0% found this document useful (0 votes)
123 views15 pages

MCS3002124 - Sadbhav Lamichhane - ICTTEN622 Assignment 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
123 views15 pages

MCS3002124 - Sadbhav Lamichhane - ICTTEN622 Assignment 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

ICTTEN622 Produce ICT network architecture designs

Assessment Details
Unit Code/Name ICTTEN622 Produce ICT network architecture designs

Qualification Code/Name ICT60220 Advanced Diploma of Information Technology

Assessment Task Assessment task 1

Student Details
Student Name Sadbhav Lamichhane

Student ID MCS3002124

Student Declaration: I declare that the work submitted is my own and has Signature:
not been copied or plagiarized from any person or source.
Date:
8/13/2024

Instructions to Students
 This assessment is to be completed according to the instructions given below in this document. Please read
the Questions carefully then complete all Tasks.

 Should you not answer the tasks correctly, your assessor will provide you with feedback on the results and
gaps in knowledge. You are entitled to two (2) resubmissions attempts in showing your competence with
this unit. Please refer to the College re-submission policy for more information.

 Before submitting this assessment, ensure that you have provided all required information above, signed
and dated.

 If you have questions and other concerns that may affect your performance in the Assessment, please
inform your assessor immediately.

 To receive satisfactory outcome in this assessment, you must answer all the questions correctly.

 This is an Individual Assessment. Once you have completed this assessment, please submit the assessment
on Moodle in the designated submission link.

 Plagiarism is copying someone else’s work and submitting it as your own. Any Plagiarism will result in a
mark of Not Satisfactory. SCCM uses a Plagiarism Checker to check the originality of the student
assessment. The student must be aware of and understand the SCCM’s policy on plagiarism and certify that
this assignment is their own work, except were indicated by referencing, and that student have followed
good academic practices.

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 1 of 15
1
ICTTEN622 Produce ICT network architecture designs

Introduction
The assessment tasks for ICTTEN622 Produce ICT network architecture designs are outlined in
the assessment plan below. These tasks have been designed to help you demonstrate the skills
and knowledge that you have learnt during your course.
Please ensure that you read the instructions provided with these tasks carefully. You should also
follow the advice provided in the IT Works Student User Guide. The Student User Guide provides
important information for you relating to completing assessment successfully.

Assessment for this unit


ICTTEN622 Produce ICT network architecture designs describes the skills and knowledge required
to compile and evaluate business specifications from a client and produce a set of architecture
design solutions to cater for present and future forecast demands.
For you to be assessed as competent, you must successfully complete two assessment tasks:
 Assessment Task 1: Knowledge questions – You must answer all questions correctly.
 Assessment Task 2: Project – You must work through a range of activities and complete a
Project Portfolio.

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 2 of 15
1
ICTTEN622 Produce ICT network architecture designs

Assessment Task 1: Knowledge Questions

Information for students


Knowledge questions are designed to help you demonstrate the knowledge which you have
acquired during the learning phase of this unit. Ensure that you:
 review the advice to students regarding answering knowledge questions in the IT Works
Student User Guide
 comply with the due date for assessment which your assessor will provide
 adhere with your RTO’s submission guidelines
 answer all questions completely and correctly
 submit work which is original and, where necessary, properly referenced
 submit a completed cover sheet with your work
 avoid sharing your answers with other students.

i Assessment information
Information about how you should complete this assessment can be found in Appendix
A of the IT Works Student User Guide.Refer to the appendix for information on:
 where this task should be completed
 the maximum time allowed for completing this assessment task
 whether or not this task is open-book.
Note: You must complete and submit an assessment cover sheet with your work. A
template is provided in Appendix C of the Student User Guide. However, if your RTO
has provided you with an assessment cover sheet, please ensure that you use that.

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 3 of 15
1
ICTTEN622 Produce ICT network architecture designs

Questions
Provide answers to all of the questions below:

1. Give an example for each of the items in the table that can apply to work associated with producing
ICT network architecture designs. Explain how the example you provide is relevant to producing
ICT network architecture designs.

