Student Name
Student ID
Student Signature
Assessor
Submission FER1 FER2
Result
Date
Assessor’s
Signature

Technical Support Level 5
Case Study Research
DAT536: Database Development and Design
Version 2, Level 5, Credits 20
Assessor’s Feedback
Submission
FER1
FER2
Instructions and Guidelines for Project Submission
Task completion
 Project will be judged on the basis of completeness, correctness and clarity.
 Complete ALL tasks.
 Warning: All media must be virus free! Media containing viruses or media that
cannot be run directly will result in a FAIL grade.
Format
 The report must have a title page with your name, class and ID number clearly printed.
 All written work must be done in size 12 font with 1.5 line spacing.
 All printouts must include your student ID (or group IDs) in the footer (printed).
 You may need to attach the task cover sheet found on Moodle to the front of the final
submission of your task (please confirm with your tutor).
Submission
 The completed assignment must be handed to the tutor at the beginning of the class
on the due date.
 Submit a printed copy of your report along with the soft copy. Tutor will inform you
on how to submit the soft copy.
Competency-based assessment FER and Re-enrolment
1. Students will have an opportunity to provide further evidence twice.
2. To be eligible for a FER the student must make a reasonable attempt at the questions/tasks in the
assessment.
3. Reasonable is to be defined as a response that at the very least attempts to address the
question/task.
4. Where the student does not make a reasonable attempt at ALL questions/tasks they will not
achieve and will be required to re-enrol in the paper.
5. A fee of $250 is payable for the second FER.
6. The need for further evidence from the students will be noted on the assessment as “FER” and
dated.
7. When the further evidence is deemed adequate the “FER” notation will be crossed out, initialed
and dated.
8. If a student is still deemed not yet competent after the second FER they will be required to re-enrol
in the paper. A fee will apply for re-enrolment and details will be available in the Programme
Handbook, and students will be informed of them at the start of the programme.
9. Additional FER’s are at the discretion of the Head of Faculty.
Reconsideration of Assessments and Appeals
1. Students have the right to a reconsideration of assessment or appeal if they believe an
assessment has been incorrectly marked or graded.
2. The request for reconsideration must be made in writing to the Head of Faculty within five (5)
working days of the return of the assessment. A fee of $40 per assessment applies.
3. Students must be informed that, as a result of the reconsideration of assessment, their result
may be unchanged, raised or lowered.
4. The reconsidered result will be recorded as the final result. Students retain the right to appeal
this result.
Plagiarism
 By submitting your assignment, you agree to Aspire International policy on ‘Academic Dishonesty
and Plagiarism’. Assignments completed using unfair means or plagiarised material will receive a
FAIL grade.
 All tasks must be done in your own words and referenced.
Feedback
 You may request feedback from your lecturer to verify the accuracy of your marks.
Learning Outcomes covered:
1. Apply a broad operational knowledge of database administration to
meet typical organizational data storage and retrieval requirements.
Case Study Scenario:
The UniPharma chain of pharmacies has offered to give you a free lifetime supply of medicine if you
design its database. UniPharma is a small medium enterprise (SME) in terms of company structure
and has four (4) pharmacies in the Auckland region. Being an SME, they would like to keep their
costs down but also to have an efficient solution to manage their back-office administration. Here
is some more information to help you out with the case study:
• Patients are identified by a Social Security Number (SSN), and their names, addresses, and
ages must be recorded.
• Doctors are identified by an SSN. For each doctor, the name, specialty, and years of
experience must be recorded.
• Each pharmaceutical company is identified by name and has a phone number.
• For each drug, the trade name and formula must be recorded. Each drug is sold by a given
pharmaceutical company, and the trade name identifies a drug uniquely from among the
products of that company. If a pharmaceutical company is deleted, you need not keep track
of its products any longer.
• Each pharmacy has a name, address, and phone number.
• Every patient has a primary physician. Every doctor has at least one patient.
• Each pharmacy sells several drugs and has a price for each. A drug could be sold at several
pharmacies, and the price could vary from one pharmacy to another.
• Doctors prescribe drugs for patients. A doctor could prescribe one or more drugs for several
patients, and a patient could obtain prescriptions from several doctors. Each prescription
has a date and a quantity associated with it. You can assume that, if a doctor prescribes the
same drug for the same patient more than once, only the last such prescription needs to be
stored.
• Pharmaceutical companies have long-term contracts with pharmacies. A pharmaceutical
company can contract with several pharmacies, and a pharmacy can contract with several
pharmaceutical companies. For each contract, you have to store a start date, an end date,
and the text of the contract.
• Pharmacies appoint a supervisor for each contract. There must always be a supervisor for
each contract, but the contract supervisor can change over the lifetime of the contract.
1. As the Database Administrator (DBA) write down the relational schema for at least
5 tables of the database in terms of the company’s structure.
2. Draw an ER diagram that captures the preceding information. Identify any
constraints not captured by the ER diagram.
3. How would your design change if each drug must be sold at a fixed price by all
pharmacies?
4. As a part of the UniPharma change management plan how would you
administer changes if the design requirements are as follows:
If a doctor prescribes the same drug for the same patient more than once,
several such prescriptions may have to be stored.
5. UniPharma is concerned about weekly data backup. Formulate and briefly
describe a data backup plan.
Each of the 4 UniPharma pharmacies have a Pharmacy Manager, a data entry operator,
an accountant, 2 pharmacists and database administrator. Keeping this company
hierarchy in mind please answer the following questions6. Describe access privileges level of the five (5) employee types of UniPharma in the
database? and who is the person deciding the access privilege levels?
7. Being the DBA, you have to provide different access levels to the employees;
mention any three (3) access related.
8. Recently 100 tables were updated in the database after new products came in. As
a Database Administrator, what tasks will you perform to ensure consistency of the
database?
9. DBMS is a highly complex system with hundreds of transactions being executed
every second. UniPharma is concerned if it fails or crashes in the middle of
transactions, it is expected that the system would follow some sort of technique to
recover lost data. Discuss categories of failures and methods to formulate a
recovery plan.
Evidence and Judgement Statements
Task
No.
Evidence Judgement Criteria Submission FER1 FER2
1 The candidate shows the
relational schema of the
company’s database in relation
to the case study.
The candidate shows relational
schema of the five tables of the given
company. The candidate clearly
mentions the logical entities in the
table.
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.
2 The candidate shows the ER
diagram.
The candidate has clearly presented
the ER diagram. The relevant entities
and the attributes have been logically
created. The relationships between
entities, cardinalities and constraints
have been clearly identified.
Task
No.
Evidence Judgement Criteria Submission FER1 FER2
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.
3 The candidate analyses the
design change in the database
system in relation to the case
study.
The candidate has added and deleted
the correct attributes. The
candidate’s answers may vary but
must cover defining concepts as per
assessment schedule.
4 The candidate manages the
change management plan
according to the company’s
requirement in relation to the
case study.
The candidate has created the right
entity sets and has also identified the
relationships.
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.
5 The candidate formulates the
weekly data backup plan with
brief description.
The candidate clearly mentions and
explains the backup techniques.
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.
Task
No.
Evidence Judgement Criteria Submission FER1 FER2
6 The candidate lists down and
explains the access privilege
level of the employees.
The candidate clearly describes the
access privilege levels for at least five
employees types and identifies the
right decision maker.
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.
7 The candidate lists down the
access related commands to
each employee
The candidate lists and explains at
least three access related commands.
8 The candidate maintains the
consistency of the database
after updating the database as
per the case study scenario.
The candidate clearly mentions and
explains all MySQL statements.
9 The candidate lists several
database failure techniques
and mentions the recovery
plan.
The candidate clearly explains the
database failure techniques and
recovery plan.
The candidate’s answers may vary
but must cover defining concepts as
per assessment schedule.

