how much.?and please i need it before deadline
Assessment Details and Submission Guidelines Unit Code BN305 Unit Title Virtual Private Networks Assessment Type Individual Assessment Title Secure Network Design and Implementation Purpose of the This assignment assesses the following Unit Learning Outcomes; students should be assessment (with able to demonstrate their achievements in them. ULO Mapping) Describe architectural VPN design for small, medium and large businesses and corporations Report on the health of the existing VPN architecture, solution, data, application, and technology Discuss the appropriate security design and solutions for varieties of organisations Report on the current and future state of the management of VPN infrastructure and its technologies Interpret a roadmap process to transform the VPN architecture to support long- term organisations’ goals Implement a process to support the administration and the management of VPN Weight 15% Total Marks 40 Word limit See the instructions. Due Date Sunday 11:55pm i.e. 22th of September 2019 Submission All work must be submitted on Moodle by the due date along with a completed Guidelines Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Script based on your implementation must be submitted to moodle Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and- guidelines/specialconsiderationdeferment Academic Academic Misconduct is a serious offence. Depending on the seriousness of the case, Misconduct penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute- publications/policies-procedures-and-guidelines/Plagiarism-Academic- Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. Prepared by: ABM RusselModerated by: Noor-U-ZamanAugust, 2019 Assignment Description Tasks: There are two parts to this assignment, i.e. part A and part B. 1. Investigate, design and develop a suitable VPN network for a fictitious company in Australia (National Cyber Security Services Inc.) by addressing the following criteria. See detailed instruction in the next section. (35 marks) 2. Presentation. (5 marks) Note: Only one report for part A and one presentation slide for part B per group should be submitted. Part A description: (35 marks) National Cyber Security Services Inc. is a fictitious company in Australia and currently operating in Brisbane. Recently, National Cyber Security Services Inc. is planning to expand their operations in Melbourne and Sydney. You have been contracted to analyse various options and develop a VPN network design so that three sites can be connected securely. This is in addition to remote users (5 from Melbourne and three from Sydney) who should be able to access their work from the company site while travelling. 1. Design a network for National Cyber Security Services Inc. 2. Build VPN services for the users. The network solution would be built on a simulator (such as Packet Tracer or NetSim) and include establishing VPN connections from remote sites to main branch in Brisbane. 3. You need to select the IP address of your network at main branch based on your group ID of the third subnet such as: 10.0.g.x, where g is your group ID. The other branches at Sydney and Melbourne can use the same ip or different IP but with third subnet equal to your group ID. You need to use different IP for WAN connection. Report must include: Introduction Scopes and Limitations Requirements (Network parts and VPN service parts) Solution Design o Logical Design o Physical Design o Network Topologies o IP addressing o Security features and Policies Prepared by: ABM RusselModerated by: Noor-U-ZamanAugust, 2019 o Redundancy and Failover plans o VPN service Deployment and implementation Refer the sample document included in below for network design, and consider how to deploy and implement relevant VPN services onto the network. You need to choose the right type of VPNs and protocols that satisfy the requirements for remote and branch to branch connectivity. Part B description: (5 marks) Presentation slides should be submitted in Moodle prior to the presentation for marking. No other options (e.g. hard copy, memory stick, website, email etc) will be considered but the presentation file submitted in Moodle. Students need to demonstrate their work in Lab 11. The demonstration will include viva voce (oral test) questions as well. The final mark of Part A of this assignment might be reduced to half based on students’ presentation. Marking criteria: Section to be included in the Marks Description report and demonstration Correctly identifying, appropriateness, discussion The 5 Identification and Analysis and document should include all necessary headings and contents description to depict a VPN services and network design as per the example provided Description and justification Design This section should include proper headings and contents to propose a solution for a VPN network. Wireless LAN solution 15 Explanation/justification needs to be included. The design of this scenario should be unique and not overlapping with other group Implementation Implementation of the network solution should include VPN 12 and based on the specified design Presentation Presentation slides should be well organised and presentation 5 should be delivered well. References References should follow IEEE Style 3 Total 40 Marking Rubric Grade Mark HD 32-40 D 28-31 CR 24-27 P 20-23 Fail <20 excellent very good good satisfactory unsatisfactory identification and highly valid and valid and generally valid and valid but no not valid and analysis and appropriate appropriate appropriate appropriate not appropriate description /5 prepared by: abm russelmoderated by: noor-u-zamanaugust, 2019 components components all elements are present and most explanation/ present with present and well mostly well components lacks structure. justification /15 integrated. good cohesion integrated present components components implementation all elements are present with present and most didn’t present and well good mostly components /12 implement. implemented. implemented implemented implemented presentation presentation presentation slides presentation /5 slides were very presentation was did not present. good and well slides were good were organised given. well presented. and presented. presented. clear styles with clear generally good unclear lacks reference style /3 excellent source referencing/ referencing/styl consistency with referencing/sty le of references. style e many errors prepared by: abm russelmoderated by: noor-u-zamanaugust, 2019 excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" identification="" and="" highly="" valid="" and="" valid="" and="" generally="" valid="" and="" valid="" but="" no="" not="" valid="" and="" analysis="" and="" appropriate="" appropriate="" appropriate="" appropriate="" not="" appropriate="" description="" 5="" prepared="" by:="" abm="" russel="" moderated="" by:="" noor-u-zaman="" august,="" 2019="" components="" components="" all="" elements="" are="" present="" and="" most="" explanation/="" present="" with="" present="" and="" well="" mostly="" well="" components="" lacks="" structure.="" justification="" 15="" integrated.="" good="" cohesion="" integrated="" present="" components="" components="" implementation="" all="" elements="" are="" present="" with="" present="" and="" most="" didn’t="" present="" and="" well="" good="" mostly="" components="" 12="" implement.="" implemented.="" implemented="" implemented="" implemented="" presentation="" presentation="" presentation="" slides="" presentation="" 5="" slides="" were="" very="" presentation="" was="" did="" not="" present.="" good="" and="" well="" slides="" were="" good="" were="" organised="" given.="" well="" presented.="" and="" presented.="" presented.="" clear="" styles="" with="" clear="" generally="" good="" unclear="" lacks="" reference="" style="" 3="" excellent="" source="" referencing/="" referencing/styl="" consistency="" with="" referencing/sty="" le="" of="" references.="" style="" e="" many="" errors="" prepared="" by:="" abm="" russel="" moderated="" by:="" noor-u-zaman="" august,="">20 excellent very good good satisfactory unsatisfactory identification and highly valid and valid and generally valid and valid but no not valid and analysis and appropriate appropriate appropriate appropriate not appropriate description /5 prepared by: abm russelmoderated by: noor-u-zamanaugust, 2019 components components all elements are present and most explanation/ present with present and well mostly well components lacks structure. justification /15 integrated. good cohesion integrated present components components implementation all elements are present with present and most didn’t present and well good mostly components /12 implement. implemented. implemented implemented implemented presentation presentation presentation slides presentation /5 slides were very presentation was did not present. good and well slides were good were organised given. well presented. and presented. presented. clear styles with clear generally good unclear lacks reference style /3 excellent source referencing/ referencing/styl consistency with referencing/sty le of references. style e many errors prepared by: abm russelmoderated by: noor-u-zamanaugust, 2019>