You are on page 1of 6

INTERNATIONAL SCHOOL OF

MANAGEMENT AND TECHNOLOGY


KATHMANDU, NEPAL

Qualification Unit Number & Title


BTEC HND IN COMPUTING T/615/1639 – Unit 35: Network Management
Student Name Assessor Name
Anil Pande
Assignment Launch Date Due Date Completion Date

Session/Year Assignment Number 1/1


Assignment Title Megatech Networking Management Solution

Assignment submission format

Each student has to submit their assignment as guided in the assignment brief. The students
are guided what sort of information is to produce to meet the criteria targeted. You are
required to make use of headings, paragraphs and subsections as appropriate, and all work
must be supported with research and referenced using the APA referencing system.

Learning outcomes covered

 LO1. Explore the concepts and principles of Network Management.


 LO2. Plan, Design, Setup and Configure a Network.
 LO3. Justify the Protocols and Standards concerned with Networking and Network
Management.
 LO4. Use tools and methods to manage a network, including Network Security and
Risk Management.

1|Page
Scenario

“Netmax Technologies” has founded in the year of 2010 is a licensed of Internet Service
Provider (ISP) in Nepal. Since the very beginning, focused on providing the fastest and the most
stable connectivity to the customers. In a very short period of time, they have witnessed the high
scale growth; making us one of the leading ISP of Nepal. This has only been possible due to
dedicated team of executives and engineers.

In order to expansion the network, ISP has decided to open a western regional branch office on
Butwal. You have recently been employed by “Netmax Technologies” on western region as
“Network Administrator” and You have been given the responsibility of collecting and eliciting
requirements, planning, designing and implementing fully operational and functional managed
network on Butwal. Your need to create and manage a prototype network as Proof-of-concept.
Your prototype must be accompanied by written material that explains how your networking
management solution can increase security and scalability as well as address issues of reliability
and availability.

Assignment Task – Part 1

Prepare a report covering the following topics:

1. Conduct a detailed analysis of Networking Management principles and concepts


covering devices needed to implement a secure network, evaluate the importance of
Network Management.

2. Produce a comprehensive design of a network according to a given scenario and


Implement a network design according to a predefined network specification.
NOTE: Provide a comprehensive network configuration by providing screenshots of
your work.

Assignment Task – Part 2

Produce a Presentation which justifies the Protocols and Standards concerned with Networking

2|Page
and Network Management. Your Presentation should cover at least following topics:

1. Evaluate the following Network Protocols and Standards: SNMP, NETCONF, RMON,
TCP/IP, HTTP, DNS, DHCP, SSL, IPSec, IEEE, ITU, ISO, OSI including IANA and
ICANN.

2. Compare and contrast two Protocols. Also, Compare and contrast SNMP and RMON.

Note: Prepare a presentation for using Microsoft® PowerPoint® style presentation to be


presented to your colleagues.
Also produce a written document of your findings/research presented with citations and
references.
Follow the guidelines below to design your presentation.
 Font style Arial or Times New Roman.
 Font size: Main text should be minimum font size 16 -24 (readable from 2 meters
away). Headings 30-42. Sub-headings can be smaller. Avoid writing all in capital
letters and use same font throughout the presentation (Margins, fonts, font size,
and colors should be consistent)
 Use same background on each slide. Label images and graphs. Use bulleted points
and avoid writing long sentences. And provide citations and references.

Assignment Task – Part 3


Use tools and methods to manage a network, including Network Security and Risk Management.

1. Use tools and methods to manage a network and Implement network security on your
Network. Also, Conduct a Risk Assessment on your network.

2. Justify the importance of Network Security in a network.

3. Critically evaluate the importance of carrying out a Risk Assessment on a network.

Pass Merit Distinction

LO1 Explore the concepts and principles of Network

3|Page
Management.
P1 Investigate Network M1 Evaluate the importance of
Management concepts and Network Management.
principles. LO1 & LO2
LO2 Plan, Design, Setup and Configure a network
P2 Produce a comprehensive M2 Implement a network design D1 Provide a
design of a network according according to a predefined comprehensive network
to a given scenario. network specification. configuration by providing
screenshots of your work.
P3 Apply appropriate
analytical tools analyse
research findings and data.
LO3 Justify the Protocols and Standards concerned with
Networking and Network Management
P4 Evaluate the following M3 Compare and contrast two LO3
Network Protocols and Protocols.
Standards: SNMP, NETCONF, D2 Compare and contrast
RMON, TCP/IP, HTTP, DNS, SNMP and RMON.
DHCP, SSL, IPSec, IEEE,
ITU, ISO, OSI including
IANA and ICANN.
LO4 Use tools and methods to manage a network, including
Network Security and Risk Management
P4 Use tools and methods to M4 Justify the importance of LO4
manage a network. Network Security in a network.
D3 Critically evaluate the
P5 Implement Network importance of carrying out
Security on your network. a Risk Assessment on a
network.
P6 Conduct a Risk Assessment
on your network.

Grades Achieved

Note: Refer the unit details provided in your handbook when responding all the tasks above.
Make sure that you have understood and developed your response that matches the highlighted
key words in each task.

4|Page
5|Page
Plagiarism Notice

You are remined that there exist Academic Misconduct Policy and Regulation concerning
Cheating and Plagiarism.

Extracts from the Policy:

Section 3.4.1: Allowing others to do assignments / Copying others assignment is an offence


Section 3.4.2: Plagiarism, using the views, opinion or insights / paraphrasing of another person’s
original phraseology without acknowledgement
Requirements

 It should be the student’s own work – Plagiarism is unacceptable.


 Clarity of expression and structure are important features.
 Your work should be submitted as a well presented, word-processed document with
headers and footers, and headings and subheadings, both in hard and soft copies.
 You are expected to undertake research on this subject using books from the Library, and
resources available on the Internet.
 Any sources of information should be listed as references at the end of your document
and these sources should be referenced within the text of your document using APA
Referencing style
 Your report should be illustrated with screen-prints, images, tables, charts and/or
graphics.
 All assignments must be typed in Times New Roman, font size 12, 11/2 spacing.

The center policy is that you must submit your work within due date to achieve “Merit”
and “Distinction”. Late submission automatically eliminates your chance of achieving
“Merit and Distinction”. Also, 80% attendance is required to validate this assignment.

I declare that all the work submitted for this assignment is my own work and I understand that if
any part of the work submitted for this assignment is found to be plagiarised, none of the work
submitted will be allowed to count towards the assessment of the assignment.

Assignment Prepared By Signature Date

Binod Shah Feb 18, 2021

Brief Checked By Signature Date

Dhruba Babu Joshi Feb 22, 2021

6|Page

You might also like