Critical understanding of the top network model

Assignment Help Computer Networking
Reference no: EM133058299

COMP1609 Network and Internet Technology and Design - University of Greenwich

Learning Outcome 1: Demonstrate knowledge of network communication, OSI and TCP/IP model.

Learning Outcome 2: Demonstrate a critical understanding of the top network model with related key protocols, services, and applications.

Learning Outcome 3: Evaluate common network problems (malfunction, poor performance), adopt a systematic approach to troubleshooting and resolving the problem.

Learning Outcome 4: Be competent in the use of tools designed to analyse and simulate network functionality.

The objective of the coursework is to simulate a client-server model communication over an IP network and to investigate an application and network performance in multiple provided scenarios.

This assessment requires to use RIVERBED simulator.

The network architecture overview:
A company's headquarters are in Manchester, UK. They have recently opened regional offices in Chicago, USA and Sydney, Australia. The main service provided by the Chicago and Sydney offices will be gathered and distributed monthly and annual reports describing sales handled by the headquarters in Manchester, UK. The company has decided to perform a simulation in case if they will expand with an additional call centre.

Manchester HQ LAN: The network is undefined and needs to be designed by the student with justifications, this implies justification of several nodes, user profiles and application profiles.

Chicago office LAN: It consists of 35 users connected to 100baseT switch, Local printer, Email (heavy). They are connected to the Internet via a T1 line. Some applications run by users including printer and database (heavy) are local and others like web browsing (light-HTTP) and FTP (heavy) are supported remotely, in Manchester, UK. Additionally, 8 users run an online video conferencing application with all supported services.

Sydney Office LAN: It consists of 25 users connected to 10baseT switch, Local printer, Email (heavy). They are connected to the Internet via a T1 line. Some applications run by users including printer (light) and database (heavy) are local and others like web browsing (heavy-HTTP) and FTP (light) are supported remotely, in Manchester, UK. Additionally, 8 users run online voice and video conferencing applications.

Call centre Office LAN: It would consist of 15 users connected to 100baseT switch, Local printer, Email (light). They are connected to the Internet via a T1 line. Some applications run by users including printer (light) and database (light) are local and others like web browsing (heavy-HTTP) and FTP (light) are supported remotely, in Manchester, UK. All users run online voice and video conferencing applications with Sydney Office.

The objective is to perform group literature research and individually build a Riverbed simulation model based on the network architecture given and evaluate the behaviour of network parameters gained by simulating the use cases. The design, implementation and simulation discussion imply the inclusion of graphs and justification of made decisions or the results achieved through the simulation.

1. Perform literature research on the technologies that used in modern enterprise networks. These technologies are Distributed Denial of Service Protection, Load Balancing and Cloud Virtualization. There are multiple providers of such services, some examples, Amazon AWS, CloudFlare and Akamai Technologies. Critically discuss these technologies concerning the scalability and transparency of communication, providing examples. Identify two or more commercial risks arising due to the failure of such cloud services. The discussion should be documented and should be approximately 700 words. The group should consist of two roles: risk assessor and upgrade engineer. The upgrade engineer must review the technologies from a benefit point of view, whilst the risk assessor evaluates the potential threats. [GROUP TASK]

2. Design, implement and simulate your model in the RIVERBED simulator guided by the given network architecture overview. The design requires detailed documentation on the application and performance settings in the RIVERBED simulator for each user and these settings justifications. Following the implementation, you are required to simulate your scenario for 20 minutes. [INDIVIDUAL TASK]

3. The documentation must contain subnetting schemes for each LAN. Note: You are NOT required to configure Riverbed to use subnets. You must provide the following: Network Address, Broadcast Address, Usable Addresses, and IP Address assignments to hosts. You must use at least two classes from Private Address Space.

4. Investigate the behaviour of the network performance in a variety of cases. The analysis must be done regarding your expectations. Discuss the scenario and hypothesize on the possible outcomes of provided use-cases followed by the analysis of the results that were received from the simulation. [INDIVIDUAL TASK]

5. You must review the following:
i. Utilization of a T1 link.
ii. Average FTP download response time
iii. HTTP page response time.
iv. The behaviour of voice and video applications
v. Ethernet delay
vi. Simulate the following use-case: The new call centre office will communicate with Chicago and Sydney offices. It is planned that 10 users will communicate with the Sydney office and 5 users will communicate with the Chicago office. All offices will communicate via the video-conferencing application. Investigate the behaviour of the video-conferencing application.
vii. Evaluate the network performance in a use-case, where you would introduce at least one of the improvements that you have identified.

