Networking & System Administration 201C
- Subject Code : 201C 
Assessment
Project
Weightingwithincourse:
75%
Objective
This course aims to provide a solid knowledge of network and system administration. It covers an integrated approach to data communicationsandcomputernetworkingprinciples,buildingonITinfrastructureconcepts.Italsoincludesissues,skills,andstrategies associated with providing core services over a network in a multi-user environment.
The objective of this assessment is to test your skills in designing networks using networking devices such as routers, switches, etc. It will also test your skills in applying best practices in the configuration of LANs and VLANs and troubleshooting problems in networking.
LearningOutcomes(LOs)covered
LO2Demonstrateskillsincommonnetworkdesignandtroubleshooting.
LO3Applybestpracticesinsystemadministrationtomaintainastableofmanagedsystems.
DSDQualificationGraduateProfileOutcomes(GPOs)covered
GPO2Writeandmaintaincomplexprogramsusingdesignpatterns,datastructuresandalgorithmstomeetspecificationsand software development standards.
GPO4Applydatamanagementandstoragetechnologiestosupportthesoftwareapplicationandthedevelopmentprocesstomatch the application domain.
GPO5Integratesecurityandprivacyprinciplesthroughoutsoftwaredevelopmenttoensureapplicationsecurityandsystemintegrity using current best practices.
GPO7ApplyITtechnicalsupportconceptsandpracticetosecurelymanagehardware,softwareandnetworkingresourcestosupport end users and meet security, ethical and organisational requirements in a software development context.
BSEQualificationGraduateProfileOutcomes(GPOs)covered
GPO1Employcriticalunderstandingofbusinessandmanagementpracticesforprofessionalsoftwareprojectsandenvironments.
GPO2Applyarangeofinterpersonal,professionalandacademiccommunicationapproachestooptimiseopportunities,relationships and outcomes with stakeholders.
GPO3Operatewithprofessionalism,self-awarenessandsocialsensitivity,inculturallyandgender-diverseteams.
GPO4Identifyandfulfillself-learningneedsthroughproactiveengagementinarangeofapproachestopersonaandprofessional development, including disciplined self-reflection and soliciting the views of others.
GPO6Conducttransdisciplinaryinvestigationandanalysistoenhancetheproductionofuser-centric,viable,ethicalandsocially responsive creative software solutions.
GPO7Employsolution-focuseddesign-thinkingapproachestocontributetotheideation,developmentandproductionofsoftware.
GPO9Integrateanadaptivesetofspecialistskills,approachesandtoolswithaholisticunderstandingofsoftwaredevelopment practices, to produce software within transdisciplinary teams.
AssessmentMatrix
| LearningOutcome | GPO(DSD) | GPO(BSE) | AssessmentTask | Weightage(%) | 
| LO 2: Demonstrate skills in commonnetworkdesignand troubleshooting. | GPO2 GPO4 GPO7 | GPO4 GPO6 GPO7 | PartATask1 | 15 | 
| PartATask2 | 15 | |||
| PartATask3 | 15 | |||
| PartBTask1 | 15 | |||
| LO 3: Apply best practices in system administration to maintainastableofmanaged systems. | GPO2 GPO4 GPO5 GPO7 | GPO1 GPO2 GPO3 GPO9 | PartATask1 | 5 | 
| PartATask2 | 5 | |||
| PartATask3 | 5 | |||
| PartBTask1 | 5 | |||
| PartCTask1 | 20 | |||
| Total | 100 | |||
Grading
Thefinalgradewillbedeterminedbythescoreachievedinthisassessmentbasedonthefollowingtable.Shouldasecondorthird attempt be required the maximum contribution toward the overall mark for the tasks that required a second or third assessment attempt is 50%. A late submission is considered a second attempt, so the contribution will be capped at 50%.
| Grade | Range | 
| A+ | Meetallcourserequirements,range(90100%) | 
| A | Meetallcourserequirements,range(8589%) | 
| A- | Meetallcourserequirements,range(8084%) | 
| B+ | Meetallcourserequirements,range(7579%) | 
| B | Meetallcourserequirements,range(7074%) | 
| B- | Meetallcourserequirements,range(6569%) | 
| C+ | Meetallcourserequirements,range(6064%) | 
| C | Meetallcourserequirements,range(5559%) | 
| C- | Meetallcourserequirements,range(5054%) | 
| D | Didnotmeetallcourserequirements,range(4049%) | 
| E | Didnotmeetallcourserequirements,markrange(039%) | 
CandidatesAssessmentInstructions
- Thisassessmentisanopen-bookactivity,youcanuseyourowncourseandreviewnotesaswellasofflineoronline resources, such as textbooks or online journals.