Legislation Example: General Data Protection Regulation (GDPR)

Relevance: GDPR establishes guidelines for data


protection and privacy, as well as how businesses must
manage personal data. GDPR compliance is essential for
ICT network architecture design to guarantee that the
architecture satisfies criteria for data security and privacy.
To prevent unwanted access or breaches, this entails
putting policies in place such data encryption, access
controls, and secure data storage.

Code of practice Example: Information Security Manual, Australian


Government (ISM)

Relevance: To safeguard their ICT systems and data,


enterprises are required to adhere to a set of information
security rules and practices provided by the ISM.
Following the ISM while designing ICT network
architectures guarantees that best practices for risk
management, incident response, and security measures
are incorporated into the design, improving the network's
overall security posture.

Regulation Health Insurance Portability and Accountability Act


(HIPAA)
Relevance: HIPAA laws mandate safeguarding health
data and laying down precise guidelines for its
management, archiving, and exchange. By incorporating
access restrictions, audit trails, and encryption to
guarantee adherence to HIPAA's privacy and security
regulations, ICT network architects can create systems
that are equipped with the necessary security measures
to protect electronic health records (EHRs).

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 4 of 15
1
ICTTEN622 Produce ICT network architecture designs

Standard Example: ISO/IEC 27001:2013


Relevance: The international standard ISO/IEC 27001
pertains to information security management systems
(ISMS). It offers a structure for safeguarding and
maintaining information assets. Adhering to ISO/IEC
27001 in network architecture design guarantees that
security controls—which address things like risk
assessment, security policies, and processes for
continuous improvement—are methodically incorporated
into the architecture.

Workplace procedure Example: Methodology for Network Change Management

Relevance: The processes needed to organize, authorize,


carry out, and evaluate modifications to the network
infrastructure are described in a workplace procedure for
managing network changes. By going through this
process, network modifications can be made in a
controlled manner, reducing the chance of disruptions and
preserving the integrity and dependability of the network
architecture.

WHS practice Example: Using Network Equipment Safely

Relevance: To prevent injuries, WHS procedures for the


safe handling of network equipment include instructions
for lifting, moving, and installing hardware. Maintaining a
secure work environment is crucial for the efficient
deployment and operation of the network infrastructure,
hence it is imperative that network architects and
installers follow these guidelines.

Outcome Satisfactory Not Satisfactory

Comment

2. Outline each of the technologies included in the table and the principles behind these technologies.

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 5 of 15
1
ICTTEN622 Produce ICT network architecture designs

Access networks Overview:


The portion of a communications network that links end-
user devices to the core network is known as an access
network. They provide as the conduit between users and
the larger network infrastructure, such as houses or
companies.

Fundamentals:

Connectivity: Make it easier for specific people or devices


to connect to the internet or other network services.
Speed and Bandwidth: Guarantee sufficient data
transmission speeds for a range of uses (e.g., online
surfing, streaming).
Reliability: To reduce downtime and service interruptions,
offer steady, reliable connections.
Scalability: As demand increases, scale up to
accommodate more users and devices.
Example:
Fiber-to-the-home (FTTH)
DSL (Digital Subscriber Line)
Cellular networks (4G/5G)

Core networks Outline:


Data is routed between access networks and other core
network components by core networks, which are the hub
of a telecommunications network and offer high-speed,
high-capacity connectivity.

Fundamentals:

High Capacity: Effectively manage substantial amounts of


data traffic.
Redundancy and Reliability: To guarantee service
availability, make sure failover procedures and continuous
operation are in place.
Low Latency: To enable real-time applications and
services, minimize data transmission delays.
Scalability: The ability to expand a network and handle

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 6 of 15
1
ICTTEN622 Produce ICT network architecture designs

increasing data traffic.


