MCS3002124 - Sadbhav Lamichhane - ICTTEN622 Assignment 1
MCS3002124 - Sadbhav Lamichhane - ICTTEN622 Assignment 1
Assessment Details
Unit Code/Name ICTTEN622 Produce ICT network architecture designs
Student Details
Student Name Sadbhav Lamichhane
Student ID MCS3002124
Student Declaration: I declare that the work submitted is my own and has Signature:
not been copied or plagiarized from any person or source.
Date:
8/13/2024
Instructions to Students
This assessment is to be completed according to the instructions given below in this document. Please read
the Questions carefully then complete all Tasks.
Should you not answer the tasks correctly, your assessor will provide you with feedback on the results and
gaps in knowledge. You are entitled to two (2) resubmissions attempts in showing your competence with
this unit. Please refer to the College re-submission policy for more information.
Before submitting this assessment, ensure that you have provided all required information above, signed
and dated.
If you have questions and other concerns that may affect your performance in the Assessment, please
inform your assessor immediately.
To receive satisfactory outcome in this assessment, you must answer all the questions correctly.
This is an Individual Assessment. Once you have completed this assessment, please submit the assessment
on Moodle in the designated submission link.
Plagiarism is copying someone else’s work and submitting it as your own. Any Plagiarism will result in a
mark of Not Satisfactory. SCCM uses a Plagiarism Checker to check the originality of the student
assessment. The student must be aware of and understand the SCCM’s policy on plagiarism and certify that
this assignment is their own work, except were indicated by referencing, and that student have followed
good academic practices.
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 1 of 15
1
ICTTEN622 Produce ICT network architecture designs
Introduction
The assessment tasks for ICTTEN622 Produce ICT network architecture designs are outlined in
the assessment plan below. These tasks have been designed to help you demonstrate the skills
and knowledge that you have learnt during your course.
Please ensure that you read the instructions provided with these tasks carefully. You should also
follow the advice provided in the IT Works Student User Guide. The Student User Guide provides
important information for you relating to completing assessment successfully.
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 2 of 15
1
ICTTEN622 Produce ICT network architecture designs
i Assessment information
Information about how you should complete this assessment can be found in Appendix
A of the IT Works Student User Guide.Refer to the appendix for information on:
where this task should be completed
the maximum time allowed for completing this assessment task
whether or not this task is open-book.
Note: You must complete and submit an assessment cover sheet with your work. A
template is provided in Appendix C of the Student User Guide. However, if your RTO
has provided you with an assessment cover sheet, please ensure that you use that.
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 3 of 15
1
ICTTEN622 Produce ICT network architecture designs
Questions
Provide answers to all of the questions below:
1. Give an example for each of the items in the table that can apply to work associated with producing
ICT network architecture designs. Explain how the example you provide is relevant to producing
ICT network architecture designs.
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 4 of 15
1
ICTTEN622 Produce ICT network architecture designs
Comment
2. Outline each of the technologies included in the table and the principles behind these technologies.
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 5 of 15
1
ICTTEN622 Produce ICT network architecture designs
Fundamentals:
Fundamentals:
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 6 of 15
1
ICTTEN622 Produce ICT network architecture designs
Fundamentals:
Fundamentals:
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 7 of 15
1
ICTTEN622 Produce ICT network architecture designs
Fundamentals:
Fundamentals:
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 8 of 15
1
ICTTEN622 Produce ICT network architecture designs
Fundamentals:
Fundamentals:
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 9 of 15
1
ICTTEN622 Produce ICT network architecture designs
Comment
- Efficiency: Software compatibility facilitates data interchange and system communication, which
helps to optimize operations. This minimizes errors and eliminates the need for human data entry.
- Cost Saving: Software compatibility helps to avoid the need for costly workarounds or
modifications. It also translates into less time spent debugging and resolving problems.
- Scalablity: Software that is compatible with new tools or updates can integrate with your business
more readily as it expands, facilitating your growth without causing significant disruptions.
- User experience: It facilitates employees' ability to work effectively by offering a consistent and
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 10 of 15
1
ICTTEN622 Produce ICT network architecture designs
Comment
- Update Software: Updating your software gives you access to the newest features, compatibility
enhancements, and problem fixes. This frequently fixes problems where older versions might not
function properly with more recent apps or systems.
