NETWORK DESIGN

ND1: LAN Design, WAN Design, Network Devices, Network Security, Cisco Pocket Tracer, GNS3, Computer Security, Ethical Hacking, Internet Security, Kali Linux, Malware Removal, Metasploit, Mobile Security , Network Security , Penetration Testing , Wireless Security , 

ND4 : Linux Administration, Unix , Kali Linux, Ethical Hacking, Digital Forensics, Network Security, Internet Security, Malware Removal , Cryptography 


1) 32430-Networked Application Management

Assignment Description

The aim of the assignment is to develop an analytical understanding of performance and management of
different types of networked applications. The assignment will provide an opportunity to understand network performance and management issues of networked applications using state of the art tools. These exercises provide an opportunity to demonstrate the analytical ability to evaluating distributed systems performance, Quality of Service and service management. Overview and General Instructions of Assignment Students need to form a group of two in their own lab class and inform tutor about their group during Week 7 Lab. Each group will need to capture packets on their home network and at MIT while accessing the following websites.

One website is of a news channel and the other one is a website for live streaming. The students are required to capture packets of multiple images from the news channel website and capture packets from the live stream website while streaming for 10 minutes once at MIT in a group and then on their home network individually. So in the end, there will be six trace files, three for each website, two captured on MIT network and four on students’ home networks.

The websites to access are:
http://www.lightfm.com.au
http:// iview.abc.net.au
The complete report must be submitted on Moodle within due date. The report has the following four main parts:
Part 1:
The first part of the report should be about general statistics of all six captures using Wireshark that must include:
1. The start time of capture
2. Total number of captured packets for each protocol
3. Total Number of lost packets
4. IP addresses of the client and server
Part 2:
The second part of the report must include screenshots of packet capture, screenshots of different statistics from Wireshark and complete analysis of those screenshots for both websites for all three networks. Only screenshots of the graphs or other statistics will not get any marks as those must be analyzed in detail to discuss the quality of service for a particular application. The students are required to analyze the network performance for the assigned websites considering the following aspects:
1. Throughput
2. Round Trip Time
3. Packet Loss

 


2) SA0029-Urgent SA1909018169 MN504 Network Analysis using Wireshark

Assignment Description

The aim of the assignment is to develop an analytical understanding of performance and management of
different types of networked applications. The assignment will provide an opportunity to understand network performance and management issues of networked applications using state of the art tools. These exercises provide an opportunity to demonstrate analytical ability of evaluating distributed systems performance, Quality of Service and service management.
Overview and General Instructions of Assignment Students need to form a group of two in their own lab class and inform tutor about their group during Week 7 Lab. Each group will need to capture packets on their home network and at MIT while accessing the following websites. One website is of a news channel and the other one is a website for live streaming. The students are required to capture packets of multiple images from the news channel website and capture packets from the live stream website while streaming for 10 minutes once at MIT in a group and then on their home network individually. So at the end there will be six trace files, three for each website, two captured on MIT network and four on students’ home networks.
The websites to access are:
http://www.lightfm.com.au
http:// iview.abc.net.au
The complete report must be submitted on Moodle within due date. The report has following four main
parts:
Part 1:
The first part of the report should be about general statistics of all six captures using Wireshark that must include:
1. Start time of capture
2. Total number of captured packets for each protocol
3. Total Number of lost packets
4. IP addresses of the client and server
Part 2:
The second part of the report must include screenshots of packet capture, screenshots of different statistics from Wireshark and complete analysis of those screenshots for both websites for all three networks. Only screenshots of the graphs or other statistics will not get any marks as those must be analysed in detail to discuss the quality of service for a particular application. The students are required to analyse the network performance for the assigned websites considering the following aspects:
1. Throughput
2. Round Trip Time
3. Packet Loss


3) EM0032-EM201847GUR916CN

Assessment Description

The aim of the assignment is to develop an analytical understanding of performance and management of different types of networked applications. The assignment will provide an opportunity to understand network performance and management issues of networked applications using state of the art tools. These exercises provide an opportunity to demonstrate the analytical ability of evaluating distributed systems performance, Quality of Service and service management.
Overview and General Instructions of Assignment Students need to form a group of two in their own lab class and inform tutor about their group during Week 7 Lab. Each group will need to capture packets on their home network and at MIT while accessing the following websites. One website is of a news channel and the other one is a website for live streaming. The students are required to capture packets of multiple images from the news channel website and capture packets from the live stream website while streaming for 10 minutes once at MIT in a group and then on their home network individually. So at the end there will be six trace files, three for each website, two captured on MIT network and four on students’ home networks.
The websites to access are:
http://www.lightfm.com.au
http:// iview.abc.net.au
The complete report must be submitted on Moodle within due date. The report has following four main parts:
Part 1:
The first part of the report should be about general statistics of all six captures using Wireshark that must include:
1. Start time of capture
2. Total number of captured packets for each protocol
3. Total Number of lost packets
4. IP addresses of the client and server
Part 2:
The second part of the report must include screen shots of packet capture, screenshots of different statistics from Wireshark and complete analysis of those screenshots for both websites for all three networks. Only screenshots of the graphs or other statistics will not get any marks as those must be analysed in detail to discuss the quality of service for a particular application. The students are required to analyse the network performance for the assigned websites considering following aspects:
1. Throughput
2. Round Trip Time
3. Packet Loss
While collecting statistics please make sure, you are looking at the right flow as your Wireshark file may have packets from other applications and flows as well. Figure 1 on next page shows the throughput graph generated by Wireshark and source and destination addresses are clearly shown. You need to collect statistics for flows which are from server to client. MN504 Networked Application Management Assignment 2 Page 3 of 5 Prepared by: Dr Lincy Elizebeth Jim Moderated by: Dr Sanjeeb Shrestha August 2018 Figure 1: Throughput Graph showing source and destination IP addresses to see the Packet loss you need to enter the following filter in Wireshark: tcp.analysis lost_Segment.
Part 3:
The third part of the report is about comparing the collected Wireshark statistics of the two different networked applications on three different networks. The throughput graphs and TCP retransmission statistics for web page transfer and live streaming (provided in part 2) need to be compared with each other and for all three networks. The differences of the performance to be identified and reasons must be provided for such differences.


4) EM0007-EM201830GUR61CN

Assignment Description

The aim of the assignment is to develop an analytical understanding of performance and management of different types of networked applications. The assignment will provide an opportunity to understand network performance and management issues of networked applications using state of the art tools. These exercises provide an opportunity to demonstrate the analytical ability of evaluating distributed systems performance, Quality of Service and service management.

Overview and General Instructions of Assignment
Students need to form a group of two in their own lab class and inform tutor about their group during Week 7 Lab. Each group will need to capture packets on their home network and at MIT while accessing the following websites. One website is of a news channel and the other one is a website for live streaming. The students are required to capture packets of multiple images from the news channel website and capture packets from the live stream website while streaming for 10 minutes once at MIT in a group and then on their home network individually. So at the end there will be six trace files, three for each website, two captured on MIT network and four on students’ home networks.
The websites to access are:
http://www.news.com.au
http:// iview.abc.net.au


5) 828633-cybr security

Assessment Description

I need a project proposal before starting at actual project, I have uploaded the file in which what is needed in the project proposal is described, After my project tutor approves the proposal need to start the actual project. Harvard style referencing needed, Turnintin required as my uni uses turnintin software to check for copy. I am looking for someting in cyber security, Like wise cloud security etc. need some technical work as well done like pen testing cloud services or apps etc and find security failures how to overcome or fix them, need comparison between cloud platforms etc google cloud, microsoft azure, amazon AWS, etc. features and services provides how safe is it particular attack eg. DDOS. Note these are just examples you can go for entire your own specialised area thank you Also very important need weekly updates s need to show my work to my tutor on time to time basis and where changes necessary it can be done


6) 822770-computer forensics 5

Assessment Description

In the state of Western Australia, it is illegal to access, own or distribute digital content relating to clowns. An allegation has been made to law enforcement whereby a witness claims to have seen an individual access clown related content within a place of work. Following the approval of formal warrants, the computer in question was seized from the workplace. The computer was then forensically acquired using FTK Imager. Unfortunately, the junior investigator who obtained the ‘forensic image’ of the computer only performed a logical acquisition. To worsen the situation, the junior investigator forensically wiped the original hard drive from the computer. Fortunately, the logical acquisition was undertaken in a forensically sound manner. The suspect, Clark denies accessing clown content. However, Clark does confirm that the computer does belong to him. Clark stated that he does not always take the computer home or lock it when he is away from his desk. You are a consultant who specializes in digital forensic investigations. You have been assigned the task of examining a ‘forensic’ image of the laptop, which was seized with correct warrants. It is currently unknown what Clark was doing with the clown content. In Clark’s opinion, the computer was infected with malware which resulted in any potential content appearing on the computer.  Task Your task is to investigate the supplied forensic image using appropriate tools and process and to develop and submit a written report on your findings. You may use any tools to undertake the investigation but you must justify all of your actions! Your report must follow the report structure shown below.


 7) 822630-computer forensics 1

Assessment Description

In the state of Western Australia, it is illegal to access, own or distribute digital content relating to clowns. An allegation was been made to law enforcement whereby a witness claims to have seen an individual access clown related content within a place of work. Following the approval of formal warrants, the computer in question was seized from the work place. The computer was then forensically acquired using FTK Imager. Unfortunately, the junior investigator who obtained the ‘forensic image’ of the computer only performed a logical acquisition. To worsen the situation, the junior investigator forensically wiped the original hard drive from the computer. Fortunately, the logical acquisition was undertaken in a forensically sound manner. The suspect, Clark denies accessing clown content. However, Clark does confirm that the computer does belong to him. Clark stated that he does not always take the computer home or lock it when he is away from his desk. You are a consultant who specialises in digital forensic investigations. You have been assigned the task of examining a ‘forensic’ image of the laptop, which was seized with correct warrants. It is currently unknown what Clark was doing with the clown content. In Clark’s opinion, the computer was infected with malware which resulted in any potential content appearing on the computer. Task Your task is to investigate the supplied forensic image using appropriate tools and process and to develop and submit a written report on your findings. You may use any tools to undertake the investigation but you must justify all of your actions! Your report must follow the report structure shown below.


8) 822769-computer forensics 4

Assessment Description

In the state of Western Australia, it is illegal to access, own or distribute digital content relating to clowns. An allegation has been made to law enforcement whereby a witness claims to have seen an individual access clown related content within a place of work. Following the approval of formal warrants, the computer in question was seized from the workplace. The computer was then forensically acquired using FTK Imager. Unfortunately, the junior investigator who obtained the ‘forensic image’ of the computer only performed a logical acquisition. To worsen the situation, the junior investigator forensically wiped the original hard drive from the computer. Fortunately, the logical acquisition was undertaken in a forensically sound manner. The suspect, Clark denies accessing clown content. However, Clark does confirm that the computer does belong to him. Clark stated that he does not always take the computer home or lock it when he is away from his desk. You are a consultant who specializes in digital forensic investigations. You have been assigned the task of examining a ‘forensic’ image of the laptop, which was seized with correct warrants. It is currently unknown what Clark was doing with the clown content. In Clark’s opinion, the computer was infected with malware which resulted in any potential content appearing on the computer.
Task Your task is to investigate the supplied forensic image using appropriate tools and process and to develop and submit a written report on your findings. You may use any tools to undertake the investigation but you must justify all of your actions! Your report must follow the report structure shown below.