Example:
Ethernet Core Networks.
MPLS (Multiprotocol Label Switching) Networks.
IP Backbone

Network topologies Overview:


The physical or logical configuration of network devices and
their interconnections are referred to as network topologies.

Fundamentals:

Design Efficiency: Reduce cabling and increase


performance by optimizing the configuration.
Redundancy: Use several routes to guarantee fault
tolerance and network dependability.
Scalability: The ability to grow the network and add or
remove devices with ease.
Cost: Take into account the costs of implementation and
upkeep while making design decisions.
Example:
Star Topology: Every device is linked to a single hub or
switch.
Mesh Topology: Multiple pathways for data are provided by
networked devices.
Bus Topology: Devices are linked to a central backbone or
cable

Mobile cellular networks Overview:


Using a network of cells, each serviced by a base station,
mobile cellular networks offer wireless communication
services to mobile devices.

Fundamentals:

Frequency Reuse: To increase capacity and efficiency,


employ the same frequency bands in various cells.
Handoff: When users switch between cellphones, calls and
data are transferred seamlessly.

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 7 of 15
1
ICTTEN622 Produce ICT network architecture designs

Make sure there is extensive coverage and enough


capacity to meet consumer expectations.
Modularity: For effective network management and scaling,
modular cell designs are recommended.
Example:
4G LTE stands for Long Term Evolution.
New Radio 5G NR
The Global System for Mobile Communications

Network protocols and Overview:


operating systems
Network operating systems oversee network resources and
enable device-to-device communication, while network
protocols serve as established guidelines for data transfer.

Fundamentals:

Standardization: Assure trustworthy communication and


interoperability among various systems and devices.
Efficiency: Manage resources and data transfer as best you
can.
Security: Put in place safeguards to keep network
resources and data safe.
Scalability: Allow for the growth of the network and the
addition of additional devices.
Example: Protocols include HTTP (Hypertext Transfer
Protocol) and TCP/IP (Transmission Control
Protocol/Internet Protocol).
Operating Systems: Linux, Cisco IOS

Optical networks and principles Overview:


Optical networks provide high-speed and high-capacity
communication by using light that is sent over fiber optic
cables to deliver data.

Fundamentals:

High Bandwidth: By taking use of optical fibers' low-loss


properties, extremely high data transfer rates can be
attained.
Low Latency: Reduce the amount of time that data

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 8 of 15
1
ICTTEN622 Produce ICT network architecture designs

transmission takes because of light's rapid speed.


Signal Integrity: To preserve signal quality over extended
distances, employ optical amplification and regeneration.
Through the use of wavelength division multiplexing
(WDM), capacity can be increased by concurrently
delivering several signals at various light wavelength.
Example:
Fiber-to-the-Premises (FTTP)
Dense Wavelength Division Multiplexing (DWDM)

Radio frequency (RF) Overview:


technologies and principles
To facilitate wireless communication, radio frequency
technologies use electromagnetic waves in the radio
frequency range.

Fundamentals:

Frequency Spectrum: To minimize interference and


accommodate a range of communication requirements, use
distinct frequency bands.
Modulation: To transmit data effectively, encode
information onto radio waves.
Control the process by which radio waves move via various
settings and circumstances.
Management of Interference: To preserve signal quality,
reduce interference from external radio sources.
Example:
Wi-Fi: The use of the 2.4 GHz and 5 GHz bands for
wireless networking.
Bluetooth: A 2.4 GHz-based short-range wireless
communication system.

Radio frequency identification Overview:


(RFID) hardware and software
RFID tracks and automatically identifies tags attached to
things using radio waves. RFID software controls data and
processes, whereas RFID hardware consists of tags and
scanners.

Fundamentals:

Tagging: To store data that RFID readers can read, affix

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 9 of 15
1
ICTTEN622 Produce ICT network architecture designs

RFID tags to things.


