Submission Date
Submission Format
The submission should be in the form of an individual report written in a concise, formal style using
single spacing (refer to the assignment guidelines for more details) and a formal presentation with 8-
10 slide.
Individual Report
You are required to make use of headings, paragraphs, and subsections as appropriate, and all work
must be supported with research and referenced using Harvard referencing system. Please provide in-
text citation and a list of references using Harvard referencing system. The recommended word
count is 3,000–3,500 words for the report excluding annexures, although you will not be
penalised for exceeding the total word limit, although you will not be penalized for exceeding the
total word limit.
Presentation
A formal 10–15-minutes presentation (8-10 slides as a guide, with supporting speaker notes) to
communicate an investigation to a non-technical audience discussing the key features and
You have been appointed as the junior network administrator of BlueScope and your task is to,
design and restructure the existing network. Prepare a network architectural design and implement
it with your suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Melbourne is as follows:
Floor 1:
Reception area (5 employees)
Sales & Marketing Department (20 employees)
Customer Services Area – with Wi-Fi facilities
Factory area (30 employees)
Warehouse and the distribution (25 employees)
Floor 2:
Director suits (5 suits)
Boardroom with Video conferencing facility and Wi-Fi.
Administration Department (25 Employees)
HR Department (6 employees)
Floor 3:
Asry Networking 10 | P a g e
Accounting & Finance Department (15 employees)
IT Department (6 employees)
The Server Room
The newly established floor plan of the Darwin is as follows: Floor 1:
Reception area (2 employees)
Customer Services Area– with Wi-Fi facilities
Factory area (35 employees)
Warehouse and the distribution (20employees)
Floor 2:
Administration Department (15 Employees)
HR Department (7 employees)
Accounting & Finance Department (18 employees)
IT Department (6 employees)
The Server Room
The conferencing room of the head office and Customer Services Areas
of each branch are to be equipped with Wi- Fi connections .
Asry Networking 11 | P a g e
be provided within the report except the server room .
The Sales and Marketing Team also needs to access Network resources
( Note: Clearly state your assumptions. You are allowed to design the
network according to your assumptions, but main requirements
should not be violated)
Activity 01
Activity 02
Asry Networking 12 | P a g e
Discuss the operating principles of network devices ( Ex: Router,
Switch, Etc.) and server types that can be used for above scenario
while exploring
Asry Networking 13 | P a g e
different servers that are available in today’ s market with their
specifications and recommend server/ servers for the above scenario
and justify your selection with valid points.
Activity 03
Prepare a written network design plan to meet the above - mentioned user
requirements including a blueprint drawn using a modeling tool ( Ex:
Microsoft Visio, Edraw Max) and test and evaluate the proposed design by
analysing user feedback with the aim of optimizing your design and
improving efficiency.
( Support your answer by providing the VLAN and IP subnetting scheme for
the above scenario and the l ist of devices, network components and
software used to design the network for above scenario and while
justifying your selections.)
Asry Networking 14 | P a g e
Activity 04
Develop test cases and conduct verification ( Ex: Ping, extended ping,
trace route, telnet, SSH, etc.) to test the above Network and
analyse the test results against the expected results.
Asry Networking 15 | P a g e
Recommended resources
Please note that the resources listed are examples for you to use as a starting point in your research – the
list is not definitive.