9) 822767-computer forensics 2 and 822768

Assessment Description

In the state of Western Australia, it is illegal to access, own or distribute digital content relating to clowns. An allegation has been made to law enforcement whereby a witness claims to have seen an individual access clown related content within a place of work. Following the approval of formal warrants, the computer in question was seized from the workplace. The computer was then forensically acquired using FTK Imager. Unfortunately, the junior investigator who obtained the ‘forensic image’ of the computer only performed a logical acquisition. To worsen the situation, the junior investigator forensically wiped the original hard drive from the computer. Fortunately, the logical acquisition was undertaken in a forensically sound manner. The suspect, Clark denies accessing clown content. However, Clark does confirm that the computer does belong to him. Clark stated that he does not always take the computer home or lock it when he is away from his desk. You are a consultant who specializes in digital forensic investigations. You have been assigned the task of examining a ‘forensic’ image of the laptop, which was seized with correct warrants. It is currently unknown what Clark was doing with the clown content. In Clark’s opinion, the computer was infected with malware which resulted in any potential content appearing on the computer.  Task your task is to investigate the supplied forensic image using appropriate tools and process and to develop and submit a written report on your findings. You may use any tools to undertake the investigation but you must justify all of your actions! Your report must follow the report structure shown below.


10) 727102-digital forensics

Assessment Description

Task 1: Recovering scrambled bits (5 Marks)
For this task I will upload a text file with scrambled bits on the Interact site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.
Deliverable: Describe the process used in restoring the scrambled bits and insert plain text in the assignment.
Task 2: Digital Forensics Report (20 Marks)
In this major task you are assumed a digital forensics investigator and asked to prepare a digital forensic report for the following scenario:
You are investigating a possible intellectual property theft by a contract employee of Exotic Mountain Tour Service (EMTS). EMTS has just finished an expensive marketing and customer service analysis with Superior Bicycles, LLC. Based on this analysis, EMTS plans to release advertising for its latest tour service with a joint product marketing campaign with Superior Bicycles. Unfortunately, EMTS suspects that a contract travel consultant, Bob Aspen, might have given sensitive marketing data to another bicycle competitor. EMTS is under a nondisclosure agreement with Superior Bicycles and must protect this advertising campaign material.
An EMTS manager found a USB drive on the desk Bob Aspen was assigned to. Your task is to determine whether the drive contains proprietary EMTS or Superior Bicycles data. The EMTS manager also gives you some interesting information he gathered from the Web server administrator. EMTS filters all Web-based e-mail traffic traveling through its network and detects suspicious attachments. When a Web-based e-mail with attachments is received, the Web filter is triggered. The EMTS manager gives you two screen captures, shown in Figures 8-5 and 8-6 (Textbook page 327), of partial e-mails intercepted by the Web filter that lead him to believe Bob Aspen might have engaged in questionable activities. (Nelson, Phillips, & Steuart, 2015, p. 326-327)


11) EM0011-EM131708511B06

Assessment Description

art 2: Analyzing an E-mail Archive for an Electronic Discovery Investigation Scenario D&B is conducting a very large electronic discovery (eDiscovery) investigation for a major client. This case is so large that dozens of investigators and analysts are working on specific portions of the evidence in parallel to save time and improve efficiency. Since this is the first time you will be working on this type of investigation for D&B, your manager gives you a “test” (a sample e-mail archive) so she can assess whether you need additional training before you begin working with the rest of the team on the eDiscovery case. Your manager tells you that this archive was extracted from a hard drive image marked “suspect,” but at present nothing more is known about the user. She expects you to examine the archive and document all findings that might be of interest to a forensic investigator. She explains that she will use your report to evaluate your investigation skills, logic and reasoning abilities, and reporting methods.

Tasks
• Review the information about e-mail forensics and the Paraben P2 Commander E-mail Examiner feature in the chapter titled “E-mail Forensics” in the course textbook.
• Using the P2 Commander E-mail Examiner, create a case file, select Add Evidence, and import the e-mail archive (filename: Outlook.pst). P2 Commander will automatically begin sorting and indexing if you choose that option.
• Search for information about the user; your goal is to learn as much as possible about who the user is and what he or she has been doing. You may find evidence in the inbox or other mailboxes. You can use the software features to help you keep track of the evidence you identify, for instance, by bookmarking sections of interest and exporting attachments.
• Write a report in which you:
o Document your investigation methods.
o Document your findings. Explain what you found that may be of interest to a forensic investigator, and provide your rationale for including each selection.
Required Resources
– Course textbook
– Outlook.pst file (e-mail archive)
– Internet access

12) 716201-Incident Response & Digital Forensics

Assessment Description
One practical-based portfolio assessment (100%, 3000 words excluding appendices) to include a number of practical exercises on a simulated scenario of an APT having compromised an Enterprise network. Throughout this module you will develop a variety of practical skills related to Incident Response and Digital Forensics. Each week you will given a tutorial upon a given topic within this area. At the end of each tutorial there is a portfolio section (also detailed below) which will provide you with tasks for the assessment. Tasks listed under Pass are mandatory whilst any further tasks contribute to a better mark. Portfolio (100%) (~3000 words) Due to the rapidly increasing threats within the cyber domain. Your company has recently decided to investigate implementing an in-house Incident Response capability. You have been tasked to investigate the processes and tools required to accomplish this, and produce a report detailing your findings.  You are allowed considerable flexibility in how you go about this. This includes writing for a particular use case, e.g. Financial Organisation, Non-profit, government, legal, or generic. You also have flexibility in regard to the, tools, environments, resources, procedures and documentation style you wish to choose. You should format your report as a technical document and might follow a similar structure to the one below:
1. Introduction
2. Methodologies
3. Lab Requirements and Specification
4. Digital Forensics Process
a. Windows
b. Linux
5. Further Considerations
6. Conclusion
Appendices
a. Example Investigation
b. Code

13) 757133- digital forensics

Assessment Description
Task 1: Recovering scrambled bits (5 Marks)
For this task I will upload a text file Ass3_Task1-scrambled.txt with scrambled bits. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.
Deliverable: Describe the process used in restoring the scrambled bits and insert plain text in the assignment. This will assist you in answering Assignment 3- Task 2
Task2: Revealing hidden information from an image (5 Marks) For this task I will upload an image file Ass3_Task2.bmp’. This image file contains hidden text which describes and outlines Assignment3 Task 3 requirements. You are required to reveal the hidden text and copy the text into your assignment under this task. I have specifically not provided any details on the tools or procedure you can follow to reveal the text from the image. While you may discuss issues and options available on how to do this with your fellow subject mates, please do not provide detailed instruction to others.
Task3: (10 Marks)
For Task Instructions please refer to the hidden text. Good Luck!!!

14) 735141-digital forensics

Assessment Description
Task 1: Recovering scrambled bits (5 Marks)

For this task, I will upload a text file with scrambled bits on the Interact site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment. Deliverable: Describe the process used in restoring the scrambled bits and insert plain text in the assignment. Task 2: Digital Forensics Report (20 Marks)
In this major task you are assumed a digital forensics investigator and asked to prepare a digital forensic report for the following scenario: You are investigating a possible intellectual property theft by a contract employee of Exotic Mountain Tour Service (EMTS). EMTS has just finished an expensive marketing and customer service analysis with Superior Bicycles, LLC. Based on this analysis, EMTS plans to release advertising for its latest tour service with a joint product marketing campaign with Superior Bicycles. Unfortunately, EMTS suspects that a contract travel consultant, Bob Aspen, might have given sensitive marketing data to another bicycle competitor. EMTS is under a nondisclosure agreement with Superior Bicycles and must protect this advertising campaign material.
An EMTS manager found a USB drive on the desk Bob Aspen was assigned to. Your task is to determine whether the drive contains proprietary EMTS or Superior Bicycles data. The EMTS manager also gives you some interesting information he gathered from the Web server administrator. EMTS filters all Web-based e-mail traffic travelling through its network and detects suspicious attachments. When a Web-based e-mail with attachments is received, the Web filter is triggered. The EMTS manager gives you two screen captures, shown in Figures 8-5 and 8-6 (Textbook page 327), of partial e-mails intercepted by the Web filter that lead him to believe Bob Aspen might have engaged in questionable activities. (Nelson, Phillips, & Steuart, 2015, p. 326-327)


15) 697861-Digital Forensics and Auditing

Assessment Description

Scenario ‘Iaman Informant’ was working as a manager of the technology development division at a famous international company OOO that developed state-of-the-art technologies and gadgets.
One day, at a place which ‘Mr. Informant’ visited on business, he received an offer from ‘Spy
Conspirator’ to leak of sensitive information related to the newest technology. Actually, ‘Mr.
Conspirator’ was an employee of a rival company, and ‘Mr. Informant’ decided to accept the offer for
large amounts of money, and began establishing a detailed leakage plan.
‘Mr. Informant’ made a deliberate effort to hide the leakage plan. He discussed it with ‘Mr.
Conspirator’ using an e-mail service like a business relationship. He also sent samples of confidential
information though personal cloud storage. After receiving the sample data, ‘Mr. Conspirator’ asked for the direct delivery of storage devices that stored the remaining (large amounts of) data. Eventually, ‘Mr. Informant’ tried to take his storage devices away, but he and his devices were detected at the security checkpoint of the company. And he was suspected of leaking the company data. At the security checkpoint, although his devices (a USB memory stick and a CD) were briefly checked (protected with portable write blockers), there was no evidence of any leakage. And then, they were immediately transferred to the digital forensics laboratory for further analysis. The information security policies in the company include the following:
(1) Confidential electronic files should be stored and kept in the authorized external storage
devices and the secured network drives.
(2) Confidential paper documents and electronic files can be accessed only within the allowed
time range from 10:00 AM to 16:00 PM with the appropriate permissions.
(3) Non-authorized electronic devices such as laptops, portable storages, and smart devices
cannot be carried onto the company.
(4) All employees are required to pass through the ‘Security Checkpoint’ system.
(5) All storage devices such as HDD, SSD, USB memory stick, and CD/DVD are forbidden under the
‘Security Checkpoint’ rules.
In addition, although the company managed separate internal and external networks and used DRM
(Digital Rights Management) / DLP (Data Loss Prevention) solutions for their information security, ‘Mr.
Informant’ had sufficient authority to bypass them. He was also very interested in IT (Information
Technology), and had a slight knowledge of digital forensics.
In this scenario, find any evidence of the data leakage and any data that might have been generated
from the suspect’s electronic devices.


16) 654367-Cyber Forensic and Information Technology

Assessment Description
A functioning workstation originally belonging to m57.biz was purchased on the secondhand market. The buyer (Aaron Greene) realizes that the previous owner of the computer had not erased the drive, and finds suspicious documents and videos on it, related to drug use, specifically Methamphetamine. This drug is a very real problem in Australia and Singapore. Aaron reports this to the police, who take possession of the computer.  Police forensics investigators determine the following:
The computer originally belonged to m57.biz  The computer was used by Jo, an M57 employee, as a work machine. Police contact Pat McGoo (the CEO). Pat authorizes imaging of all other computer equipment onsite at M57 to support the additional investigation. Police further pursue a warrant to seize a personal thumb drive belonging to Jo. You are given disk images from all of the computers and USB devices found onsite at M57. Additionally, you are given two more images, clearly in a different format, which are supposed to be of the same computers. The first images were given in expert witness data format (used by EnCase software) – E01 extensions. The second images have the extension AD1..ADn. There does seem to be an issue with the logging of evidence, and it is even brought to your attention in passing that a police staff member is suspected of negligence or even “foul-play” – but that has yet to be determined.

