Need help?

COIT11238 Network Infrastructure Foundations Assignment Sample

COIT11238 Network Infrastructure Foundations

Case study scenario:

ThingsEngine (TE) is a newly established AIoT (Artificial Internet of Things) company in Queensland. This IoT company provides smart IoT products to turn your home into a smart home at low price in Australia. The main office of this company TE is in Brisbane and the branch offices are in Cairns, Townsville, Rockhampton, Sydney, and Melbourne. Their services include AIoT hardware and software installation, AIoT application management through cloud computing, and so on.

This company signed a contract with you to design networks and provide suitable solutions for several needed network services. See more details in the following networking essential tasks and answer the related questions:

Task 1:

For the main office in Brisbane, the company TE needs a network for the main office including a wired Local Area Network (LAN) with at least 2 workstations (PCs) and a wireless LAN with an Access Point (AP) for 4 local staff’s laptops and smart phones. A router will be used to link these two LANs to an ISP (Internet Service Provider).

Question (T1-Q1):

You are required to use Cisco Packet Tracer or other software, such as draw.io to draw a network diagram for this company’s main office demonstrating the network devices, computer devices and types of media/connection between the devices. Make sure to use meaningful names to label all devices in the designed diagram. To build this network, the network devices, such as switches, wireless access points and routers can be considered to utilise, as well as a wireless router. Take a screenshot of the design and paste below as your solution for this request: (2.5 marks)

Question (T1-Q2):

Identify a primary network topology used in your network design diagram and discuss the difference between physical and logical topology design for this company. (2 marks)

Answer:

Question (T1-Q3):

List the needed equipment for building this network including computers, network devices and media; and,
justify the selected media used in this network, e.g., for the wired LAN, the wireless LAN, and the connection to an Internet Service Provider (ISP). (3 marks)

Task 2:

The newly established AIoT company will set up an email server in the Sydney office for all staff. And a file sharing server will be available in Townsville for company staff to circulate some project files for further development. These two servers are maintained by the primary office in Brisbane. The company plans to initially provide several networking services including the following:

An email server for the internal and external communication

A file sharing server for project development

Remote-control service for network management

Question (T2-Q1):

Draw a TCP/IP layered architecture diagram (only one diagram is needed) showing the protocols that are most likely to be used for these three types of services in each of the top three layers. Give the (i) names of these layers and (ii) the acronyms or full names of the needed protocols in each layer (in the top three) of the TCP/IP architecture. Answer this question with a diagram or a screenshot of a diagram that you have created. (2.5 marks) Answer:

TCP/IP Layered Architecture

Question (T2-Q2):

Discuss the protocol IPsec, which can be used to provide security for these services and give an example of how to enhance security for one of these services. (2 marks) Answer:

Question (T2-Q3):

For the two offices located in the heart of Brisbane CBD and somewhere in Sydney, you are required to provide a solution to link these two offices. You should provide/identify the assumption/s for different AIoT applications and related services and suggest what type of network and connection they could consider fulfilling this request. (3 marks)

Task 3:

The company asks you to perform some basic network administrative and troubleshooting tasks.

Question (T3-Q1):

Assuming that you are requested to test the reachability to the company’s website http://www.thingsengine.com/, create a ping command with 5 ICMP echo requests, with each echo-request packet size set to 64 bits. Include a screenshot that shows both the ping command and its output as your answer. (2 marks)

Question (T3-Q2):

Use any tools (command “ping” or packet capture tools, like Wireshark) to find the IP address of the company website and indicate which IPv4 class this IP address belongs to. Provide the reserved addresses as private IP address in this class and discuss why the private IP addresses are needed. (2 marks)

Question (T3-Q3):

Explain the difference between “ping thingsengine.com” and “ping [the IP address of the company website]”. You may want to try both and observe any differences. Your answer should include your explanation, as well as screenshots.

Assume you are able to surf the Internet but not able to ping the web server of the company website: www.thingsengine.com. The command “tracert” used in Windows (“traceroute” in Linux or macOS) may be considered to track in real-time the pathway in a network from your computer to the company’s webserver.

