0% found this document useful (0 votes)
36 views21 pages

Nweg5122 Poe

Test Heartbreaking
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views21 pages

Nweg5122 Poe

Test Heartbreaking
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

18; 19; 20; 21 2022

MODULE NAME: MODULE CODE:


NETWORK ENGINEERING 1B NWEG5112
NETWORK ENGINEERING 1B NWEG5122

ASSESSMENT TYPE: POE (PAPER ONLY)

TOTAL MARK ALLOCATION: 100 MARKS

TOTAL HOURS: 15 HOURS

By submitting this assessment, you acknowledge that you have read and understood all the rules
as per the terms in the registration contract, in particular the assignment and assessment rules in
The IIE Assessment Strategy and Policy (IIE009), the intellectual integrity and plagiarism rules in
the Intellectual Integrity Policy (IIE023), as well as any rules and regulations published in the
student portal.

INSTRUCTIONS:

1. No material may be copied from original sources, even if referenced correctly, unless it is a
direct quote indicated with quotation marks. No more than 10% of the assignment may
consist of direct quotes.
2. Make a copy of your assignment before handing it in.
3. Assignments must be typed unless otherwise specified.
4. All work must be adequately and correctly referenced.
5. Begin each section on a new page.
6. Follow all instructions on the assignment cover sheet.
7. This is an individual assignment.

© The Independent Institute of Education (Pty) Ltd 2022


Page 1 of 21
18; 19; 20; 21 2022

Referencing Rubric

Providing evidence based on valid and referenced academic sources Markers are required to provide feedback to students by indicating
is a fundamental educational principle and the cornerstone of high- (circling/underlining) the information that best describes the
quality academic work. Hence, The IIE considers it essential to student’s work.
develop the referencing skills of our students in our commitment to
achieve high academic standards. Part of achieving these high Minor technical referencing errors: 5% deduction from the
standards is referencing in a way that is consistent, technically overall percentage – the student’s work contains five or more
correct and congruent. This is not plagiarism, which is handled errors listed in the minor errors column in the table below.
differently.
Major technical referencing errors: 10% deduction from the
Poor quality formatting in your referencing will result in a penalty of overall percentage – the student’s work contains five or more
a maximum of ten percent being deducted from the percentage errors listed in the major errors column in the table below.
awarded, according to the following guidelines. Please note,
however, that evidence of plagiarism in the form of copied or If both minor and major errors are indicated, then 10% only (and
uncited work (not referenced), absent reference lists, or not 5% or 15%) is deducted from the overall percentage. The
exceptionally poor referencing, may result in action being taken in examples provided below are not exhaustive but are provided to
accordance with The IIE’s Intellectual Integrity Policy (0023). illustrate the error

Required: Minor errors in technical correctness of Major errors in technical correctness of referencing
Technically correct referencing referencing style style
style Deduct 5% from percentage awarded Deduct 10% from percentage awarded
Consistency Minor inconsistencies. Major inconsistencies.
• The referencing style is generally • Poor and inconsistent referencing style used in-text
• The same referencing format consistent, but there are one or two and/or in the bibliography/ reference list.
has been used for all in-text changes in the format of in-text • Multiple formats for the same type of referencing
references and in the referencing and/or in the bibliography. have been used.
bibliography/reference list. • For example, page numbers for direct • For example, the format for direct quotes (in-text)
quotes (in-text) have been provided for and/or book chapters (bibliography/ reference list)
one source, but not in another is different across multiple instances.
instance. Two book chapters
(bibliography) have been referenced in
the bibliography in two different
formats.
Technical correctness Generally, technically correct with some Technically incorrect.
minor errors. • The referencing format is incorrect.
Referencing format is technically • The correct referencing format has • Concepts and ideas are typically referenced, but a
correct throughout the been consistently used, but there are reference is missing from small sections of the work.
submission. one or two errors. • Position of the references: references are only
• Concepts and ideas are typically given at the beginning or end of large sections of
Position of the reference: a referenced, but a reference is missing work.
reference is directly associated from one small section of the work. • For example, incorrect author information is
with every concept or idea. • Position of the references: references provided, no year of publication is provided,
are only given at the beginning or end quotation marks and/or page numbers for direct
For example, quotation marks, of every paragraph. quotes missing, page numbers are provided for
page numbers, years, etc. are • For example, the student has paraphrased material, the incorrect punctuation is
applied correctly, sources in incorrectly presented direct quotes (in- used (in-text); the bibliography/reference list is not
the bibliography/reference list text) and/or book chapters in alphabetical order, the incorrect format for a
are correctly presented. (bibliography/reference list). book chapter/journal article is used, information is
missing e.g. no place of publication had been
provided (bibliography); repeated sources on the
reference list.
Congruence between in-text Generally, congruence between the in- A lack of congruence between the in-text referencing
referencing and bibliography/ text referencing and the bibliography/ and the bibliography.
reference list reference list with one or two errors. • No relationship/several incongruencies between
• There is largely a match between the the in-text referencing and the
• All sources are accurately sources presented in-text and the bibliography/reference list.
reflected and are all accurately bibliography. • For example, sources are included in-text, but not in
included in the bibliography/ • For example, a source appears in the the bibliography and vice versa, a link, rather than
reference list. text, but not in the bibliography/ the actual reference is provided in the bibliography.
reference list or vice versa.
In summary: the recording of In summary, at least 80% of the sources In summary, at least 60% of the sources are incorrectly
references is accurate and are correctly reflected and included in a reflected and/or not included in reference list.
complete. reference list.

