Reference no: EM133959032
Design Network Infrastructure
Assessment Item 1:
Session 1:
Download and install FreePBX
Submit a MS Word report/PDF with screenshots of you installing FreePBX in a virtual machine and include your answers to the following: Explain where VoIP, MQTT, IAM, Carrier Ethernet, and Cloud lie on Ganter Hype Cycle.
Also identify new Networking technologies that you may become mainstream and why.
Session 2:
Configure FreePBX with softphones.
Submit a MS Word report/PDF with screenshots of phone configurations and include your answers to the following:
What protocols does freePBX use (tip: use wireshark and capture the packets from FreePBX to determine) Critically compare VoIP protocols
Discuss the future of VoIP.
Session 3:
Download and install flexiwan.
Research and configure flexiwan for load balancing and WAN compression.
Submit a MS Word report/PDF with screenshots of your flexiWAN configuration and include your answers to the following: Explain how load balancing and WAN compression can be considered Software Defined Networks.
Explain how Software Defined Networks separates the control, data and management plane. Research Kubernetics and Minicube. Explain the difference and collect links on how to install them.
Session 4
Download and install Minikube on an Ubuntu. Following this tutorial:
If you get the following errors:
Minikube Errors:
Install:
Error: This computer doesn't have VT-X/AMD-v enabled at minikube VBoxManage modifyvm <VirtualMachineName> --nested-hw-virt on
e.g.
cd c:\Program Files\Oracle\VirtualBox
./VBoxManage modifyvm Ubuntu --nested-hw-virt on
Error: PR_VBOX_DEVICE_MISSING ... install virtualbox-dkms sudo apt-get install virtualbox-dkms
sudo dpkg-reconfigure virtualbox-dkms sudo dpkg-reconfigure virtualbox
sudo apt-get install linux-headers-generic
Note: MiniKube is still a bit unstable on a standalone PC. You are better off in a Cloud environment.
Submit a MS Word report/PDF with screenshots of your MiniKube configuration and include your answers to the following: Explain how to use MiniKube and what are some practical implementation you can do on a Ubuntu Virtual Machine. Explain how Network Function(s) has benefited from Network Orchestration.
Explain two Network Functions.
Session 5
Install MQTT broker and a subscriber in Ubuntu Virtual Machine see the following youtube link.
Try to subscribe to your neighbour's MQTT broker. Explain your attempt.
Submit a MS Word report/PDF with screenshots of your MiniKube configuration and include your answers to the following: Explain how to implement MQTT.
Explain the network architecture of MQTT and think of new application it can be used for.
Session 6
Download and Install TheOpenEM software on a Windows Server see the following videos and homepage for details:
Submit a MS Word report/PDF with screenshots of your MiniKube configuration and include your answers to the following: Explain how you can configure End Point Management System and justify why this is critical in the modern IT world. Explain what else needs to be done to make sure End Point Management is possible. (Agents, Firewall rules, etc)
Session 7
Download and Install KeyCloak on a Windows Servers Evaluation version see the following link:
Session 8
Download and install Cisco see the following link:
Create a login and download the latest version of UCSPE 4.2(2a).
Submit a MS Word Report/PDS with screenshots of your Keycloak configuration and include your answers to the following: Justify why organization needs a datacentre
Explain why many organisations will still need an on-premises datacentre.
Session 9
Configure Cisco UCS Platform Emulator using the following video as a guide:
Submit a MS Word Report/PDS with screenshots of your UCS configuration and include your answers to the following: Explain how to connect datacentres to the Internet
Explain how Carrier Ethernet and MPLS is used
Session 10
Create an account on Schneider Electric
Complete one Energy Efficiency Course and one Data Centre Course
Assessment Details for Assessment Item 2:
Overview
Introduction
You will submit work in assignment activities during the study period. This is an individual assessment.
You are a junior network engineer at a managed services provider that has recently onboarded a client with multiple branch offices across different geographic locations. The client is transitioning from a legacy telephony system to a modern, IP-based communication infrastructure. Due to budget constraints and the need for rapid deployment, the client has requested a proof-of-concept (PoC) for a virtualized VoIP solution that can operate across segmented networks.