- Thisassessmentisanindividualassessment,andyouarerequiredtocompleteitonyour
- Youcanalwaysaskyouronlinetutorifyouneedfurtherexplanationiftheinstructionsare
- YourworkshouldnotbePlagiarismincludescopyingmaterialwithoutacknowledgingit,copyingfromanother student, getting another person to help you with your assessment, using material from commercial essays or assignment services, or using AI to create the answers.
- ThepurposeofthisassessmentistoassessyourIntheeventYoobeesuspectscollusion,thiswillbe addressed. For more information on plagiarism, please refer to the Student Handbook.
- Submityourcompletedassessmentonlineinthecorrectspace
- Marksandfeedbackwillbereturnedwithin15daysofthesubmission
- By completing and submitting an assessment you are authenticating that the work is original and does not violate plagiarismorcopyrightAuthenticityischeckedwhereanybreachesofacademicintegrityaresuspected.Pleaserefer to the Student Handbook for further information.
SubmissionInstructions
PleasesubmitthefollowingtoyourLMS:
- Anassessmentreportwithscreenshotscoveringallpartsofthe
- AzippedfolderwithallrequiredPackettracer
AssessmentTasksCompletionTimeline
| Week | Whatneedstobedone | Whatneedstobesubmitted | 
| Week1 | Assessments1and2tobereleased. 
 StudentstartsworkingonAssessment1 | |
| Week2 | StudentkeepsworkingonAssessment1 | |
| Week3 | RecommendcompletingAssessment1bytheendoftheweek | |
| Week4 | StudentstartsworkingonAssessment2PartA | SubmitviaLMS: 
 Assessment1document | 
| Week5 | StudentcontinuesworkingonAssessment2PartA | |
| Week6 | StudenttocompleteAssessment2PartAbytheendofthe week | |
| Week7 | StudentcompletesAssessment2PartB | |
| Week8 | StudentcompletesAssessment2PartC | SubmitviaLMS: 
 Assessment2reportwithscreenshots covering all parts of the assessment. AzippedfolderwithallrequiredPacket tracer files. | 
ASSESSMENT
PARTA
LO2:Demonstrateskillsincommonnetworkdesignandtroubleshooting.
LO3:Applybestpracticesinsystemadministrationtomaintainastableofmanagedsystems.
Scenario
AnITcompanyinAucklandoperatesthreeoffices,eachwithitsownlocalareanetwork(LAN).Theseofficesareinterconnectedviaa Wide Area Network (WAN) to ensure seamless communication and resource sharing across all locations.
Office1:AucklandCBD LAN 1
NumberofHosts:60
Office2:Northshore,Auckland LAN 2
NumberofHosts:126
Office3:Manukau,SouthAuckland LAN 3
NumberofHosts:14
The WAN connects the three offices to facilitate inter-office communication. Each office has a router that connects to the WAN, allowing them to communicate with each other securely and efficiently.
Link C
Task1: DevelopanIP AddressingScheme(20%)
- Based on the above topology, subnet the IPv4 network below to provide IP addresses to three LANs (subnets) that will support the requirednumber of hosts. TheVariableLengthSubnet Mask(VLSM) methodshouldbeusedfor theIPplanfor thenetworksincluding the WAN links (links between the routers). All work must be shown using the IP Addressing worksheet below.