Question (T3-Q4):

Discuss how this tool (tracert or traceroute) can be used for troubleshooting purposes.

Question (T3-Q5):

Use tracert or traceroute to indicate the path between your computer and thingsengine.org. Explain one record (5 columns in a row or in a hop) for a router (such as how long the reply took and so forth). The answer should include related screenshots. (2 marks)

Task 4: 5 Marks

The company will provide some AIoT project demons through git services, such as GitHub, for some customers as collaborative AIoT project developers.

Question (T4-Q1):

Which type of cloud computing service GitHub is offering? Justify your answer.

A customer is leading a team to develop a specific AIoT application for monitoring stoves at home. A new kind of network computing service is needed to set up a development environment for their team focusing on coding through online teamwork, no need to worry about infrastructure to develop, test and run the software.

Question (T4-Q2):

What type of cloud computing service for this online development is appropriate? Justify your response.

Solution

Case study scenario:

Task 1:

Question (T1-Q1):

Answer:



Figure 1 Designed network for TE company

These elements can be found in this diagram:

• Workstations (PCs): Also known as wired LAN devices, these are represented by PCs.

Workstations are connected by a wired LAN, represented by a switch.

• Access Point: This is the computers and cellphones of the regional staff's wireless LAN infrastructure.

• Router: Establishes an internet connection by linking the LANs to the ISP.

Question (T1-Q2):

Answer:

The principal network topology for management assignment expert utilized in the network design diagram shown for TE's main headquarters combines a physical star topology and a logical star topology.

Physical Topology: The actual physical configuration of the network's devices and the connections that link them are referred to as the physical topology. The physical topology of the main office network is a star topology. All of the network's devices are linked to a central device, in this case, the switch, in a star topology. Individual workstations (PCs) and the access point are linked to the switch in a star-like configuration (GeeksforGeeks, 2020).

On the other side, the logical topology establishes how data moves throughout the network. The logical topology of the main office network is a star topology as well. All data traffic is routed through a central device, in this case, the switch, in a logical star topology. The switch serves as a hub for communication, enabling information to be sent between the router, access point, and workstations.

The physical star topology is applied to the TE main office network to create the physical connections between the devices, ensuring a single point of connectivity via the switch. The switch serves as the hub for data exchange while the logical star topology is also applied to control how data travels throughout the network (Computerhop, 2023).

Question (T1-Q3):

Answer:

The following tools are required to construct the network for TE's Brisbane headquarters:

1. Computers: For the wired LAN, at least two workstations (PCs) are required.

2. Network Equipment:

• Switch: To link the workstations in the wired LAN, a switch is needed.

• Access Point (AP): An access point is required to give the local staff laptops and cell phones wifi connectivity.

• Router: To link the LANs to the ISP and offer internet connectivity, a router is needed.

3. Media/Connections:

• Wired LAN: For wired LAN connections, Ethernet cables (such as Cat 5e or Cat 6) are frequently utilized. High-speed and dependable data transmission between the PCs and the switch is made possible by these cables.

• Wireless LAN: Wi-Fi technology can be used to set up a wireless LAN connection. The local staff's laptops and smartphones will have wireless connectivity thanks to the access point.

• Connection to ISP: A variety of media can be used to establish a connection to the ISP, including:

• Ethernet: An Ethernet cable can be used to link the router to the ISP's network interface if the ISP offers an Ethernet connection.

• Fiber Optic: A fiber optic cable can be used to connect the router to the ISP's network interface if the ISP offers a fiber optic connection.
Reasons for the Selected Media:

• Wired LAN: Due to their dependability, speed, and affordability, Ethernet cables are frequently utilized for wired LAN connections.

• Wireless LAN: Wi-Fi technology is employed for the wireless LAN connection since it gives the local staff's laptops and smartphones freedom and mobility.

• ISP Connection: Depending on what the ISP offers, the connection media must be chosen. Common connections to the ISP are made via Ethernet and fiber optics.

