Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: daixieit

IMAT5122 Computer Systems and Networks

COURSEWORK 2022/2023

PART 1 COMPUTER SYSTEMS -  50 MARKS

You are an IT support engineer and you have been asked to build a GNU/Linux bash script that monitors a computer system and user activity regularly and logs key information. You need to create a script “SysMonitor.sh” that automatically and regularly writes to a log file “SysMonitor.log”. The log file will need to contain time-stamped detailed information about significant changes to the following:

a) Users currently logged in

b) Current processes

c) Top 3 CPU utilizing processes

d) Devices plugged in (e.g. USB)

e) Launch another script within the first script that waits for 5 seconds before launching (f) and (g)

f) Disk usage

1. Overall disk usage

2. Other key directories

g) Network interfaces and their states

The script will need to be written to extract only key details about the changes to the computer system such as listed above and add them to an ever-growing log file. Hence the log file should consist of easily readable key details only. For pass level you are expected to write a script that satisfies a) to f) listed above. For higher marks you are expected to add relevant extra information (e.g. monitoring OS system file changes, monitoring installed applications, etc.) and relevant features, more easily readable output (e.g. HTML), configurable log levels (e.g. verbose, debug, standard and key-details only), etc.

Note that you should only use common pre-installed command line tools and your work should not rely on additional programs / tools / libraries / etc. If you are unsure about any detail of this coursework please ask your tutor.

Also you may be called to present and demonstrate the system and report if your module tutor is in doubt. Failure to proof ownership of your coursework may lead to a fail!

What should be submitted to Blackboard before the due date:

I. Documentation (5 pages maximum (excluding title page, bibliography, appendices etc.) , minimum font size 10):

a) A specification of how to install and use the script(s) (max 1 page)

b) Design consideration – what commands you used, how you constructed your script(s) and justification why you chose these techniques. (1 page)

c) Extensive test results with exemplary log and screen output. (1 page)

d) Conclusion / Reflection – Advantages and disadvantages of your techniques / work (1 page)

e) Bibliography – An exhaustive list of references you used in your work (1 page)

II. One ZIP file will need to be uploaded to Blackboard, containing all coursework relevant files including scripts and exemplary log files.

The documentation needs to be submitted to Turnitin assignment submission link on blackboard while the ZIP file needs to be uploaded separately via the Upload link on blackboard.

PART 2 COMPUTER NETWORKS  50 MARKS

Designing and Deploying a Computer Network Solution for a start-up medium defence enterprise.

This question entails the design and theoretically deployment of a secured computer network for a medium defence enterprise. Please carefully read the following details:

You are in charge of the IT services of Locked Martin corporation, a relatively new UK defense contractor company that develops military technology. The company is moving to their new UK office building in Cranfield and the complete network infrastructure needs to be designed and implemented from scratch.  In addition, the corporation Research and Development (R&D) centre is working on the next generation of missile technology so security of the designed network is also critical to the corporation.

“Building 1” (in the UK):

                           Ground floor:                                                      First Floor:

    

Storage & Shipping: 30 (hosts) employees using wireless devices to label and track products to be shipped.

Quality Assurance: 6 (hosts) employees with a lot of networked lab equipment to continuously test and certify products.

Sales & Marketing: 8 (hosts) employees working as a team to bring the products to market.

Research & Development 1: 10 (hosts) employees (plus networked lab equipment) working on current & new products.

Research & Development 2: 5 (hosts) employees (plus networked lab equipment) working on current & new products.

Server Room 1: Contains 10 - servers ( client-available servers including Backups, UPS, etc.

Management 1: The overall company boss (1 host), mainly working with the Sales and Marketing team.

Employees are allowed to work from home one day a week but must use secure remote solutions to work within the company network.

In addition, Groovy Inc. recently acquired another company to gain its cutting edge technology in parallel computing and its research and development staff. This new part of the company is located in Canada

“Building 2” (Canada):

 

To be co-located with other companies in a large modern office building as shown above.

Server Room 2: Contains 5 client-available servers including Backups, UPS, etc. Also contains the 10 main Research & Development servers.

Research & Development 3: 12 (hosts) employees (plus networked lab equipment) working on current & new products.

Management 2: The Canada-division manager (1 host), working mainly with all the Research & Development team.

Your task

2a) 25 marks

2a) It is your responsibility to design the overall network for the company, connecting all staff, equipment and customers through appropriate networking technologies. You need to consider a variety of factors, such as:

· User requirements

· Hardware and Software needed:

o Switches, with VLANs and/or subnets, Gateways, etc.

o Performance Network bandwidth

o Connectivity, Internet Connections, etc.

o Security Issues e.g. Proxy Servers, Firewalls, etc.

o Wired versus Wireless solutions deployed

o Redundancy and Backups

· Deployment Plan

o The when, what, and how exactly to put the solution in place.

· Maintenance and Administration Plan

2b) 25 marks

a) Using a Variable Subnet Length Mask (VLSM) applied to internet protocol (IP) address of class C with a classless interdomain routing (CIDR) of /24  ( for example 192.168.10.0/24), assign IP address to all users(hosts) in the network in the UK building and Canada building.

Marking Scheme 

 

0-5

6-11

12-17

18-23

24-30

GNU/Linux

Command Usage

No or only little ability to use basic GNU/Linux commands. No or only little attempt solving the coursework problem.

Little use of basic GNU/Linux commands. Little attempt solving the coursework problem.

Fair use of basic and more advanced GNU/Linux commands. Fair attempt to solve coursework.

Good use of basic and more advanced GNU/Linux commands. Well executed piece of coursework.

Very good use of basic and more advanced GNU/Linux commands. Very well executed piece of coursework.

 

0-3

4-7

8-11

12-16

17-20

GNU/Linux

Bash Scripting

No or only little ability to use basic GNU/Linux bash scripting.

Little use of basic GNU/Linux bash scripting.

Fair use of basic and more advanced GNU/Linux bash scripting.

Good use of basic and more advanced GNU/Linux bash scripting.

Very good use of basic and more advanced GNU/Linux bash scripting.

 

0-4

5-9

10-14

15-19

20-25

Extra relevant information / extra relevant features

No, only little or non-relevant extra information or extra features added to the work

Only little or not very relevant extra information or extra features added to the work

Some extra information or extra features added to the work. These extras are fairly relevant.

Good extra information or extra features added to the work. These extras are mostly relevant.

Excellent extra information or extra features added to the work. These extras are highly relevant.

 

0-4

5-9

10-14

15-19

20-25

Report and Referencing

Poorly written, unstructured, unclear justification, no testing, none or entirely inappropriate referencing.

Understandable, little structure, some justification, little testing, adequate coverage of sources but lacking sufficient detail in referencing.

Reasonably written, adequate structure, good justification, well tested, adequate coverage of sources but lacking some detail in referencing.

Well written, good structure, good justification, thorough testing and coverage of sources with sufficient detail in referencing.

Very well written, very good structure and excellent justification, thorough testing, comprehensive, informative and relevant referencing.

 

 

 

 

 

 

Part 2

0-4

5-9

10-14

15-19

20-25

Network Design Principles

Poorly written, unstructured, unclear justification, no testing, none or entirely inappropriate referencing.

Understandable, little structure, some justification, little testing, adequate coverage of sources but lacking sufficient detail in referencing.

Reasonably written, adequate structure, good justification, well tested, adequate coverage of sources but lacking some detail in referencing.

Well written, good structure, good justification, thorough testing and coverage of sources with sufficient detail in referencing.

Very well written, very good structure and excellent justification, thorough testing, comprehensive, informative and relevant referencing.

VLSM

Poor calculation

Little calculations with some justification

Reasonably well steps and calculations

Good calculations

Very well written steps

 

 

 

 

Marking comments and feedback:

 

 

 

 

 

 

Final Mark 100