MITS4004 IT Networking and Communication Assignment 2 February 2020 MITS4004 Assignment 2 Copyright © 2020 VIT, All Rights Reserved. This assessment item relates to the unit learning outcomes as in...

1 answer below »
I need ontime and follow marking guidelines and all intructionsplease follow all the rules that they mentioned because i want to achieve all marks


MITS4004 IT Networking and Communication Assignment 2 February 2020 MITS4004 Assignment 2 Copyright © 2020 VIT, All Rights Reserved. This assessment item relates to the unit learning outcomes as in the unit descriptors. L01: Identify the operation of the protocols that are used inside the Internet and use the seven-layer model to classify networking topology, protocol and security needs. LO2: Evaluate LAN technology issues, including routing and flow control. Explain the difference between switches and routers. Build and troubleshoot Ethernet, Wi-Fi and Leased line networks. Connect networks with routers. Scenario: You are a Network and Security Engineer for the ABC Consulting Private Limited, which is a leading network and security provider for the small and medium scaled offices. Task 1: Your task is to propose a network design for the small scaled company and sketch a basic logical network diagram of the office with 5 departments. You are free to assume: • Name of the Office and Departments • Networking Hardware’s such as routers, switches, hubs, modems wireless access points, firewalls etc. Task 2: Using your expert knowledge on TCP/IP Model and its layers, sketch the TCP/IP protocols and identify at least one protocol used by each layer. Task 3: At each level of the TCP/IP model, there are security vulnerabilities and therefore, security prevention measures that can be taken to ensure that enterprise applications are protected. As a network and security engineer, your task is to identify the security threats and propose a solution on each layer. The report should be prepared in Microsoft word and uploaded on to the LMS. The word limit of the report is 2000 words. The report should be a properly constructed as an academic report. The report should include references in IEEE style. __________________________________________________________________________________ Due Date: Session 9 Weightage: 10% Individual Assignment MITS4004 Assignment 2 Copyright © 2020 VIT, All Rights Reserved. Submission Guidelines: The report should have a consistent, professional, and well-organized appearance. 1. Your report should include the following: ➢ The word limit of the report is 2000 words. ➢ The cover page must identify student names and the ID numbers, unit details, and the assignment details. ➢ The assignment must use 12-point font size and at least single line spacing with appropriate section headings. ➢ In-text referencing in IEEE style must be cited in the text of the report and listed appropriately at the end in a reference list. 2. The report must be submitted in soft (electronic) copy as a Microsoft Word document on the LMS in Turnitin dropbox. Assignments submitted on the LMS will only be accepted. 3. Late penalty applies on late submission, 10% per day would be deducted. 4. The assignments will go through Turnitin and plagiarism penalty will be applied. The report must be submitted in soft (electronic) copy as a Microsoft Word document via the upload link available on Moodle. __________________________________________________________________________________ Marking Guide: 100 Marks Task Description Marks Task 1: Network Design You should propose a network design for the small scaled company and sketch a basic logical network diagram of the office with 5 departments 50 Task 2: Identify protocols on TCP/IP models Using your expert knowledge on TCP/IP Model and its layers, sketch the TCP/IP protocols and identify at least one protocol used by each layer. 20 Task 3: Identify Security Needs At each level of the TCP/IP model, there are security vulnerabilities and therefore, security prevention measures that can be taken to ensure that enterprise applications are protected. As a network and security engineer, your task is to identify the security threats and propose a solution on each layer. 20 Report Layout and References The report style, language and structure should be appropriate. Follow IEEE referencing style. 10 Total 100
Answered Same DayApr 21, 2021MITS4004

Answer To: MITS4004 IT Networking and Communication Assignment 2 February 2020 MITS4004 Assignment 2 Copyright...

Amit answered on Apr 24 2021
151 Votes
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Date: 4/24/2020
Table of Contents
1.    Introduction    3
2.    Task 1: network design to ABC Consulting Private Limited    3
3.    Task 2: explanation of TCP/IP Model    6
4.    Explanation of working protocols in TCP/IP Model    7
5.    Task 3: Security vulnerabilities in TCP/IP layers    8
6.    Solution to identified vulnerabilities    9
7.    Conclusi
on    10
8.    References:    12
1. Introduction
The network development of any small size organization requires consideration of different possible issues and outcomes. The development of VLAN to this small company will help in easy and smooth operations for its users. Small size companies do not want to make huge investment in network equipments thus, capital investment is the main consideration while developing any network for such company. As most of the companies are implementing wireless solutions for their employees and guests, thus, involvement of wireless solution is also considered. The involvement of wireless connection to this proposed network will also require proper security, thus, security implications are also considered in the network implementation. The selection of used devices is based on small capital for the network implementation to this company. The logical network design for this small company is developed in packet tracer.
The implementation of TCP/IP model makes use of different protocols. There are different protocols which are working on each defined layer of this model. The explanation of these working protocols in this model is provided in detail. The implementation of each protocol on each layer of this model also needs identification of possible vulnerabilities, thus, this vulnerability identification and possible solution to remove these vulnerabilities is also included in my proposed report.
2. Task 1: network design to ABC Consulting Private Limited
The network development to “ABC Consulting Private Limited” requires identification of working departments in its office so that the separate VLAN’s for each working departments can be developed. The implementation of VLAN is based on the working requirements from the network for the selected department. The possible use of devices is also based on the identified requirements from the departments. The proposed design of logical network to this “ABC Consulting Private Limited” is provided here:
The development of this logical network is based on the four identified departments which are explained below:
· Reception as the VLAN1: Even if it is small sized or large size organization, each organization has reception for its guests. There are limited resources like 1-2 systems will be required on reception. The separate implementation of this VLAN is shown and IP assignment for this department is also done. The wired connections are proposed for the reception.
· Management as the VLAN2: The management of this “ABC Consulting Private Limited” will perform different secured operations and store the data. Thus, server implementation is suggested in this VLAN. Because of improved security requirements, any wireless connection is not proposed to this VLAN. The management staff can use the provided wired connections to make network access and perform their operations. The implementation of server in this VLAN will provide the security to management data and other confidential data bases.
· Staff as the VLAN 3: This consulting company will maintain its staff. Thus, the separate VLAN is developed for the staff members. The staff can require both wired and wireless connections, thus, wireless implementation is also provided in this VLAN.
· Guest as the VLAN 4: The frequent visits of guests are possible to consulting company. The guests can also required wired and wireless connections for their devices. Thus, wireless connections to laptops, smart phones and tablets are proposed for this department. The wired connection based device implementation is also proposed for this VLAN.
· IT staff as the VLAN 5: The complete management of this VLAN based network for this company is done by the dedicated department. The handing of all occurred...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here