| Network | NumberofHostsinLAN1 | NumberofHostsinLAN2 | NumberofHostsinLAN3 | 
| 192.168.5.0/24 | 60 | 126 | 14 | 
IPAddressingWorksheet
| Specification | LAN1 | LAN2 | LAN3 | 
| Number of usablehosts per subnet. | |||
| Number of borrowedbits (n)inthe subnet | |||
| Subnetmask (binary) | |||
| Subnetmask (decimal) | |||
| IP Subnet (network address)with prefix. | |||
| FirstIPHost addresswith prefix | |||
| LastIPHost addresswith prefix | 
- Based on the given topology, use packet tracer to design the network with their suitable interfaces, each LAN should have a switch with an interface connected to a router and three interfaces connected to three PCs, then record your subnet assignment in the table
- AssignthefirstIPv4addressofeachsubnettoarouter
- LAN1ishostedontheR1Giginterface(connectedtoswitch1)
- LAN2ishostedontheR2Giginterface(connectedtoswitch2)
- LAN3ishostedontheGiginterface(connectedtoswitch3)
 
- AssignthelastthreeIPv4addressesofeachsubnet/LANtothePCs
- AssignthesecondIPv4addressofLAN1toSwitch1,LAN2toSwitch2,LAN3to
| Device | IPaddress | SubnetMask | Gateway | 
Task2: Implementationof the networkusingCiscoPacket Tracer(20%)
Step1:ConfigurationtasksforRouter1,Router2,andRouter3onPackettracerincludethefollowing:
| Task | Specification | 
| Routername | |
| EncryptedprivilegedEXEC password | 
 ciscoenpass | 
| Consoleaccesspassword | ciscoconpass | 
| Settheminimumlengthfor passwords | 
 10characters | 
| Setloginonvtylinestouselocal database | |
| Encryptthecleartextpasswords | |
| ConfigureanMOTDBanner | |
| 
 ConfigureInterfaceGiga Ethernet | Setthedescription SettheLayer3IPv4address Activate Interface | 
| 
 
 ConfigureInterfaceSerial | Setthedescription SettheLayer3IPv4address Activate Interface | 
| Addstaticordynamicroutingto each router | 
Step2:ConfigurationtasksforSwitch1,Switch2,andSwitch3 onPackettracerincludethefollowing:
| Task | Specification | 
| Switchname | |
| EncryptedprivilegedEXEC password | 
 ciscoenpass | 
| Consoleaccesspassword | ciscoconpass | 
| Settheminimumlengthfor passwords | 
 10characters | 
| Setloginonvtylinestouselocal database | |
| Encryptthecleartextpasswords | |
| ConfigureanMOTDBanner | |
| 
 ConfigureManagementInterface (SVI) on VLAN1 | Setthedescription SettheLayer3IPv4address Activate Interface | 
Step3: Configurationtasks forhostcomputers
Afterconfiguringeachhostcomputer,recordeachhostnetworksettingswiththeipconfig/allcommandbasedonthetablebelow.
| PCNetworkConfiguration | |
| Description | |
| PhysicalAddress | |
| IPv4Address | |
| SubnetMask | |
| IPv4DefaultGateway | |
Step4:TestandVerify IPv4End-to-EndConnectivity
UsethepingcommandtotestIPv4connectivitybetweenallnetworkdevices.AddscreenshotsfortheconnectivitywithineachLANto its connected router, and for all the remote (indirectly) connected networks.
Task 3: Use the IOS CLItogather device information(20%)
EntertheappropriateCLIcommandneededtodisplaythefollowingonR1:
| CommandDescription | Command | 
| Display a brief outcome of important informationabouttheIPinterfacesonR1. | |
| Displayalltheconfigurationthatisdoneon R1. | |
| Verifiestheinterfacestatusanddisplaysany error messages. | |
| DisplaytheIPv4routingtable. | |
| DisplayasummaryofIPv4interface addresses and status. | |
| Display information about the neighboring devices connected to R1. Information should includeDeviceID,LocalInterface,Holdtime, Capability, Platform, and Port ID. | |
| Savethecurrentconfigurationsoitwillbe used the next time the router is started. | 
PARTB
LO2:Demonstrateskillsincommonnetworkdesignandtroubleshooting.
LO3:Applybestpracticesinsystemadministrationtomaintainastableofmanagedsystems.
Task1: Network troubleshootingscenarios(20%)
- PleaseconsulttheexhibitandrefertotheprovidedPacketTracerfilenamed"PartBTask1a.pkt"
Inthetopologymentionedearlier,accordingtothenetworklayout,itisintendedforswitch-3tofunctionastherootbridge.Examinethe providedPacketTracerfiletoinitiallyidentifytheexistingrootbridgeinthetopology.Subsequently,troubleshootandensurethatswitch- 3 would indeed perform the role of the root bridge.
- PleaseconsulttheexhibitandrefertotheprovidedPacketTracerfilenamed"pkt"
All hosts are assigned to the correct VLANs, but none of the hosts connected to Switch 0 can communicate with hosts in the same VLAN connected to Switch 1. Analyse the shared packet tracer file and complete the following tasks:
- Identifyanddiscussthe
- ProposeandimplementthesolutionsothatallthehostsinthesameVLANwillbeabletocommunicateacrossthetwo
- Pleaseconsulttheexhibitandrefertotheprovidedtracerfilenamed"pkt
The network administrator's attempt to initiate a ping from PC-0 to PC-1 results in the outcomes displayed. Your task is to identify the problem in the provided Packet Tracer file and then proceed with the process of troubleshooting and resolution.
PARTC
LO3:Applybestpracticesinsystemadministrationtomaintainastableofmanagedsystems.
Task 1: Apply best practices(20%)
- ScenarioA:YouarethenetworkadministratorforacompanyInfiniPI,thatusesRIPasitsroutingInarecentconfiguration update, you entered the command"ip route 0.0.0.0 0.0.0.0 55.12.4.38" on your router. Analyse this scenario and explain the purpose of this command. Additionally, propose a scenario where such a configuration could be beneficial for the network.
- ScenarioB:You are a network administrator atXteliXCorporation, a company that specializes in web hosting services. One of your clients has reported issues accessing a web server hosted internally. The client's website is not accessible from external networks, even though the server's services are functional within the local network. Create an initial analysis of the problem and outline the steps to address it.
- ScenarioC:Refertothe
ProblemDescription:
Your assignment involves implementing RIP routing on the illustrated network using Cisco Packet Tracer. The objective is to establishcommunicationbetweenPC1andPC3 throughtherouters.However,uponconfiguringRIProuting,itbecomesevidentthatPC1cannot ping PC3, and vice versa.
Uponanalysis,anadministratorattemptstopingPC3'sdefaultgatewayat30.0.0.1,resultinginthedisplayedoutput:
```now createPC3>ping30.0.0.1
host(30.0.0.1)notreachable
IdentifytheOSIlayerwheretheproblemliesandsuccinctlyoutlinethestepsthatcanbetakentorectifytheissue.
- ScenarioD:Refertothe
The network administrator normally establishes a Telnet session with the switch from host A. However, host A is unavailable. The administratorattemptstoTelnettotheswitchfromhostBbutthetelnetsessionfails.Analysetheoutputpresentedaboveandcomplete the following tasks
- Identifythe
- WriteyouranswertofixtheTelnetsessionfromhost
MarkingRubrics
Topassthisassessment,youmustmeetalltherequirementsofeachofthelearningoutcomes(irrespectiveofthenumericalgradeawarded) and achieve PASS results for each learning outcome.