17) 636384-digital forensics

Assessment Description
M57.biz is a new company that researches patent information for clients.
Facts of the case:
• 1 president / CEO
• 3 additional employees
• The firm is planning to hire more employees, so they have a lot of inventory on hand
(computers, printers, etc).
Current employees:
• President: Pat McGoo
• Information Technology: Terry
• Patent Researchers: Jo, Charlie
Employees work onsite and conduct most business exchanges over email. All of the employees work
in Windows environments, although each employee prefers different software (e.g. Outlook vs.
Thunderbird).
Figure 1: Network configuration for M57.biz
Note: In the above figure “DOMEX” is the local server managing external network access and email.
One of the M57 employees is spying on the boss (Pat McGoo) electronically. This employee is
concerned that Pat may find out about certain activities they have engaged in – activities that may be
related (directly or indirectly) to another ongoing investigation. You are tasked with determining the
following:
• Who is spying on Pat?
• How are they doing it? Can you identify specific methods or software they have used to facilitate
this?
• Why is the employee spying on Pat?
• Is anyone else involved? Would you characterize them as accomplices?

18) 637934-digital forensics

Assessment Description
1) In this major task assume you are a Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you. You are free to choose a forensics scenario which can be the examination of a storage media (HDD, USB Drive, etc), email or social media forensics, mobile device forensics, cloud forensics or any other appropriate scenario you can think of.

19) 7174-Network Security and Intrusion Detection

Assessment Description
Blockchains: A Detailed Study

Carry out a detailed study on Blockchains and write a report that reflects your understanding of this technology (in your own words) with key issues including what this technology is, why this technology received much attention, history, technical details (how?, implementation, use of cryptography and networks, operation, illustrations, etc.), what can (and cannot) be done with this technology, types,
applications and use cases, current state of this technology/application/usage, research activities on this technology, and your view on its potential success or failure or any other trends with reasons. Your report should be in the standard format (Abstract, Introduction, …, Conclusions, References). Mention the references that you used for this study in the report.


20) 9001-Report

Assessment Description
1. To what extent does public key cryptography depend on social trust?
2. Clearly and concisely describe the public key infrastructure involved with Transport Layer Security (TLS) protocol.
a. Then, critically analyse the most important points where trust in organisations or institutions is necessary for this infrastructure to function,
b. the direction of trust in these relationships,
c. and how that trust could be created and lost.
3. Finally, explain what the limits of trust under international anarchy imply for your analysis of public key cryptography.

21) 32690-Case Study

Assessment Description
In the state of Western Australia, it is illegal to access, own or distribute digital content relating to clowns. An allegation has been made to law enforcement whereby a witness claims to have seen an individual access clown related content within a place of work. Following the approval of formal warrants, the computer in question was seized from the workplace. The computer was then forensically acquired using FTK Imager. Unfortunately, the junior investigator who obtained the ‘forensic image’ of the computer only performed a logical acquisition. To worsen the situation, the junior investigator forensically wiped the original hard drive from the computer. Fortunately, the logical acquisition was undertaken in a forensically sound manner. The suspect, Clark denies accessing clown content. However, Clark does confirm that the computer does belong to him. Clark stated that he does not always take the computer home or lock it when he is away from his desk. You are a consultant who specializes in digital forensic investigations. You have been assigned the task of examining a ‘forensic’ image of the laptop, which was seized with correct warrants. It is currently unknown what Clark was doing with the clown content. In Clark’s opinion, the computer was infected with malware which resulted in any potential content appearing on the computer.
Task
Your task is to investigate the supplied forensic image using appropriate tools and process and to develop and submit a written report on your findings. You may use any tools to undertake the investigation but you must justify all of your actions!

22) 31904-Software Defined Wireless Networking

Assessment Description
Task
1. Different antenna, such as yagi, horn, and cellular antennas, etc. has different merits. Research these technologies in details and pay specific attention to how they are used as well their strengths and weakness. Provide an opinion regarding which antenna types will become the dominant players in the future of medium- and long-distance wireless links [4 marks]
2. A local engineering group ask you to present your finding of the most recent advanced wireless technologies. Research any THREE different wireless network protocols in details and pay specific attention to how they are used as well their strengths and weakness. What security challenges they are facing? Provide a report of your opinion [6 marks]
3. Read the following two research papers, please give your critical reflection on the topic of the software-defined wireless network. [6 marks] Please refer some other References below one is sample
Bernardos, C. J., Oliva, A. d. l., Serrano, P., Banchs, A., Contreras, L. M., Jin, H., & Zuniga, J. C. (2014). An architecture for software defined wireless networking. IEEE Wireless Communications, 21(3), 52-61. doi: 10.1109/MWC.2014.6845049 Rangisetti, A. K., & Tamma, B. R. (2017). Software Defined Wireless Networks: A Survey of Issues and Solutions. Wireless Personal Communications, 97(4), 6019-6053. doi: 10.1007/s11277-017-4825-8

23) 737382- Computer security

Assessment Description
WidgetsInc has contracted Benny Vandergast Inc to develop their new web-
based store. Benny Vandergast Inc has provided a VMware virtual machine for
testing. WidgetsInc have decided to give you the job of evaluating the security
of the system provided by Benny Vandergast Inc.
You should perform a security evaluation on the provided virtual machine
image. You have not been supplied with either the IP address of the system or
any usernames and passwords, you have have to discover these as part of your
investigation.
Requirements
Your report should include:

A description of how you investigated the security of the system.

include fully cited information on tools and techniques you used.

A description of the results obtained.

A proposal on how to secure the system.

you should address each of the security issues you find.

24) 501289-Network Security-1000-20-Harvard

Assessment Description
it’s network security, I have to design a network and perform different types of attacks on the network and state how they can be prevented, And then implement the security measures to prevent them.
about 4-5 different attacks should be good. sounds good, for simulations, I will use kali Linux to perform the attacks
Virtual machines Software:
• VMware Workstation 12
Operating systems:
• Windows 7
• Windows XP
• MetasploitableHacking system:
•Kali, research port scanners in kali (Nmap)
•Kali TutorialsType of attacks:
• SQL injection
• ARP Spoofing
• Attack using a backdoor like a bind and shell with kali
• password guessing attack
• Denial of Service Attacks on the network HTTP

25) 749687- CyberSecurity and 726076-malware

Assessment Description
Part 1: Basic malware analysis
In this scenario, an acquaintance was e-mailed a suspicious attachment and wants to know if it is
malicious. He already opened the file and was surprised to see a foreign-language sentence. Now he
is concerned that he is infected with malware.
Answer all the questions below and write a full report. If you want to work in pairs, identify both authors
on the report cover sheet and upload it twice. Environment & tools Statically and dynamically analyze the unzipped sample “29-10-2014_Quittung.rtf” on a Windows XP SP3 virtual machine. The archive password is “infected”. Please note that this is real malware. Which tools to use is completely up to you. In malware analysis, there is rarely only one “right” path. Be creative! Still, I suggest you look at previous exercises and pick whatever tools you deem appropriate. For this exercise, it okay to let the sample talk to the outside world. Before you do that, however, it is recommended to simulate internet communication (also see lab exercise “Combined dynamic analysis”) and determine beforehand if it is safe.
Analysis tasks
1. Analyze the social engineering component of the malware. Translate it. How does it try to get
people to execute it?
2. Your friend has already opened the document attachment. What happened? Is his machine
already infected? Find proof for/Argue your answer!
3. Extract the core malware and document the steps.
4. Perform basic static analysis of the sample and document your findings. Is it packed? What
do the imports and exports tell you? Do you see anything suspicious section- wise? Interesting
strings? Remember: MSDN is your friend!
5. Analyze the sample dynamically and monitor the activity on the system. What changes? Is
anything dropped, executed or deleted? If you use Regshot, be careful to set the right scan
directory (C:)!
6. Can you find indicators for sandbox or VM detection? What can you do to circumvent it? Restart
your analysis after taking care of the anti-analysis technique(s).part2
In this scenario, your company’s CFO was victim of a crypto locker, losing all her precious holiday
photos. She comes to you in hopes that you’llbe able to help her recover her files without paying the
ransom. The incident response team has already located the malicious sample and provides you with
both the malware and an encrypted sample that needs to be recovered at all costs.
Answer all the questions below and write a full report. If you want to work in pairs, identify both authors
on the report cover sheet and upload it twice.
Environment & tools
Analyze the sample “cryptolock.exe” on a Windows virtual machine. The archive password is
“infected”.  Which tools to use is completely up to you. In malware analysis, there is rarely only one “right” path. Be creative and know when to stop. With disassembly, you will see many functions that will not yield any useful answers. For this exercise, it okay to let the sample talk to the outside world. Before you do that, however, it is recommended to simulate internet communication (also see lab exercise “Combined dynamic analysis”) and determine beforehand if it is safe. The questions below provide hints about the technical backgrounds and recommended MO.
Analysis tasks
1. Perform a basic static analysis of the sample and document your findings. Is it packed? What do
the imports and exports tell you? Do you see anything suspicious section- wise? Interesting
strings?
2. Attempt to execute the sample and use basic dynamic analysis tools to determine whether the
sample causes damage to the system. Can the sample be executed as is? If yes, what happens?
If no, why not?
3. Load the sample into IDA and attempt to locate the “main” function (which is not necessarily
called this way). You will see a lot of exit conditions that will terminate the program when run.
Where is the main function? Highlight it and expand it.


26) 706551-Analysis of Ransomware and Impacts in Enterprises

Assessment Description
The aims of the project is focusing on the detailed analysis of Ransomware (WannaCry) with reverse engineering techniques, how does it affect the enterprise environment and take the related prevention based on IT infrastructure deign First, perform an in-depth analysis with reverse engineering techniques (IDA Pro) to explore why WannaCry has gained such momentum recently, how WannaCry’s functions, and the related behaviors. Then, discuss about why the traditional anti-virus or anti-spam are rarely efficient against on WannaCry and how impact on the enterprises environment. Final, any possible solution that can detect and prevent the WannaCry attack instead of paying money.


27) 729503- malware analysis

Assessment Description

Part 1: Basic malware analysis
In this scenario, an acquaintance was e-mailed a suspicious attachment and wants to know if it is
malicious. He already opened the file and was surprised to see a foreign-language sentence. Now he
is concerned that he is infected with malware.
Answer all the questions below and write a full report. If you want to work in pairs, identify both authors
on the report cover sheet and upload it twice.
Environment & tools
Statically and dynamically analyze the unzipped sample “29-10-2014_Quittung.rtf” on a Windows XP
SP3 virtual machine. The archive password is “infected”. Please note that this is real malware.
Which tools to use is completely up to you. In malware analysis, there is rarely only one “right” path. Be
creative! Still, I suggest you look at previous exercises and pick whatever tools you deem appropriate.
For this exercise, it okay to let the sample talk to the outside world. Before you do that, however, it is
recommended to simulate internet communication (also see lab exercise “Combined dynamic analysis”)
and determine beforehand if it is safe.
Analysis tasks
1. Analyze the social engineering component of the malware. Translate it. How does it try to get
people to execute it?
2. Your friend has already opened the document attachment. What happened? Is his machine
already infected? Find proof for/Argue your answer!
3. Extract the core malware and document the steps.
4. Perform a basic static analysis of the sample and document your findings. Is it packed? What
do the imports and exports tell you? Do you see anything suspicious section- wise? Interesting
strings? Remember: MSDN is your friend!
5. Analyze the sample dynamically and monitor the activity on the system. What changes? Is
anything dropped, executed or deleted? If you use Regshot, be careful to set the right scan
directory (C:)!
6. Can you find indicators for sandbox or VM detection? What can you do to circumvent it? Restart
your analysis after taking care of the anti-analysis technique(s).

part2
In this scenario, your company’s CFO was victim of a crypto locker, losing all her precious holiday
photos. She comes to you in hopes that you’llbe able to help her recover her files without paying the
ransom. The incident response team has already located the malicious sample and provides you with
both the malware and an encrypted sample that needs to be recovered at all costs.
Answer all the questions below and write a full report. If you want to work in pairs, identify both authors
on the report cover sheet and upload it twice.
Environment & tools
Analyze the sample “cryptolock.exe” on a Windows virtual machine. The archive password is
“infected”.
Which tools to use is completely up to you. In malware analysis, there is rarely only one “right” path.
Be creative and know when to stop. With disassembly, you will see many functions that will not yield
any useful answers. For this exercise, it okay to let the sample talk to the outside world. Before you do that, however, it is recommended to simulate internet communication (also see lab exercise “Combined dynamic analysis”) and determine beforehand if it is safe.
The questions below provide hints about the technical backgrounds and recommended MO.
Analysis tasks
1. Perform a basic static analysis of the sample and document your findings. Is it packed? What do
the imports and exports tell you? Do you see anything suspicious section- wise? Interesting
strings?
2. Attempt to execute the sample and use basic dynamic analysis tools to determine whether the
sample causes damage to the system. Can the sample be executed as is? If yes, what happens?
If no, why not?
3. Load the sample into IDA and attempt to locate the “main” function (which is not necessarily
called this way). You will see a lot of exit conditions that will terminate the program when run.
Where is the main function? Highlight it and expand it.