Overall Feedback about the consistency, technical correctness and congruence between in-text referencing and bibliography:
........................................................................................................................................................................................................................................................................................
........................................................................................................................................................................................................................................................................................

© The Independent Institute of Education (Pty) Ltd 2022


Page 2 of 21
18; 19; 20; 21 2022

Portfolio of Evidence (PoE) — Background ___________________

A portfolio of evidence (POE) is a collection of materials that illustrates a person’s skills and
capabilities. Through a POE, students can recognise their own growth and learn new skills. Students
can also show possible employers what their capabilities are.

The POE is the place (usually a file) where students collect critical documents which they can use for
one or both of the following purposes:

• To demonstrate their competence by putting together evidence of what they did.


• To keep in one place some of the documents, they may wish to show a potential employer as
evidence of their learning.

In this module, you will be expected to complete POE tasks. Ensure that you keep both the hard copy
and the soft copy of the completed POE. Use your creativity and be as innovative as possible in the
creation of the final solution. Use the marking rubrics provided to guide you through the minimum
content that you are required to submit for evaluation.

This POE will require you to work consistently during the semester to achieve the best results.

POE Tasks and Allocation of Marks


Description Mark Allocation Weight
POE Part 1 100 marks 25%
POE Part 2 100 marks 30%
Final POE Part 100 marks 35%
TOTAL 90%

Your Final POE Part requires you to use feedback and suggestions provided by your lecturer (POE
Part 1 and POE Part 2). Therefore, ensure that you are provided with detailed feedback for POE
PART 1 and POE PART 2.
.

© The Independent Institute of Education (Pty) Ltd 2022


Page 3 of 21
18; 19; 20; 21 2022

POE PART 1 (Marks: 100)

Summary of Activities
ACTIVITY MARK
ALLOCATION
Activity 1 40 marks
Activity 2 25 marks
Activity 3 20 marks
Activity 4 35 marks
TOTAL 100 marks
.

Activity 1 (Marks: 40)


You are a Technology Specialist in your organisation. You have been tasked to run a workshop on
network system design specifically looking into the requirements and constraints. You have
decided to approach the task by studying the components that make up a network system and
then the relationship between network systems and related areas.

Thus far, you have realised that you will base your workshop on the exhibit extracted from
Serpanos and Wolf (2011).

Exhibit: Requirements and constraints for network system design

Prepare for this workshop by completing the following questions.

© The Independent Institute of Education (Pty) Ltd 2022


Page 4 of 21
18; 19; 20; 21 2022

Q.1.1 Identify a suitable network scenario/case that can be used to explain and discuss (10)
the relationship of concepts in the exhibit. Ensure that you provide details of the
following aspects of the scenario:

• Description of the scenario.


• Why the scenario is considered a network system?

