Reference no: EM133853201
Network Architecture
Assessment: TechWorld Electronics
TechWorld Electronics is a small, growing electronics store located in a busy commercial district. The store has been operating for two years and is experiencing rapid growth, both in the number of customers and in its inventory. The owner, Mr. Lee, wants to upgrade the store's existing network infrastructure to enhance connectivity, improve security, and support the growing number of devices and online sales. He seeks your expertise to design a network system that suits the store's needs.
Identify Network Devices and Their Functions:
List and describe the essential network devices required for TechWorld Electronics (e.g., routers, switches, firewalls, wireless access points).
Explain the functions of each device in relation to the operation of the store's network, particularly focusing on providing reliable internet access for employees, managing online orders, and securing customer data.
Analyse Different Network Topologies:
Research and compare different network topologies (e.g., star, bus, mesh, hybrid).
Evaluate the suitability of each topology for TechWorld Electronics based on factors like ease of expansion, cost, and network performance.
Recommend a suitable network topology for the store. Justify your recommendation by explaining how it aligns with the store's current needs and scalability for future growth.
Designing the Network Infrastructure:
Design a simple network layout for TechWorld Electronics, incorporating at least 2 different types of network devices (e.g., router, switch, and access point). Book assignment help service now!
Use Cisco Packet Tracer to create the network diagram. Show how the devices are connected, including any wireless devices and required configurations.
Ensure the design supports secure and efficient communication between the POS system, online sales platform, and employee workstations.
Addressing Network Security:
Identify potential security threats to TechWorld Electronics' network (e.g., unauthorized access, data interception, malware).
Recommend security measures, including firewall configurations, encryption, and secure wireless network setup, to protect both the internal network and customer data.
Assessment Item 2:
Introduction
This is a group project of 3-4 students in a group.
In this assignment, you will design, analyze, and compare two network types: Peer-to-Peer (P2P) and Client-Server. You will use appropriate software to create network diagrams and tools like Wireshark to capture and analyze traffic. The focus will be on identifying protocols, evaluating network scalability, performance, security, and reliability, and applying these concepts to real-world scenarios.
Case Study Scenario:
Your task is to design and evaluate two network setups for a medium-sized organization, "TechWorld Solutions," which provides both internal communication and external services. The company requires a robust internal network for file sharing and communication, and a secure, high-performance network for hosting web services and storing cloud data for customers.
Tasks:
Peer-to-Peer (P2P) Network Design:
Use Case: Design a P2P network for file sharing and internal messaging within the organization.
Network Diagram: Create a detailed network diagram using appropriate diagramming software (e.g., Lucidchart, Microsoft Visio, or draw.io). The diagram should include at least 5 devices (computers, printers, etc.) and indicate their connections.
Scalability and Performance Analysis:
Discuss how this P2P network would scale with additional devices.
Evaluate the network's performance, especially for file sharing and messaging. Consider factors such as latency, data consistency, and reliability.
Client-Server Network Design:
Use Case: Design a client-server network to support web services and cloud storage for customer data.
Network Diagram: Create a network diagram illustrating the client-server relationship. The diagram should include at least one server (hosting web services or cloud storage) and multiple clients (end-user devices accessing the services).
Scalability, Security, and Performance Analysis:
Discuss the scalability of the client-server network, especially with an increase in web traffic and data requests.
Evaluate security protocols (such as HTTPS) that could be used to secure communications between clients and the server.
Discuss performance in terms of server load, response time, and data transfer rates.
Protocol Identification & Network Efficiency Analysis:
Protocol Identification: - Identify the key protocols used in each network (P2P and client-server), such as file transfer protocols (FTP, SMB), HTTP/HTTPS, DNS, and TCP/IP. - Explain the function of each protocol and how it supports the respective network.
Network Efficiency Analysis: - Compare the scalability, performance, security, and reliability of the P2P and client-server networks. - Provide an analysis of how each network type handles growing demands, traffic, and security requirements.
Wireshark Traffic Capture and Analysis:
Capture Network Traffic: Use Wireshark to capture traffic for both the P2P and client-server networks during their operation. Perform traffic captures under various conditions (e.g., file transfer for P2P, web request for client-server).
Protocol Filtering and Analysis:
Filter the captured packets in Wireshark to identify key protocols (such as HTTP, FTP, TCP/IP, SMB) and analyze their role in network communication.
Explain how you filtered the traffic to identify different protocols and describe what information you gathered from each type of traffic (e.g., request/response flow, transmission times, packet loss).