28) 181600-197551-SIT382 – System Security

Assessment Description

Problem Statement
You are required to perform security exploits specified in this document using the WebGoat J2EE web application package as well as BackTrack GNU/Linux distribution. You can download WebGoat and any appropriate tools from the SIT382 CloudDeakin course website to complete this assignment. The link to download BackTrack is http://www.backtrack-linux.org/downloads/. You can also use other non-commercial (free and open-source) tools (e.g. Wireshark) to help you complete this assignment. You are not to use any commercial security-related or hacking products for this assignment. There are two parts to this assignment. Part A will require you to use more than one exploit to attack a web application and different techniques to defend against such attacks, while part B is to test your understanding of a particular exploit and how to counter that exploits.


29) 33524-Kali Linux

Assessment Description

Each group needs to select one of the following security vulnerability testing tools of Kali Linux
on a first come first served basis:
 Hydra
 Maltego
 NMap
 Zed Attack Proxy
 SqlMap
 Metasploit Framework
 Burp Suite
If there are more groups than the number of available topics, then one topic can be selected by more than one group. This should be arranged under the discretion of Lecturer/Tutor. If a group wants to select a security vulnerability testing tool of Kali Linux that is not listed above, the group needs to discuss this with the Lecturer/Tutor.
3. Deliverables
Members of each group need to learn the usage of the selected tool of Kali Linux. For this students need to research, install, and use Kali Linux and the selected tool. After sufficient study and hands-on experience, each group needs to prepare and submit a report, and orally present their understanding on the selected tool and Kali Linux as a whole (individual member presentation). Formats of the report and oral presentation are mentioned below.


30) 7176-computersecurityproject

Assessment Description
1. you may need to scan the network to find the target machine (how to be in the same subnet with VM1, which has a static IP? )
2. find which port/service is running
3. find the service (SSH)
4. using Hydra for dictionary attack (both command line or gui)
5. find the root’s passwords for both machines
6. for the second machine, if you can login with a regular user account (recovered from VM1), then previlege escalation, copy etc/password, john the ripper to crack the passwords


31) 825254-FOUNDATIONS OF CYBER SECURITY

Assessment Description

1. Create a new or modify an existing C program in order to complete a given specification
2. Explain and demonstrate understanding of an operating system’s persistent storage
3. Evaluate and justify the use of cryptographic tools and techniques in an application context
4. Critically analyse network traffic to identify potential vulnerabilities
5. Relate knowledge of topics to cyber security domain
4. Download the pcap file 5801cwk_pcap and analyse the traffic. Identify, analyse and explain all connections and interactions you can identify. Assess whether or not any of the connections might be suspicious, identify these and explain why they might pose a danger. You must include:
– Start frame
– Mac address of host initiating the connection
– Mac address of destination host
– IP address of host initiating connection
– IP address of destination host
– The port used by the initialising host
– The port used by the destination host
(25 MARKS)


32) EM0020-EM1800SUR3008NETW

Assessment Description

This assignment include two tasks:
Task one: (research)
Students are required to choose four WLAN sniffing tools and write a maximum of 200
words about each tool to highlight:
 How tools work
o Level of complexity
 Included features
 Differences from other tools
 Advantages and disadvantages
 screen shots (one for each tool)
o install demo versions then take screen shots – online screen shots will not be considered
Task two:
Students are required to
1. Record WLAN access points at a public place (such as at a shopping centre, public place, home network etc. of your choice).
2. Gather technical information about wireless network at three different locations with minimum of 5 APs for each location.
3. Test the WLAN sniffing tool and report your observation and recommend how to secure and/or manage WLAN. Your report should include:
a. Screenshots (as an evidence) and detail explanation to report working mechanism (the step by step process) of the identified technique.
b. Explain the use (evaluation) of the technique to secure and/or manage WLAN. o Discuss dual bands and its advantages o Security implications.


33) 31210-Networking Fundamentals

Assessment Description

Question 1 [1 Marks]
Briefly describe the OSI reference model and the TCP/IP networking model, use diagrams to show the relationship between both these models.
Question 2 [1.5 Marks]
Complete the following Hands-On Projects from the prescribed textbook (Pyles, Carel & Tittel 2017, pages 37-45)
• Hands-On Project 1-1
• Hands-On Project 1-2
In order to complete this activity, students should insert screenshots in the assignment document along with a short description of each step taken to complete the project. Students must also answer any relevant questions highlighted in step-by-step description of the above mentioned hands-on projects in the textbook
Question 3 [1.5 Marks]
a. Describe the role ARP Cache plays in establishing Address Resolution Protocol (ARP)? [2 Marks]
b. Complete Hands-On Project 4-1 from the prescribed textbook (Pyles, Carel & Tittel 2017,page 241) [1 Marks]
Question 4 Case study task [2.5 Marks]
In your role as a Solutions Architect at Riverina IT Solutions, you are leading a team of several system administrators. Riverina IT Solutions is a medium sized organisation and is currently expanding its operations. The company has acquired six sites across regional New South Wales to accommodate its various departments. You have been asked to design a network by utilizing 10.0.0.0 private IP address. The designed network should span six sites with a router at each site to interconnect the entire network. It is assumed that each site will have its own single subnet. Company expects approximately 1100 workstations across all the sites with approximate numbers in each building as follows:
Wagga Office – 300 workstations
Junee Office – 130 workstations
Albury Office – 125 workstations
Griffith Office – 120 workstations
Temora Office – 215 workstations
Culcairn Office – 150 workstations
TASK – Write a 800 words (+/- 10%) (Max) report explaining:
a. The detailed design of a simple addressing solution (with diagram(s) and step by step workout of the calculations) that leaves room for growth, is easy to administer and has the minimum wastage of available IP address space. [ 1.5 Marks]
b.Explain what happens to your design if the number of hosts per network jumps to over 1,024 per building. [ 1 Marks]


34) 749338-Network Application Management

Assessment Description

The aim of the assignment is to develop an analytical understanding of performance and management of
different types of networked applications. The assignment will provide an opportunity to understand network performance and management issues of networked applications using state of the art tools. These exercises provide an opportunity to demonstrate analytical ability of evaluating distributed systems performance, Quality of Service and service management.
Overview and General Instructions of Assignment
Students need to form a group of two in their own lab class and inform tutor about their group during Week 7 Lab. Each group will need to capture packets on their home network and at MIT while accessing the following websites. One website is of a news channel and the other one is a website for live streaming. The students are required to capture packets of multiple images from the news channel website and capture packets from the live stream website while streaming for 10 minutes once at MIT in a group and then on their home network individually. So at the end there will be six trace files, three for each website, two captured on MIT network and four on students’ home networks.
The websites to access are:
http://www.lightfm.com.au
http:// iview.abc.net.au
The complete report must be submitted on Moodle within due date. The report has following four main
parts:
Part 1:
The first part of the report should be about general statistics of all six captures using Wireshark that must
include:
1. Start time of capture
2. Total number of captured packets for each protocol
3. Total Number of lost packets
4. IP addresses of the client and server
Part 2:
The second part of the report must include screen shots of packet capture, screenshots of different statistics
from Wireshark and complete analysis of those screenshots for both websites for all three networks. Only
screenshots of the graphs or other statistics will not get any marks as those must be analysed in detail to
discuss the quality of service for a particular application. The students are required to analyse the network
performance for the assigned websites considering following aspects:
1. Throughput
2. Round Trip Time
3. Packet Loss


35) 677767-Network Application

Assessment Description

This assignment is designed to develop student’s analytical skills in addition to Wireshark utilization
to capture data from live network traffic. Through the laboratories, students have learned how to
analyze HTTP packets, TCP packets streams, and audio streaming with TCP. Students have learned to
identify the performance parameters such as load distribution, throughput graph, time sequence
graph, flow graph, and window scaling graph.
Overview and General Instructions of Assignment
Students need to use captured Wireshark data to explain the performance of the distributed system
behind the given web system. In a report, students need to focus on human-centered design as this is
an approach to interactive systems development that aims to make systems usable and useful by
focusing on the users, their needs and requirements, and by applying human factors/ergonomics,
usability knowledge, and techniques.
Task – 1
From the (MIT lab Network), students need to chase and capture three websites in the table below
(Table 1). Students have to analyse the performance for each website with respect to:
 Load Distribution
 Throughput Graph
 Time Sequence Graph
 Flow Graph (Both general and TCP flow)
 Window Scaling Graph
Task – 2
Investigate streaming audio delivery over TCP by listening to Internet live radio and capturing the
transmitted packets.
From a second network (home, work, etc.), students have to chase and capture one more website
which has an audio stream (such as radio stations, e.g, http://www.abc.net.au/radio/listen-online )
Students are free to choose any website. Show your analysis using TCP Stream Graph and Time
Sequences Graph.


36) 507424-Network Applications

Assessment Description

This assignment, detailed below, is designed to develop students’ deep analytical understanding of different distributed network conditions, and the purpose includes, but are not limited to, presenting understanding to a wide range of technical and non-technical audience. This exercise will provide opportunity to learn underlying inherent mechanism of networked application protocols. It has scope to do comparative study between different network conditions to ensure load balancing and QoS. This exercise provides them with the opportunity to demonstrate analytical ability of evaluating distributed systems performance, Quality of Service and service management.

Overview and General instructions of Assignment
The students need to use captured Wireshark data to explain the performance of the distributed system behind the given web system.

Capture your own data according to the Table below.
• In two different network conditions.
• Your capture should include a number of multimedia content (such as large images, etc.,) including video/audio (live or offline streaming).
• using Wireshark (tools/graph specification) for live video/audio and multimedia data types.

The captured Wireshark data should be used to analyse the network performance at:
• Two different network conditions.
• Each student needs to prepare an individual report of their analysis using performance parameters specified for that particular website.
• Report must include screenshots.
• The student also pair with another student who is working on the same group and compare their findings and each can then write one to two paragraphs about it.

 


37) 181600-197551-SIT382 – System Security 

Assessment Description

You are required to perform security exploits specified in this document using the
WebGoat J2EE web application package as well as BackTrack GNU/Linux
distribution. You can download WebGoat and any appropriate tools from the SIT382
CloudDeakin course website to complete this assignment. The link to download
BackTrack is http://www.backtrack-linux.org/downloads/. You can also use other
non-commercial (free and open-source) tools (e.g. Wireshark) to help you complete
this assignment. You are not to use any commercial security-related or hacking
products for this assignment.
There are two parts to this assignment. Part A will require you to use more than one
exploit to attack a web application and different techniques to defend against such
attacks, while part B is to test your understanding of a particular exploit and how to
counter that exploit.