Task 2:

Question (T2-Q1):

Answer:

Figure 2 Layers and their respective protocols

Question (T2-Q2):

Answer:

The protocol suite known as IPsec, or Internet Protocol Security, enables secure communication across IP networks. It provides a framework for safeguarding several network-level protocols and can be applied to strengthen security for the aforementioned services, including the email server, file-sharing server, and remote control service (Loshin, 2021).

The TCP/IP protocol stack's network layer is where IPsec operates and provides the following security features:

1. Authentication

2. Confidentiality

3. Data Integrity

4. Replay Protection

Enhancing Email Server Security

• Enable IPsec so that the email server and client devices may communicate securely. As a result, every email transmission is secured with encryption and shielded from prying eyes.

• Before establishing a secure connection, use IPsec's authentication features to confirm the legitimacy of the email server and client devices. By doing this, email transmission cannot be accessed by or intercepted by unauthorized devices.

• Use IPsec's data integrity checks to make sure that emails aren't tampered with while being transmitted. This guard against malicious content change or injection.

• Think about setting up IPsec to offer replay protection, which stops attackers from intercepting and resending email packets to obtain unauthorized access or change email content.

The communication between the server and clients can be protected using encryption, authentication, integrity checks, and replay protection by installing IPsec for the email server. Protecting private data and ensuring that only authorized users can access and use the email system, improves the overall security of the email service.

Question (T2-Q3):

Answer:

There are several network and connection alternatives that TE can take into account to connect the two offices, which are situated in the CBDs of Brisbane and Sydney. The individual needs of AIoT applications and related services, financial restrictions, and the required degree of performance and security will all influence the choice of network and connection.

One is a virtual private network (VPN)

A VPN encrypts the data transmission between the offices in Brisbane and Sydney and establishes a secure tunnel over the open internet. As a result, confidential information can be shared between the offices securely and privately.

2. Dedicated Leased Line

This guarantees a specific amount of bandwidth for communication, resulting in fast data transfer rates and low latency. For AIoT applications that demand real-time data sharing, it provides a dependable and consistent connection.

3. MPLS (Multiprotocol Label Switching)

TE can set up an MPLS network to link the offices in Brisbane and Sydney. Data traffic may be prioritized and routed efficiently because of MPLS's highly scalable and effective network infrastructure. It provides the freedom to give particular AIoT applications or services the attention they deserve based on their needs, ensuring optimal performance and resource use.

4. Connectivity via the cloud

As a solution, TE can make use of connectivity services offered by public cloud providers like AWS or Azure, such as Direct Connect or ExpressRoute. These services create exclusive links between the TE offices and the data centers of the relevant cloud service providers.

Task 3:

Question (T3-Q1):

Answer:



For 5 ICMP echo requests the “-n 5” command is used

For each echo-request packet size set to 64 bits the “-l 64” command is used.

Question (T3-Q2):

Answer:



Question (T3-Q3):

Answer:

Pinging using the domain name: When a person types the command "ping thingsengine.com," the computer runs a DNS query to translate the domain name to its matching IP address. ICMP echo requests are then issued to the IP address once it has been identified. By first resolving the domain name when pinging a website, one may determine whether it can be reached (Garn, 2021).

Pinging with the IP address: It is required to send ICMP echo requests to a specific IP address without first completing a DNS lookup by using the command "ping [the IP address of the company website]". Bypassing the process of resolving the domain name, pinging using the IP address targets the IP address directly.

The DNS resolution step is when the two methods diverge most. The DNS resolution process is used to locate the IP address linked to the domain name when pinging using that name. Pinging with the IP address, on the other hand, bypasses the DNS resolution process and talks directly with the provided IP address. One can quickly switch between other IP addresses connected to the domain using the domain name (in the event of load balancing or failover) without changing the command.

Question (T3-Q4):

Answer:

A network diagnostic tool is used to track the course or route that network packets take from a computer to a target IP address or domain name. It is called "tracert" in Windows and "traceroute" in Linux or macOS. It can be a useful tool for locating possible bottlenecks or network breakdowns as well as addressing connectivity problems on the network.

The "tracert" or "traceroute" utility can be used in the following ways to troubleshoot:

1. Recognizing Network Hops

2. Measuring Network Latency

3. Determining Packet Loss

4. Troubleshooting Connectivity Issues

5. Examining Network Performance and Path

Question (T3-Q5):

Answer:

The columns for each hop show:

• Hop number: This specifies the order of the hops.

• IP address: The router's IP address at that specific hop.

• Round-trip time (RTT): The time it takes packets to travel from one hop to the next and back, expressed in milliseconds (Fisher, 2021).

• Hostname: The hostname connected to the IP address, if one is provided.

• Additional details: Some variations of the command may offer more details like the router's location or Autonomous System Number (ASN).


Task 4:

Question (T4-Q1):

Answer:

A code repository also referred to as a version control system, is a cloud computing service provided by GitHub. Developers can store, manage, and work together on their code projects on this platform. Git repositories, which are distributed version control systems, are the main emphasis of GitHub (Gaba, 2020).

Justification:

1. Distributed version control: Git, a distributed version control system, is used by GitHub. Git enables programmers to effectively communicate with others while managing multiple versions of their code and tracking changes. Developers can take advantage of distributed version control's advantages, such as offline work, branch management, and painless merging of code changes, by using GitHub, which provides Git as the underlying technology.

2. Hosting and Collaboration of Code: For hosting code repositories, GitHub offers a cloud-based infrastructure. By pushing their work to GitHub, developers may establish a central repository for code storage and collaboration. It provides features that encourage team member participation, including pull requests, issue tracking, and project management tools. GitHub is a collaborative environment for the creation of AIoT projects since developers can clone, fork, and contribute to projects hosted there.

3. Accessible from Anywhere: Because GitHub is cloud-based, programmers may access their work and communicate with others from any location with an internet connection. Because GitHub supports a variety of Git clients and provides a web-based interface, developers may work on their projects using a variety of hardware and operating systems.

4. Integrations and Services: GitHub offers project management services, CI/CD pipelines, and integrations with several different development tools. To improve the development process and make it simpler for AIoT project developers to build, test, and deploy their code, it offers capabilities like code reviews, automated testing, and deployment procedures (W3schools.com, 2023).

Question (T4-Q2):

Answer:

Platform as a solution (PaaS) is the right kind of cloud computing solution for the online creation of the AIoT application for monitoring ranges at home.

1. Development Environment: PaaS offers a full development environment that includes all of the tools, libraries, and frameworks needed to develop code and applications. Developers may concentrate on building code without thinking about the supporting infrastructure thanks to the pre-configured platform it provides.

2. Online Teamwork: PaaS platforms frequently come with collaboration tools that let groups of programmers collaborate on projects. With tools like real-time collaboration, code sharing, and version control, it enables numerous developers to work together at once. For the customer's requirement for online teamwork, this is very crucial.

3. Infrastructure Management: With PaaS, developers are relieved of the responsibility of overseeing the infrastructure needed for software creation, testing, and operation. Developers are free to concentrate entirely on coding and application logic because the cloud provider takes care of infrastructure provisioning, scalability, and maintenance responsibilities.

4. Quick Development and Deployment: Platforms as a service (PaaS) frequently include capabilities like auto-scaling, automated deployment, and continuous integration/continuous deployment (CI/CD) pipelines. These characteristics accelerate the AIoT application's time to market by streamlining the development and deployment processes (Shakerkhan and Abilmazhinov, 2019).

5. Cost-Effectiveness: PaaS saves operations costs and does not require an initial infrastructure investment. It is a cost-effective solution for the customer's development needs because developers can pay for the resources they use on a pay-as-use-go basis.

References

Computerhope. (2023). What is Star Topology? [online] Computerhope.com. Available at: https://www.computerhope.com/jargon/s/startopo.htm [Accessed 26 May 2023].
Fisher, T. (2021). How to Use the Tracert Command in Windows. [online] Lifewire. Available at: https://www.lifewire.com/tracert-command-2618101 [Accessed 25 May 2023].

Gaba, I. (2020). What is GitHub And How To Use It? [online] Simplilearn.com. Available at: https://www.simplilearn.com/tutorials/git-tutorial/what-is-github [Accessed 25 May 2023].

Garn, D. (2021). Ping command basics for testing and troubleshooting. [online] Enable Sysadmin. Available at: https://www.redhat.com/sysadmin/ping-usage-basics [Accessed 25 May 2023].

GeeksforGeeks. (2020). Difference between Physical and Logical Topology. [online] Available at: https://www.geeksforgeeks.org/difference-between-physical-and-logical-topology/ [Accessed 26 May 2023].

Loshin, P. (2021). IPsec (Internet Protocol Security). [online] Security. Available at: https://www.techtarget.com/searchsecurity/definition/IPsec-Internet-Protocol-Security [Accessed 26 May 2023].

Shakerkhan, K.O. and Abilmazhinov, E.T., 2019. Development of a Method for Choosing Cloud Computing on the Platform of Paas for Servicing the State Agencies. International Journal of Modern Education & Computer Science, 11(9), pp. 14-25. DOI: 10.5815/ijmecs.2019.09.02

W3schools.com. (2023). What is GitHub. [online] Available at: https://www.w3schools.com/whatis/whatis_github.asp [Accessed 25 May 2023].

 

Still in Dilemma? See what our users have to say about our services.

student rating
Management

Essay: 10 Pages, Deadline: 2 days

They delivered my assignment early. They also respond promptly. This is excellent. Tutors answer my questions professionally and courteously. Good job. Thanks!

flag User ID: 9***95 United States

student rating
Accounting

Report: 10 Pages, Deadline: 4 days

After sleeping for only a few hours a day for the entire week, I was very weary and lacked the motivation to write anything or think about any suggestions for the writer to include in the paper. I am glad I chose your service and was pleasantly pleased by the quality. The paper is complete and ready for submission to the professor. Thanks!

flag User ID: 9***85 United States

student rating
Finance

Assignment: 8 Pages, Deadline: 3 days

I resorted to the MBA assignment Expert in the hopes that they would provide different outcomes after receiving unsatisfactory results from other assignment writing organizations, and they genuinely are fantastic! I received exactly what I was looking for from this writing service. I'm grateful.

flag User ID: 9***55

student rating
HR Rrecruiter

Assignment: 13 Pages, Deadline: 3 days

Incredible response! I could not believe I had received the completed assignment so far ahead of the deadline. Their expert team of writers effortlessly provided me with high-quality content. I only received an A because of their assistance. Thank you very much!

flag User ID: 6***15 United States

student rating
Management

Essay: 8 Pages, Deadline: 3 days

This expert work was very nice and clean.expert did the included more words which was very kind of them.Thank you for the service.

flag User ID: 9***95 United States

student rating
Thesis

Report: 15 Pages, Deadline: 5 days

Cheers on the excellent work, which involved asking questions to clarify anything they were unclear about and ensuring that any necessary adjustments were made promptly.

flag User ID: 9***95 United States

student rating
Economics

Essay: 9 Pages, Deadline: 5 days

To be really honest, I can't bear writing essays or coursework. I'm fortunate to work with a writer who has always produced flawless work. What a wonderful and accessible service. Satisfied!

flag User ID: 9***95

student rating
Taxation

Essay: 12 Pages, Deadline: 4 days

My essay submission to the university has never been so simple. As soon as I discovered this assignment helpline, however, everything improved. They offer assistance with all forms of academic assignments. The finest aspect is that there is also an option for escalation. We will get a solution on time.

flag User ID: 9***95 United States

student rating
Management

Essay: 15 Pages, Deadline: 3 days

This is my first experience with expert MBA assignment expert. They provide me with excellent service and complete my project within 48 hours before the deadline; I will attempt them again in the future.

flag User ID: 9***95 United States

GET A FREE ASSISTANCE

Still Finding MBA Assignment Help? You’ve Come To The Right Place!