RFID systems possess the ability to both read and, in
certain situations, write data to tags.
Data Transmission: Information is transferred between tags
and readers via radio waves.
Range and Frequency: Control the frequency bands and
operational range that tags and readers use for
communication.
Example:
Tags: Active RFID tags (battery-powered), Passive RFID
tags (no battery).
Software: RFID middleware for corporate system
integration and data collection.

Outcome Satisfactory Not Satisfactory

Comment

3. Explain the importance of compatibility in terms of software solutions for a business.

Compatilibity in software solutions is important for a business because:


- Smooth operation: It guarantees the smooth operation of various software applications and
systems. This implies that using different tools won't cause issues or cause them to conflict with one
another.

- Efficiency: Software compatibility facilitates data interchange and system communication, which
helps to optimize operations. This minimizes errors and eliminates the need for human data entry.

- Cost Saving: Software compatibility helps to avoid the need for costly workarounds or
modifications. It also translates into less time spent debugging and resolving problems.

- Scalablity: Software that is compatible with new tools or updates can integrate with your business
more readily as it expands, facilitating your growth without causing significant disruptions.

- User experience: It facilitates employees' ability to work effectively by offering a consistent and

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 10 of 15
1
ICTTEN622 Produce ICT network architecture designs

simple experience across several applications.

Outcome Satisfactory Not Satisfactory

Comment

4. List two ways that compatibility issues can be resolved.

The two ways are:

- Update Software: Updating your software gives you access to the newest features, compatibility
enhancements, and problem fixes. This frequently fixes problems where older versions might not
function properly with more recent apps or systems.

- Use Integration Tools: Integration tools, also known as middleware, serve as bridges that let
various software systems interact and communicate with one another. By translating data formats
and protocols, these solutions enable otherwise incompatible systems to work together seamlessly.

Outcome Satisfactory Not Satisfactory

Comment

5. Outline a process that could be used to find out about supplier costs for products associated with
network architecture design.

Here are the process that could be used to find supplier costs for network architecture design
products:

- Identify and specify products

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 11 of 15
1
ICTTEN622 Produce ICT network architecture designs

- Find potential suppliers


- Request quotes and send detailed RFQs to multiple suppliers
- Evaluate quotes by comparing prices and overall values.
- To negotiate the best price and terms, discuss about them.
- Select the best supplier and place order.
- Monitor costs and assess of supplier
- Maintain proper relation with supplier for future needs.

Outcome Satisfactory Not Satisfactory


Comment

6. Explain why it is important to configure an IP address.

Setting up an IP address is crucial because it gives every item on a network a distinct


identity and permits appropriate communication between them. Network operations
would be disrupted if devices couldn't send or receive data reliably due to a non-
configured IP address. Devices may access resources such as printers, servers, and
the internet thanks to an IP address, which guarantees that data reaches its intended
location. To put it simply, seamless network connectivity and functionality depend on
proper IP configuration.

Outcome Satisfactory Not Satisfactory

Comment

7. What is a desktop application? List an example of a desktop application.

Software that is meant to be installed and used on a desktop or laptop is known as a desktop
application. Desktop programs are installed straight onto the computer's operating system,
such as Windows, macOS, or Linux, in contrast to web applications, which are accessed via a

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 12 of 15
1
ICTTEN622 Produce ICT network architecture designs

web browser over the internet. The hardware and operating system components of the
computer are frequently optimized for these apps to run as well as possible.
Desktop programs can be used for a variety of purposes, each with its own set of capabilities.
They are typically utilized for jobs that benefit from direct access to the computer's resources
or those that need for more intensive processing. They could be utilized, for example, for
productivity tasks like graphic design, word processing, and spreadsheet administration.
Furthermore, desktop programs are offline-compatible, which means that once installed, you
can use them without an internet connection.

Example: Microsoft Word is a popular desktop application used for creating and editing
documents.