38) EM0019-EM201882DHA826BM_C

Assignments Description
Each student has to select an organization with the following specification:
1. The organization must use information technology to implement its business operations.
2. It must have a website to improve the organization marketing and customer satisfaction through better services. The organization domain name is: www. compName.org.au
3. Email services for each staff member.
4. More than one campus at different locations.
5. Wireless network services within the organization campuses.
6. Assume the organization has more than 3000 computers at each campus connected in a network and have access to the Internet.
7. Backup and file share servers for regularly backup staff important documents and share files between staff, respectively.
Assume the head officer of the IT department wants to analyse current network design and propose the hosting of some network services using virtualization and Cloud.
Analyse the current network by develop a logical diagram. Your diagram must base on three-layers hierarchal model. The diagram should include the set of required servers, network devices, and connections with justification. You may have to make some assumptions with the required justifications.

39)877060-IT computer and networking

Assignments Description
You have been asked by a local school to design a new network. At present, there is only a simple LAN installed, consisting of 10 computers and 2 printers connected to two 8-port HUB. There is a router with a 50Mbps ADSL Broadband Internet access (point of presence – POP) located in the storeroom.
The Plan:
The storeroom will be converted into a Communications (Comms) room to house the Main Distribution Facility, (MDF). There is a main two-storey building and a single-storey studio. The ground floor of the main building that is 100 metres x 120 metres. The admin is on the ground floor with 6 computers and one printer and reception with 4 computers and a printer. One classroom on the ground floor with 12 hosts, located approximately 50 metres from the admin office and a computer lab (with 10 hosts) is on the first floor. The single storey building is 100 metres north of the main building, with a lab of 8 hosts. One of the hosts in each classroom is a printer. The administration is concerned about security and requires one sub-network for Admin and another for the Students.
The School has a Web server and DNS server with an IP address of 200.200.1.254 and a domain name: www.school.ac.uk for Internet access.
The intranet has additional segments in the building, therefore, the Network Manager assigned a Class C (/24) IP to the School LAN: 192.168.11.0/24 (Do not change the red part!)
The internal LAN network is behind the firewall router provisioned with two Ethernet ports for the internal subnetted networks and one for the Web and DNS servers. (Router can be modified.)
a) Showing your reasoning, determine a suitable number of subnets, the subnet mask, and IPv4 networks for the scenario. Provide a grid with the IP address ranges, subnet mask and broadcast addresses.
b) Decide and draw the logical topology using Packet Tracer showing the IP addresses based on your answers to part (a). and circle the broadcast and collision domains.


40)33222-Advanced Networking

Assignments Description

Tasks:
There are two parts to this assignment, i.e. part A and part B.
A. Research and propose a modern network for a multi (five) building university campus with internet and wireless access.
Details description is as under. 60 marks
Description:
There are three (3) areas to consider for advanced network design in this assignment.
1. Propose a detailed design/layout for a campus having multiple buildings;
2. Design LAN (including Wireless LAN) and WAN services for the users
3. Research about LAN, wireless LAN and WAN technologies (Equipment, protocols and services)
4. Report must include:
a. Introduction
b. Building diagram (this need to be virtually assumed according to you own thinking)
c. Scopes and Limitations
d. Requirements (Network LAN,WLAN, WAN)
e. Solution Design
f. Logical Design and physical Design
g. Network structure/topologies
h. Protocols, technologies and services
i. IP addressing ( IPv4 and Ipv6)
j. Security features, policies, redundancy
k. Provision of wired and wireless internet for staff and student

 

 


41) 33244-Networking

Assignments Description

Tasks:
Task 1 (Research)
In this task, you are required to research a range of options/methods that can be used for network designing in this assessment. Based on your research you are required to clearly list your views on pros and cons of each available option for the completion of this assessment and select an option that you will use to complete this assessment [5 marks].
Task 2 – Setting up a Network
You are required to set up a network consisting of PCs, routers, switches and servers. You need to configure routing between routers. The routers will have multiple network interfaces. The PCs (clients) will be connected to switches and switches to the router’s interfaces and.
Client(s) <–> Switch <–> Router <–> Router <–> Switch <–> Server(s)
Use ONLY the IP address ranges you designed for this network in assessment 2.
Perform the following activities and support your workings with screenshots [10 marks]:
1. Configure the PCs, Server and Router interfaces with appropriate network addressing;
2. Configure RIP or static routing on the routers;
3. On the client ping the client’s own network interfaces, then the local router gateway interfaces, then the remote router interfaces, then the servers;
4. Use the traceroute command from the client to the server. Include results of the traceroute in your submission.
Task 3 – Configuring Network Services
Using the same network topology that you have setup in Task 1, perform the following additional activities [10 marks]:
1.DHCP: Configure DHCP servers and show that the client PC has successfully received IP Addresses and other network parameters (default router, netmask, DNS) using DHCP;
2.WEB Server: Configure WEBs server on the dedicated machines in their specified networks, with URL as servername.yourname.class
3.DNS: Configure DNS Servers on the server device and demonstrate that forward and reverse DNS are working from the client PC; test DNS Server by browsing servername.yourname.class from client PC, DNS must resolve this URL to IP address of WEB Server
4.Firewall: Configure traffic filtering on the web servers to block ONLY TCP traffic between one of the client PCs and WEB Servers and allowing all other IP traffic, provide evidence of such traffic filtering.

 

 


42) SA0005-MN621 SA220820180119-Advanced Network Design

Assignments Description

A case study: Local Area Network design and configuration
There is an organisation which is primarily e-commerce business. It is going through a major transformation because of its expansion. The expansion is due to merger of two smaller businesses to the organisation. Now, the organisation is moving to a new building having about 100 employees. The new building is of three floors. The ground floor is for reception, foyer and warehouse so there is a need of five data points at reception, four in warehouse and two in foyer. The 1st floor consists of five offices and forty open plan office cubicles. The 2nd floor consists of three rooms, each room have four office cubicles, two offices and thirty open plan cubicles. There is also a meeting room at 2nd floor that requires four data points. Each and every person needs two data points at their desk whether it’s an office, room cubicle or open plan cubicle. Each floor also needs wireless connectivity.
This organisation needs a new LAN plan, design and implementation before they move to new facility.

 

 


43) SA0011-SA240820180139-MN603-Wireless Networks and Security 

Assignments Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.
For further reading, could refer to the article “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey” [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.
The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:
1. Comparison of the existing cellular networks generations in terms of:
a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk
2. Explore the architecture of LTE/LTE-A
3. Evaluate the LTE/LTE-A attacks on the access and core networks.
4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

 

 


44) EM0021-EM201855ANJ830CN

Assignments Description

A case study: Local Area Network design and configuration
There is an organisation which is primarily e-commerce business. It is going through a major transformation because of its expansion. The expansion is due to merger of two smaller businesses to the organisation. Now, the organisation is moving to a new building having about 100 employees. The new building is of three floors. The ground floor is for reception, foyer and warehouse so there is a need of five data points at reception, four in warehouse and two in foyer. The 1st floor consists of five offices and forty open plan office cubicles. The 2nd floor consists of three rooms, each room have four office cubicles, two offices and thirty open plan cubicles. There is also a meeting room at 2nd floor that requires four data points. Each and every person needs two data points at their desk whether it’s an office, room cubicle or open plan cubicle. Each floor also needs wireless connectivity.
This organisation needs a new LAN plan, design and implementation before they move to new facility. Description Design a local area network for the given case study. Write a report on a network plan and configurations having following sections: 1. Analyse the need for the network for above case study. Investigate and propose a suitable complete network design for the case study. 2. Write a detailed setup of network devices only for a LAN. 3. Write a detailed implementation report which includes configurations of each networking device which are included in the whole network. 4. Demonstrate and compare at least 2 configuration results which may include at least two switches/routers and two PCs on physical networking devices. [20 marks]

 

 


45) EM0022-EM201862KIR94CN-Network Design

Assignments Description
A case study: Local Area Network design and configuration
There is an organisation which is primarily e-commerce business. It is going through a major transformation because of its expansion. The expansion is due to merger of two smaller businesses to the organisation. Now, the organisation is moving to a new building having about 100 employees. The new building is of three floors. The ground floor is for reception, foyer and warehouse so there is a need of five data points at reception, four in warehouse and two in foyer. The 1st floor consists of five offices and forty open plan office cubicles. The 2nd floor consists of three rooms, each room have four office cubicles, two offices and thirty open plan cubicles. There is also a meeting room at 2nd floor that requires four data points. Each and every person needs two data points at their desk whether it’s an office, room cubicle or open plan cubicle. Each floor also needs wireless connectivity. This organisation needs a new LAN plan, design and implementation before they move to new facility.

46) SA0033-SA2009018176 MN603 Wireless Networks and Security

Assignments Description

Secure enterprise wireless local area networks LANs are an important component of modern network
architecture. Such networks are required to support mobile devices and provide connectivity where wiredconnections are not practical or cost prohibitive.
Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard – industry advances in technology and vendor innovation makes this easier than ever.
WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.This assignment requires the students to design and implement a secure enterprise wireless network, considering the ethical implications. The students are required to complete the following tasks and submit areport on Moodle.
1. Explore the ethical implications in the design and implementation of a secure enterprise wireless
network.
2. Design a secure enterprise wireless network, employing Boson Netsim.
3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the
following aspects:
a. Confidentiality
b. Integrity
c. Availability
d. Authentication
e. Authorization
4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server.
5. Test and prove a successful of connectivity between clients using AP. You need to take a snapshot for
the different phases of authentication, association, de-association, and pinging each other’s terminals
on the same network

 

 


47) EM0020-EM1800SUR3008NETW

Assignments Description

This assignment include two tasks:
Task one: (research)
Students are required to choose four WLAN sniffing tools and write a maximum of 200
words about each tool to highlight:
 How tools work
o Level of complexity
 Included features
 Differences from other tools
 Advantages and disadvantages
 screen shots (one for each tool)
o install demo versions then take screen shots – online screen shots will not be
considered
Task two:
Students are required to
1. Record WLAN access points at a public place (such as at a shopping centre, public
place, home network etc. of your choice).
2. Gather technical information about wireless network at three different locations with
minimum of 5 APs for each location.
3. Test the WLAN sniffing tool and report your observation and recommend how to
secure and/or manage WLAN. Your report should include:
a. Screenshots (as an evidence) and detail explanation to report working mechanism
(the step by step process) of the identified technique.
b. Explain the use (evaluation) of the technique to secure and/or manage WLAN.
o Discuss dual bands and its advantages
o Security implications

 

 


48) EM0051-EM201843ANJ919CN

Assignments Description

Secure enterprise wireless local area networks LANs are an important component of modern network architecture. Such networks are required to support mobile devices and provide connectivity where wired connections are not practical or cost prohibitive.
Enterprise wireless LAN deployments have evolved from guest access in conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless LAN is not hard – industry advances in technology and vendor innovation makes this easier than ever.
WPA2-Enterprise deployment includes installing a remote authentication dial-in user service RADIUS server, configuring access points with the encryption and RADIUS server information, configuring your operating system with the encryption and IEEE 802.1x settings, and then connecting to your secure wireless enterprise.
The standard for passing EAP over a network is IEEE 802.1x. In this authentication framework, the user who wishes to be authenticated is the supplicant. The RADIUS server doing the authentication is the authentication server, and the device at the AP, such as a laptop or smartphone, is the authenticator.

 

 


49) EM0118-EM201893MOH1022CN

Assignments Description

Design and Implementation of Internet Network for ABC Bank and its Branches:
The ABC bank is situated at Ruwi, Oman. It was established in 2004. It has three branches and the bank does not have internal network. The banking organization is planning to create network between head office and its branches using Packet Tracer.

1.1 Problem Definition
• The bank and its branches are not interconnected.
• The banks have traditional way of networking and it makes the working slow and they will not have Automated Teller Machine for client’s comfort.
• The client’s cannot access their account in any other branch than the one they have their account.
• The bank will be far behind the race of today’s competition
• Bank and its branch works as an independent unit.
• The processing and updating is a time taking and hectic process.

