Wednesday, May 6, 2020

Case Study of PriceLo Malls Inc - Get Free Sample

Question: Discuss about theNetwork Design Overview for a Case Study of PriceLo malls Inc. Answer: Introduction PriceLo malls Inc. is one of the leading company that has several malls situated within Australia, Melbourne, Sydney. The company wants to develop an innovative network infrastructure that will provide the facility of being connected with the internet through wired or wireless medium within the shopping mall. All the users of this network infrastructure will be provided the internet speed according to their amount of purchase from the mall. This report is elaborating the network infrastructure with respect to the concerned demands of the company. Network Design Top-Down Design The leading shopping mall has been used the To-Down approach in order to set up their network infrastructure. The top-down design approaches used for the network infrastructure of the PriceLo mall are elaborated with respect to the business requirements and objectives of the organization [1]. The business needs specified in the too-down network infrastructure within the mall has introduced all the technical details needed for designing the infrastructure. In addition to this, the affordability, availability, scalability as well as the security measures related to the each node connected within the network of shopping mall is elaborated with detailed specification. The top-down approach specifies the technical details before selecting the hardware components for the network infrastructure [2]. In accordance with this particular case study, the application of the top-down infrastructure is discussed with respect to the upper layer related to the OSI model [3]. Session, data transport and other network specifications are chosen before the selection of the connected components in the hardware part of the infrastructure. Therefore, it is probable that the network infrastructure has selected the top-down structure for integrating all the network components [4]. The primary overviews of the customer needs are focused with respect to the different technological preferences. Disadvantages in not following the structured design approach: There will be a huge amount of the lack of efficiency within the network infrastructure of the PriceLo mall if it does not follow the structured approach of networking [5]. PriceLo will face an entire malfunctioning within the structured network components if the structured approach is not followed and at that time the requirement changes [6]. Therefore, any changes made on the designed approach will directly affect the owner of the company, as the entire structure will be crashed down. Characterization of the Internetwork and Network Traffic in the Designed Network Necessity for doing the estimation of traffic amount in the network: The designing of the network infrastructure within the PriceLo mall, it is important to recognize the amount of the traffic consumed as well as the characteristics of the traffic. The estimation of the consumed traffic in the mall is essential, as it will help to maximize the efficiency and minimize the latency of the network [7]. This estimation of the traffic also estimates the capacity, reliability of the network with respect to the demands of the PriceLo malls. This entire set up results into the effective design and implementation of effective topology within the infrastructure. Process of estimating Network Traffic: The significant estimation of the network traffic introduced the data involved within the traffic. In addition to this, these data also explains the Bandwidth requirement and load imposed by the network [8]. The traffic is measured with the help of the comparable estimation based on the present and past network models. Traffic loads and models are analyzed with the help of the DES models. Apart //from these models, Pareto Distribution Process, Embedded Markov Models and Weibull distribution methods are used in estimating the data transferred within the traffic [1]. Different types of Traffic Flows within PriceLo: The flow of traffic within the PriceLo malls are generally explained as the amount of data flowed in a sequence of packets. The identified traffic flows within the PriceLo malls are explained as follows: Server-to-Client Traffic Flow: This type of the Traffic flow is both Bidirectional and asymmetric. In addition to this, all the data are flowed from the destination to the source [3]. The traffic generally flows from customers and staffs by using the network to server architecture of the system. HTTP and FTP are most convenient examples of this network architecture. Server-to-Server Traffic Flow: This kind of traffic flow allows the bidirectional traffic flows [5]. Both the communication measures between the staffs and admin are managed in this network. Network Design with Security Proposal Security of the considered wired and wireless networks should be managed with highest priority. All the information shared within this network must be kept confidential. There must be several security applications that will protect the network architecture such as Arpwatch, that will monitor the activities within Ethernets [6]. Nmap scanner will discover the services and host networks incorporated within the network. In addition to this, EtherApe will monitor the modes concerned with the Ethernet connections. The graphical measurements of the host as well as the server are essential in order to consumer traffic within the network [7]. The authorization should be there in order to provide security to the information transferred within the network. Tcpdump application is used to analyze the amount of data within a packet transferred. In addition to this, the network should consider the laws and legislations that might have to be obeyed by the network infrastructure [2]. The Cyber Crime Act and Spam Act has to be followed by the network infrastructure of the PriceLo. This network protocol identification will help to identify the unauthorized structure of the users and servers within the network infrastructure of PriceLo. References "The research of IoT architecture model and internetworking mechanism",SCIENTIA SINICA Informationis, 2013. D. Vardalis and V. Tsaoussidis, "Exploiting the potential of DTN for energy-efficient internetworking",Journal of Systems and Software, vol. 90, pp. 91-103, 2014. S. Watanabe and Y. Kabashima, "Cavity-based robustness analysis of interdependent networks: Influences of intranetwork and internetwork degree-degree correlations",Physical Review E, vol. 89, no. 1, 2014. Optical Switching and Networking",Optical Switching and Networking, vol. 10, no. 4, pp. 463-464, 2013. T. Li, S. Chen and Y. Ling, "Per-Flow Traffic Measurement Through Randomized Counter Sharing",IEEE/ACM Transactions on Networking, vol. 20, no. 5, pp. 1622-1634, 2012. A. Bremler-Barr and Y. Koral, "Accelerating Multipattern Matching on Compressed HTTP Traffic",IEEE/ACM Transactions on Networking, vol. 20, no. 3, pp. 970-983, 2012. I-Hong Hou, "Broadcasting Delay-Constrained Traffic Over Unreliable Wireless Links With Network Coding",IEEE/ACM Transactions on Networking, vol. 23, no. 3, pp. 728-740, 2015. A. Verma and N. Bhardwaj, "A Review on Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) Routing Protocol",International Journal of Future Generation Communication and Networking, vol. 9, no. 4, pp. 161-170, 2016.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.