Weblinks:
https://blog.netwrix.com/ (2022) Network Devices Explained [online] Available at:
https://blog.netwrix.com/2019/01/08/network-devices-explained/ [Accessed 1 August 2022]
https://www.checkpoint.com/ (n.d.) What is a Firewall? [online] Available at:
https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/ [Accessed 1 August
2022]
https://www.checkpoint.com/ (n.d.) What is an IoT Gateway? [online] Available at:
https://www.checkpoint.com/cyber-hub/network-security/what-is-iot/what-is-an-iot gateway/
[Accessed 1 August 2022]
https://www.cloudflare.com/en-gb/ (n.d.) A global network built for the cloud [online] Available at:
https://www.cloudflare.com/en-gb/learning/network-layer/internet-protocol/ [Accessed 1 August
2022]
https://www.comparitech.com/ (2020) Variable Length Subnet Mask (VLSM) Tutorial [online]
Available at: https://www.comparitech.com/net-admin/variable-length-subnet-mask-vlsm tutorial/
[Accessed 1 August 2022]
https://www.comptia.org/ (n.d.) What Is a Network Protocol, and How Does It Work? [online]
Available at: https://www.comptia.org/content/guides/what-is-a-network-protocol [Accessed 1
August 2022]
https://www.ibm.com/uk-en (2021) Networking [online] Available at: https://www.ibm.com/uk-
en/cloud/learn/networking-a-complete-guide [Accessed 1 August 2022]
https://www.ibm.com/uk-en (2022) TCP/IP protocols [online] Available at:
https://www.ibm.com/docs/en/aix/7.2?topic=protocol-tcpip-protocols [Accessed 1 August 2022]
https://www.lifewire.com/ (2022) What Is Bandwidth? Definition, Meaning, and Details [online]
Available at: https://www.lifewire.com/what-is-bandwidth-2625809 [Accessed 1 August 2022]
https://www.ncsc.gov.uk/ (2019) Secure design principles [online] Available at:
https://www.ncsc.gov.uk/collection/cyber-security-design-principles [Accessed 1 August 2022]
https://www.serverwatch.com/ (2021) Network Server [online] Available at:
https://www.serverwatch.com/servers/network-server/ [Accessed 1 August 2022]
Asry Networking 16 | P a g e
https://www.techtarget.com/ (2022) IoT gateway [online] Available at:
https://www.techtarget.com/iotagenda/definition/IoT-gateway [Accessed 1 August 2022]
https://www.univention.com/ (2022) Brief Introduction: DHCP and DNS [online] Available at:
https://www.univention.com/blog-en/brief-introduction/2019/03/brief-introduction-dhcp dns/
[Accessed 1 August 2022]
Asry Networking 17 | P a g e
Virtual Network Simulators:
https://www.adobe.com/ (n.d.) DNS/DHCP/EMAIL VIA PACKET TRACER [online] Available at:
https://express.adobe.com/page/7ogipygZfOh0B/ [Accessed 1 August 2022]
https://techgenix.com/ (2019) Tips and tools for simulating a complex network in a virtual lab
[online] Available at: https://techgenix.com/simulating-network-in-virtual-lab/ [Accessed 1 August
2022]
https://www.eve-ng.net/ (2022) EVE - The Emulated Virtual Environment For Network, Security
and DevOps Professionals [online] Available at: https://www.eve-ng.net/ [Accessed 1 August
2022]
https://www.gns3.com/ (2022) The software that empowers network professionals [online]
Available at: https://www.gns3.com/ [Accessed 1 August 2022] https://www.netacad.com/ (n.d.)
Cisco Packet Tracer [online] Available at: https://www.netacad.com/courses/packet-tracer
[Accessed 1 August 2022]
Journal articles.
Agyemang, J., Kponyo, J. and Klogo, G., 2022. The State of Wireless Routers as Gateways for
Internet of Things (IoT) Devices. [online] Pubs.sciepub.com. Available at: [Accessed 1 August
2022].
Oje, A. (2021) Optimization and analysis of the packet switched network with focus on the 3G
network. Journal of Physics: Conference Series, Volume 1734, International Conference on Recent
Trends in Applied Research doi:10.1088/1742-6596/1734/1/012037 Available at:
https://iopscience.iop.org/article/10.1088/1742-6596/1734/1/012037/meta [Accessed 1 August
2022].
Tyagi, A. (2020) TCP/IP Protocol Suite. International Journal of Scientific Research in Computer
Science Engineering and Information Technology doi:10.32628/CSEIT206420 Available at:
https://www.researchgate.net/publication/346829282_TCPIP_Protocol_Suite [Accessed 1 August
2022].
Van der Toorn et al. (2022) Addressing the challenges of modern DNS a comprehensive tutorial.
Computer Science Review, Volume 45, 2022, 100469,
https://doi.org/10.1016/j.cosrev.2022.100469
Xu, G. (2021) Research on the Application of the IPv6 Network Protocol. Journal of Physics:
Conference Series doi:10.1088/1742-6596/2031/1/012040 Available at:
https://iopscience.iop.org/article/10.1088/1742-6596/2031/1/012040/pdf [Accessed 1 August
Asry Networking 18 | P a g e
2022].
ZHUKOVYTS’KYY, Igor & PAKHOMOVA, Victoria. (2018). Research of token ring network options in
automation system of marshalling yard. Transport Problems. 13. 149-158.
doi:10.20858/tp.2018.13.2.14.
Asry Networking 19 | P a g e
Reading:
Bonaventure, O. (2011) Computer Networking: Principles, Protocols and Practice, The Saylor
Foundation, Available at: https://resources.saylor.org/wwwresources/archived/site/wp
content/uploads/2012/02/Computer-Networking-Principles-Bonaventure-1-30-31-OTC1.pdf
Asry Networking 20 | P a g e
Asry Networking 21 | P a g e
Asry Networking 22 | P a g e
Asry Networking 23 | P a g e
Asry Networking 24 | P a g e