WAN Telecomunication
docx
keyboard_arrow_up
School
Sir Syed College of Education, Kotli *
*We aren’t endorsed by this school
Course
CREATIVE W
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
6
Uploaded by CaptainThunderArmadillo30
Course Work Assessment -
Alternative Assessment
Semester
202310
Division
CIS
Assessment title in
Syllabus
Project
Program
Bachelor of
Information
Technology
Course Code
CSF-4203
Course Title
CSF-4203 Telecommunications and WAN Security
Course Instructor
Khalid Anjum
CRN
13127
Chatbot ( e.g. ChatGPT ) statement
This submission allows you to use AI-generated tools, but the prompt used
must be stated and the response must be in red font.
C
oversheet instructions:
CSF-4203 Course Project
Project Objectives:
Implement a WAN network for a company with at least three branches in different cities or
countries and keep network security as the project's primary goal.
Course Learning Outcomes (CLOs):
The project covers the following CLOs:
CLO2
Distinguish between circuit-switching and packet-switching technologies.
CLO3
Select various techniques to configure WAN protocols, including Frame Relay and
PPP.
CLO4
Design WAN technologies including access control, Syslog, AAA and IPS
CLO5
Design and configure a site to site VPN to provide secure WAN communication.
CIS202310-CSF4203-GroupProjectV1
Page
1 | 6
Project Environment:
The project involves implementing WAN in Cisco Packet Tracer, creating a full connectivity
network infrastructure across multiple locations. Security techniques must be used in the
design and implementation of the company network.
Introduction
You are part of a telecommunication company that provides network and security solutions.
A client has called you to plan and design the network system and the company's needed
security controls. The idea of this project is to create a full connectivity network
infrastructure across multiple locations. Your job is to propose and design an integrated
solution based on the following requirement.
The Network Requirements
The client is a UAE based company that has different and remote locations. During the
network design, the team should take into consideration the following networking
techniques that may be used all or be used partially according to the company size and
requirements:
●
At least 3 different sites (in other cities or countries). You can propose more location.
However, you must be sure that all of them are connected to one network.
●
Frame Relay networking between sites.
●
PPP Networking between sites.
On the other side, and regardless of the company size, all companies require a high-security
level to be achieved. Here are the set of security techniques that you must use in the design
and implementation of the company network:
●
PPP with Authentication between any two sites.
●
Firewall Server.
●
Syslog and NTP.
●
VPN technology (Site-to-Site VNP).
CIS202310-CSF4203-GroupProjectV1
Page
2 | 6
The techniques mentioned above are mandatory to be used in the design and
implementation of network security as part of the project.
Moreover, the students may use more security techniques, such as implementing the AAA
server or deploying an Intrusion Detection System (IDS) for securing the company network.
This will be considered a bonus, and the students will have additional marks during
Grading.
The Deliverables
This is a team project with the following deliverables:
●
The Project Design and Document (25%)
●
The Project Solution –Packet Tracer File (25%)
●
The Project Demo and Oral Defence (50%)
Project Tasks:
Task 1: The Project Design and Document
To have consistent and robust documentation for the project. The team should create
a document report that includes:
Introduction:
Write a 150-word introduction that provides a technical but brief
overview of the project.
The Client:
Write a 150-word description of an actual or a fictitious company focusing
on their IT infrastructure and networking needs.
Requirements and Constraints:
This is the main body of your project document. Client
requirements and constraints are WAN and Security technologies (Site-to-Site VPN,
AAA, Frame Relay, Firewall & PPP). Discuss each topic by stating how the technology
applies to your client (why should they implement it?), and then a brief (100-150
words) but a precise and technical description of the technology. This is based on
research so cite articles and journals.
In the same project document, add the following sections as part of the design you
are proposing:
Network Topology:
Provide a clear network topology/map with a description of each
network device and what technology is used on that device.
CIS202310-CSF4203-GroupProjectV1
Page
3 | 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Addressing table (s):
Provide an addressing table with interfaces, IP addresses, subnet
masks, gateways, etc.
WAN Security:
Describe how security controls specified (such as Site-to-Site VPN,
Firewall, AAA) were applied to the different components of the WAN. What is being
protected, and how? Be sure that these security controls satisfy the requirements and
constraints mentioned in the previous section.
Assumptions and Limitations:
A brief discussion of your assumptions and design
limitations.
Important Notes for better design and documentation:
●
Your research topics should include all elements listed in the Network
Requirements section above.
●
Use APA style formatting.
●
You should include a references page and in-text citation.
●
You may cite the course and the textbook, but it's not enough. The
textbook/course should be accompanied by another reference.
Task 2: The Project Solution
The proposed design must be implemented using Packet Tracer.
The Packet Tracer File
: You must submit a Packet Tracer file with the proposed design
fully implemented and configured to BbLearn site.
Important Notes:
●
Ensure that all components are working
●
Ensure you're using a recent version of Packet Tracer
Task 3: The Project Demo and Oral Defense
Each team is required to demo their solution highlighting the technology implemented
and configuration details.
Important Notes:
●
Students will be assessed individually on their knowledge of the design and the
solution
CIS202310-CSF4203-GroupProjectV1
Page
4 | 6
Submission Requirements
●
Submit before midnight
●
You must submit one folder (zipped) with all files to Bb Learn site.
●
Your folder must contain two files
o
One project report
o
One Packet Tracer file
●
Your zipped folder should be named as per names of team members
o
Example: Mohamad-Ismail-Salem
●
Each file in the folder must also have the same naming format:
o
Example: name-name-name
●
Your project report should include a cover page sheet must also have the same
naming format:
o
Example: name-name-name
END OF PROJECT
CIS202310-CSF4203-GroupProjectV1
Page
5 | 6
Mastering (87-100%)
(A-/A)
Gr
ou
p
Gr
ad
in
g
[5
0
%]
CLO2-5 Deliverable The Project
Design and Document [10%]
.
All of the following:
●
A brief and precise analysis of the project is provided with appropriate references.
●
Successfully and clearly linked the client's needs to the technology discussed in the introduction.
●
Different technologies and solutions are introduced.
CLO2-5 Deliverable
The Project
Design and Document [15%]
●
Assumptions, limitations, and justifications are included as part of the solution.
●
IP addressing table with interfaces, IP addresses, subnet masks and gateways information complete and error-free.
●
A description of what is being protected and how. Additional analysis of risks of successful exploits.
CLO3 Deliverable The Project
Solution [10%]
●
Configuration of WAN protocols Frame relay and PPP implemented in packet tracer file error-free configuration
CLO4 Deliverable The Project
Solution [5%]
●
Configuration of access control, Syslog, AAA implemented in packet tracer file error-free configuration
CLO5 Deliverable The Project
Solution [10%]
●
Configuration of VPN implemented in packet tracer file error-free configuration
CIS202310-CSF4203-GroupProjectV1
Page
6 | 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help