Q.1.2 As part of the requirements analysis, list the requirements for each component or (15)
related area presented in the exhibit. Include the following components or
network areas:

• Network systems and related network protocols.


• Network systems and related network traffic.
• Network systems and related embedded systems.

Q.1.3 Using Q.1.1 and Q.1.2 above, discuss the relationship between the concepts as (15)
presented in the exhibit. In particular, explain the importance of understanding
these relationships in network systems design.

Activity 2 (Marks: 25)

“The lack of support for emerging networking paradigms is a problem that cannot be tackled
easily by employing existing techniques”. (extracted from p.269 of the prescribed textbook)

Search and study one Next-generation Internet Architecture and then critically discuss how this
architecture addresses the shortcomings in the Internet architecture presented on p.268 of the
prescribed textbook. Ensure that the discussion follows the following format:

• Introduction
• What is Internet architecture?
• Describe the Next-generation Internet Architecture you have selected.
• Can Next-generation Internet Architecture address the shortcomings in Internet
architecture?
• Conclusion.

© The Independent Institute of Education (Pty) Ltd 2022


Page 5 of 21
18; 19; 20; 21 2022

Activity 3 (Marks: 20)

Study the adapter structure in the diagram below and then answer the questions that follow.
Diagram:

Q.3.1 Using suitable examples, briefly explain the functions of the five components of (10)
this network adapter.

Q.3.2 Provide a detailed operation analysis of this network adapter. (10)

Activity 4 (Marks: 35)

Read the following scenario and then answer the questions that follow:

You have been recently promoted to an Enterprise Administrator in your organisation. Your
organisation is an IT tertiary institution offering several diplomas and degree programmes. Based on
the overall organisation’s improvement plan, you have been appointed as the Technology Leader
who will foster the development of the network system design project. You have also signed a
formal agreement that you will execute the project following cost-effective best practices and
network standards.

Each semester, the IT Support personnel receive a file containing information about new students.
These are Programming Students and Networking Students. The students are encouraged to use
network-wide resources only for academic purposes. This includes the ability to complete tasks;
share files; save files and print documents as required in their respective modules; conduct research
and retrieve module materials, as well as access computers when writing assessments.

At the end of each semester, students are required to write their practical examinations in one of
the computer/lab rooms. The nature of the examinations requires the students to retrieve read-

© The Independent Institute of Education (Pty) Ltd 2022


Page 6 of 21
18; 19; 20; 21 2022

only examination files from the examination folder, work with these files, and save the modified
files in a dedicated examination account home folder.

The following are noted about the institution:

• The tertiary institution consists of the Head Office in Cape Town and one campus each in
Durban, Johannesburg and Cape Town.
• Each campus consists of:
o Four lecturing halls;
o A library;
o Four computer/electronic device facilities;
o IT Support office.

• All client computers run Windows 7 or the latest operating system, Microsoft Office 2013
suite, Microsoft Project and Microsoft Visio 2013.
• The network is centrally managed at the Head Office and all campuses are linked to the Head
Office.
• Each campus is Wi-Fi enabled providing wireless connection to staff and students.

Q.4.1 Design an implementable routing and bridging solution for the network. Your
solution must address the following design and operation aspects of all routers.

Q.4.1.1 The functionality of the network layer. (5)

Q.4.1.2 Design and implementation of the data plane. (5)

Q.4.1.3 Design and implementation of the control plane. (5)

Q.4.1.4 Interconnection of networks using bridging systems. (5)

Q.4.2 Draw a detailed diagram showing the design and implementation of Q.4.1 above. (15)

Your marked submitted work showing the marks obtained AND the lecture’s
REMEMBER feedback will be submitted as part of the final POE. You will be required to
implement this feedback in POE Part 2 and POE Final Task.

END OF POE PART 1

© The Independent Institute of Education (Pty) Ltd 2022


Page 7 of 21
18; 19; 20; 21 2022

POE PART 2 (Marks: 40)

Summary of Activities
ACTIVITY MARK
ALLOCATION
Activity 1 40 marks
TOTAL 40 marks
.

