Evaluate the networks performance

Assignment Help Computer Networking
Reference no: EM133853210

Network Architecture

Assessment Item:

Introduction
This is a group project of 3-4 students in a group.

In this assignment, you will design, analyze, and compare two network types: Peer-to-Peer (P2P) and Client-Server. You will use appropriate software to create network diagrams and tools like Wireshark to capture and analyze traffic. The focus will be on identifying protocols, evaluating network scalability, performance, security, and reliability, and applying these concepts to real-world scenarios.

Case Study Scenario:
Your task is to design and evaluate two network setups for a medium-sized organization, "TechWorld Solutions," which provides both internal communication and external services. The company requires a robust internal network for file sharing and communication, and a secure, high-performance network for hosting web services and storing cloud data for customers.

Tasks:

Peer-to-Peer (P2P) Network Design:
Use Case: Design a P2P network for file sharing and internal messaging within the organization.
Network Diagram: Create a detailed network diagram using appropriate diagramming software (e.g., Lucidchart, Microsoft Visio, or draw.io). The diagram should include at least 5 devices (computers, printers, etc.) and indicate their connections.
Scalability and Performance Analysis:
Discuss how this P2P network would scale with additional devices.
Evaluate the network's performance, especially for file sharing and messaging. Consider factors such as latency, data consistency, and reliability.

Client-Server Network Design:
Use Case: Design a client-server network to support web services and cloud storage for customer data.
Network Diagram: Create a network diagram illustrating the client-server relationship. The diagram should include at least one server (hosting web services or cloud storage) and multiple clients (end-user devices accessing the services).
Scalability, Security, and Performance Analysis:
Discuss the scalability of the client-server network, especially with an increase in web traffic and data requests.
Evaluate security protocols (such as HTTPS) that could be used to secure communications between clients and the server.
Discuss performance in terms of server load, response time, and data transfer rates.

Protocol Identification & Network Efficiency Analysis:
Protocol Identification: - Identify the key protocols used in each network (P2P and client-server), such as file transfer protocols (FTP, SMB), HTTP/HTTPS, DNS, and TCP/IP. - Explain the function of each protocol and how it supports the respective network. Book assignment help service now!
Network Efficiency Analysis: - Compare the scalability, performance, security, and reliability of the P2P and client-server networks. - Provide an analysis of how each network type handles growing demands, traffic, and security requirements.

Wireshark Traffic Capture and Analysis:
Capture Network Traffic: Use Wireshark to capture traffic for both the P2P and client-server networks during their operation. Perform traffic captures under various conditions (e.g., file transfer for P2P, web request for client-server).
Protocol Filtering and Analysis:
Filter the captured packets in Wireshark to identify key protocols (such as HTTP, FTP, TCP/IP, SMB) and analyze their role in network communication.

Explain how you filtered the traffic to identify different protocols and describe what information you gathered from each type of traffic (e.g., request/response flow, transmission times, packet loss).

 

Reference no: EM133853210

Questions Cloud

Name five anti-tuberculosis drugs : Name five anti-tuberculosis drugs. What are the primary differences (in use) between them? What are the goals of pharmacological treatment of TB?
What is the principal diagnosis code : Using the techniques described in this chapter carefully read through the case study and determine the most accurate. What is the principal diagnosis code?
Infected diabetic ulcer on her left leg : Mrs. Y is an 84-year-old client who was recently discharged from the hospital for an infected diabetic ulcer on her left leg.
Which drug could be the frontline medication to treat blood : A patient has developed mild hypertension. Which drug could be the frontline medication to treat the blood pressure of this patient?
Evaluate the networks performance : Evaluate the networks performance, especially for file sharing and messaging. Consider factors such as latency, data consistency, and reliability
Spontaneous vaginal delivery : Betsy Lambert is a primigravida who had a spontaneous vaginal delivery at 09:41 today. An overview of her history reveals the following: 23 years old
What is he referring to : A 58-year-old male has been diagnosed with erectile dysfunction and says that a friend told him about a method that uses constricting. What is he referring to?
Nurse is teaching client how to collect sputum specimen : The nurse is teaching a client how to collect a sputum specimen. Which steps should the nurse instruct the client to follow when collecting sputum?
What is the nurse practitioner should recommend : A 62-year-old male has a low International Prostate Symptom Score for lower urinary tract symptoms associated. What is the nurse practitioner should recommend?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd