WAN Telecomunication

docx

School

Sir Syed College of Education, Kotli *

*We aren’t endorsed by this school

Course

CREATIVE W

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

6

Uploaded by CaptainThunderArmadillo30

Report
Course Work Assessment - Alternative Assessment Semester 202310 Division CIS Assessment title in Syllabus Project Program Bachelor of Information Technology Course Code CSF-4203 Course Title CSF-4203 Telecommunications and WAN Security Course Instructor Khalid Anjum CRN 13127 Chatbot ( e.g. ChatGPT ) statement This submission allows you to use AI-generated tools, but the prompt used must be stated and the response must be in red font. C oversheet instructions: CSF-4203 Course Project Project Objectives: Implement a WAN network for a company with at least three branches in different cities or countries and keep network security as the project's primary goal. Course Learning Outcomes (CLOs): The project covers the following CLOs: CLO2 Distinguish between circuit-switching and packet-switching technologies. CLO3 Select various techniques to configure WAN protocols, including Frame Relay and PPP. CLO4 Design WAN technologies including access control, Syslog, AAA and IPS CLO5 Design and configure a site to site VPN to provide secure WAN communication. CIS202310-CSF4203-GroupProjectV1 Page 1 | 6
Project Environment: The project involves implementing WAN in Cisco Packet Tracer, creating a full connectivity network infrastructure across multiple locations. Security techniques must be used in the design and implementation of the company network. Introduction You are part of a telecommunication company that provides network and security solutions. A client has called you to plan and design the network system and the company's needed security controls. The idea of this project is to create a full connectivity network infrastructure across multiple locations. Your job is to propose and design an integrated solution based on the following requirement. The Network Requirements The client is a UAE based company that has different and remote locations. During the network design, the team should take into consideration the following networking techniques that may be used all or be used partially according to the company size and requirements: At least 3 different sites (in other cities or countries). You can propose more location. However, you must be sure that all of them are connected to one network. Frame Relay networking between sites. PPP Networking between sites. On the other side, and regardless of the company size, all companies require a high-security level to be achieved. Here are the set of security techniques that you must use in the design and implementation of the company network: PPP with Authentication between any two sites. Firewall Server. Syslog and NTP. VPN technology (Site-to-Site VNP). CIS202310-CSF4203-GroupProjectV1 Page 2 | 6
The techniques mentioned above are mandatory to be used in the design and implementation of network security as part of the project. Moreover, the students may use more security techniques, such as implementing the AAA server or deploying an Intrusion Detection System (IDS) for securing the company network. This will be considered a bonus, and the students will have additional marks during Grading. The Deliverables This is a team project with the following deliverables: The Project Design and Document (25%) The Project Solution –Packet Tracer File (25%) The Project Demo and Oral Defence (50%) Project Tasks: Task 1: The Project Design and Document To have consistent and robust documentation for the project. The team should create a document report that includes: Introduction: Write a 150-word introduction that provides a technical but brief overview of the project. The Client: Write a 150-word description of an actual or a fictitious company focusing on their IT infrastructure and networking needs. Requirements and Constraints: This is the main body of your project document. Client requirements and constraints are WAN and Security technologies (Site-to-Site VPN, AAA, Frame Relay, Firewall & PPP). Discuss each topic by stating how the technology applies to your client (why should they implement it?), and then a brief (100-150 words) but a precise and technical description of the technology. This is based on research so cite articles and journals. In the same project document, add the following sections as part of the design you are proposing: Network Topology: Provide a clear network topology/map with a description of each network device and what technology is used on that device. CIS202310-CSF4203-GroupProjectV1 Page 3 | 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Addressing table (s): Provide an addressing table with interfaces, IP addresses, subnet masks, gateways, etc. WAN Security: Describe how security controls specified (such as Site-to-Site VPN, Firewall, AAA) were applied to the different components of the WAN. What is being protected, and how? Be sure that these security controls satisfy the requirements and constraints mentioned in the previous section. Assumptions and Limitations: A brief discussion of your assumptions and design limitations. Important Notes for better design and documentation: Your research topics should include all elements listed in the Network Requirements section above. Use APA style formatting. You should include a references page and in-text citation. You may cite the course and the textbook, but it's not enough. The textbook/course should be accompanied by another reference. Task 2: The Project Solution The proposed design must be implemented using Packet Tracer. The Packet Tracer File : You must submit a Packet Tracer file with the proposed design fully implemented and configured to BbLearn site. Important Notes: Ensure that all components are working Ensure you're using a recent version of Packet Tracer Task 3: The Project Demo and Oral Defense Each team is required to demo their solution highlighting the technology implemented and configuration details. Important Notes: Students will be assessed individually on their knowledge of the design and the solution CIS202310-CSF4203-GroupProjectV1 Page 4 | 6
Submission Requirements Submit before midnight You must submit one folder (zipped) with all files to Bb Learn site. Your folder must contain two files o One project report o One Packet Tracer file Your zipped folder should be named as per names of team members o Example: Mohamad-Ismail-Salem Each file in the folder must also have the same naming format: o Example: name-name-name Your project report should include a cover page sheet must also have the same naming format: o Example: name-name-name END OF PROJECT CIS202310-CSF4203-GroupProjectV1 Page 5 | 6
Mastering (87-100%) (A-/A) Gr ou p Gr ad in g [5 0 %] CLO2-5 Deliverable The Project Design and Document [10%] . All of the following: A brief and precise analysis of the project is provided with appropriate references. Successfully and clearly linked the client's needs to the technology discussed in the introduction. Different technologies and solutions are introduced. CLO2-5 Deliverable The Project Design and Document [15%] Assumptions, limitations, and justifications are included as part of the solution. IP addressing table with interfaces, IP addresses, subnet masks and gateways information complete and error-free. A description of what is being protected and how. Additional analysis of risks of successful exploits. CLO3 Deliverable The Project Solution [10%] Configuration of WAN protocols Frame relay and PPP implemented in packet tracer file error-free configuration CLO4 Deliverable The Project Solution [5%] Configuration of access control, Syslog, AAA implemented in packet tracer file error-free configuration CLO5 Deliverable The Project Solution [10%] Configuration of VPN implemented in packet tracer file error-free configuration CIS202310-CSF4203-GroupProjectV1 Page 6 | 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help