Read the scenario below and then answer the questions that follow:

Mr. Khoza runs a small business in Midrand, Gauteng. His business has been steadily growing since
its inception in February 2019in spite of the ill-effects of the COVID19 lockdowns as well as the
ripple effects of the Russia-Ukraine such as rising fuel prices and inflation.
He, Mr. Khoza, has asked you to design a secure network for his small business. Additionally, he
would like you to design and build a cost-effective network for his business.

The current setup is such that every PC and laptop user uses a 3G dongle to connect to the internet.
When users need to print they either copy the work that needs to be printed to USB flash drives or
email their work to any one of the five users whose PCs are attached to a printer – all printers
connect via USB cables.

The new network, according to Mr. Khoza, should cater to at least thirty devices, fifteen desktops
(PCs), seven laptops including Mr. Khoza’s laptop, two servers and four BYOD devices. Additionally,
Mr. Khoza wants to allow visitors such as customers and suppliers to connect mobile devices to get
internet connectivity. All users with PCs and laptops should still be able to print.

The premises where Mr. Khoza runs his business has six offices (rooms). All the rooms are located
on the same floor. Mr. Khoza has an office and does not share office space. There are two open
plan offices, the first open plan office houses seven desktops and the remainder of the PCs are
housed in the second open plan office. Two laptop users share an office while the other three laptop
users share a separate office. A small storeroom has been selected for use as a server room.
.

Question 1: (Marks: 40)

© The Independent Institute of Education (Pty) Ltd 2022


Page 8 of 21
18; 19; 20; 21 2022

Q.1.1 Write a short report to present to Mr, Khoza that clearly explains how the new (10)
network design will save Mr. Khoza’s business money if implemented.

Q.1.2 Briefly explain what business and functional requirements are in the context of (4)
computer networking and then identify one business requirement and functional
requirement from the scenario.

Q.1.3 Recommend devices needed to set up a computer network for Mr. Khoza’s business (6)
and provide, in two sentences, brief explanations of why each of the devices that
you recommended devices are needed.

Q.1.4 Use professional network diagrams software, such as MS Visio, to design a network (10)
diagram that represents the new network. Note that a floor plan (1.e., a diagram
that shows network cable layout) is not required. You will not earn marks for
presenting a floor plan.

Q.1.5 Reveal the IP address plan of the new local area network. Note that you will need to (4)
implement this plan in Task 2.

Q.1.6 Clearly explain two security considerations that you incorporated into the network (4)
design The security considerations must address specifically, BOYD devices and
providing internet to visitors. Note that firewalls, hardware- or software-based
firewalls and switches may not be used as security considerations in your answer.

Q.1.7 To add redundancy to your network what modification would you need to do in case (2)
the domain controller fails?

Your marked submitted work showing the marks obtained AND the lecture’s
REMEMBER feedback will be submitted as part of the final POE. You will be required to
implement this feedback in the POE Final Task.

END OF POE PART 2


POE FINAL PART (Marks: 100)

© The Independent Institute of Education (Pty) Ltd 2022


Page 9 of 21
18; 19; 20; 21 2022

Summary of Activities
ACTIVITY MARK
ALLOCATION
Activity 1 – Part 1 and 2 Marked and Feedback (report document) 10 marks
Activity 2 – Summary of ICE tasks (report document) 5 marks
Activity 3 – (report document) 60 marks
Activity 4 – Presentation (presentation) 15 marks
Activity 5 – Evaluation (report document + rubric) 10 marks
TOTAL 100 Marks

© The Independent Institute of Education (Pty) Ltd 2022


Page 10 of 21
18; 19; 20; 21 2022

Activity 1 (Marks: 10)

Task 1:

This task is the collection of the POE Part 1 activities submitted in the semester. Ensure that you
submit or included:

A. The marked POE Part 1 shows the final mark and the lecture’s feedback.
B. An updated and corrected POE Part 1 as per the lecturer’s feedback.
C. A brief explanation of what was recommended and how you have implemented the
recommendations.

Task 2:

This task is the collection of the POE Part 2 activities submitted in the semester. Ensure that you
submit or included:

A. The marked POE Part 2 shows the final mark and the lecture’s feedback.
B. An updated and corrected POE Part 2 as per the lecturer’s feedback.
C. A brief explanation of what was recommended and how you have implemented the
recommendations.