Posted in Blog

Autumn 2020 300575 Networked Systems Design 1
300575 Networked Systems Design:
Network Design Assignment 2020S1
DUE DATE: Friday 5 June 2020 by 17:00 (Submission via vUWS)
Autumn 2020 300575 Networked Systems Design 2
Overview and Objectives
In this assignment you will design an enterprise scale network using the skills and knowledge gained in this
unit and its prerequisites. This assignment is not a trivial task. To complete it as outlined with all the required
documentation will be a significant task.
The assignment scenario describes in general terms, the network that is to be designed. Following the
scenario, the assignment is broken into a number of sections (phases), each of these phases has a detailed
list of requirements. It is important to read and understand each requirement to make sure that the assignment
is completed accurately.
The following tasks are required to complete the assignment:
• Design the network using the diagram and accompanying requirements
• Simulate and test the network using the network simulator tool Cisco Packet Tracer (v7.2.1)
• Correctly configure single area OSPF protocol
• Correctly configure VLANs and 802.1q trunking
• Correctly configure PPP and PPPoE
• Correctly configure DHCP
• Correctly configure GRE
• Correctly configure NAT and PAT
• Create and apply access control lists on the appropriate routers and interfaces
• Verify that all configurations are operational and functioning according to the scenario guidelines
• Provide documentation and configuration files as detailed in the following sections and phases.
Autumn 2020 300575 Networked Systems Design 3
Scenario
Introduction
MegaCon is a company based in the Campbelltown area. Recently, they have opened another site at
Parramatta which will be used to support a number of engineers. Because the engineers are frequently
required at customer sites, they are expected to be working away from the Parramatta office much of the time.
The business has grown rapidly; a proof of concept has been created, the infrastructure design has been
planned and more engineers have been hired to scale the product. This new model will require a larger
location for day-to-day management as well as a number of secure connections between home locations of
newly appointed staff.
It is your task to analyse all the requirements and to develop a report that specifies the implementation of the
requirements, offering realistic alternatives where possible (Final Report). This report will be used as the basis
for a redeveloped network as MegaCon grows.
Your will be required to bench test the design to provide a “proof of concept” to ensure your solution will cater
to MegaCon’s needs. This is an important step because it is essential to understand if the solution will work
correctly before committing contractually to delivering this project. Bench testing in this case will be done with
Cisco’s software emulation package, Packet Tracer Version 7.2.1.
Requirements
Being a growing company, the initial network topology was just a simple router, switch and internet
connection. With the rapid growth generated through hiring developers, MegaCon has managed by
purchasing additional switches and daisy chaining them to create a single flat network.
MegaCon’s Network Requirements
Scalable design which will facilitate business expansion.
Seamless connectivity between their main campus at Campbelltown (Cam1, Cam2 and Cam3) and the newly
opened office at Parramatta (Par).
Secure communication to cloud storage location (reached via ISP).
MegaCon’s Internet Service Provider (In-Tel) will be providing a WAN solution and will be supplying your group
with specific information and partial configuration to assist with bench testing.
Technical consultants have assisted MegaCon in translating the above network requirements into the following
sections, which contain technical requirements you need to incorporate into the solution.
Autumn 2020 300575 Networked Systems Design 4
Section 1: Basic Network
Figure 1: Basic network diagram (proposed topology)
Basic Configuration Requirements
• Configure device names as shown in the topology.
• Disable DNS lookup.
• Disable HTTP on all routers and switches.
• Enable SSH on all router and switches. Use the device name as the username and cisco as the
password on all devices.
• Configure logging synchronous for the console and VTY lines.
• Configure a MOTD banner to warn users that unauthorized access is prohibited.
• Device Security
o Encrypt the plain text passwords.
o Assign class as the privileged EXEC mode secret password.
o Assign cisco as the console and VTY passwords for login.
• For testing purposes MegaCon advises their WAN provider, In-Tel, has set clock rate for all external
WAN serial links to 128000 kbps.
• Configure the IPv4 and IPv6 addresses as listed in the Addressing Table.
ISP
Cam1 Cam2
Cam3
Par
NMPC
Liv
PSW
SwB
SwM
PCP
SPC
LPC
SwT
Autumn 2020 300575 Networked Systems Design 5
Topology Diagrams
When your network design has been finalised you will be required to provide an accurate and detailed logical
and physical topology diagram.
The logical diagram should accurately reflect the implemented addressing scheme.
The physical diagram should include but not be limited to the following:
• Internetworking devices and interface details.
• Link networks and IP address information.
• Routing Domains and static route details.
• Switching details and features e.g. STP, Channel Ports, VLAN information.
The physical topology diagram should be complete enough to allow a third party, for example a network
contractor, to install and configure the network without any additional documentation.
Section 2: Network Addressing
IP Address Scheme
MegaCon will be using the following addressing schemes:
Address Type Address Owner
IPv4 Private Address Allocation 10.100.0.0/19 MegaCon
IPv6 Address Allocation 2001:1:10::/52 MegaCon
IPv4 Public Address Allocation 200.200.0.0/28 Must be allocated across Cam1 and Cam2
IPv4 ISP Point-to-point Cam1 link 90.1.1.0/30 ISP
IPv6 ISP Point-to-point Cam1 link 2001:60:1:1::/64 ISP
IPv4 ISP Point-to-point Cam2link 90.1.2.0/30 ISP
IPv6 ISP Point-to-point Cam2link 2001:60:1:2::/64 ISP
ISP Lo1 for IPv4 5.5.5.5/32 ISP
ISP Lo1 for IPv6 2001:5.5.5.5::5/128 ISP
ISP Lo2 for IPv4 6.6.6.6/32 ISP
ISP Lo2 for IPv6 2001:6:6:6::6/128 ISP
Table 2: IP address block allocations
A data centre provider has been asked to lease some of their public address space for MegaCon’s data centre
infrastructure. In-Tel will provide an internet tail (link) through serial connections to Cam1 and Cam2 and
advertise this address space to the Internet. To achieve this there will be a static route implemented using the
point-to-point link public address space provided in Table 2.
Network Specifics
• All routers, switches and PCs are dual stack devices.
• OSPF router ID will come from the private IPv4 internal addressing.
• PPPoE links between all users on Eng networks and Par will come from internal addressing. Allocate
address space and consider how this can be routed within the network.
• Ensure route aggregation has been built in to the addressing scheme for scalability.
• Gateway addresses will be assigned the first usable address in each subnet for both IPv4/6.
• Router interfaces for IPv6 will use static link-local addressing (keeping the addressing simple).
• MegaCon’s network manager PC (NMPC) is physically connected to the switch SwM. NMPC uses the
last address on the Management VLAN.
Host Requirements
Campbelltown will use IPv6 addresses which are dynamically assigned through SLAAC.
VLAN Information
VLSM is NOT required. An industry standard of /24 addressing for internal IP scheme is desirable. However,
when that is not feasible, larger networks may be used.
Autumn 2020 300575 Networked Systems Design 6
Site VLANs Required
Cam1, Cam2 and Cam3 Accounting/Marketing/Sales/Office
Par Parra Office / Engineering
Both sites Native / Management / Blackhole
Table 3: VLAN Information List
NOTE
Network addressing scheme should take into account route summarisation.
Addressing Requirements
VLAN Host Requirements Growth
Accounting 50 Hosts Yes
Marketing 75 Hosts Yes
Sales 150 Hosts Yes
Office 200 Hosts Yes
Management 5 Hosts (per site) No
Parra Office 40 Hosts Yes
Engineering 20 Hosts Yes
Table 4: Current Host Addressing Requirements
MegaCon expects that it will have to provision for doubling of the sizes of most of its VLANs over the next two
years.
Section 3: Network Switches
MegaCon is moving away from their ad-hoc switch design to a more hierarchical and scalable design. The
deployment of the following technologies should “future proof” the business for further expansion as required.
VLAN Requirements
Switch access ports allocation is three ports per VLAN per switch.
Assign VLAN 100 as the Management VLAN and Native VLAN.
Any unassigned ports are to be placed into a “Blackhole”, an unused and non-routed VLAN (VLAN 999).
Additionally, these ports should be disabled and the vlan deleted.
Allow only configured VLANs to be permitted on trunk links.
Switching Technologies
Enable rapid-PVST+ on all switches.
Manipulate Spanning Tree to load balance VLANs between all HQ switches.
Implement EtherChannel between SwM and SwB. Justify your choice of EtherChannel method chosen.
Implement First Hop Redundancy (FHR) using HSRP on Cam1 and Cam2. Load Balance Active
and Standby between these two physical routers.
Section 4: Network Routing
With the flexible IP address scheme created for MegaCon, integration of the newly created environment using
OSPF is to be deployed throughout.
Routing Requirements
Inter-VLAN Routing: Layer 3 routing at the Campbelltown virtual router and router-on-a-stick at Parramatta.
Summarisation to be implemented where possible with OSPF.
OSPF Router IDs allocated from internal IPv4 addressing.
For best practice and security reasons, unnecessary routing updates shall be prevented.
OSPF Requirements
Configure OSPF throughout the routing domain.
OSPF routing updates and adjacencies between Sydney and Parramatta must occur over the GRE tunnel.
Autumn 2020 300575 Networked Systems Design 7
NOTE
A functional GRE tunnel (in Section 5) is required for exchanging OSPF routes successfully between
Parramatta and Sydney. (While preparing your implementation, you may wish to use static routes temporarily,
for testing purposes.)