| Criterionand Evidence Weightage | |||||||
| Task | Subtask | A+,A,A- | B+,B,B- | C+,C,C- | D | E | |
| PARTA(LO2andLO3)(DSD:GPO2,GPO4,GPO5,GPO7BSE:GPO1,GPO2,GPO3,GPO4,GPO6,GPO7,GPO9) | |||||||
| 
 
 
 
 
 
 
 
 
 Task1:Develop an IPAddressing Scheme | 
 
 
 
 Task1a | 
 
 
 
 10% | 
 The student has correctly subnettedtheIPv4networkbelow to provide IP addresses to three LANs (subnets) that will support the required number of hosts. Allanswers(21)areaccurate. | 
 ThestudenthassubnettedtheIPv4 network below to provide IP addresses to three LANs (subnets) that will support the required number of hosts with some errors. Mostanswers(11-20)areaccurate. | 
 The student has subnetted the IPv4 network below to provide IP addresses to three LANs (subnets) thatwillsupporttherequirednumber of hosts with significant errors. Lessthanhalfoftheanswers(4-10) are correct. | The student has subnetted the IPv4 network below to provide IP addresses to three LANs (subnets) thatwillsupporttherequirednumber of hosts with significant errors. Onlyafewanswers(1-3)are correct. | 
 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | 
| 
 
 
 
 
 
 Task1b | 
 
 
 
 
 
 10% | The student has correctly used Packet Tracer to design the network with their suitable interfaces,eachLANhasaswitch with an interface connected to a router and three interfaces connected to three PCs. Alltherecordingsarecorrect. The simulation is excellent. Thestudenthasappliedbest practices excellently. | 
 The student has used Packet Tracer to design the network with theirsuitableinterfaces,eachLAN has a switch with an interface connected to a router and three interfacesconnectedtothreePCs. Mostoftherecordingsarecorrect. The simulation is good. Thestudenthasappliedbest practices adequately. | The student has Packet Tracer to design the network with their suitable interfaces, each LAN has a switch with an interface connected to a routerandthreeinterfacesconnected to three PCs. Lessthanhalfoftherecordingsare correct. Thesimulationissatisfactory. The student has applied best practices satisfactorily. | The student has used Packet Tracer to design the network with their suitable interfaces, each LAN has a switchwithaninterfaceconnectedto a router and three interfaces connected to three PCs. Only1-2recordingsarecorrect. The simulation is poor. Thestudenthasappliedbest practices poorly. | 
 
 
 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | |
| 
 
 
 
 
 
 Task 2:Implementationof the network using Cisco Packet Tracer | 
 
 
 Task2 Step1 | 
 
 
 
 5% | The student has correctly configured all three routers on Packet Tracer and provided all requiredspecificationsaccurately. The simulation is excellent. Thestudenthasappliedbest practices excellently. | The student has correctly configured two routers on Packet Tracer and provided most of the requiredspecificationsaccurately. The simulation is good. Thestudenthasappliedbest practices adequately. | Thestudenthascorrectlyconfigured one router on Packet Tracer and provided a few of the required specifications accurately. Thesimulationissatisfactory. The student has applied best practices satisfactorily. | Thestudenthastriedtoconfigure one or more routers on Packet Tracer and provided a few of the requiredspecificationsaccurately. The simulation is poor. Thestudenthasappliedbest practices poorly. | 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | 
| 
 
 
 Task2 Step2 | 
 
 
 
 5% | The student has correctly configured all three switches on Packet Tracer and provided all requiredspecificationsaccurately. The simulation is excellent. Thestudenthasappliedbest practices excellently. | The student has correctly configuredtwoswitchesonPacket Tracer and provided most of the required specifications accurately. The simulation is good. Thestudenthasappliedbest practices adequately. | Thestudenthascorrectlyconfigured one switch on Packet Tracer and provided a few of the required specifications accurately. Thesimulationissatisfactory. The student has applied best practices satisfactorily. | Thestudenthastriedtoconfigure one or more switches on Packet Tracer and provided a few of the requiredspecificationsaccurately. The simulation is poor. Thestudenthasappliedbest practices poorly. | 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | |
| 
 
 
 
 Task2 Step3 | 
 
 
 
 5% | The student has correctly configuredatleasttwohostsinall three subnets on Packet Tracer and provided all required specifications accurately. The simulation is excellent. Thestudenthasappliedbest practices excellently. | The student has correctly configuredatleasttwohostsintwo subnets on Packet Tracer and provided most of the required specifications accurately. Thesimulationisgood. Thestudenthasappliedbest practices adequately. | Thestudenthascorrectlyconfigured at least two hosts in one subnet on PacketTracerandprovidedafewof the required specifications accurately. Thesimulationissatisfactory. The student has applied best practices satisfactorily. | Thestudenthastriedtoconfigure oneormorehostsinoneormore subnets on Packet Tracer and provided a few of the required specifications accurately. Thesimulationispoor. Thestudenthasappliedbest practices poorly. | 