Outcome Satisfactory Not Satisfactory

Comment

8. What is an operating system? List an example of a desktop application.

The software that controls a computer's hardware and software resources, offers an interface for
users to interact with, and permits the usage of different programs is known as an operating system
(OS). It handles operations including file management, peripheral device control, and program
execution, serving as a bridge between the computer's hardware and its applications. The OS
makes sure that people and other software applications may function without interfering with one
another.

Example: One popular operating system for personal computers is Windows 10. With its intuitive
interface and compatibility for a broad variety of hardware and programs, users may accomplish a
variety of tasks, including online browsing, document editing, and running specialist software.

Outcome Satisfactory Not Satisfactory

Comment

9. Outline two types of security protocols.

The two types of security protocols are:

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 13 of 15
1
ICTTEN622 Produce ICT network architecture designs

- SSL/TLS (Secure Sockets Layer/Transport Layer Security): A protocol called Secure Sockets
Layer/Transport Layer Security (SSL/TLS) is used to encrypt data being sent over the internet. It
functions by encrypting data transferred between a website and your web browser, rendering it
unintelligible to any potential interceptors. Passwords and credit card numbers, among other sensitive
data, are kept hidden and secure thanks to this encryption. Furthermore, SSL/TLS uses digital
certificates to authenticate the website you are connecting to, guaranteeing that you are interacting with
the real thing and not a phony. Additionally, it verifies the data's integrity to guard against changes made
during transmission. A padlock icon in the browser's address bar and "https" in the URL indicate a secure
connection when a website employs SSL/TLS.

- IPsec (Internet Protocol Security): A group of technologies known as IPsec (Internet Protocol
Security) are intended to protect data being sent over IP networks. It ensures that the data is private and
unaltered by encrypting and authenticating each data packet delivered across the network. Because
IPsec functions at the network layer, it protects communication between connected devices, including
computers and servers. It has two primary security features: authentication, which confirms that the data
is real and hasn't been altered, and encryption, which jumbles the data to keep it private. Virtual Private
Networks (VPNs) frequently use IPsec to provide private connections over the internet, enabling distant
users to safely access internal networks and safeguarding data from unauthorized access.

Outcome Satisfactory Not Satisfactory

Comment

10. Outline two types of data encryption techniques.

The two types of data encryption techniques:


- Symmetric encryption: A single key is used in symmetric encryption to both encrypt and decode
data. This approach requires that the sender and the recipient have the same secret key, which
needs to be kept private in order to ensure security. Plaintext can be changed from ciphertext to
plaintext and back again using the key. The Advanced Encryption Standard, or AES, is a popular
example of symmetric encryption because of its reliability and efficiency. When encrypting huge
volumes of data quickly, like in file encryption or secure conversations between known parties, this
technique is perfect.

- Asymmetric encryption: A public key and a private key are used in asymmetric encryption. While
the private key needs to be kept private for decryption, the public key is used to encrypt data and
can be shared freely. Data encrypted with the accompanying public key can only be decrypted
using the matching private key. A popular asymmetric encryption technique for protecting data
transfer over the internet is called RSA (Rivest-Shamir-Adleman). This technique is vital for jobs that
require safe key exchange and identity verification, like creating secure online connections and
encrypting emails.

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 14 of 15
1
ICTTEN622 Produce ICT network architecture designs

Outcome Satisfactory Not Satisfactory


Comment
Assessment Task 1: Checklist

Student Name: Sadbhav Lamichhane

Did the student provide a Completed successfully?


sufficient and clear answer
that addresses the Yes No
suggested answer for the
following?

Question 1

Question 2

Question 3

Question 4

Question 5

Question 6

Question 7

Question 8

Question 9

Question 10

Outcome  Satisfactory  Not-satisfactory

Assessor Name:

Assessor Signature:

Date:

© Sydney City College of Management Pty Ltd RTO: 45203 CRICOS: 03620C Date Version
File Name: ICTTEN622 Student Assessment Tools April 2023 Page 15 of 15
1

You might also like