Section 5: Security and Monitoring
The following security measures are to be imposed, for both IPv4 and IPv6 addresses:
Users on the Sales VLAN are not to be permitted to access any networks outside their own VLAN.
Users on the Engineering VLAN are permitted to reach of users on their VLAN and the Internet.
NMPC is the network manager’s PC. Ensure that it is the only device which can manage
MegaCon’s routers and switches
NMPC should maintain a log file of all security violations. Unauthorised attempts to connect to either switch
SwT or switch SwB should be reported to NMPC.
Section 6: WAN
For redundancy, an alternate link to ISP is required from Cam2 Router. Because In-Tel cannot guarantee that
its interface on this link will be provided by a Cisco router, MegaCon will have to use PPP with CHAP
authentication on this link.
To improve load balancing, this link must be used for those VLANs for which Cam2 is the Active router.
Appropriate floating static and default static routing is required for this implementation. The two loopback
addresses on ISP will represent cloud storage, and for this exercise it is sufficient that all internal hosts can
successful ping these two loopback addresses using both IPV4 and IPv6 addresses.
To simplify later integration of the Sydney and Parramatta sites, a Virtual Private Network (VPN) is planned.
Even though the link between the two sites is a private network, a business requirement dictates the tunnel
must be encrypted to ensure sensitive data cannot be intercepted by any means.
Your group will demonstrate VPN technology using a GRE tunnel connecting routers Cam3 and Parra. Thus,
addressing this key business requirement, and solving a complex design issue but more importantly instilling
confidence through your technical ability.
To provide home user access PPPoE will be implemented. For the demonstration a single PPPoE connection
is required. However, the addressing and routing should be designed to allow 10 simultaneous PPPoE
connections (this functionality can be demonstrated by LPC which is connected to router Liv, In Figure 1).
To provide internet connectivity and public addressing for webservers Network Address Translation (NAT)
needs to be configured on the border routers at Campbelltown. Public addressing has been leased (see
Section 2) and subnetted from the Data Centre’s public address blocks. This address space will be advertised
to the Internet by In-Tel and traffic redirected back to MegaCon’s network via floating static routes.
WAN Requirements
Statically assign IP addressing for the connecting router’s interfaces.
Site to Site Connectivity
The point-to-point VPN tunnel will use private addresses and will terminate at Cam3 and Parra.
Enable OSPF routing to exchange routes over the tunnel.
Ensure traffic is flowing through the tunnel interfaces not the carrier link.
Network Address Translation (NAT)
All devices within MegaCon’s network are expected to have internet connectivity using the given address
range with overloading.
Internet is to be simulated by a loopback interface on the ISP router.
NOTE
NAT functionality can be tested by simply pinging the ISP loopback (inside-out).
Autumn 2020 300575 Networked Systems Design 8
Deliverables:
1. Documentation
Your documentation must be of a professional standard and conform to the following:
• Formatted for A-4 paper;
• Arial font;
• Minimum main body text font size 10pt;
• Minimum diagram font size 6pt;
• Maximum of 10 pages NOT including any Appendices.
Your documentation at a minimum should contain the following sections:
• Title Page;
• Table of contents;
• Introduction;
• Network Design Summary;
• Logical Diagram;
• Summary Addressing Table/s;
• Network Design Details – Provide all the required information for all the devices in your network design
in a tabular form.
• Appendices containing
• Complete device configs
o Separate highlighted ACLs configs for all relevant devices with comments and descriptions
o Separate highlighted DHCP config/s for all relevant devices with comments and description
o Separate highlighted NAT config/s for all relevant devices with comments and descriptions
2. Files to upload
A single zip archive file must be uploaded to vUWS on or before the specified due date and time (17:00
07JUN2019).
The zip file name must adhere to the following convention:
First name initial followed by last name initial followed by student ID followed by “.zip”
Eg Kim Smith with the student ID 12345678 would name their archive file “KS12345678.zip”. The zip archive
file must contain the following files:
A PDF fie containing your documentation, with the file name adhering to the following convention:
First name initial followed by last name initial followed by student ID followed by “.pdf”
Eg Kim Smith with the student ID 12345678 would name their documentation file “KS12345678.pdf”
Cisco Packet Tracer (v7.2.1) file/s for the assignment in the most current version of Cisco Packet Tracer
(v7.2.1) format. With the file name/s adhering to the following convention:
First name initial followed by last name initial followed by student ID followed by “.pkt”
Eg Kim Smith with the student ID 12345678 with two Cisco Packet Tracer (v7.2.1) files would name each file
as follows “KS12345678_1of2.pkt” & “KS12345678_2of2.pkt”.
Any file format other than a single zip archive with a file name that does not adhere to the naming convention
OR that does not contain the required files in the specified formats and filenames is NOT acceptable and will
have a mark of zero (0) automatically be awarded.
Multiple submissions will be allowed however only the last submission will be assessed. Submission made
after the due date and time will incur a penalty as outlined in the unit learning guide in the section on “Late
Submission” under section “2.6 General Submission Requirements”.
You must NOT include an assignment coversheet with your upload. When uploading your submission to vUWS
you will certify that:
• you hold a copy of this assignment if the original is lost or damaged,
• you hereby certify that no part of this assignment or product has been copied from any other students
work or from any other source except where due acknowledgment is made in the assignment,
• no part of the assignment/product has been written/produced for me by any other person except
where collaboration has been authorised by the subject lecturer/tutor concerned,
Autumn 2020 300575 Networked Systems Design 9
• you are aware that this work may be reproduced and submitted to plagiarism detection software
programs for the purpose of detecting possible plagiarism (Which may retain a copy on its database
for future plagiarism checking.)
• you hereby certify that no part of this assignment or product has been submitted by you in another
(previous or current) assessment, except where appropriately referenced, and with prior permission
from the Lecturer/Tutor/Unit Coordinator for this unit.
Autumn 2020 300575 Networked Systems Design 10
Marking Scheme:
The quality of your deliverables will be evaluated with the following rubric.
CRITERIA Unsatisfactor
y (0%)
Poor
(25%)
Good
(50%)
Very Good
(75%)
Excellent
(100%)
Network
Design/Addressin
g Scheme
25 Marks
Does not
meet any
requirements.
Only just meets
basic
requirements.
Does not account
for growth in any
way. Inefficient
use of available
address space.
Meets basic
requirements.
Accounts for
growth in some
way. Not an
optimal use of
available
address space.
Meets most
requirements.
Accounts for
growth in some
way. Efficient
use of available
address space.
Meets all
requirements.
Accounts for
growth in an
optimal way.
Most efficient
use of available
address space.
Presentation
20 Marks
No
documentatio
n provided or
does not
contain any of
the minimum
required
sections.
The
documentation is
simple and not of
a professional
standard. Hard to
read and
understand or
does not contain
all of the
minimum
required sections.
The
documentation
contains all of
the minimum
required
sections
however it is
simplistic and
only just of a
professional
standard. It is
hard to read
and understand.
The
documentation
is of a
professional
standard, however its
layout is not
optimal or it is
not easy to
read or
understand.
The
documentation
is of a
professional
standard. It is
well written
and clear with
a layout that is
easy to read
and
understand.
Use of Diagrams
10 Marks
No
diagrams
used.
Inaccurate logical
diagram and/or
Illegible or
irrelevant
diagrams.
Accurate logical
diagram poorly
executed.
Accurate
logical diagram
well executed
no other
diagrams used
or do not add
to the
understanding
of the design.
Accurate
logical diagram
very well
executed and
uses diagrams
that aid in the
understanding
of the design.
ACLs
20 Marks
ACLs not
implemente
d
ACL rule
inaccurately
defined and
applied.
ACL rule
accurately
defined but
inappropriately
applied.
ACL rule
accurately
defined and
appropriately
applied but not
optimally.
Optimal ACL
rule accurately
defined and
appropriately
applied.
Packet
Tracer
Implement
and Test.
25 Marks
No Packet
Tracer
implement and
test or the
Packet Tracer
Implementatio
n does not
match the
submitted
design or
given
requirements.
Packet Tracer
Implementation
matches the
submitted design
and given
requirements
however it is
poorly laid out
and not
configured
correctly.
Packet Tracer
Implementation
matches the
submitted
design and
given
requirements
and is well laid
out however not
more than 60%
of the required
configuration
items are
configured
correctly.
Packet Tracer
Implementation
matches the
submitted
design and
given
requirements
and is well laid
out however
not more than
80% of the
required
configuration
items are
configured
correctly.
Packet Tracer
Implementation
matches the
submitted
design and
given
requirements
and is well laid
out with more
than 80% of the
required
configuration
items
configured
correctly.
TOTAL
100 Marks
Appendix 1 Tables
Sample Table A.1 IPv4 Subnetting Table
Subnet
Number Subnet Address Subnet Mask Hosts Required Maximum Hosts in
Subnet
Percentage
growth
In Uses
(Yes or No)
Network
Name
Sample Table A.2 IPv6 Addressing Table
Network
Number IPv6 Prefix/Prefix length
In Uses
(Yes or No)
Network Name
Sample Table A.3 Device Interface IP Addressing Table
Device Interface IPv4 address Subnet Mask IPv6 Address/Prefix Length
ISP
SwT
SPC
LPC
PCP
SwM
SwB
PSW
Liv
MPC
Par
Cam3
Cam1 Cam2
ISP