Required Mark
Allocation
Task 1 (Part 1 of the POE)
Submission of Part 1 with feedback. 2
Evidence that the lecture’s feedback has been addressed. 1 5
Evidence that the recommendations were implemented. 1
Report documenting above 1
Task 2 (Part 2 of the POE)
Submission of Part 2 with feedback. 2
Evidence that the lecture’s feedback has been addressed. 1 5
Evidence that the recommendations were implemented. 1
Report documenting above 1
TOTAL 10

© The Independent Institute of Education (Pty) Ltd 2022


Page 11 of 21
18; 19; 20; 21 2022

Activity 3 (Marks: 60)

Read the scenario below and answer the question that follows. Note that the scenario below is an
extension of the scenario presented in Task 2. When answering the POE question ensure that you
keep in mind the scenario in Task 2.

Mr. Khoza is looking at opening two new offices within twelve months, one in Roodepoort and
the other in Pretoria North. The two branches will be launched at the same time. The
Roodepoort branch is expected to launch off with ten computer users. The Pretoria North
branch is expected to kick off with 25 users.

Q.1.1 With the aid of a network, the diagram proposes a solution for Mr. Khoza that will ()
enable the three offices to share information. Your solution must clearly indicate
how you are going to provide scalability, security, and server redundancy. Ensure
that you highlight how the connectivity of the three offices and routing will be
achieved. Additionally brief justifications for the need for the devices in your
solution as well as brief justifications for all protocols involved in your solution.
The proposal must be presented in a well-structured and well-formatted report. The
structure of your report must be professional and must include an introduction, the
main body, and a conclusion. The main body of your report must use headings and
paragraphs to structure the report. Use the table below to guide you.

Solution Criterion Mark


Considerations Allocation
(up to)
Network diagram Network diagram created using a 10
professional tool such as Visio. (Should not
be hand drawn).
Network performance 5
Connectivity 4
Routing 5
Scalability 3
Security 6

© The Independent Institute of Education (Pty) Ltd 2022


Page 12 of 21
18; 19; 20; 21 2022

Main Server redundancy 3


considerations Devices 5
Protocols 4

Introduction 2
Report Body formatted using headings and 4
paragraphs
Conclusion 2

Additional Network design best practices evidenced 3


Considerations Evidence of research, use of credible 5
sources
Total 60

Activity 4 (Marks: 15)

In this activity, you are required to write a report in your own words to discuss the following:

Q.1.1 Why is the quality of service (QoS) important? (3)

Q.1.2 Explain how does QoS work? (3)

Q.1.3 Provide two real-life examples of use case situations where QoS is commonly used. (3)

Q1.4. Discuss denial of service under the following heading:


• how denial of service works. (3)
• How it can be detected.
• The most well-known and spectacular DoS attacks in the last few years.

Q.1.5 Discuss why is it important to have security in the following Network protocols:
• Transport layer. (3)

© The Independent Institute of Education (Pty) Ltd 2022


Page 13 of 21
18; 19; 20; 21 2022

Activity 5 (Marks: 10)

Task:

Write a reflection report and then complete the self-evaluation.

In this section, you are required to write a reflection report on your learning experience. Once
completed, a self‐evaluation must be completed to reflect on your learning experience. Ensure to
include the following in your report:

• How would you define reflection?


• What did you learn from completing the POE?
• What did you learn from having to correct Parts 1 and 2 as per the feedback from your
lecturer?

© The Independent Institute of Education (Pty) Ltd 2022


Page 14 of 21
18; 19; 20; 21 2022

PART C
This section is the reflection report on the learning experience. The self-evaluation must be completed by the student and included in the submission.

SELF-EVALUATION
Student Number: ___________________________

(Each student must complete one of these rubrics as part of their POE submission. Review their self-evaluation and if you disagree then change the
marks accordingly)

Criteria 1 2 3 Score
You have learned something – but You are on the right track, but Well done. You have done exceptionally
you are not proving it. you can do better. well.
Reflection • Reflection shows no • Reflection shows little • Reflection shows thorough
thoughtfulness; thoughtfulness; thoughtfulness;
• Reflection has no details; • Reflection has few details • Reflection has several supporting
• Reflection is incomplete. or examples; details and examples;
• Most parts of the • All parts of the reflection are
reflection are incomplete. complete and done well.
Demonstration of • Reflection does not move • The reflection • Clearly explains what was learned;
learning beyond description of the demonstrates student’s • Reflection is beyond simple
event/experience. attempt to analyse the description of event/experience to an
event/experience but analysis of how it contributed to
fails to demonstrate learning and understanding.
depth of analysis.

© The Independent Institute of Education (Pty) Ltd 2022


Page 15 of 21
18; 19; 20; 21 2022

Criteria 1 2 3 Score
You have learned something – but You are on the right track, but Well done. You have done exceptionally
you are not proving it. you can do better. well.
Organisation of • Ideas are disorganised; • Ideas are organised but • Ideas are very well organised with
report and clarity • Language is unclear and paragraphs are not well well-constructed paragraphs;
of report confusing throughout. constructed; • The language is clear and expressive;
• Frequent lapses in clarity. • The reader can create a mental
picture of the situation being
described;
• Explanation of concepts makes sense
to an uninformed reader.
Demonstration that learning has taken place from addressing comments and feedback provided by the lecturer (1 mark)
TOTAL /10

© The Independent Institute of Education (Pty) Ltd 2022


Page 16 of 21
18; 19; 20; 21 2022

Intellectual Property
Plagiarism occurs in a variety of forms. Ultimately though, it refers to the use of the words, ideas or
images of another person without acknowledging the source using the required conventions. The IIE
publishes a Quick Reference Guide that provides more detailed guidance, but a brief description of
plagiarism and referencing is included below for your reference. It is vital that you are familiar with
this information and the Intellectual Integrity Policy before attempting any assignments.

Introduction to Referencing and Plagiarism

What is ‘Plagiarism’?

‘Plagiarism’ is the act of taking someone’s words or ideas and presenting them as your own.

What is ‘Referencing’?

‘Referencing’ is the act of citing or giving credit to the authors of any work that you have referred to
or consulted. A ‘reference’ then refers to a citation (a credit) or the actual information from a
publication that is referred to.

Referencing is the acknowledgment of any work that is not your own, but is used by you in an
academic document. It is simply a way of giving credit to and acknowledging the ideas and words of
others.

When writing assignments, students are required to acknowledge the work, words or ideas of others
through the technique of referencing. Referencing occurs in the text at the place where the work of
others is being cited, and at the end of the document, in the bibliography.

The bibliography is a list of all the work (published and unpublished) that a writer has read in the
course of preparing a piece of writing. This includes items that are not directly cited in the work.

A reference is required when you:

• Quote directly: when you use the exact words as they appear in the source;
• Copy directly: when you copy data, figures, tables, images, music, videos or frameworks;
• Summarise: when you write a short account of what is in the source;
• Paraphrase: when you state the work, words and ideas of someone else in your own words.

© The Independent Institute of Education (Pty) Ltd 2022


Page 17 of 21
18; 19; 20; 21 2022

It is standard practice in the academic world to recognise and respect the ownership of ideas, known
as intellectual property, through good referencing techniques. However, there are other reasons
why referencing is useful.

Good Reasons for Referencing

It is good academic practice to reference because:

• It enhances the quality of your writing;


• It demonstrates the scope, depth and breadth of your research;
• It gives structure and strength to the aims of your article or paper;
• It endorses your arguments;
• It allows readers to access source documents relating to your work, quickly and easily.

Sources

The following would count as ‘sources’:

• Books,
• Chapters from books,
• Encyclopaedias,
• Articles,
• Journals,
• Magazines,
• Periodicals,
• Newspaper articles,
• Items from the Internet (images, videos, etc.),
• Pictures,
• Unpublished notes, articles, papers, books, manuscripts, dissertations, theses, etc.,
• Diagrams,
• Videos,
• Films,
• Music,
• Works of fiction (novels, short stories or poetry).

What You Need to Document from the Hard Copy Source You are Using

(Not every detail will be applicable in every case. However, the following lists provide a guide to
what information is needed.)