- Use Integration Tools: Integration tools, also known as middleware, serve as bridges that let
various software systems interact and communicate with one another. By translating data formats
and protocols, these solutions enable otherwise incompatible systems to work together seamlessly.
Comment
5. Outline a process that could be used to find out about supplier costs for products associated with
network architecture design.
Here are the process that could be used to find supplier costs for network architecture design
products:
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 11 of 15
1
ICTTEN622 Produce ICT network architecture designs
Comment
Software that is meant to be installed and used on a desktop or laptop is known as a desktop
application. Desktop programs are installed straight onto the computer's operating system,
such as Windows, macOS, or Linux, in contrast to web applications, which are accessed via a
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 12 of 15
1
ICTTEN622 Produce ICT network architecture designs
web browser over the internet. The hardware and operating system components of the
computer are frequently optimized for these apps to run as well as possible.
Desktop programs can be used for a variety of purposes, each with its own set of capabilities.
They are typically utilized for jobs that benefit from direct access to the computer's resources
or those that need for more intensive processing. They could be utilized, for example, for
productivity tasks like graphic design, word processing, and spreadsheet administration.
Furthermore, desktop programs are offline-compatible, which means that once installed, you
can use them without an internet connection.
Example: Microsoft Word is a popular desktop application used for creating and editing
documents.
Comment
The software that controls a computer's hardware and software resources, offers an interface for
users to interact with, and permits the usage of different programs is known as an operating system
(OS). It handles operations including file management, peripheral device control, and program
execution, serving as a bridge between the computer's hardware and its applications. The OS
makes sure that people and other software applications may function without interfering with one
another.
Example: One popular operating system for personal computers is Windows 10. With its intuitive
interface and compatibility for a broad variety of hardware and programs, users may accomplish a
variety of tasks, including online browsing, document editing, and running specialist software.
Comment
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 13 of 15
1
ICTTEN622 Produce ICT network architecture designs
- SSL/TLS (Secure Sockets Layer/Transport Layer Security): A protocol called Secure Sockets
Layer/Transport Layer Security (SSL/TLS) is used to encrypt data being sent over the internet. It
functions by encrypting data transferred between a website and your web browser, rendering it
unintelligible to any potential interceptors. Passwords and credit card numbers, among other sensitive
data, are kept hidden and secure thanks to this encryption. Furthermore, SSL/TLS uses digital
certificates to authenticate the website you are connecting to, guaranteeing that you are interacting with
the real thing and not a phony. Additionally, it verifies the data's integrity to guard against changes made
during transmission. A padlock icon in the browser's address bar and "https" in the URL indicate a secure
connection when a website employs SSL/TLS.
- IPsec (Internet Protocol Security): A group of technologies known as IPsec (Internet Protocol
Security) are intended to protect data being sent over IP networks. It ensures that the data is private and
unaltered by encrypting and authenticating each data packet delivered across the network. Because
IPsec functions at the network layer, it protects communication between connected devices, including
computers and servers. It has two primary security features: authentication, which confirms that the data
is real and hasn't been altered, and encryption, which jumbles the data to keep it private. Virtual Private
Networks (VPNs) frequently use IPsec to provide private connections over the internet, enabling distant
users to safely access internal networks and safeguarding data from unauthorized access.
Comment
- Asymmetric encryption: A public key and a private key are used in asymmetric encryption. While
the private key needs to be kept private for decryption, the public key is used to encrypt data and
can be shared freely. Data encrypted with the accompanying public key can only be decrypted
using the matching private key. A popular asymmetric encryption technique for protecting data
transfer over the internet is called RSA (Rivest-Shamir-Adleman). This technique is vital for jobs that
require safe key exchange and identity verification, like creating secure online connections and
encrypting emails.
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 14 of 15
1
ICTTEN622 Produce ICT network architecture designs
Question 1
Question 2
Question 3
Question 4
Question 5
Question 6
Question 7
Question 8
Question 9
Question 10
Assessor Name:
Assessor Signature:
Date:
© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 15 of 15
1