 

 


50) 644563-IT Networking Designing

Assignments Description

Scenario
You and your group members are working for the AusNet networking solution provider. Your team is asked to design a network solution for the requirements specified by the Seven Star Motors (SSM) Australia and test it using GNS3 emulation platform before deploying the real network and document the specifications.
Company – Seven Star Motors (SSM):
Seven Star Motors is a vehicle, motorcycle, and engine manufacturing company founded in 1916. It is one of the best-selling luxury automakers in the world. The company is a component of the Euro Stoxx 50 stock market index. SSM headquartered in Munich, Bavaria and owns Mini cars and is the parent company of Star Motor Cars. SSM has overseas subsidiaries in different countries such as Australia, Brazil, Canada, China, India, Japan, Mexico, South Africa and United States.
Seven Star Motor Company Requirements:
SSM Australia maintains, hires out, buys and sells new and used premium branded motor vehicles in Australia. The head office of the company is situated in Sydney. It has branches in Melbourne, Perth and Brisbane. Company wants to Implement a network which supports potential growth over the next five years and they have hired AusNet to layout the network with an expectation of 50% growth of current IP requirements. (For the simplicity of the case study and to limit the scope we have ignored the connections to the international branches.)
At present, there are 125 employees at department of Sales and Hire, 45 employees in department of Marketing, 20 employees in department of Vehicle Maintenance, 25 employees in the department of Business Administration and 5 employees at department of Site Security providing their service to the head office which is stationed in Sydney. All members of department of Site Security require access to all the network via a wireless LAN at each site. Company has 20 employees working for the Technical Support Group, 5 employees at each site. Sydney head office also hosts the server farm for the network. These servers contain web servers and file servers which carry company sensitive information.
Sydney head office is spread across 2 major buildings which are 5km apart from each other. Building A is a three-storied building with 50 Sales and Hire employees on 2nd and 1st flow. Rest of the Sales and Hire Department employees and Site Security Group is stationed in the ground floor. Building B is a two-storied building with 1st flow for department of Marketing and Technical support group and the ground flow for the other departments. Server Farm is hosted in building A. In connecting the major building of the head office, company has requested to set up a leased line with security measurements.
The Melbourne branch spans across a single area which is 150metres x 100 metres and has a building floor of size 25meters x 30 meters. It has a Hire Only department, Vehicle Maintenance department and Site Security department which employs 265, 20, 5 employees respectively.
Brisbane branch spans across a land of 100metres x 100 metres with 25metres x 40 metres building floor dimensions. It has a Sales Only department, Vehicle Maintenance department, site security department which employs 160,20,5 employees respectively. The Internet Service Provider (ISP) for the company is based in Brisbane. Use class C ISP network connection address.
Perth Branch is spread over a land of 125 metres x 100 metres with a single storied building of the floor size 20metres x 40 metres. Perth branch has a department of Sales Only, Vehicle maintenance and site security which employs 100,20,5 employees respectively.
Company also has a branch just started with 7 employees for, 5 in Hire Only department and 2 in Business Administration departments who are working for the Brisbane branch through a remote VPN connection. This branch located in a Brisbane inner suburb has internet connection through an ISP provider.
Further Company request at least one separate printer for each department in each Branch. Each department also has a separate server reserved. Main Network Administrator who is working for the Technical Support group in Sydney should have access to all the devices over the network to both monitor and configure as necessary using a secured connection. Company also insists upon automatic configuration of IP addresses to minimize administrative overhead. They also insist the network to be reliable and secured to the maximum extend.
Company prefers to use private addresses as a security concern and prefers to buy a range of public addresses which could be used for internet connections using Network Address Translation (NAT).
The company requires the implementation of following security policies to control the flow of IP traffic within its network and to the Internet.
For clarity, all the requirements requested by the company is listed in point form bellow.
• Access Rules for Server Farm LAN must be decided as to which VLANs can access which servers in the Server Farm VLAN. The servers need to be protected from malicious computer attacks and unauthorized access. Facility to carry out audit checks needs to be provided as well so as to keep track of the exact activity along with the date and time at which an employee of QW Australia carried out a computer system based activity. The activity could include doing task(s) such as installation of new software, installing patches, taking backups and make changes in Webpage etc.

• Access Rules for Group Access VLANs
 All VLANs are permitted to access internet unless specifically denied below.
 VLAN to VLAN access, is denied unless specifically permitted below.
 PC hosts in the Sales and Hire VLAN are permitted access to the Business Administration VLAN.
 PC hosts in the Hire Only VLAN are permitted access to the Marketing VLAN and Sales and Hire VLANs.
 PC hosts in the Marketing VLAN are permitted access to the Business Administration VLAN, and Hire Only LANs.
 PC hosts in the Business Administration VLAN are only permitted access to the Internet.
 PC hosts in Sales Only VLANs are permitted access to Marketing VLAN.
 PC hosts in Marketing VLAN are permitted access to Sales Only VLANs.
 PC hosts in the Site Security wireless LAN are permitted access to all VLANs.
 PC hosts in Technical Support VLANs are permitted access to all VLANs.
 PC hosts in Site Security wireless LAN denied access to the Internet.

(Use a Table H to record the testing of the ACLs – add Rows as needed)

AusNet Networking Company Requirements and Specifications
Your company expects you to configure eBGP peering between the enterprise and the ISP particularly on the enterprise side of the configuration. Ausnet ensures most efficient solutions for the clients and there for uses VLSM for their designs. Use table A to show the subnets that meet the company requirements. Clearly identify the subnets that are available for the future use.
Use the following specifications defined by the AusNet Networking to implement the IP address Plan.
IP Address Plan
SPECIFICATION INFORMATION
Specification Number 3.4
Class A -Internal Network Address 41.105.0.0 / 18
Class B -NAT Pool Public Address 135.40.0.0 / 23
Class C- ISP Network Connection Address 193.21.2.0 / 30
Class B -ISP Internet Web Server Address 171.81.52.0 / 30

 

 


51) 196780-MN 503 – Overview of Internetworking

Assignments Description

Case Study
You are employed as a Network Engineer by a leading shopping mall Mega company called
PriceLo malls Inc. The company has branches of their malls spread in 5 major cities of Australia- Sydney, Melbourne, Adelaide, Brisbane and Gold Coast. Each of these cities on an average has 10 PriceLo malls. Furthermore, PriceLo malls are also in USA, South Asia and Canada. You are required to design a network from scratch for their recently constructed PriceLo Mall branch in North Melbourne, The network coverage should be there for both wired and wireless network inside the mall. The mall in North Melbourne has 4 floors with 3 food courts. Each food court can accommodate up to a maximum of 500 customers. PriceLo mall expects to have 4000 customers in their North Melbourne Mega mall and 500 staff. The 500 staff will be employed in the 5 departments of the North Melbourne mall namely IT- 70 staff, Human Resources- 50 staff, Sales- 100, Engineering-80 staff and Security-200 staff. Each of these departments should be on a different subnet for confidentiality of information transfer.
The customers are technology savvy and want to be able to use their laptops or iPad or any other communication gadget on either the wireless or wired network available within the mall. For the wired network the mall proposes to have connection ports available on the tables of the food court area where the customers can sit down and enjoy food as well as get connected to the wired or wireless network. The speed of the connection offered to the customers needs to be based on the amount of money the customers have spent on their purchase in the mall. The management has currently planned for three speeds – 100kb/s – 400 kb/s if no purchases are made, 1 Mbps if purchase of over 10 $ are made and speed of 3-5 Mbps if purchase of above 40$ is made.
A challenge is finding the right solutions to best facilitate ease of deployment and limit disruption of service whenever the network needs to be upgraded.In addition to the obvious hazards of having anyone and any communication gadget connect to the network, another big issue is being able to capture important information about the network users accessing the campus network. For example, it is important to identify users who might be doing something inappropriate using network resources. All customers before they start using the PriceLo malls network are required to accept the terms and conditions of the network usage policy of the mall. If someone violates a policy, such as downloading
inappropriate material, the IT team needs a way to identify the customer location in the mall,
so that they can be fined by the malls security personnel.
Authentication of the genuine customers of the mall is also necessary before they can use the malls wired or wireless network. A method for a secure authentication mechanism for approved users and devices attempting to connect to the network is another key challenge.
As part of the wireless network deployment you need to also to find out how to provide hotspots in the mall by using a suitable Wireless LAN technology by taking into consideration the RF propagation characteristics. Some of the hotspots are to provide Open access authentication while others need to provide shared key authentication to customers who pay a fee.
LoPrice mall is on a tight schedule and budget so you need to quickly create a detailed design of the network for their North Melbourne mall. PriceLo malls business productivity is very important so it also wants to make sure that the network downtime is not more than 0.04%. PriceLo malls will provides online training over the Internet to its staff within Australia from its headquarters based in Sydney and all the training material will be made available online on its webservers. As the training material is very confidential in nature so the webservers need to be provided with a secure or a protected network. The North Melbourne mall of PriceLo also wants to have desktop screen sharing and online meeting facility which will allow the staff in different branches to securely collaborate to develop, deliver and improve
the customer quality in its malls. This will reduce time and money spent in quick sharing of ideas and IT technology and the cost of travelling. In particular each branch office will have high quality digital video conferencing systems and secure remote desktop sharing facilities with a WAN to support it. Another key challenge is to create the above required network with as low cost as possible but it should still be as per the principles of the top down network design.
Note: You will need to undertake a serious literature research on the networking equipment vendors, cost of their equipment that you plan to purchase, network security considerations, top down design, testing methods and any issues that may arise. You are allowed to make assumptions for the network design as long as you can justify them.

 

 


52) 1110-Network Security Report

Assignments Description

Assessment Task:
Starting from the logical design of the network that you completed in Assessment Item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you receivedin Assessment Item 1. In order to undertake your physical design, you may need to make further justifiable assumptions.You also have tocomplete your final networkdesign report.
In this process, you are expected to participate in the weekly discussions and find the answers to the recommended discussion questions. Discussion questions have been selected and created not only to gradually increase your knowledge and skills in this course but also to help produce the final network design report. The students who do not attempt weekly discussion questions would very likely produce a report that would not satisfy the requirements and/or that cannot be justified.

Your report should include the following:
1. Executive Summary
2. Table of Contents
3. Project Goal
4. Project Scope
5. Design requirements
a. Business Goals and Constraints
b. Technical Goals and Tradeoffs
c. User Communities and Network Applications
d. List of Assumptions
6. Logical Network Design
a. The logical network diagrams including addressing and naming
b. The explanation and justification of your logical design
c. The list of routing and switching protocols, and security mechanisms
7. Physical Network Design
a. The final network diagram
b. The table of networking & communication devices and applications required, including the cost of each of them, the IP addresses, the product numbers as well as the approximate total cost
c. The explanation and justification for the selection of the devicesand applications required.
d. Write a test plan that can be used to test the new network.
e. Writeone detailed test script for your test plan.
8. Brief Reflection (maximum two A4 pages): Justify how your work in this course has satisfied the course learning outcomes. For your justification, you should also use the agreed outcomes of the weekly discussion questions. Your tutor will keep a copy of the agreed outcomes of the weekly discussion questions and use them when marking your brief reflection. Also include one thing that you liked about this course giving the reason and suggest an improvement to the course with the justification. Use the list of headings given below for your reflection:
a. Prepare the user, business and security requirements of the organisation in relation to network design.
b. Analyse the user, business and security requirements.
c. Compare and contrast the possible alternative logical and physical network designs.
d. Design a network by applying the top-down network design methodology.
e. Create the final documentation of the designed network.
f. Justify that the designed network satisfies the requirements.
g. One thing you liked the most about this course.
h. One suggestion to improve the course.

 

 


53) 6072 F-network design

Assignments Description

I want you to design a network for a small company on packet tracer, no ip configuration will be necessary, just design representation. After that you have to describe the benefits of using this services, basically its a small company, i want it to have a server. one computer will be the administrator and will be able to access all other computers on the network. Plus: I want to implement VPN, so that the admin access remotely all the computers while not at work, and also i would like to have some kind of backup system, maybe a SAN (Sorry if i am wrong – Not a network guy) so everything can be backup up

Office area :

Area 1 (Executive) – Admin 1 computer + 3 computer for other executives;

Area 2 (Employees) – 5 Computers

Area3 (Employees) – 5 computers

Please don’t forget to use routers, switches, and shared printers.

 

 


54) 6053 F-Network Design

Assignments Description

You are tasked with designing a company network that must be defended from attackers. Defending a computer network from a breach is all about defense-in-depth and layered security. You need to create a network diagram that shows how best to defend against intruders stealing customer secrets from the database. The network diagram must include the following:

1. A node donating the internet (usually a cloud symbol)

2. Web Server (a reverse proxy)

3. Application Server

4. Email Server

5. DNS Server

6. Database Server

7. Employee Workstations (can be a single node)

However, one-hundred percent security is incredibly rare if just impossible. All computer networks suffer from at least a few vulnerability issues at all times. Please explain how your diagram prevents stealing customer secrets from the database for the following:

1. The web server suffers from misconfiguration and an attacker was able to get access to the server.

2. The application server is using known vulnerable software that has given the attacker root access.

3. An employee has opened a malicious attachment and has opened a backdoor on their workstation.

4. The DNS server is vulnerable to cache poisoning allowing an attacker to misdirect traffic.

5. The attacker has infiltrated the network and has created a man-in-the-middle listening to network traffic.

6. The database server itself has an escalation vulnerability allowing an attacker to get admin access to the database.

 


55) 580611-IT Networking Designing

Assignments Description

Scenario
Create a small network by connecting network devices and configuring host computers and one Cisco router for basic network connectivity.
Subnet A and Subnet B are subnets that are currently needed. Subnet C and Subnet D are for future growth and are not yet connected to the network.
The first subnet, subnet 0 will be used.
Switch1 has a default configuration, and does not require additional configuration. Common utility commands will be used to test and document the network.
Task 1: Design the Logical LAN Topology.
Given an IP address and mask of 178.18.5.0 /24 (address / mask), design an IP addressing scheme that satisfies the following requirements:
Only subnet zero is used. No subnet calculators may be used. All work must be shown on this Final Exam paper.
Fill in the tables below:
Subnet Number of Hosts
Subnet A 6
Subnet B 50
Subnet C 20
Subnet D 10


56) 575132-Network design

Assignments Description

Objectives
In Assessment Item 2, you willcomplete your final network design report for the scenario given on page 5based on the written and oral feedback received on your Assessment Item 1. Please refer to the Unit Profile to understand how this assessment item relates to the Unit Learning Outcomes (ULOs). You are expected to participate in the weekly discussions and find the answers to the recommended discussion questions. The weekly discussion questions have been selected and formulated not only to gradually increase your knowledge and skills in this unit but also to help you develop the logical and physical network designs. If you do not attempt weekly discussion questions, you would very likely produce a logical network design that would not satisfy the requirements and/or that cannot be justified.

Requirements
Starting from the logical design of the network that you completed in Assessment Item 1, you are required to undertake the physical design of the network taking into consideration the feedback that you receivedin Assessment Item 1.
In order to undertake your physical design, you may need to make further justifiable assumptions.You also have tocomplete your final networkdesign report.It should also contain a brief reflection justifying how your work in this unit has satisfied the unit learning outcomes. The reflection should be supported by the agreed outcomes of the weekly discussion questions. Please refer to the unit profile to see how this assessment item relates to ULOs.

Your report should include the following:
1. Executive Summary
2. Table of Contents
3. Project Goal
4. Project Scope
5. Design requirements
a. Business Goals and Constraints
b. Technical Goals and Tradeoffs
c. User Communities and Network Applications
d. List of Assumptions
6. Logical Network Design
a. The logical network diagrams including addressing and naming
b. The explanation and justification of your logical design
c. The list of routing and switching protocols, and security mechanisms
7. Physical Network Design
a. The final network diagram
b. The table of networking & communication devices and applications required, including the cost of each of them, the IP addresses, the product numbers as well as the approximate total cost
c. The explanation and justification for the selection of the devicesand applications required
d. A test plan that can be used to test the new network
e. One detailed test script for your test plan.
8. Brief Reflection (maximum two A4 pages): Justify how your work in this unit has satisfied the Unit Learning Outcomes. For your justification, you should use your contributions to the weekly discussion questions as supporting material. You also need to include one thing that you liked about this unit giving the reason.Also, suggest an improvement to the unit with the justification. Use the list of headings given below for your brief reflection:
a. Prepare the user, business and security requirements of the organisation in relation to network design.
b. Analyse the user, business and security requirements.
c. Compare and contrast the possible alternative logical and physical network designs.
d. Design a network by applying the top-down network design methodology.
e. Create the final documentation of the designed network.
f. Justify that the designed network satisfies the requirements.
g. One thing you liked the most about this unit.
h. One suggestion to improve the unit.


 

57) 575310-Cisco packet tracer

Assignments Description

Background
Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS’s network into WaG’s, WMS actually need to have a network. WMS consists of three close buildings, each with multiple floors. Each floor is dedicated to a business function as defined in this network design topology.

Task Details
You have been given the final design approved by the tender process and hired to implement that design. In this submission you should take the design given and implement it in Packet Tracer.  Where there is ambiguity, you are encouraged to use your best judgement.  The design includes several VLANs, a Routing Layer 3 switch and 2 routers to external networks. There is a Wireless VLAN that all wireless access points and the VPN server connect to.

NOTE on using your best judgement:
There ARE ERRORS in this physical topology! Correcting these errors in some fashion demonstrates that you
• understand the concepts in enough detail to see the error and
• know what options exist in correcting these errors.

NOTE on needing to do research:
You WILL need to do some additional research to complete this assignment! Part of University assessments is about encouraging you to research topics. In other units you may be given a topic to research and then write a report or academic paper on the subject. In this unit you are still required to do some research (into Layer 3 switches) but you will instead be required to APPLY the result of that research directly.

Remember, this is an implementation. Transferring logical concepts into practical application needs to be displayed, physical implementation of logical processes such as subnetting are important. You have been given the Network range of 10.0.0.0/21 to work with. Good luck Network Warrior!


58) 573729-Network Routing and Switching Assignment

Assignments Description

Question 2– Allocating subnets from a block (6 marks)
You are the Network Administrator for a startup company that has been granted a new block of addresses starting with the address 139.145.56.0/22.
a) Calculate the total number of addresses available in this block including all the special addresses. Show your calculation (1 mark)

b) As Network Administrator, you need to distribute the available addresses on a departmental needs basis (meaning not allocating more than you have to), with 4 new subnets determined as follows:

Marketing needs 65 addresses
Accounting needs 100 addresses
Head Office needs 33 addresses and,
Customer Services needs 13 addresses.

Create the 4 subnets. For each subnet, list the subnet or first address, the last address, and the subnet mask in CIDR format. Show your calculations for all subnets, briefly showing how you arrived at the sub-block addresses. (4 marks or 1 mark for each correct subnet)

c) How many addresses are left unallocated? Show your calculation. (1 mark)

Question 3 – Fragmentation (4 marks)
An IP datagram 5,600 bytes long (including header with no options) arrives at a router, which determines that the next destination has an MTU of 1,500 bytes. Answer the following questions, showing your calculations and reasoning.
a) Assuming that the router decides to fragment the packet into 4 fragments, for each fragment, determine a correct size, and identify the starting byte and ending byte (2.5 marks).
b) Calculate the fragmentation offset for each fragment (1 mark).
c) The total number of bytes from all 4 fragments leaving the router should be greater than the initial datagram size that arrived. Explain why this is so (.5 mark).
Hints: Working out part (a) can be a fiddly (messy) exercise and you may find it helpful to use a spreadsheet to work out appropriate sizes and offsets. Remember that the offset needs to be evenly divisible by 8, as explained in the textbook. You may need to do additional reading to understand the process if it is unclear to you – Forouzan is a good place to start.

Question 4: Advanced routing study (15 marks)
Research and review appropriate materials, including the textbook, and answer the first two questions (a & b).

a) Define the terms and discuss the relationship between Autonomous Systems, Inter-domain routing, and Intra-domain routing (2 marks).

b) Identify the major routing protocols associated with Inter-domain and Intra-domain routing and list their similarities and differences (1.5 marks). Finish by commenting on why we need different protocols for Inter-domain and Intra-domain routing (1.5 marks).

Study the two articles listed below – both are freely available on the Internet. You may use other references in addition to these, as needed. Then answer the remaining 3 questions (c, d & e).

c) Briefly summarize in your own words the problems with current routing methods that the authors have identified. (5 marks)
d) Contrast and compare the concepts of embedded routing and extensible routing. (2.5 marks)
e) How does the proposal of Routing As A Service (RAAS or just RAS) address the problems with current routing methods? (2.5 marks)


59) 567539-Network Security and VPN

Assignments Description

At minimum your report should address the following:
Part I:
1. A table showing all the interfaces at every site [hind: Internal IP interface and external IP interface] (05 marks)
Part II:
Explain in detail the description of proposed VPN type, including
1. What type of VPN is chosen to implement? And why you have chosen this type of VPN? (05 marks)
2. What functionalities will VPN provide to the network in Figure 1? (05 marks)
3. What are the security features it can provide to protect data? (05 marks)
4. What type of organization should use it? (05 marks)
5. What are the advantages and disadvantages brought by the VPN to the network? (05 marks)


60) 539217-TCP/IP NETWORKING

Assignments Description

Task
This assessment is a practical assessment and will enhance and test your practical s******s related to the subject topic. You are required to set up a simple network using minimum three PCs and minimum two routers, or use simulation software to set up the same network.
To complete this assessment you are expected to refer to information beyond the text book. This assignment is open; in that you are free to choose the devices or software you use to complete the specified tasks. Students are expected to research the necessary commands by themselves.

There are numerous web sites available that discuss Linux networking. You are expected to list your sources of information for the different tasks. When completing this ‘project’, you may encounter errors or experience difficulties getting your setup to work. If this occurs, your challenge is to analyse why they happen and report on how you solved the problems you encountered.

Additional information will be provided for technology options to use in creating this lab closer to the assessment due date.

Part 1 – Setting up a Network

You are required to set up a network consisting of PCs, routers and servers. You need to configure routing between routers (minimum two routers required). The routers will have multiple network interfaces. The PC (client) will be connected to one of the router’s interfaces and other PCs (servers) will be connected to the second router’s interface.
Client <–> Router <–> Router <–> Server(s)
Each side of the router will be in its own LAN (or WAN) segment and should have a different network address, use private IP address ranges for each LAN Segment.

Perform the following activities and support your workings with screenshots [10 marks]:
1. Configure the PC, Server and Router interfaces with appropriate network addressing;
2. Configure routing (IP packet forwarding) on the routers;
3. On the client ping the client’s own network interface, then the local router gateway interface, then the remote router interface, then the server;
4. Use the traceroute command from the client to the server. Include results of the traceroute in your submission.