Perform the analysis of the results starting from the first minute. This should be done, to reduce the noise from the data caused by the initialization of network devices such as routers and switches which may have an impact on your investigation.

A good structure report, which must include the following:

• A literature review on the technologies that are used in a provided network architecture and the benefits of usage of cloud services. Refer to Task 1.
• Description of the designed and implemented scenarios, including the justifications for the design and choice of performance parameters. Refer to Task 2.
• Documentation on the investigation of required features and use-cases, including graphs and analysis of the results of the simulation. Refer to Task 3 and its subcategories.
• Based on the results; recommend your choice of consideration to improve the network model.
• A critical reflection, which is evaluative and reflective.

Attachment:- Network and Internet Technology and Design.rar

Reference no: EM133058299

Questions Cloud

Calculate the price of the callable bond : GoGo Inc. plans to issue a perpetual callable bond that pays 11.4% annual coupons. The current interest rate is 8%. Two years later, there is 15% probability th
Describe causative microbial agent of botulism : Describe the causative microbial agent of botulism? Why was the doctor interested in Grandma's canned veggies? What is the treatment regimen for this disease?
Enhance the value of portfolio : The Kuala Lumpur CI is standing at 1650 now. You, as the fund manager under AT Asset Management Berhad, is managing a portfolio which tracks the performance of
Fund net asset value per share : Suppose the MilFord Equity Fund, an open-ended mutual fund, owns the following six stocks:
Critical understanding of the top network model : Demonstrate a critical understanding of the top network model with related key protocols, services, and applications.
Pathogenesis and current treatment strategies : Search current publications and write (type) a summary of Pathogenesis and Current Treatment Strategies of COVID-19
Price of the underlying asset falls : The buyer of a put and seller of a call O both are potential sellers of the underlying asset O both have rights and not obligations O a and c are correct O both
Rise in equity prices : 1. A rise in equity prices can be due to
Examples of an optimal capital structure : Define and provide examples of an Optimal Capital Structure. Please try to reference with material from Miller and Modigliani. Please share sources.

Reviews

Write a Review

Computer Networking Questions & Answers

  Discus the osi model layers

Dragging and Dropping the OSI Model Layers Time Required: 10 minutes Objective: Put the OSI model layers in the correct order by using Simulation 12.

  What are the advantages of dhcp

Compare and contrast DCHP and the ICMP messages that were previously used for start up configuration. What are the advantages of DHCP that caused it to be the popular solution

  Write a research report on network technology

Write a research report on a chosen Network Technology/ Protocol/Topic - Implementation of the requirements and thus the working application and demonstration of the working application.

  SBM4304 IS Security and Risk Management Assignment

SBM4304 IS Security and Risk Management Assignment Help and Solution. Asia Pacific International College, Australia - Discuss information protection using CIA

  What is the transmission efficiency of a file sent

What is the transmission efficiency of a 5,000-byte file sent in response to a Web request HTTP, TCP/IP, and Ethernet?

  Explain control domain and how it maps to your chosen scope

Explain the control domain, how it maps to your chosen scope, and specifically what your organization does to implement the stated control.

  Network discussion - application layer collapse

Application layer protocols such as HTTP, FTP, SMTP, DNS, and P2P networks. Pick up one protocol that you are familiar with and write a brief overview using your own words.

  Draw diagram showing network design indicating the switches

Draw a diagram showing the network design indicating the switches, firewalls, routers, WAN and Internet connections, servers, etc. Please use APA formatting. The paper should be written professionally.

  Develop an analytical understanding of performance

Network Analysis using Wireshark - develop an analytical understanding of performance and management of different types of networked applications

  Explain a tcp connection between host a and host b

Is it possible for an application to enjoy reliable data transfer even when the application runs over UDP? If so, please be specific in your answer of how this takes place.

  What is the difference between capturing traffic for

answer the following questions in a two to three page word document using good apa formatting.1 four capabilities are

  Significance of use cases of uml specification

MN404 - Fundamentals of Operating Systems and Java Programming - discuss the significance of use cases of UML specification.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd