Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 29

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title

Assessor Internal Verifier


Unit(s)
Assignment title
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor
has awarded.
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria
awarded match those shown in the Y/N
assignment brief?

Is the Pass/Merit/Distinction grade


awarded justified by the assessor’s Y/N
comments on the student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:

• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N

• Identifying opportunities for


improved performance?
Y/N

• Agreeing actions? Y/N

Does the assessment decision need


Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature
Date
(if required)
1|Page

Pearson Education 2016


Higher Education Qualifications
Internal Verification - Assessment Decisions
Confirm action completed
Remedial action taken

Give details:

Assessor signature Date

Internal
Date
Verifier
Programme Leader
Date
signature (if

Pearson Education 2016


Higher Education Qualifications
Internal Verification - Assessment Decisions
2|Page
Assignment Brief (RQF)
Higher National Diploma in Computing

Course Tittle

Unit Number and Title:

Assignment Title

Name of the Learner

Ref. No. of the Learner Pearson Regd. No.

Assignment Number Batch No & Semester

Issue Date Submission Date


Date Received 1st
Re-submission Date
submission
Unit Assessor: Academic Year

Assessor Summative Feedback

Grade: Assessor Signature: Date:


Resubmission Feedback - Formative

3|Page
Date
Grade: Assessor Signature:

Internal Verifier’s Comments

Signature of the IV Date


Student Agreement:
Student Signature
I understand the feedback given to me and agree to carry out the
actions in future works as required and indicated. Date

Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grades decisions have been agreed at the assessment board.

STUDENT ASSESSMENT SUBMISSION AND DECLARATION

Student name: Assessor name:

Issue date: Submission date: Submitted on:

Programme:

Unit:

Assignment number and title:

4|Page
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and
students who break the rules, however innocently, may be penalised. It is your responsibility
to ensure that you understand correct referencing practices. As a university level student, you
are expected to use appropriate references throughout and keep carefully detailed notes of all
your sources of materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your course tutor if
you need any further advice.

Student Declaration

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences
of plagiarism. I understand that making a false declaration is a form of malpractice.

Student signature: Date:

5|Page
Activity 3

Figure 1

6|Page
Network devices, components and software List

1. Wireless Router

Figure 2

Specification
Brand -TP-Link Archer C6 Gigabit MU-MIMO
Connections - Wireless
Frequency band class -Dual-band
Wi-Fi speeds -300 Mbps and 867 Mbps
Wireless type -80802.11ac standard bandwidth.

Justification

• This further supports one Mesh function.


• Can connect to several devices.
• A smoother experience.
• High Speed Connection.

7|Page
2. Switch

Figure 3

Specification

Brand -NETGEAR 24-Port Gigabit Ethernet Unmanaged (JGS524)


Ports -24
16Gbps switching from the device

Justification

• Silent operation.
• Prosafe lifetime protection.
• Helps to transfer data.
• Energy efficient.

8|Page
3. Servers

HP Z840 Tower Workstation

Figure 4

Specification

CPU -Quad-Core 2.6GHz Intel Xeon Broadwell E5-2623 v4 [4-cores / 8-threads]


RAM -32GB (4x 8GB) of 2400MHz DDR4 ECC Memory.
SSD -500GB SATA 2.5" Solid-State Drive.
GRAPHIC -NVIDIA Quadro P600 2GB.

Justification

 Decent candidate.

• Very extensible.
• Superior performance.

9|Page
4. Desktop Computer

Specification
Processor -Intel Core i5 3rd Generation.
Motherboard -H61 Series Motherboard.
Graphics -Intel HD Graphics.
Ram -8GB DDR3 Ram.
SSD (OS) -120GB Sata SSD.
Hard Disk -500GB Seagate HDD.
PSU -500 WATTS SMPS.

Justification
 More data may be stored.
 Quicker file saving.
 Effective power delivery.

10 | P a g e
Software

1. Cisco Packet Tracer

Justification
• We can build, set up, configure, and debug complex networks using virtual
equipment.
• It provides an instructional setting with lifelike simulations and visuals.

2. Wondershare Edrawmax

Justification

• It enables us to see how the network is set up.


• Operates on Linux, macOS, and Windows.
• Able to generate Office layouts, Smart Layouts, Network Diagrams, and UML
Diagrams.

11 | P a g e
Feedback Form

12 | P a g e
Name Zoro

Date 28.05.2023

Position Web Developer

Responses

1.Network Speed Good

2.Virus Issue Well Managed

3.Security Issue Good

4.Network relevant to the Yes


scenario
5.Is the objective Clear Yes

Overall Performance of the Well Prepared


system
Signature Zoro99@gmail.com

13 | P a g e
Installing network monitoring tool

Wireshark

Figure 5

Figure 6

14 | P a g e
Figure 7

Figure 8

15 | P a g e
Figure 9

Figure 10

16 | P a g e
Figure 11

Figure 12

17 | P a g e
Installing configuration

Vlan

Creating and Assigning Vlan on switch

Figure 13

18 | P a g e
Assigning ports on VLAN

Figure 14

Vlan Out put

19 | P a g e
Figure 15

20 | P a g e
Trunking switch ports

Figure 16

Enable Password for the Router

21 | P a g e
Figure 17

While accessing router

Figure 18

VTP Domain and server and client mode

22 | P a g e
Figure 19

Figure 20

Sub interface in Router

Figure 21

Assigning Ip address using DHCP (configuring)

23 | P a g e
Figure 22

DHCP output

Wireless connections
Figure 23
Wireless connection

24 | P a g e
Maintenance schedule

Maintenance schedule

Plan Daily Weekly Monthly Yearly

Resolving network problems

Software updates and upgrades

Delete unwanted files

Inspection on network devices

Change the hardware and software

Backup data

Monitoring network

Check network security

Check for network upgrade

Activity 4

25 | P a g e
This form of network module can be highly recommended to consumers because there are no
risks of failure

Any problems may easily be found because of how reliable this network is. Furthermore,
authors can easily correct errors in this type of network. The router's security password was
also added by the author, restricting who can access the internal network to approved users
who have a security password and username. The constancy of data transfer is another
important aspect of this network, the author has connected all switches using trunk ports. The
author also made use of VTY lines in networks. In a normal VLAN network, we can only
transfer data within the same VLAN. On the other hand, inter-VLAN routing enables us to
send and receive data between other networks. One benefit of conventional inter-VLAN
routing is its ease of configuration.

The author has employed the VTP configuration of the network. To distribute every VLAN
and domain name to clients, we can set up a server switch and employ trunk ports. Therefore,
we do not need to give each switch a unique feature. It saves time and keeps us from giving
false information to every switch. We do this by using the same domain name (VTP domain)
across all switches. Additionally, the author created a wireless connection for some
departments. ACCESS POINT, enabling us to connect devices without wires and manage
devices with simplicity.

Test ID Name Description Details Expected result Actual result Remark

26 | P a g e
Test 01 Login User attempts to Secret The system should Actual findings were
access system password: allow the user to in line with
through router 987abc successfully log in expectations, and the
by providing using a secret user was able to log
secret password. on.
password

Test 02 Login User attempts to Incorrect The system should Actual results were in
(Incorrect access system Secret allow the user to line with what was
Password) through router password: successfully log in anticipated, making it
by providing s7896 using a secret impossible for the user
wrong secret password. to log in.
password

Test 03 Ping Pinging with Ping Ping should be Ping Successful Packet sent = 4
different Vlan 192.168.10.98 unsuccessful Packet received
=4
Lost packets = 0

Test 04 Ping 2 Pinging in Ping Ping should be Ping Successful Packet sent = 4
Same 192.168.10.162 successful, and reply Packet received
Vlan should come from =4
another network Lost packets = 0
with 100% accuracy.

Test cases

Future Enhancements for the described Network


 Backup

We're talking about reinforcement right now. Reinforcement is another vital part of our
organization, and there is no reinforcement for the framework at the moment. They might

27 | P a g e
lose every piece of data. We wanted to select a response to this. The best answer to this is a
cloud worker. If a cloud backup is possible, worker, it will always exist, and one worker's
failure will not have an impact on the entire framework since in the cloud,

 Create a unique guest network.

For guests to connect to the internet while keeping corporate separate, the company can build
up a separate network.

 System for digital switching

To exchange messages, terminal devices are connected via a switching network.

Depending on the viewpoint, there are various ways that the switching network is set up:

1. Requirements for regulations


2. The volume of traffic

And creating a link via control signals is the act of switching.

 Software and firmware updates

The software that runs on them and the improvements in technology do not always keep up
with one another. It is unlikely that new programs running on outdated hardware will
function properly when combined with more recent software.

 Information compression

Data compression lowers the number of bits needed to represent data. You may reduce
storage and network traffic costs, speed up file transfers, and save space by using data
compression.

 Take advantage of virtual local area networks (VLANs)

By dividing an existing physical network into many logical networks, a VLAN creates its
broadcasting domain. VPN must be included into the network architecture because it protects
online data as we browse the web using sophisticated encryption methods. The network's
capacity can be boosted by using a VPN.

Critical Evaluation

The organization firm is the owner of this network infrastructure. Because the current

28 | P a g e
network system is unreliable and insecure, they engaged a network engineering firm to
maintain and modify the network. As the newly hired network engineer, he had plans to
revamp the network system and make many improvements to increase its speed and security.
As needed in the scenario, a high-speed internet connection and wireless network were
necessary. The facility had a number of distinct departments. It has been implemented in the
system and is anticipated to increase the data traffic by 85%. It uses VLANs to link to other
buildings and implements quality of service. Every gadget is password-protected to ensure
security and prevent illegal access. No matter if they are wireless or wired, networks are an
essential component of technology. The company's requirements must be followed, such as
controlling employee traffic and dividing the network into departments, in order to maintain
an efficient network. The network architecture is the next issue to think about because it has a
big impact on the system and is important to take into account. Next, each and every module
must be meticulously evaluated for an error-free network that enables the devices to operate
properly in order for the network to operate in line with Call Management (Pvt) Ltd's criteria.
Prior to implementation, the network must first be evaluated. In order to test the network, it is
important to review each module and look for any issues that might lead to issues.

29 | P a g e

You might also like