Posted in Blog

Faculty of Science, Engineering and Technology
CVE20002 Computer Aided Engineering Civil, Semester 1, 2020
Project Brief:
Each group should have a maximum of 2 students. You need to prepare detailed multilevel
building with appropriate furniture and other external and internal features. In this project,
your group is assigned to design a four-level office building utilizing a land of 25m x 40m.
An extensive and efficient utilization of Autodesk Revit software in design is required parallel
to the weekly lab sessions. Furniture and other related objects can be imported from furniture
families within the Revit software to reflect the environment inside the building. Design of a
staircase is required for easy access among all the levels. To assist you with this task, it is
recommended to follow the unit tutorials to achieve your desired objectives. Project work will
be reviewed by your tutor in class every week and he/she will show you examples of previous
group works.
The submission due date is 5th of June 2020 end of the day.
Technical details:
You need to consider the following details in the design:
– The building covers 65% of the land.
– Level height is 3.5m for all levels (ground, first, second and third floors). The ground floor
should be different to all other levels.
– The column size is 300 x 600 mm for rectangular column or 450 mm for circular column.
– The distance between two columns should not be more than 7.5 metres.
– Concrete beams have width of 300mm, and depth of 400 mm and the slab thickness is
120mm.
– Structural foundation slab is to be used with 500mm depth.
– Car parking is to be considered with maximum of 10 parking spots.
– You may use the rest of the area for landscaping.
Deliverables:
The submission should include online submission with following details:
Cover page
a. Student names b. ID numbers c. year, subject code, day and time of class attended
Revit 3D modelling of the building, rendered model and drawings,
Model the complete building in Revit using the knowledge acquired in the tutorial sessions.
In order to present the model effectively, you need to create architectural and structural
drawings sets. Rendering is a great feature which is utilized to showcase your project to your
clients with some realistic views. A soft copy of the Revit model must be attached as
instructed in the submission requirements. You need to submit the drawing sheets for the
plans, elevations, sections and 3D rendered model.

Posted in Blog

COIT11134 Object Oriented Programming (T1 2020) Assignment 2

Due date: Friday of Week 10 (11:45 pm AEST)
Weighting: 20%
Length: N/A

Objectives
This assignment is designed to assess the following learning outcomes.
• Implement object-oriented programs using a modern programming language
• Build interactive software applications using Graphical User Interface components
• Apply self-designed and existing algorithms in problem solutions
• Use complex data structures in software application development
Introduction
This is an individual assignment.
Assignment Task
As part of Assignment 1, you have developed a Java Application for the CQS Solar Power Installers (CQS). CQS has accepted your prototype and has requested you to improve the system by providing the following additional functionalities:
• When the system is started, it should load the data from the relevant file(s) and display the details of the installations that have been already entered into the system (there must be three prestored installation and three preinstalled technician in file). This should include Building Address, start date, end date, and installation design.
• Display the installations that have been performed by a technician chosen by the user.
• Save the data (technicians and installations) in relevant files.
You can continue to develop the Java GUI application that you have created in your Assignment 1. You are also allowed to use the Assignment 1 sample solution that will be released on the Unit web site. If you would like to modify the first part of the application that you have submitted in your Assignment 1, you are free to do so. You can adopt any layout patterns that are suitable for the requirements of the system in this assignment.
Note: During the initial run of your application, your application should read the data from the required file(s). During the subsequent program runs, your application should append all the new data entered by the user into the relevant files.
In order to include these additional changes in the application, you may need to do any or all the following:
• develop additional Java classes
• extend the existing Java classes that you have developed for your Assignment 1
• implement newly created java interface(s)
• Implement file reading and writing.
• Use search algorithms

Note: If you need to make suitable assumptions for the development of the above Java application, please provide them in the form of comments in the test driver file.

GUI Design
You are encouraged to use any layout pattern to implement the user interface. You may need additional controls such as Command Buttons for ‘Load’, and ‘Save’. You may need to use a ComboBox to display the list of Technicians.
Assignment submission
1. You must submit your assignment using the Moodle online submission system.
2. You must submit a zip file containing the text file(s)/csv files(s) and all java source code files including the test driver file (any additional library/jar files used if any).

Assignment 2 Marking criteria
Item Description Maximum
marks
1 Runs without any compilation/ run time errors (2). Displays the controls for additional ‘Display’ or Load and ‘Save’ functionalities (1) 3
2 Reads and stores the input data from the relevant files into suitable data structure 2
3 Allows to select a technician (1) and displays the details of installations performed by that selected technician (2) 3
4 Displays the details of all installations in the subsequent runs 2
5 Saves/appends the data into the relevant files 3
6 Uses Exception handling and provides appropriate error messages 2
7 Student used additional classes and or java interfaces (3); Used best programming practice (comments, indentation, naming and readability) (2) 5
Less late penalty (5% per calendar day)
Less Plagiarism penalty
Total 20
Note: If the program does not compile/run, partial marks may be given based on the submitted-source codes.

Appendix
This section presents information on setting standards and assessing teamwork, setting assessment specific academic integrity guidelines for programming assignments.
1.1 Academic Integrity – getting assistance and source code
This assignment is your chance to obtain the learning outcomes as given under objectives. It is important that you develop skills and deeper understanding of the concepts. You are permitted to use certain resources for completing this assignment as given in the table below. Use of resources outside of what is listed below will be a hurdle in your learning and required development of skills.
The scale of assistance students can get is clearly marked based on the students’ level of mastery and expected learning at various levels.
Note: You can use these as appropriate to the unit you are writing assessments.
The objective is to understand several concepts and apply those concepts to design and build a software solution. At this level you can use the provided materials, online resources for further reading and take assistance from your classmates or teammates to develop deeper understanding of the concepts. You can also sort help to debug the implemented program. But you should implement and test your program on your own.

Unit Textbook, Unit notes and examples Understanding concepts, design
Instructors Understanding concepts, design, debugging
Teammates (in case of teamwork) Understanding concepts, debugging
Classmates, Online resources Understanding concepts,
Everyone else Understanding concepts
No help acceptable Implementing code

Posted in Blog

Global Warming: Fact or Fiction?
Adelaide temperature data analysis
In this exercise you will analyse data about a temperature in Adelaide city. The data was collected by Australian Bureau of Meteorology – the best source of the climate related information in Australia. Two presented data set contain information about daily maximal and minimal temperatures for Adelaide weather station 023034 at Adelaide Airport. You can find these and other locations data at http://www.bom.gov.au/climate/data/index.shtml?bookmark=200
Q 1: You must complete the exercise and provide answers on the following points:
 Write an introduction about what type of analysis you plan to execute. Provide a brief data description: what are your data about; how many variables and observations there; what are highest and lowest temperatures were observed and when?
 Make a function to calculate and (nicely) present descriptive statistics (mean, standard deviation, skewness, kurtosis, median, IQR) for a given month and year. Run it for a maximal temperature for any month of 1961 and 2019. Compare results and discuss. Present appropriate data visualisation to support your discussion.
 Combine two data sets together and calculate a daily range between maximal and minimal temperature. Get an average range for each year, discuss its distribution and change over the time. Provide appropriate data visualisation to support your discussion.
 Count number of days per year with maximal temperature above 35 degrees. Build a graph. Discuss your observations.
 Select and justify a threshold for a minimal temperature and repeat step 4 for the number of days below the chosen threshold.
 Combine results from steps 4 and 5; discuss your finding and implications for the question of climate change.
 Write a conclusion outlining your analysis and results.
You should write the report in MS Word format and R-script with the code.

Posted in Blog

ITECH7201 Software Engineering: Analysis and Design (2020/07)
CRICOS Provider No. 00103D Page 1 of 5
Assignment 2
Overview
For this assignment, you will logically extend the functionality of the Maze Game introduced during the
lectures, via the modification of the code base as well as documentation and implementation of various
user stories.
Timelines and Expectations
Percentage Value of Task: 20%
Due: Sun, Jun 7, 2020 – 23:55 (Week 11)
Minimum time expectation: 20 hours
Assignment Type: Group (2 Students in each group)↓

In case of an exceptional situation (if the number of students in a group is 3), the group should take special permission
from the Lecturer.
Learning Outcomes Assessed
The following course learning outcomes are assessed by completing this assessment:
 Understand the significance of detailed project planning and control, good communication and
documentation and the use of appropriate tools in order to provide a quality product
 Understand the distinction between software engineering and programming, and thus the
distinction between a software configuration and a program.
 Understand the methods and techniques involved in designing, implementing and maintaining
an information system, in particular using an object-oriented approach
 Understand how unit tests are used during software development to assist in agile programming
techniques such as refactoring and demonstrate skills in designing Unit tests
 Work together in small teams to complete a fully documented, detailed design and
implementation of a small business information system
 Demonstrate skills in designing and implementing an information system
Assessment Details
You are required to logically extend the functionality of the Maze Game introduced during lectures, via
the modification of the code base as well as documentation and implementation of various user stories.
You will use the Boost methodology discussed during lectures, which requires the use of pair
programming. All documentation, other than the customized game map, must be completed individually.
The codebase provided for this assignment has already implemented the “warm-up” and some “sets”.
You will be implementing numerous other “sets” for this assignment using the Boost methodology. The
“warm down” stage is not required.
CRICOS Provider No. 00103D ITECH_7201_2020-07_ Assignment-2.docx Page 2 of 5
You are free to take ideas discussed during lectures and implement these in your own version of the
codebase provided in Moodle for this assignment.
This assignment will be marked according to the functionality of your code, in addition to the elegance
and extensibility of your design and the quality of your documentation.
Note: It is recommended that you spend some time familiarizing yourself with the provided code base
prior to beginning any work on this assignment. You should start by spending some time exploring the
structure of the code to gain an understanding of the roles each class plays within the system and then
complete Lab 7-8.
Assignment Requirements
In Pairs:
1. Design and implement a custom environment for your maze game. This requires producing
your own unique hand-drawn map of the maze game environment and changing the
HardCodedData file to reflect the locations and items on your map. At least M (M>=4) locations,
including exactly N (N>=3) shops with a condition M>N, must be included, as well as enough
items to allow for proper testing of the game functionality. For example, there must be sufficient
items to verify that a player cannot collect an item if the weight restriction has been met. Note:
you should not retain the original locations or items from the provided codebase in your version
of the game.
2. Implement each of the following deliverables/milestones:
a. functionality as detailed in Lab 7 and Lab 8
b. commands to manage the various item management commands:
i. listItems, getItem, and dropItem, to allow the listing of all held items, collect a new
item, and drop a held item.
ii. equipItem and unequipItem, to wear/wield a held item, and to stop wearing or
wielding an equipped item.
iii. purchaseItem and sellItem, to buy an item from a vendor and to sell an item to a
vendor.
iv. getmazestatus to show the status of the maze (i.e., the value of M and N)
Ensure that weight restrictions are not exceeded and that the context for each command is
appropriate. For example, purchasing and selling of items should only occur in a shop.
c. Basic combat functions, allowing a player to attack or to be attacked by a non-player
character (NPC). A player may flee combat or continue to attack until such time as one
combatant loses all life points. The end result must not be hard-coded, and neither the
hostile NPCs nor player may have their attributes configured in such a way that the final
outcome is pre-determined. Note that combat functions should only be available when the
player is in the presence of a hostile NPC, and combat may take whatever form is
appropriate for your game context rather than being limited to just hits with a weapon.
d. Collectable items that, when used, restore life points to a player. The number of life points
regained should be determined by the roll of 2 six-sided dice up to the player’s maximum
health. You can elect to allow these to be used during combat if you wish.
CRICOS Provider No. 00103D ITECH_7201_2020-07_ Assignment-2.docx Page 3 of 5
3. Write 3 (Three) Unit test cases for each of the methods you are developing in this assignment.
You can write the test cases in any Java framework, but Junit is preferred.
4. Prepare a short Power-point presentation to demonstrate your software/program as if you are
going to sell this software/program to a prospective customer. The Power-point presentation
must contain the following items:
i. A demonstration of the game – how the game play works and how this was
implemented.
ii. Explanation of the role of design patterns in the game, clearly identifying the
functionality where design patterns have had an impact and how this has occurred.
iii. An analysis of the use of a development methodology in creating the game
describing how did this assist, or make the development of the game more
complicated.
This presentation will be assessed based on the clarity and accuracy of the explanations and how clearly
it demonstrates an understanding of how the game was coded, the design patterns used, and the impact
of using a development methodology.
Individually:
1. Prepare an individual report, to be submitted as a Word document or a PDF, which includes:
a. The student number and name of each person on your team (including yourself)
b. User stories for each of the deliverables/milestones
c. Class diagrams for Lab 7 and Lab 8
d. Sequence diagrams for two (2) of the item management commands, taken from separate
groupings (i.e. you will not get credit for both getItem and dropItem as they are both in
group i)
e. A statement of your own personal contribution to the assignment
f. A statement of your partner’s contribution to the assignment.
Do not work with your partner or any other person to complete your individual report. These must
be unique and your own work.
Please note that assignments will NOT be marked and zero marks will be allocated if the individual
statements of personal and partner contributions are not submitted.
Submission
Each student must submit a single zip file that contains all assignment files in the Assignment 2
submission box provided in Moodle. Submission files include a photograph or a scanned image of your
hand-drawn map, code for each deliverable/milestone, presentation file, and an individual report
containing your student number, name, your partner’s student id number and name, diagrams, user
stories and contribution statements.
CRICOS Provider No. 00103D ITECH_7201_2020-07_ Assignment-2.docx Page 4 of 5
Marking Criteria/Rubric
Student ID Partner ID
Student Name Partner Name
Pre-Requisites For Marking
 Statement of personal contribution and the partner’s contribution
Task Available
Marks
Student
Mark
Paired Tasks
a. Functionality as detailed in Lab 7 and Lab 8
b. Keeping the provision of taking the values of M and N while the program is in
execution
6
6
c. Hand-drawn map detailing custom game environment, implemented in the game, with
at least M different locations including exactly N shop(s), and items to allow for full
testing
6
d. Item management commands: 3
3
3
3
i. listItems / getItem / dropItem
ii. equipItem / unequipItem
iii. purchaseItem / sellItem
iv. getmazestatus
e. Implementation of combat sequences between a player and hostile NPCs, including
variable outcomes and the ability to flee.
f. Implementation of collectable items used to restore a player’s life points
5
5
g. Unit test
h. Power-point presentation
15
15
Individual Work
Individual report containing team details and:
a. User stories for each of the deliverables / milestones 10
b. Class diagrams for Lab 7 and Lab 8 10
c. Sequence diagrams for two of the item management command from different groups. 10
Total 100
The percentage value of the Task 20%
CRICOS Provider No. 00103D ITECH_7201_2020-07_ Assignment-2.docx Page 5 of 5
Feedback
A completed marking guide will be uploaded in Moodle and marks uploaded to fdlGrades within 2 weeks
of assignment submission.
Plagiarism:
Plagiarism is the presentation of the expressed thought or work of another person as though it is one’s
own without properly acknowledging that person. You must not allow other students to copy your work
and must take care to safeguard against this happening. More information about the plagiarism policy
and procedure for the university can be found at http://federation.edu.au/students/learning-andstudy/online-help-with/plagiarism.

Posted in Blog

IT 111 Database Design and SQL
Assignment
Part 1:
Instructions:
For the following each problems:
1. Write the purpose/mission statement for the database. Though this should not be long, it should be concise and complete as to the purpose of the database.
2. Identify and list the initial entities from the provided requirements.
3. Pair down the entity list based on duplication and other factors resulting in the final entity list that the database will be built.
4. Write the relationships between each entity.
Do not combine the above. Meaning, provide a list for #2 and a final list for #3. For #4 you can develop a ERD using the cheat sheet that was provided in Week 2 resources. Or you can simply write the relationships between the entities. For example:
STUDENTS has a MANY-TO-MANY relationship with COURSES
COURSES has a MANY-TO-One relationship with INSTRUCTORS

Complete all on a WORD document and upload via the assignment manager.

Problem 1 (requirements):
Melikealot Records has started a new business. To help them grow, they want you to develop a database for them that will capture their customers favorite songs. The shoppers would go online and via a list of music and its artist that will be displayed the shoppers would select and add to their favorite song list. This will help the business to know what musicians to carry and material they should carry for each singer. At anytime the customers can add and delete from their list.

Problem 2 (requirements):
Getemtobuyit Company wants you to develop a customer database. They want to store all purchasers’ orders and the products on each order. Shoppers of their company should be able to see all of their orders and every item on each order including the vendor of each product. Getemtobuyit would love to know via this database who their favorite product suppliers and best-selling products are at any point.

Part 2:

Instructions:
For the following each problems.
Based on your solution for Assignment 2 and the solution that is posted in Week 2 – Weekly Activities, do the following:
1. Create the ERD for this solution using VISIO.
2. Add the appropriate attributes for each entity in VISIO.
3. Identify the correct datatype for each attribute and note them by the attribute name.
4. Apply the Primary Key to each entity by identifying the Key in VISIO for each entity.

Complete all using VISIO and upload the .vsdx file via the assignment manager.

Problem 1.1 (requirements):
Melikealot Records has started a new business. To help them grow, they want you to develop a database for them that will capture their customers favorite songs. The shoppers would go online and via a list of music and its artist that will be displayed the users would select and add to their favorite song list. This will help the business to know what musicians to carry and material they should carry for each singer. At anytime the customers can add and delete from their list.
For customers, Melikealot Records would like to know common demographic type information. That is First Name, Last Name, Address, State, ZIP. In addition, they would like to be able to filter the data based on Gender, Race, and Age.
For the songs, the name of the song, the date recorded, the genre, and the record label where the song was recorded is suffice. For the musicians, their name is only needed.

Problem 2.2 (requirements):
Getemtobuyit Company wants you to develop a customer database. They want to store all purchasers’ orders and the products on each order. Shoppers of their company should be able to see all of their orders and every item on each order including the vendor of each product. Getemtobuyit would love to know via this database who their favorite product suppliers and best-selling products are at any point.
For customers, Getemtobuyit Company would like to know common demographic type information. That is First Name, Last Name, Address, State, ZIP. In addition, they would like to be able to filter the data based on Gender, Race, and Age in the future.
Each order should have a unique order number that the company will generate and also the date of the order. It will be important in the future to sort all orders based on their status (In Process, Shipped, Delivered).
Each product should contain the name of the product, the cost of the product to Getemtobuyit and the retail price that it is being sold to the public. In addition, they will need to know how many of the items are in inventory and what category the product falls in. For example, electronics, food, clothes, etc.
For the supplier, the need to know the name, and complete address of each. In addition, the contact name and contact information for each supplier is needed.

Part 3:
Instructions:
For the following problem 3
1. Write the purpose/mission statement for the database. Though this should not be long, it should be concise and complete as to the purpose of the database.
2. Identify and list the initial entities from the provided requirements.
3. Pair down the entity list based on duplication and other factors resulting in the final entity list that the database will be built.
4. Write the relationships between each entity.
5. Create the ERD for this solution using VISIO.
6. Add the appropriate attributes for each entity in VISIO.
7. Identify the correct datatype for each attribute and note them by the attribute name.
8. Apply the Primary Key to each entity by identifying the Key in VISIO for each entity.

Complete 1, 2, 3 with a WORD Document.
Complete 4, 5, 6, 7, and 8 using VISIO.
Upload the WORD and VISIO documents via the assignment manager.

Problem 3 (requirements):
Flyme Corporation is an airline and needs a database that can store the flights for their company, the passengers on each flight, the pilots on each flight, and the flight attendants for each voyage. Once complete the goal will be the customer can reserve a spot on a particular trip and also see their travel history and miles flown. The employees on the flight will also be able to check their upcoming weekly schedules and also see their history and hours in the air. In addition, every plane would need to be monitored for hours in use.
Pilots for Flyme have a distinct role. They can be the captain, co-pilot or Flight Engineer
Finally, Flyme would like to know the actual maintenance done on each plane. In other words, the date of the work, the work completed, by whom, and how many hours would be on the plane when maintained. The work on each plane will be completed by Flyme’s own maintenance workers.

Posted in Blog

Assessment Details and Submission Guidelines
Trimester T3 2019
Unit Code BN202
Unit Title Internetworking Technologies
Assessment Type Type A: Group submission and demonstration
Assessment Title Assignment 2 – Network requirement analysis and plan
Purpose of the assessment (with ULO Mapping) Main objective of this assignment is to enable student to understand networking devices, gather requirements for a given business case study and plan a network design.
After successful completion of this assignment, students should be able to:
d) Explain the current and future state of the internetworking infrastructure and its applications.
e) Apply a process to support the administration and management of internetworking.
Weight 20% of the total assessments
Total Marks 50
Word limit 1000
Due Date Week 11 (Friday 31st January, 2020, 5:00pm), submit report on Moodle
Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
• Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
Extension • If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment

Academic Misconduct
• Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description.

Assignment 2 Description

Business case study: Network design proposal for University of Future Technology

Description

You are a new network engineer at the University of Future Technology in Australia. University of Future Technology in Australia has two campuses in different ends of city with same structure. Your institute wishes to install a network throughout their lecture theatres, Labs, Faculty area, Administration Office, and student service areas in both campuses. The institute is becoming aware that the students require Internet access on their laptops and mobile phones during the lectures so the need a wireless connectivity as well.

The institute has its administrative office in the adjacent building with a line of sight view over the windows (open windows). Overall, the staff members are moving continuously, and they need full connectivity and accessibility to the Internet and Data Services.

The network should be divided in a way that that traffic for each domain (student, faculty, administration) should be visible within that domain.

Your operational director asks you to report on the best network design that can be used to serve the students during their lectures as well as to support the staff to be connected to the Internet and the data server.

The operational director is aware of the security concerns; therefore, requests you to include security related issues (Login, Password) for each Login.

Write a report based on the above network requirements, use the following structure to organise your report; and demonstrate switch and router configuration in week 11 laboratory class.

Report Contents

• Project Scope and Goals
• Project requirements(Hardware & Software)
• Detailed Network Design in Packet Tracer which includes
– All switches
– All routers
– VLAN
– VTP
– All PCs
• Network device configurations
a. Switch configuration:
– Set IP addresses on PC and switch
– Create VLAN
– Ping each other
– Set VTP domain with your first name
– Set VTP password with your family name
– Demonstrate VTP packets

b. Router configuration
c.
– Set descriptions on interfaces, one with your name, second with your family name, third with your middle name
– Display information about directly connected devices to router
– Setup IP addresses for each interface.
– What is the subnet mask did you use?
– Ping all routers.

Marking criteria:

Section to be included in the report Description of the section Marks
Project Scope and Goals
a. Project Scope
b. Project Goals 6(3 each)
Project hardware & software requirements a. Name of the network device(Router, switches, acess points, servers, PCs with specification such as operating system, RAM, hard disk) with manufacturer’s name, series, model and ports
b. Type of the cables 6+2
Network Design in Packet Tracer a. Design the network using Packet Tracer
b. Write justification of the network design 10
Network device configurations – Switch configuration a. Set IP addresses on PC and switch
b. Create VLAN
c. Ping each other
d. Set VTP domain with your first name
e. Set VTP password with your family name
f. Demonstrate VTP packets 6
Network device configurations – Router configuration a. Set descriptions on interfaces, one with your name, second with your family name, third with your middle name
b. Display information about directly connected devices to router
c. Setup IP addresses for each interface.
d. What is the subnet mask did you use?
e. Ping all routers. 5
Demonstration – Demonstrate switch and router configuration in week 11 laboratory class 10
Reference style – Follow IEEE reference style 5
Total 50

Marking Rubric for Assignment #2: Total Marks 50

Grade
Mark HD
40-50 DI
35-39 CR
30-34 P
25-29 Fail
<25
Excellent Very Good Good Satisfactory Unsatisfactory
Project Scope and Goals
Concise and specific to the project Scope relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic.
Project hardware requirements Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrated excellent ability to think critically but did not source reference material appropriately Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately
Network Design in Cisco Packet Tracer Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed
Network device configurations – Switch configuration All elements are present and very well integrated. Components present with good cohesive Components present and mostly well integrated Most components present Proposal lacks structure.
Network device Configurations – Router configuration All elements are present and very well integrated. Components present with good cohesive Components present and mostly well integrated Most components present Proposal lacks structure.
Demonstration Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed
IEEE Reference style Clear styles with excellent source of references. Clear referencing style Generally good Referencing style Sometimes clear referencing style Lacks consistency with many errors

Posted in Blog

Assignment 1B
CAB420, Machine Learning, Semester 1, 2020
This document sets out the three (3) questions you are to complete for CAB420 Assignment
1B. The assignment is worth 20% of the overall subject grade. All questions are weighted
equally. Students are two work either individually, or in groups of two. Students should
submit their answers in a single document (either a PDF or word document), and upload
this to TurnItIn.
Further Instructions:
1. Data required for this assessment is available on blackboard alongside this document
in CAB420 Assessment 1B Data.zip. Please refer to individual questions regarding
which data to use for which question.
2. Answers should be submitted via the TurnItIn submission system, linked to on Blackboard. In the event that TurnItIn is down, or you are unable to submit via TurnItIn,
please email your responses to cab420query@qut.edu.au.
3. For each question, a short written response (approximately 3-5 pages depending on the
nature of the question, approach taken, and number of figures included) is expected.
This response should explain and justify the approach taken to address the question
(including, if relevant, why the approach was selected over other possible methods),
and include results, relevant figures, and analysis.
4. MATLAB or Python code, including live scripts or notebooks (or equivalent materials
for other languages) should be included as appendices. Figures and outputs/results
that are critical to question answers should be included in the main question response,
and not appear only in an appendix. Note hat MATLAB Live Scipts, Python Notebooks, or similar materials will not on their own constitute a valid submission and a
written response per question is expected as noted above.
5. Students who require an extension should lodge their extension application with HiQ
(see http://external-apps.qut.edu.au/studentservices/concession/). Please
note that teaching staff (including the unit coordinator) cannot grant extensions.
1
Problem 1. Person Re-Identification. Person re-identification is the task of matching
a detected person to a gallery of previously seen people, and determining their identity. In
formulation, the problem is very similar to a typical biometrics task, however large changes
in subject pose and their position relative to the camera, lighting, and occlusions make this
a challenging task.
Person re-identification is typically evaluated using Top-N accuracy and Cumulative
Match Characteristic (CMC) curves. Top-N accuracy refers to the percentage of queries
where the correct match is within the top N results. A CMC curve plots the top-N accuracy
for all possible values of N (from 1 to the size of the dataset).
You have been provided with the VIPeR [1] dataset (see Q1/VIPeR.tar.gz, a widely
used dataset for person re-identification. This data has been split into two segments:
• Train: consists of the first 482 identities. Each identity is visible in both cameras, and
there is a single image from each camera for each subject.
• Test: consists of the remaining 150 identities. Each identity is visible in both cameras,
and there is a single image from each camera for each subject.
Your Task: Using this data, you are to:
1. Develop and evaluate a non-deep learning method for person re-identification. The
method should be evaluated on the test set by considering Top-1, Top-5 and Top-10
performance. A CMC (cumulative match characteristic) curve should also be provided.
2. Develop and evaluate a deep learning based method for person re-identification. The
method should be evaluated on the test set by considering Top-1, Top-5 and Top-10
performance. A CMC (cumulative match characteristic) curve should also be provided.
3. Compare the performance of the two methods. Are there instances where the non-deep
learning method works better? Comment on the respective strengths and weaknesses
of the two approaches.
In completing your answer you may also wish to consider the following:
• You may wish to resize images to reduce computational burden. This is acceptable,
but should be documented.
• You may wish to fine-tune a pre-trained network. This is acceptable, but should be
documented.
• A high level of accuracy alone will not guarantee a high mark for the question. The
approach you choose and the rationale for it, and the quality of your evaluation and
discussion are far more important.
2
Problem 2. Clustering and Recommendations. Recommendation engines are typically
built around clustering, i.e. finding a group of people similar to a person of interest and making recommendations for the target person based on the response of other subjects within
the identified cluster.
You have been provided with a copy of the MovieLens small dataset1
, which contains
movie review data for 600 subjects. The data is contained in the Q2 directory within the
data archive, and is split over several files as follows:
• ratings.csv: Contains the movie ratings, and consists of a user ID, a movie ID, a
rating (out of 5), and a timestamp.
• movies.csv: A list of all movie ID’s, alongside the movie titles and a list of genres.
• tags.csv: A list of tags applied to movies by users. Each entry consits of a user ID,
a movie ID, the text tag, and a timestamp.
• links.csv: Contains IDs to link the MovieLens dataset to IMDB and TMBD.
It is recommended that you do not use the tags.csv and links.csv file, though they are
contained here for completeness and you may choose to use them if you wish.
Your Task: Using this data, develop a method to cluster users based on their movie
viewing preferences. Having developed this, provide recommendations for the users with the
IDs 42, 314, and 444. Your answer should include:
1. A discussion of how you process and prepare the data, and what data you cluster.
2. A description of and justification for your clustering method. This should include
why you select the clustering method you do, and why you select the parameters (i.e.
number of clusters) that you do.
3. A brief discussion on the results of the clustering, including interpretation of the resultant clusters.
4. Recommendations for the three users with IDs: 42, 314 and 444; and a short discussion
of these recommendations, including if the recommendations make sense.
1https://grouplens.org/datasets/movielens/
3
Problem 3. Semantic Person Search. Semantic person search is the task of matching a
person to a semantic query. For example, given the query ‘1.8m tall man wearing jeans a red
shirt’, a semantic person search method should return images that feature people matching
that description. As such, a semantic search process needs to consider multiple traits. You
have been provided with a dataset (see Q3/Q3.tar.gz) that contains the following semantic
annotations:
• Gender: -1 (unknown), 0 (male), 1 (female)
• Pose: -1 (unknown), 0 (front), 1 (back), 2 (45 degrees), 3 (90 degrees)
• Torso Clothing Type: -1 (unknown), 0 (long), 1 (short)
• Torso Clothing Colour: -1 (unknown), 0 (black), 1 (blue), 2 (brown), 3 (green), 4
(grey), 5 (orange), 6 (pink), 7 (purple), 8 (red), 9 (white), 10 (yellow)
• Torso Clothing Texture: -1 (unknown) , 0 (irregular), 1 (plaid), 2 (diagonal plaid), 3
(plain), 4 (spots), 5 (diagonal stripes), 6 (horizontal stripes), 7 (vertical stripes)
• Leg Clothing Type: -1 (unknown), 0 (long), 1 (short)
• Leg Clothing Colour: -1 (unknown), 0 (black), 1 (brown), 2 (blue), 3 (green), 4 (grey),
5 (orange), 6 (pink), 7 (purple), 8 (red), 9 (white), 10 (yellow)
• Leg Clothing Texture: -1 (unknown) , 0 (irregular), 1 (plaid), 2 (diagonal plaid), 3
(plain), 4 (spots), 5 (diagonal stripes), 6 (horizontal stripes), 7 (vertical stripes)
• Luggage: -1 (unknown), 0 (yes), 1 (no)
The unknown class can be considered either a class in it’s own right (i.e. three classes of
gender), or can be considered as missing data. Note that three colours are annotated for each
of the torso and leg clothing colour, indicating the primary, secondary and tertiary colours.
One or both of the secondary and tertiary colours may be set to unknown (-1) to indicate
that there are only 1 or 2 colours in the garment.
In addition, the dataset contains semantic segmentation for each image in the training
data, that breaks the image down into the following regions:
• Leg clothing
• Shoes
• Torso clothing
• Luggage
• Leg skin regions
• Torso/arm skin regions
• Facial skin regions
4
• Hair
Semantic segmentation information is supplied both as a single colour coded mask image,
and as an individual mask for each component.
Your Task: Using this data you are to implement one or more classifiers that, given an
input image, classify the traits:
• Gender
• Torso Clothing Type
• Primary Torso Clothing Colour
• Torso Clothing Texture
• Leg Clothing Type
• Primary Leg Clothing Colour
• Leg Clothing Texture, and
• Luggage.
Pose and the semantic segmentation data may optionally be used when developing your approach (though remember that semantic segmentation data is only available for the training
set). Secondary and tertiary torso and leg colours should be ignored.
Your answer to this question should include:
• Any pre-processing that is performed on the data (cropping, resizing), or data augmentation that is used. Note that you may wish to crop and/or resize data to reduce
the computational demands of your approach. This is completely acceptable, though
the pre-processing should be explained.
• A description of your approach, including justification explaining why you selected this
approach, and how the approach was trained.
• An evaluation of performance for each of the traits using the provided test set. The
evaluation should also include an investigation of situations where the model performs
poorly.
5
References
[1] D. Gray, S. Brennan, and H. Tao, “Evaluating Appearance Models for Recognition, Reacquisition, and Tracking,” Proc. IEEE International Workshop on Performance Evaluation for Tracking and Surveillance (PETS), 2007.
6

Posted in Blog

DATA ANALYSIS SPECIFICATION
In this assignment you are asked to critique, in the form of a 3,000 word paper, the way in which data, in the form of graphs, images and tables, are presented for a domain of your choice. Note that I am not asking for an analysis of the data itself but the way in which it is presented to the viewer. (One way of thinking about this is to imagine, if you will, that you have been asked by your manager to advise on how to present data in a given domain to a large audience. Another way is to think about comparing and contrasting the ways different sources have presented the same data.)
You can choose any domain you wish but a few suggestions include:
• The infection and death rates from Covid-19,
• Australia’s (or any other country’s) carbon emissions,
• The uptake of renewable energy in Australia (or any other country or the world as a whole),
• Some aspect of the economy (eg unemployment, GDP, …),
• Vaccination rates for some set of diseases,
… but you can choose your own domain. Just ensure that the sources of the graphs, images, tables, etc are publicly available and referenced in your paper (hotlinks would be good) so we can view then also. (You can also include presentation ideas from other domains if they are relevant).
You can choose to structure your paper in any way you believe is appropriate but the sorts of questions you might ask yourself and write about are things such as:
• Does it answer the sorts of questions that people might want to ask?
• Is the method of showing the data unambiguous? confusing? complete? too complex? too simple?
• Are the graphical methods easy to understand? Are they visually appealing?
• What could be improved? Could techniques from one site (or domain) be usefully added to another?
You should choose an area where there are a number (at least three) different sources of data presented for the same subject. For example, in terms of the energy mix in Australia, you might look at the AEMO, OpenNEM, NEMWatch, Electricitymap.org etc.
In terms of citations, apart from the sources of data themselves, I would expect a few references but this is not a research paper so probably not that many.

Posted in Blog