Part II – Configuring Network Services
Perform the following activities [15 marks]:

1. DHCP: Configure DHCP on the server and show that the client PC has successfully received an IP Address and other network parameters (default router, netmask, DNS) using DHCP;
2. WEB Server: Configure a WEB server on dedicated machine, with URL as www.YOUR NAME.csu.edu.au
3. DNS: Configure a DNS Server on the server device and demonstrate that forward and reverse DNS are working from the client PC; test DNS Server by browsing www.YOUR NAME.csu.edu.au from client PC, DNS must resolve this URL to IP address of WEB Server
4. Firewall: Configure traffic filtering on the router to block network traffic between client PC and WEB Servers, and then unblock traffic between them.

Before starting this task, you MUST show and discuss your proposed network topology with your lecturer.

A series of screen shots with commentary on each of the required tasks is to be submitted. The submission has to include an explanation of the tasks and all the commands used along with the output (or final result) in report format.


 

61) 744043- wireless networks and security

Assignments Description

Assignment Description
Enterprise wireless LAN deployments have skyrocketed in recent years, evolving from guest access in
conference rooms, to limited hot zones of connectivity within the enterprise to full coverage throughout the
organization. Unfortunately, many of these deployments are still insecure, leaving opportunities for the just
plain curious or malicious hackers to try and access confidential enterprise information. Securing a wireless
LAN is not hard – industry advances in technology and vendor innovation makes this easier than ever.
Default settings for most access points do not include any form of security being enabled. This is the most
common reason that wireless LANs are hacked or used by unauthorized personnel. When deployed,
immediately turn a method of over-the-air security on.
For enterprises, it is recommended that the most secure over-the-air encryption and authentication method
be used – either IEEE 802.11i or a VPN. IEEE 802.11i, also known as WPA2 when the access point is certified
by the Wi-Fi Alliance, uses IEEE 802.1x for mutual authentication between the client and the network and AES
for data encryption.
Its predecessor was WPA, an interim form of security certified by the Wi-Fi Alliance while the 802.11i standard
was still being ratified. WPA also uses 802.1x for authentication, but TKIP for encryption. While AES is
considered the stronger encryption method, it is worth noting that WPA has never been cracked. 802.11i,
WPA2 and WPA require the use of a RADIUS server to provide the unique, rotating encryption keys to each
client.
This assignment requires the students to design and implement a secure enterprise wireless network,
considering the ethical implications. The students are required to complete the following tasks and submit a
report on Moodle.
1. Explore the ethical implications in the design and implementation of a secure enterprise wireless
network.
2. Design a secure enterprise wireless network, employing Boson Netsim.
3. Analysis of a secure enterprise wireless network using WPA2 and the RADIUS server, considering the
following aspects:
a. Authorization
b. Authentication
c. Integrity
d. Network eavesdropping prevention
4. Implementation of a secure enterprise wireless network using WPA2 and the RADIUS server


62) 0003-SANTISOUK TOM

Assignments Description

HSBC BANK uses one office location in London with multiple floors. The networks in these locations are in urgent need of replacement. It no longer meets the stringent demands for availability and performance required for today’s banks. All hardware and cabling requires updating along with the design. We are looking for a solution that will not only meet current needs but will continue to deliver a service level that meets our needs for the foreseeable future.
HSBC BANK is one of the leading financial institutions in the UK today. They provide financial services for a wide range of British businesses and industries.
Technical Environment
Our technical environment is as follows: –
• Currently running with Windows XP on the desktop
• Servers are a mix of Windows and Linux
• Using TCP/IP – currently using IPv4
• Networks details are as follows:
o Using old Layer 2 switches, and router.
o OSPF or EIGRP for internal routing
o ISDN for Internet connection


63) 641913-Networking Technologies

Assignments Description

The Task:
The emphasis of this task is to design and use a model of a network as the basis for an investigation into the
factors that affect the network’s performance (using throughput and delay as performance metrics). It is
necessary to build a realistic model of a network in order to perform reliable experiments and achieve
meaningful results.
Part A – Designing a network and modelling it
1. Design a network for a medium-sized company, or an organisation such as a hospital or airport, located
at a single campus. You can base the design on the requirements of an existing company or
organisation, or you can invent one. In either case care must be taken to ensure the design is realistic.
You need to clearly identify the organisation’s line of business and the data and communication needs
they have, and thus determine the consequences this has on the network requirements.
Part B Network Traffic Modelling
You are required to evaluate the performance of your network under realistic conditions. Workload is
constantly fluctuating in real networks and can vary significantly; therefore you should test the network under
a range of different workload types and intensities.
This step, see below, sets up your base workload model on which you perform the majority of experiments (see
section C). However, it is often interesting to test the network under significantly higher workloads than are
expected to occur – to ‘stress-test’ your network design. To do this you could try doubling or quadrupling the
traffic intensity in your base workload model.
Part C – Network Performance investigation
The emphasis of this stage of the work is to understand the relationship between the network’s configuration
and its performance. You need to perform a sufficient number of separate experiments in order to be able to see
the actual effects on performance of specific network configurations or changes in traffic conditions.
1. Investigate the ways in which changes in the link performance (in terms of bandwidth) affect the
network performance, using a variety of traffic intensitie


64) 638355-computer information system

Assignments Description

Scenario
You and your group members are working for the AusNet networking solution provider. Your team is asked to design a network solution for the requirements specified by the Seven Star Motors (SSM) Australia and test it using GNS3 emulation platform before deploying the real network and document the specifications.
Company – Seven Star Motors (SSM)
Seven Star Motors is a vehicle, motorcycle, and engine manufacturing company founded in 1916. It is one of the best-selling luxury automakers in the world. The company is a component of the Euro Stoxx 50 stock market index. SSM headquartered in Munich, Bavaria and owns Mini cars and is the parent company of Star Motor Cars. SSM has overseas subsidiaries in different countries such as Australia, Brazil, Canada, China, India, Japan, Mexico, South Africa and United States.
Seven Star Motor Company Requirements
SSM Australia maintains, hires out, buys and sells new and used premium branded motor vehicles in Australia. The head office of the company is situated in Sydney. It has branches in Melbourne, Perth and Brisbane. Company wants to Implement a network which supports potential growth over the next five years and they have hired AusNet to layout the network with an expectation of 50% growth of current IP requirements. (For the simplicity of the case study and to limit the scope we have ignored the connections to the international branches.)
At present, there are 125 employees at department of Sales and Hire, 45 employees in department of Marketing, 20 employees in department of Vehicle Maintenance, 25 employees in the department of Business Administration and 5 employees at department of Site Security providing their service to the head office which is stationed in Sydney. All members of department of Site Security require access to all the network via a wireless LAN at each site. Company has 20 employees working for the Technical Support Group, 5 employees at each site. Sydney head office also hosts the server farm for the network. These servers contain web servers and file servers which carry company sensitive information.
Sydney head office is spread across 2 major buildings which are 5km apart from each other. Building A is a three-storied building with 50 Sales and Hire employees on 2nd and 1st flow. Rest of the Sales and Hire Department employees and Site Security Group is stationed in the ground floor. Building B is a two-storied building with 1st flow for department of Marketing and Technical support group and the ground flow for the other departments.
Server Farm is hosted in building A. In connecting the major building of the head office, company has requested to set up a leased line with security measurements.
The Melbourne branch spans across a single area which is 150metres x 100 metres and has a building floor of size 25meters x 30 meters. It has a Hire Only department, Vehicle Maintenance department and Site Security department which employs 265, 20, 5 employees respectively.
Brisbane branch spans across a land of 100metres x 100 metres with 25metres x 40 metres building floor dimensions. It has a Sales Only department, Vehicle Maintenance department, site security department which employs 160,20,5 employees respectively. The Internet Service Provider (ISP) for the company is based in Brisbane. Use class C ISP network connection address.
Perth Branch is spread over a land of 125 metres x 100 metres with a single storied building of the floor size 20metres x 40 metres. Perth branch has a department of Sales Only, Vehicle maintenance and site security which employs 100,20,5 employees respectively.
Company also has a branch just started with 7 employees for, 5 in Hire Only department and 2 in Business Administration departments who are working for the Brisbane branch through a remote VPN connection. This branch located in a Brisbane inner suburb has internet connection through an ISP provider.
Further Company request at least one separate printer for each department in each Branch. Each department also has a separate server reserved. Main Network Administrator who is working for the Technical Support group in Sydney should have access to all the devices over the network to both monitor and configure as necessary using a secured connection. Company also insists upon automatic configuration of IP addresses to minimize administrative overhead. They also insist the network to be reliable and secured to the maximum extend.
Company prefers to use private addresses as a security concern and prefers to buy a range of public addresses which could be used for internet connections using Network Address Translation (NAT).
The company requires the implementation of following security policies to control the flow of IP traffic within its network and to the Internet.
For clarity, all the requirements requested by the company is listed in point form bellow.
Access Rules for Server Farm LAN must be decided as to which VLANs can access which servers in the Server Farm VLAN. The servers need to be protected from malicious computer attacks and unauthorized access. Facility to carry out audit checks needs to be provided as well so as to keep track of the exact activity along with the date and time at which an employee of QW Australia carried out a computer system based activity. The activity could include doing task(s) such as installation of new software, installing patches, taking backups and make changes in Webpage etc.
• Access Rules for Group Access VLANs
 All VLANs are permitted to access internet unless specifically denied below.
 VLAN to VLAN access, is denied unless specifically permitted below.
 PC hosts in the Sales and Hire VLAN are permitted access to the Business Administration VLAN.
 PC hosts in the Hire Only VLAN are permitted access to the Marketing VLAN and Sales and Hire VLANs.
 PC hosts in the Marketing VLAN are permitted access to the Business Administration VLAN, and Hire Only LANs.
 PC hosts in the Business Administration VLAN are only permitted access to the Internet.
 PC hosts in Sales Only VLANs are permitted access to Marketing VLAN.
 PC hosts in Marketing VLAN are permitted access to Sales Only VLANs.
 PC hosts in the Site Security wireless LAN are permitted access to all VLANs.
 PC hosts in Technical Support VLANs are permitted access to all VLANs.
 PC hosts in Site Security wireless LAN denied access to the Internet.


65) 202338- Local Area Network Management

Assignments Description

Purpose of the assessment:
The purpose of this assignment is to develop skills required to configuring routers and switches
in VLAN networks. In this assessment, students will be able to
 Design a simple network with routers and switches;
 IP subnet calculation;
 Configuring routers and switches using Netsim;
 Troubleshoot for multiple VLAN configurations;
 Test network connectivity for the output in PT or lab environment;
 Demonstrate the final outcome.
Description of the assessment:
Introduction
This is a Group Assignment, with 2-3 members in each group; the number of group members
may vary due to the class size; and the Lecturer will decide the group size accordingly. You are
required to
 Complete your works by using Netsim in line with the design diagram in the next page
 Write a report with all screenshots that are extracted from each step of your work
 Declare and demark your role throughout your involvement with the group work
 Demonstrate your group works on the Netsim & real routers and switches to your tutor


66) 605872-DataCommunicationNetwork

Assignments Description

Background:

A private biomedical development company (5 Star) is located in 2 adjacent three-story buildings. It developed software for programming machines which it has built and sold for many years. They plan to develop a web version of their machine. Each building is approximately 50 metres long and 15 metres wide. They are set about 40 metres apart. The company needs your expertise to upgrade their existing network.

Their current network is old and will need to be replaced. The managing director has asked for a “software development company of the future, using the latest technologies with a network which can accommodate the load now and for another five years”.

Current – see attached Organisation chart

The 5star company has currently 250 employees with only two dedicated computer rooms each with 10 computers and printers. Most employees work in production and do not need computers.

A computer room is in one building (software development) while the other computer room (technical development) is in the other building. The network was installed in 2011. Network operating system is Windows Server 2008. The network is simple hub and switch connected to the server.

There is one router connected to each of these two servers. There are also 20 computers in second building for administrative staff again with a hub, switch and server and they use the same router. There are three LANs all connected to the one router. Employees cannot log in using their laptops. It is a very simple network.