 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | |
| 
 
 
 
 
 Task2 Step4 | 
 
 
 
 
 
 5% | The student has used the ping commandtotestIPv4connectivity between all network devices. The student has also added multiple screenshots for the connectivity within each LAN to its connected router, and for all the remote (indirectly) connected networks. Theend-to-endconnectivityis perfect. | The student has used the ping commandtotestIPv4connectivity between all network devices. The student has also added many screenshots for the connectivity within each LAN to its connected router, and for all the remote (indirectly) connected networks. Theend-to-endconnectivityisnot achieved completely. | 
 The student has used the ping command to test IPv4 connectivity betweensomenetworkdevices.The student has also added a few screenshots for the connectivity within each LAN to its connected router, and for all the remote (indirectly) connected networks. Theend-to-endconnectivityisnot achieved completely. | Thestudenthastriedtousetheping command to test IPv4 connectivity between some network devices but mostarenotsuccessful.Thestudent has also added 1-2 screenshots for the connectivity within each LAN to its connected router, and for all the remote (indirectly) connected networks. Theend-to-endconnectivityisnot achieved. | 
 
 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | |
| 
 Task3:Usethe IOS CLI to gatherdeviceinformation | 
 
 20% | Thestudenthascorrectlyentered the CLI command needed to display the given description on Router R1. Allsevencommandsarecorrect. | ThestudenthasenteredtheCLI commandneededtodisplaythe given description on Router R1. Fivetosixcommandsarecorrect. | ThestudenthasenteredtheCLI commandneededtodisplaythe given description on Router R1. Onlythreetofourcommandsare correct. | ThestudenthasenteredtheCLI commandneededtodisplaythe given description on Router R1. Onlyonetotwocommandsare correct. | Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | |
| PARTB(LO2andLO3)(DSD:GPO2,GPO4,GPO5,GPO7BSE:GPO1,GPO2,GPO3,GPO4,GPO6,GPO7,GPO9) | |||||||
| 
 
 
 
 
 
 
 
 
 Task 1:Network troubleshooting scenarios | 
 
 
 
 
 
 Task1a | 
 
 
 
 
 
 5% | 
 The student has examined the provided Packet Tracer file to identify the existing root bridge in the topology. The student has troubleshooted and ensured that switch-3wouldindeedperformthe role of the root bridge. Thestudenthasappliedbest practices excellently. | The student has examined the provided Packet Tracer file to identify the existing root bridge in thetopology.Thestudenthastried to troubleshoot and ensure that switch-3wouldindeedperformthe role of the root bridge but everything is not working as required. Thestudenthasappliedbest practices adequately. | 
 The student has examined the providedPacketTracerfiletoidentify the existing root bridge in the topology. The student has not performed troubleshooting correctly to ensure switch-3 would indeed perform the role of the root bridge. Thestudenthasappliedbest practices adequately. | 
 Thestudenthasattemptedthistask but has not performed any troubleshooting to ensure switch-3 wouldindeedperformtheroleofthe root bridge. Thestudenthasappliedbest practices poorly. | 
 
 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | 
| 
 
 
 
 Task1b | 
 
 
 
 10% | The student has analysed the packet tracer file and completed the following tasks correctly: i.Identifyanddiscusstheproblem. ii.Propose and implement the solutionsothatallthehostsinthe same VLAN will be able to | The student has analysed the packettracerfileandcompleted only one of the following tasks correctly: i.Identifyanddiscusstheproblem. ii.Propose and implement the solutionsothatallthehostsinthe sameVLANwillbeableto | The student has attempted to analysethepackettracerfileand completed the following tasks: i.Identifyanddiscusstheproblem. ii.Propose and implement the solutionsothatallthehostsinthe same VLAN will be able to | The student has attempted to analysethepackettracerfileand completed one of the following tasks: i.Identifyanddiscusstheproblem. ii.Propose and implement the solutionsothatallthehostsinthe sameVLANwillbeableto | 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | |
| communicateacrossthetwo switches. Thetroubleshootingiscorrect. 
 Thestudenthasappliedbest practices excellently | communicateacrossthetwo switches. Thetroubleshootingiscorrect. The student has applied best practices adequately. | communicateacrossthetwo switches. Theanalysisisnotcompletely correct. Thestudenthasappliedbest practicessatisfactorily. | communicateacrossthetwo switches. Theanalysisisnotcompletely correct. Thestudenthasappliedbest practicespoorly. | ||||
| 
 
 
 
 
 Task1c | 
 
 
 
 
 5% | The student has identified the problem in the provided Packet Tracerfileandthenfollowedthe process of troubleshooting, and resolution. Thetroubleshootingandresolution are correct. 
 Thestudenthasappliedbest practices excellently. | The student has identified the problem in the provided Packet Tracerfileandthenfollowedthe process of troubleshooting, and resolution. The identification is accurate but troubleshootingandresolutionare partially correct. Thestudenthasappliedbest practices adequately. | 
 The student has identified the problem in the provided Packet Tracer file but hasnt then followed theprocessoftroubleshooting,and resolution. 
 Thestudenthasappliedbest practices satisfactorily. | 
 The student has attempted toidentify the problem in the provided PacketTracerfilebutgotitincorrect. 
 Thestudenthasappliedbest practices poorly. | 
 
 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | |
| PARTC(LO3)(DSD:GPO2,GPO4,GPO5,GPO7BSE:GPO1,GPO2,GPO3,GPO9) | |||||||
| 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 Task 1: Apply bestpractices | 
 
 
 
 
 
 Task1a | 
 
 
 
 
 
 5% | The student has analysed the scenario and explained the purpose of the command. The student has also proposed a scenario where such a configurationcouldbebeneficial for the network. Theanalysisandproposalare excellent. Thestudenthasappliedbest practices excellently. | The student has analysed the scenarioandexplainedthepurpose of the command. The student has also proposed a scenario where such a configuration could be beneficial for the network but with minor errors. Theanalysisandproposalare good. Thestudenthasappliedbest practices adequately. | 
 
 
 The student has analysed the scenarioandexplainedthepurpose of the command. The analysis is satisfactory. Thestudenthasappliedbest practices satisfactorily. | 
 Thestudenthastriedtoanalysethe scenarioandexplainthepurposeof the command, but the analysis doesnt make sense. 
 Thestudenthasappliedbest practices poorly. | 
 
 
 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | 
| 
 
 
 Task1b | 
 
 
 5% | Thestudenthascreatedaninitial analysis of the problem and outlined the steps to address it. The analysis is excellent. Thestudenthasappliedbest practices excellently. | Thestudenthascreatedaninitial analysis of the problem and outlined the steps to address it. The analysis is adequate. Thestudenthasappliedbest practices adequately. | Thestudenthastriedtocreatean initial analysis of the problem. Theanalysislacksdetailsandisjust satisfactory. Thestudenthasappliedbest practices satisfactorily. | Thestudenthastriedtoanalysebut the analysis doesnt make sense. Thestudenthasappliedbest practices poorly. | 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | |
| 
 
 
 
 
 Task1c | 
 
 
 
 
 5% | Thestudenthascorrectlyidentified the OSI layer where the problem lies and succinctly outlined the steps that can be taken to rectify the issue. Theidentificationandtheoutlines of the steps are accurate. Thestudenthasappliedbest practices excellently. | ThestudenthasidentifiedtheOSI layer where the problem lies and succinctly outlined the steps that can be taken to rectify the issue. Theidentificationandtheoutlines of the steps are adequate. Thestudenthasappliedbest practices adequately. | 
 
 The student has identified the OSI layer where the problem lies but hasnt succinctly outlined the steps thatcanbetakentorectifytheissue. The student has applied best practices satisfactorily. | 
 Thestudenthastriedtoidentifythe OSI layer where the problem lies and provided some steps but most dont make sense. Thestudenthasappliedbest practices poorly. | 
 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | |
| 
 
 
 
 
 Task1d | 
 
 
 
 
 5% | Thestudenthascorrectlyanalysed the output presented and completed all of the followingtasks: i.Identifytheproblem. ii.Writeyouranswertofix the Telnet session from host B. Thestudenthasappliedbest practices excellently. | 
 Thestudenthascorrectlyanalysed the output presented and just identifiedtheproblemandprovided some analysis but the analysis misses details. Thestudenthasappliedbest practices adequately. | 
 
 Thestudenthascorrectlyanalysed the output presented and just identified the problem. 
 Thestudenthasappliedbest practices satisfactorily. | 
 Thestudenthasincorrectlyanalysed the output presented and incorrectly identified the problem. Thestudenthasappliedbest practices poorly. | 
 
 Thestudenthasattemptedthe task but has provided mostly irrelevant evidence. ORThestudenthasnot attempted this task. | |
| Sum | 100% | 
 
								