Your role is to design and demonstrate a prototype that simulates this environment using virtual machines. The solution must showcase inter- office communication capabilities, scalability potential, and basic call functionality between remote endpoints.
Your task is to complete and make a 6-8 min video presentation on the following:
Environment Setup
Deploy a VoIP server within a virtualized environment (e.g., using VirtualBox or similar). You may use any open-source VoIP platform (e.g., FreePBX, Asterisk) to simulate enterprise-grade communication capabilities.
Inter-Server Communication
Configure and establish communication pathways (e.g., SIP trunks) between two independent VoIP servers hosted on separate virtual machines.
Provision and register VoIP endpoints (softphones or virtual IP phones) on each server.
Demonstrate a successful call session between endpoints across the segmented network.
Technical Reflection
Summarize your implementation strategy, highlight any technical hurdles encountered, and explain how you addressed them.
Presentation Delivery
Your video should clearly articulate your design choices, configuration steps, and outcomes. Marks will be awarded for clarity, depth of explanation, and professionalism.
You may use any of the following software or software approved by your tutor. Additional marks may be gained by using advanced techniques not taught in the laboratories.
Assessment details
Assessment 3:
Introduction
You will submit work in assignment activities during the study period. This is an individual assessment.
Assignment 3 is a group assessment with 3-4 students in a group. Configure and demonstrate link aggregation using EtherChannel aggregation techniques, including PAgP and LACP, as Cisco and IEEE 802.3ad defined. Configure load balancing and redundancy techniques on physical switches to enable load balancing for WAN connections.
SDWAN simplifies the deployment and management of WAN connections, enabling the addition of multiple links between headquarters and branch offices. SDWAN can enable load balancing across multiple links, which balances the traffic load across the links and even provides resiliency in the case of a single link failure. However, when SDWAN is combined with load balancing, it becomes a potent option that brings branch offices better connectivity to the applications and data they need to run their local operations. Businesses can further enhance their edge connectivity by adding aggregation to the mix. Tunnel bandwidth aggregation maximises bandwidth use, ensuring that applications can perform at their best levels without hindering the performance of other applications competing for bandwidth.
Configure and demonstrate link aggregation using EtherChannel aggregation techniques, including PAgP and LACP, as Cisco and IEEE 802.3ad defined. Configure load balancing and redundancy techniques on physical switches to enable load balancing for WAN connections. Marks will be awarded based on the sophistication and difficulty of the demonstration. Submit the video on configuration and demonstrate the working features.
Your task is to complete and make a 6-8 min video presentation on the following:
Download and install the Cisco packet tracer. Create a topology according to Figure 1, configure addresses according to Table 1, or devise your own addressing scheme.
Demonstrate (narration of your actions recorded by video) demonstrate a working conversation.
Prepare the switches
Enable each switch as VTP Transparent Mode
Assign Access VLANs to the appropriate ports on each switch (SW1: int range fa0/5 - 6)
Repeat for fa0/7 - 8 and assign vlan 20, complete the same task on SW2. On SW3 assign fa0/5 - 6 vlan 30 and on SW4 assign fa0/5 - 6 vlan 40
Create Trunk links between switches MLS1: int range fa0/1 - 4
MLS1: switchport trunk encap dot1q SW1: int range fa0/1 - 2
SW2: int range fa0/3 - 4
test the default spanning-tree results for MLS1, SW1,SW2: sho spanning-tree vlan 1
Create Link aggregation
PAgP for EtherChannel between MLS1 and SW1
LACP for EtherChannel between MLS1 and SW2
Manual ON for EtherChannel between SW3 and SW4
Look at the spanning tree and verify that the port-channel interfaces have the least-cost path and that no ports are in a blocking state. This indicates that all uplink ports are in use. Check each switch.
Verify that EtherChannel is working.
Load Balancing
Check the default load balance method used
Change the load-balance method to src-dst-ip
Configure the Intervlan routing
Turn on routing for the MLS1 switch
Configure R1 with intervlan routing
Test successful pings from PC1-V10 to PC7-V20, PC10-V30, and PC12-V40. All pings should respond successfully. Otherwise, troubleshoot appropriate EtherChannel, trunks, and intervlan routing.
Show the output of extended ping and record the route. (Use show ip route, trace and extended ping commands)
Summarize your findings.
Present the results in a video presentation.
This is the Group assessment; therefore, every member must present his/her task in a single video presentation. Please submit the video presentation and demonstration explaining how you have completed all these tasks. Remember to turn on the camera and screen record. The
presentation should show all the configuration and workings of the assignment, and you will receive marks based on the marking rubric. The names of all the virtual machines should include your Student ID.
Additional marks may be gained by using advanced techniques not taught in the laboratories.
Submission Instructions
All submissions are to be submitted through Turnitin. Drop-boxes linked to Turnitin will be set up in Moodle. Assessments not submitted through these drop- boxes will not be considered. Submissions must be made by the end of session 5.
The Turnitin similarity score will be used to determine any plagiarism of your submitted assessment. Turnitin will check conference websites, Journal articles, online resources, and your peer's submissions for plagiarism. You can see your Turnitin similarity score when you submit your assessments to the appropriate drop-box. If your similarity score is of concern, you can change your assessment and resubmit. However, re-submission is only allowed before the submission due date and time. You cannot make re-submissions after the due date and time have elapsed.
Please Note: All work is due by the due date and time. Late submissions will be penalized at 20% of the assessment final grade per day, including weekends.
Assessment 4: Introduction
You will submit work in assignment activities during the study period.
This is a group project with 3 - 4 students in a group. You will critically compare and evaluate IAM and zero trust solutions. You will install and configure an IAM and zero trust solutions and analyse their operations and limitations. You will present your findings in a report and demonstrate your IAM and zero trust solutions.
Project Report
You will critically compare and evaluate IAM and zero trust solutions. You will install and configure an IAM and zero trust solutions and analyse their operations and limitations. You will present your findings in a report and demonstrate your IAM and zero trust solutions.
Students are to develop a network and explain its topology. There should be several virtual machines. To set up a larger virtual network, you may need to connect two or more computers together. Get AI-free online assignment help from experienced academic experts.
Your team has been assigned to simulate a secure enterprise network environment and evaluate two critical cybersecurity technologies: Identity and Access Management (IAM) and Zero Trust Network Access (ZTNA). These technologies are increasingly adopted by organizations to protect digital assets, enforce access control, and reduce the risk of breaches.
The objective of this project is to design and implement a simplified enterprise network using three or four virtual machines, deploy IAM and Zero Trust solutions, and critically assess their effectiveness. You will demonstrate how these systems manage user authentication, enforce access policies, and integrate with supporting infrastructure.
This project is designed to reflect real-world deployment scenarios while remaining feasible for students working on personal laptops.
Virtual Environment Requirements
You may use three or four virtual machines to simulate the following components as you are designing and implementing them.
Directory & DNS Server
Install either Windows Server (with Active Directory and DNS roles) or Ubuntu Server (with OpenLDAP and BIND DNS).
This server will manage user identities and provide name resolution across the network.
IAM Server
Install Keycloak or TheOpenEM on a Windows or Linux VM (Ubuntu recommended).
Configure user authentication, role-based access control, and integrate with the directory server.
Zero Trust Server
Install a Zero Trust solution (e.g., TheOpenEM or similar) on a separate Linux VM.
Configure device-based access control, segmentation policies, and secure login workflows.
Client Machine
Use Windows 10/11 or Ubuntu Desktop.
Simulate user login and access to protected resources.
Use this machine to test IAM and Zero Trust configurations.
Implementation Tasks
Install and configure IAM and Zero Trust platforms.
Integrate both with the directory server for centralized identity management.
Demonstrate:
User login and role-based access
Policy enforcement and segmentation
Secure access to resources from the client machine
You may use any of the following software or software approved by your tutor. Additional marks may be gained by using advanced techniques not taught in the laboratories.
Project Demonstration and Presentation
You will demonstrate and present your project in Assessment Item 4 at the end of the study period, and you will be assessed both as an individual and as a member of the group.