© The Independent Institute of Education (Pty) Ltd 2022


Page 18 of 21
18; 19; 20; 21 2022

You need to acknowledge:

• The words or work of the author(s),


• The author(s)’s or editor(s)’s full names,
• If your source is a group/ organisation/ body, you need all the details,
• Name of the journal, periodical, magazine, book, etc.,
• Edition,
• Publisher’s name,
• Place of publication (i.e. the city of publication),
• Year of publication,
• Volume number,
• Issue number,
• Page numbers.

What You Need to Document if you are Citing Electronic Sources

• Author(s)’s/ editor(s)’s name,


• Title of the page,
• Title of the site,
• Copyright date, or the date that the page was last updated,
• Full Internet address of page(s),
• Date you accessed/ viewed the source,
• Any other relevant information pertaining to the web page or website.

Referencing Systems

There are a number of referencing systems in use and each has its own consistent rules. While these
may differ from system-to-system, the referencing system followed needs to be used consistently,
throughout the text. Different referencing systems cannot be mixed in the same piece of work!

A detailed guide to referencing, entitled Referencing and Plagiarism Guide is available from your
library. Please refer to it if you require further assistance.

When is Referencing Not Necessary?

This is a difficult question to answer – usually when something is ‘common knowledge’. However, it
is not always clear what ‘common knowledge’ is.

© The Independent Institute of Education (Pty) Ltd 2022


Page 19 of 21
18; 19; 20; 21 2022

Examples of ‘common knowledge’ are:

• Nelson Mandela was released from prison in 1990;


• The world’s largest diamond was found in South Africa;
• South Africa is divided into nine provinces;
• The lion is also known as ‘The King of the Jungle’.
• 𝐸𝐸 = 𝑚𝑚𝑚𝑚2
• The sky is blue.

Usually, all of the above examples would not be referenced. The equation 𝐸𝐸 = 𝑚𝑚𝑚𝑚2 is Einstein’s
famous equation for calculations of total energy and has become so familiar that it is not referenced
to Einstein.

Sometimes what we think is ‘common knowledge’, is not. For example, the above statement about
the sky being blue is only partly true. The light from the sun looks white, but it is actually made up of
all the colours of the rainbow. Sunlight reaches the Earth's atmosphere and is scattered in all
directions by all the gases and particles in the air. The smallest particles are by coincidence the same
length as the wavelength of blue light. Blue is scattered more than the other colours because it
travels as shorter, smaller waves. It is not entirely accurate then to claim that the sky is blue. It is
thus generally safer to always check your facts and try to find a reputable source for your claim.

Important Plagiarism Reminders

The IIE respects the intellectual property of other people and requires its students to be familiar with
the necessary referencing conventions. Please ensure that you seek assistance in this regard before
submitting work if you are uncertain.

If you fail to acknowledge the work or ideas of others or do so inadequately this will be handled in
terms of the Intellectual Integrity Policy (available in the library) and/ or the Student Code of
Conduct – depending on whether or not plagiarism and/ or cheating (passing off the work of other
people as your own by copying the work of other students or copying off the Internet or from
another source) is suspected.

Your campus offers individual and group training on referencing conventions – please speak to your
librarian or ADC/ Campus Co-Navigator in this regard.

© The Independent Institute of Education (Pty) Ltd 2022


Page 20 of 21
18; 19; 20; 21 2022

Reiteration of the Declaration you have signed:

1. I have been informed about the seriousness of acts of plagiarism.


2. I understand what plagiarism is.
3. I am aware that The Independent Institute of Education (IIE) has a policy regarding plagiarism
and that it does not accept acts of plagiarism.
4. I am aware that the Intellectual Integrity Policy and the Student Code of Conduct prescribe the
consequences of plagiarism.
5. I am aware that referencing guides are available in my student handbook or equivalent and in
the library and that following them is a requirement for successful completion of my
programme.
6. I am aware that should I require support or assistance in using referencing guides to avoid
plagiarism I may speak to the lecturers, the librarian or the campus ADC/ Campus Co-Navigator.
7. I am aware of the consequences of plagiarism.

Please ask for assistance prior to submitting work if you are at all unsure.

END OF PAPER

© The Independent Institute of Education (Pty) Ltd 2022


Page 21 of 21

You might also like