Principles of IP Addressing and Subnetting - Module Assignment
Students who successfully complete this module will be able to:
- Demonstrate a broad understanding of the knowledge base of this module, and its terminology and discourse (with specific reference to transmission media, data encoding, transmission modes, error detection and correction, flow control, multiplexing, switching techniques, and routing);
- Identify and evaluate the principles and concepts underlying theoretical frameworks highlighted in this module, and demonstrate an ability to identify their strengths and weaknesses, especially in relation to the evolving networking scene (covering network topologies, protocols, layering, standardisation);
- Collect and evaluate information from a variety of authoritative sources to inform a choice of solutions to standard data communication and network problems highlighted in this module, including online open source and subscription-only literature;
- Evaluate the reliability of data and information provided in this module, using pre-defined techniques and/or criteria, especially inrelation to free resources.
This is an individual assignment designed to allow students to demonstrate a broad understanding and knowledge of the principles of networking technologies. It also gives students the opportunity to demonstrate research, analyse skills and evaluate common network underpinning principles and standards
- One common strategy in data communication is to reduce errors. An error in data communication occurs when sent data does not equate with the received data, the method in discovering error and/or discover and correct varies depending on the method and algorithm applied. You are to explain using at least one example for each of CRC and hamming error discovery/correction.
- Explain with the aid of diagrams and examples different digital modulation techniques and encoding schemes.
- The TCP/IP models are known to be very successful suites in data communication. Explain with the aid of diagrams the TCP/IP model layers, analysing functions protocol within each layer.
- Known to be one of the most important protocol used in computer networks, User Datagram Protocol (UDP) facilitates messaging between different network devices. To best understand and analyse the protocol, one needs to monitor and capture the traffic using protocol analyser. Using Wireshark capture and analyse UDP traffic, identify source and destination MAC address, source and destination IP address by showing the full work of your experiment in a logical structure.
- You are working as a pre-sales engineer in an IT company. You have been assigned to design and implement a network infrastructure for a client company. The Company consist of 4 departments. The distribution of workstation is shown in table 1. The director instructed you to use private IP address.
Table 1: workstation distribution
Explain the principles of IP addressing based on IPv4 and discuss the key practical issues in implementing IP addressing.
Subnet the above network IP address based on the given requirements including future possible expansion for both number of departments and users in each department.
- All components of the assignment must be submitted in ….one-word file (hand-written text or hand drawn diagrams are not acceptable), any other accompanied materials such as simulation file, code, etc. should be attached in appendices.
- Standard and commonly used fonts such as Arial or Calibri should be used, font size must be within the range of 10 to 15 points including the headings, body text and any texts within diagrams,
- Spacing should not be less than 1.5
- Pay attention to the Assessment criteria / Marking scheme, the work is to be concise and technical. Try to analyse, compare and evaluate rather than simply describe.
- All figures, screenshots, graphs and tables must be numbered and labelled.
- The assignment should be logically structured, the core of the report may start by defining the problem / requirements, followed by the proposed solution including a detailed discussion, analysis and evaluation, leading to implementation and testing stage, finally a conclusion and/or personal reflection on learning.
- Screenshots without description / discussion does not constitute understanding and maybe assumed irrelevant.
- Please access your Turnitin Test Page via Dashboard or My modules to learn more about Turnitin and to make a test submission and to check your similarity score before uploading your final version
- You will have opportunity to submit as many times to your module pages as you want up until thedeadline.
- Make sure to make backup of your work to avoid distress for loss or damage of your original work, use multiple storage media (memory stick, cloud and personal computer).
- Please note file size limitation might apply. You work must be under 100MB.