Develop strategies for distribution of applications

Assignment Help Computer Networking
Reference no: EM132723417

COMP 30011 Network Management - Middle East College

Learning Outcome 1: Appraise the properties of interconnections of LANs and WANs as they affect the provision and performance of application services.

Learning Outcome 2: Develop strategies for distribution of applications and services within an internetworked environment.

Learning Outcome 3: Use and Apply Network Management tools and Web-based Management.

Assignment Objective

• To encourage students to develop their knowledge and skills in the concept of network management.
• To apply a simulation of Network Management tool (Wireshark).

Assignment Tasks

Task 1
Submit a work proposal for this assignment on or before 13/12/2020 (23:59) which must include:
• Understanding of deliverables - a detail description of deliverables.
• General overview of proposed plan - initial understanding of solution to task2.
• Timeline for completion of the given tasks.
The work proposal must be submitted in a word file through the link available in Moodle.

Task 2

A. The modern enterprise IT team faces a seemingly impossible task. More and more, IT leaders are under pressure to dramatically increase agility, maximize workforce productivity, eliminate any security threats, and address every compliance requirement-all while cutting costs. That's why IT leaders are moving away from all-or-nothing approaches to the cloud and embracing hybrid network models. With a hybrid network that mixes the best aspects of on-premises, public cloud, and private cloud infrastructure, you can find the balance between agility, cost efficiency, and security.
As Network administrator analyze the challenges in managing and monitor the hybrid networks by analyzing two research papers.
(Hint: Minimum of 600 words)

B. Prepare a short report on the latest Network Management tools in a web-based environment.
(Hint: Minimum of three tools are expected Minimum of 600 words)

Task 3

As a network administrator for one company, you are responsible for end to end performance monitoring, troubleshooting the errors in real time and ensuring the availability of the network resources.
Wireshark is an essential tool for network administrators as well as security professionals that can provide network traffic analysis and helps to detect quickly common issues such as : malicious activities, latency,... In this context, you are required to complete the following tasks using wireshark:

1. Establish an HTTP connection and detect the HTTP traffic generated (get, response) and analyze the different layers encapsulated in the captured frame.

2. Generate ARP traffic. Detect the ARP broadcast and reply and analyze the different layers encapsulated in the captured frame.

3. Using appropriate filters, detect all the ICMP traffic that is being generated by one specific IP address (that you know it is active in the network).

4. Display the statistics of the captured traffic and provide clear explanations on its content.

(Hint: Provide a Print-screen in your assignment report submission with explanation of the screenshot)

Attachment:- Network Management.rar

Reference no: EM132723417

Questions Cloud

Calculate the estimated ending inventory using gross profit : Beginning inventory $990,000; purchases $450,300; freight-in $12,200; Calculate the estimated ending inventory using the gross profit method
Emergency evacuation of patients : How important are external relationships with other agencies to having an efficient evacuation plan? Was the community clear on what the procedures were? How?
Determine the correct balance of cash and cash equivalents : Determine the correct balance of cash and cash equivalents to be reported in the current asset section of the 2021 balance sheet
Emergency evacuation of patients : How important are external relationships with other agencies to having an efficient evacuation plan? Was the community clear on what the procedures were? How?
Develop strategies for distribution of applications : Develop strategies for distribution of applications and services within an internetworked environment - Use and Apply Network Management tools and Web-based
What amount should sheridan report as inventories : Sheridan Company has the following account balances at year end: Office supplies $4300. What amount should Sheridan report as inventories in its balance sheet
What is human exposure assessment : What is human exposure assessment? Explain some of the methods of exposure assessment.
Areas of negligence for allied health professionals : Discuss the standard of care in each area, and how that standard can be applied to the healthcare facility.
How difficult is it to ensure ethical decision making : How difficult is it to ensure ethical decision making in a business that is organized as a "network of equals"? How does this impact accountability

Reviews

len2723417

12/8/2020 12:38:58 AM

I don''t want the last expert to do my assignment I want Task one to be from 2 to thee real research papers with the reference For the lab task I don''t want expert using experience but I want basic solution I will attach lab manual

Write a Review

Computer Networking Questions & Answers

  Network topology diagram and implementation

MN621 - Advanced Network Design - Network requirement analysis and plan - Investigate suitable network designs to match requirements

  Strategy to create a high-performance network

Recommend one (1) strategy to upgrade the company's current infrastructure to support the new / additional employees. Recommend one (1) strategy to create a high-performance network

  Discuss the lifo method of valuing inventories

We used the LIFO method of valuing our inventories for approximately 50% and 53% of total inventories at June 30, 2007 and 2006, respectively.

  Analyze the requirements necessary to allow for proper os

Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

  How you would implement a similar scenario using unix

You have been called in to analyze this situation and make recommendations and explain how you would implement a similar scenario using UNIX?

  Examine the vulnerabilities of an ftp file transfer

Examine the vulnerabilities of an FTP file transfer, perform the activity - Capture network traffic using WireShark or Ethereal

  What is statistical multiplexing

What are some similarities between neighborhood roads and LANs? What is statistical multiplexing? How is statistical multiplexing useful in WANs

  Briefly describing snmp

Write a two-and-a-half-page report briefly describing SNMP and its commands and describing MIB-1/MIB-2, including the hierarchical tree, object identifier (OID), groups, and object types

  Write a annotated bibliography about wireless security

Write a Annotated Bibliography about `wireless security, which is not a topic any of you will be doing, but it works as a sample of what we are looking for.

  What are some of the configuration options

You have configured a LAN with 25 workstations, three network printers, and two servers.

  Business requirements driving the need for the system

The presentation must include the following: A full description of the new system, a description of its components, and the benefit it will provide to Riordan A discussion of the business requirements driving the need for the system A discussion o..

  You have been asked to design an ip addressing plan

You have been asked to design an IP addressing plan for a medium size corporation, Corporation (X) converting to an IP network. The corporation currently has 88 locations but plans to expand to approximately 100 Locations within the next year.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd