Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Understanding Network Types, Topologies, and Devices: A Comprehensive Guide, Assignments of Network Programming

An overview of various network types, their benefits and constraints, network topologies, and the operating principles of networking devices and server types. It covers topics such as Local Area Networks (LAN), Wireless LAN, MAN, Personal Area Networks (PAN), network protocols like Ethernet and HTTP, and network devices like switches, routers, hubs, bridges, and print servers.

Typology: Assignments

2021/2022

Uploaded on 04/21/2022

hai-le-41
hai-le-41 🇻🇳

1 document

1 / 37

Toggle sidebar

Related documents


Partial preview of the text

Download Understanding Network Types, Topologies, and Devices: A Comprehensive Guide and more Assignments Network Programming in PDF only on Docsity! ASSIGNMENT 1 FRONT SHEET Qualification BTEC Level 5 HND Diploma in Computing Unit number and title Unit 2: Networking Infrastructure Submission date Date Received 1st submission Re-submission Date Date Received 2nd submission Student Name Student ID Class Assessor name Student declaration I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student’s signature Grading grid P1 P2 P3 P4 M1 M2 D1 3 LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. Assignment Brief and Guidance: Assignment scenario You are employed as a network engineer by Nguyen Networking Limited, a high-tech networking solution development company, which has branches in Ho Chi Minh City, Hanoi, Da Nang and Can Tho. The company has been contracted to implement a networking project from a local educational institute. The specification of the project is given below: • People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers including the academic heads and the programme managers, and 3 computer network administrators. • Resources: 50 student lab computers, 35 staff computers, and 3 printers. • Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located on the first floor and another located on the second floor. Task 1 The CEO of the company, Mr. Nguyen, has asked you to investigate and explain networking principles, protocols and devices and submit a report. You will need to produce a report that includes the following: • An introduction to provide an overview of your report. • Benefits and constraints of different types of networks and networking standards. • The impact of network topology, speed of communication and bandwidth requirements. • Effectiveness of networking systems. • Discussion on operating principles of networking devices and server types and networking software. • Discuss the relationship of workstation hardware with networking software. • Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. • For the given specification, identify the topology protocol for the efficient utilization of a networking system. Learning Outcomes and Assessment Criteria (Assignment 1): Learning Outcome Pass Merit Distinction 4 LO1 P1 Discuss the benefits and constraints of different network types and standards. P2 Explain the impact of network topology, communication and bandwidth requirements. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. D1 Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system. LO2 P3 Discuss the operating principles of networking devices and server types. P4 Discuss the inter- dependence of workstation hardware with relevant networking software. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimisation. 5 Contents Introduction ........................................................................................................................................................................................ 6 P1 Discuss the benefits and constraints of different network types and standards .............................................. 6 1.1 Overview about ...................................................................................................................................................................... 6 1.2 Overview about Protocol ................................................................................................................................................ 10 P2 - The impact of network topology, communication and bandwidth requirements ...................................... 12 2.1 Overview about Topology ............................................................................................................................................... 12 2.2 Communication ................................................................................................................................................................... 18 2.3 Rules of Communication ................................................................................................................................................. 18 P3. Discuss the operating principles of networking devices and server types...................................................... 20 3.1 Network devices ................................................................................................................................................................. 20 3.2 Network server ................................................................................................................................................................... 22 P4 - Discuss the inter-dependence of workstation hardware with relevant networking ................................ 27 software ............................................................................................................................................................................................. 27 4.1 Discuss .................................................................................................................................................................................... 27 M1.Compare common networking principles and how protocols enable the effectiveness of networked systems ....................................................................................................................................................................... 29 5.1 Compare circuit switching and packet switching .................................................................................................. 29 5.2 How the protocols enable networked systems to connect efficiently using these .................................. 31 principles ...................................................................................................................................................................................... 31 M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimisation ................................................................................................ 32 6.1 Range server ........................................................................................................................................................................ 32 References ........................................................................................................................................................................................ 33 Figure Figure 1 Network devices .................................................................................................... 7 Figure 2 Overview about protocol ...................................................................................... 12 Figure 3 Star Topology ...................................................................................................... 15 Figure 4 Bus Topology ....................................................................................................... 16 Figure 5 Ring Topology...................................................................................................... 16 Figure 6 Hybrid Topology ................................................................................................... 17 Figure 7 Hybrid Topology ................................................................................................... 18 Figure 8 Tree Topology ...................................................................................................... 19 Figure 9 Switch .................................................................................................................. 21 Figure 10 Router ................................................................................................................ 22 8 Troubleshooting and maintenance of CAN are expensive as compared to other networks. The connection between nodes (computers) is limited in size i.e. you cannot connect a large number of nodes together in CAN. And also CAN have a maximum length of 40 meters. Home Area Networks (HAN) -Define: A home area network connects devices within a home environment. It might include personal computers, tablets, smartphones, printers, TVs and other devices. This Home Area Network enables communication and sharing of resources between the smart devices over a network connection. -Benefits: Home Area Network provides better security as it is enabled with security software, passwords,..etc, which protects it from unauthorized access. Much easier to manage since it's connected to home network. -Constraints: We can see that the high cost may be considered to be one of the biggest disadvantages, it requires smart and high-tech devices to work in the network. Wireless Local Area Network (WLAN) -Define: Wireless LAN is a network that allows devices to connect and communicate wirelessly. Unlike LAN, WLAN is used the internet to commute despite of using traditional cables. -Benefits: It is easier to add or remove workstation. You can also move workstation while maintaining the connectivity. For propagation, the light of sight is not required. The direction of connectivity can be anywhere i.e. you can connect devices in any direction unless it is in the range of access point -Constraints: WLAN requires license, it has a limited area to cover. Government agencies can limit the signals of WLAN if required. This can affect data transfer from connected devices to the internet. If the number of connected devices increases then data transfer rate decreases. Metropolitan Area Network (MAN) -Define: MAN network is a network model that is connected from many LANS together through cables, transmission facilities, etc. The connection range is in a wide area like in a city. The main users of the MAN network model are organizations and businesses that have many branches or departments connected to each other. -Benefits: Even though the prices is not as expensive as WAN, MAN gives a good connection, all data is easily manageable in a centralized way. Moreover, the security sever is better than WAN. 9 -Constraints: As it cannot work on phone copper wires. Copper wires affect the speed of MAN. So high cost is needed for fiber optics. In this network, there is a high risk of attacking hackers as compared to LAN. So data may be a leak. Highly security staff is the need in MAN. Metropolitan Area Network (MAN) -Define: MAN network is a network model that is connected from many LANS together through cables, transmission facilities, etc. The connection range is in a wide area like in a city. The main users of the MAN network model are organizations and businesses that have many branches or departments connected to each other. -Benefits: Even though the prices is not as expensive as WAN, MAN gives a good connection, all data is easily manageable in a centralized way. Moreover, the security sever is better than WAN. -Constraints: As it cannot work on phone copper wires. Copper wires affect the speed of MAN. So high cost is needed for fiber optics. In this network, there is a high risk of attacking hackers as compared to LAN. So data may be a leak. Highly security staff is the need in MAN. Enterprise Private Networks (EPN) -Define: An enterprise private network is used by a company to connect its various sites so that the different locations can share resources. -Benefits: It provides the maximum security. In addition, the cost of physically transporting data to various departments/parts of an organization located over vast areas is reduced. -Constraints: A full-time network administrator is needed to keep the system up and going. The use of firewalls, security protocols and systems increase the costs of upkeep and maintenance for an organization. Backbone Networks (BBN) -Define: A backbone is a part of a network that connects different pieces and provides a path for information to be exchanged. -Benefits: 10 The primary advantage of a distributed backbone is that it can reduce the impact of the failure of any given node. This is particularly true if services and resources are distributed around the nodes. The distributed backbone also has the effect of segmenting the network, which can be advantageous in localizing the impact of network problems, and aiding in the troubleshooting of those problems. -Constraints: The prime disadvantage of a distributed backbone is that the backbone links are shared by users and services located right around the network. If there is a growth in the bandwidth needs of the users who are local to one node of the backbone, that growth can potentially affect multiple backbone links. Personal Area Networks (PAN) -Define: Personal area network (PAN) is an interconnection between different devices like smartphone, tablet,computer and other digital devices. PAN is used for a personal purpose like data sharing among devices and it has a range of 10 meters. Some type of personal area networks is wired like USB while others are wireless like Bluetooth. Wireless personal area network is also known as WPAN. -Benefits: Personal area network does not require extra wire or space. For connecting two devices you only need to enable Bluetooth in both devices to start sharing data among them. -Constraints: infrared have a slow data transfer rate as compared to another type of networks like LAN (local area network). 1.2 Overview about Protocol Network protocols are a collection of rules that specify how computer network components, from servers and routers to endpoints, format, send, and receive data. For device networks, standardized protocol networks provide a common language. Computers would be unable to interact with one another without them. A network protocol links one device's layer to another device's layer, with each layer adding control information to the communication. The message is eventually carried via a stream of bits carried by the physical layer. Each protocol is implemented at each layer on each network device. Ethernet is a network protocol designed for use in local area networks (LAN). 13 Types of Topology I'll walk you through the most common network topology definitions to give you a feel for the advantages and disadvantages of each: Star Topology A star topology, the most common network topology, is a network model consisting of a central device and information nodes under the control of that center. The information nodes here can be workstations, terminals or other devices in the LAN system. The central hub plays roles as a manager, control activities in the system. Figure 3 Star Topology 14 Advantages: - When an error occurs in one machine, the whole system still works normally since it works on the principle of parallel connection. - Devices can be added, removed, and modified without taking the entire network offline. - Easy to install. Disadvantages: - Cost of wire network and intermediate equipment. - if the central hub goes down, the rest of the network can't function. - The distance to connect is limited. • Bus Topology This is a type of Topology where all devices such as servers, workstations, and information nodes are linked together on a main cable to transmit data. The two ends of the cable are sealed with two terminator devices.The data and signals transmitted over the cable carry the specific address of the destination. Figure 4 Bus Topology Advantages: - Cost-effective choice for smaller networks because the layout is simple. - No limit on cable length. - It is difficult to determine the error occurred, so it is necessary to suspend the system operation for inspection and recovery. - When transmitting data with a large amount of storage, it is easy to lead to state congestion on the transmission line. • Ring Topology 15 Ring topology is where nodes are arranged in a circle (or ring). The data can travel through the ring network in either one direction or both directions, with each device having exactly two neighbors. Figure 5 Ring Topology Advantages: - Easily extend the LAN system further. - Saving cable length by not requiring as many conductors as the above two types of links. - The network speed is faster than the bus topology. Disadvantages: - The entire network must be taken offline to reconfigure, add, or remove nodes. And while that's not the end of the world, scheduling downtime for the network can be inconvenient and costly. Mesh Topology Mesh network is a type of Topology in which each computer will be linked to all other computers on the system without having to connect via Hub or Switch. The web-like structure of mesh topologies offers two different methods of data transmission: routing and flooding. It is similar to the structure of the internet today. 18 Figure 8 Tree Topology Advantages: - This topology is the combination of bus and star topology. - This topology provides a hierarchical as well as central data arrangement of the nodes. - Supported by several hardware and software vendors. Disadvantages: - Requires large number of cables compared to star and ring topology. - The Backbone appears as the failure point of the entire segment of the network. 2.2 Communication Network communication, or internetworking, defines a set of protocols (that is, rules and standards) that allow application programs to talk with each other without regard to the hardware and operating systems where they are run. Internetworking allows application programs to communicate independently of their physical network connections. 2.3 Rules of Communication Message Encoding: - Encoding between hosts must be in appropriate format for the medium. Messages are first converted into bits by the sending host. Each bit is encoded into a pattern of sounds, light waves, or electrical impulses depending on the network media The destination host receives and decodes the signals in order to interpret the message. Message Formatting and Encapsulation: - There is an agreed format for letters and addressing letters which is required for proper delivery. Putting the letter into the addressed envelope is called encapsulation. Each computer message is encapsulated in a specific format, called a frame, before it is 19 sent over the network. A frame acts like an envelope providing destination address and source address. Message Size: - Humans break long messages into smaller parts or sentences. Long messages must also be broken into smaller pieces to travel across a network. Each piece is sent in a separate frame. Each frame has its own addressing information. A receiving host will reconstruct multiple frames into the original message. Message Timing: - Access Method: Hosts on a network need to know when to begin sending messages and how to respond when collisions occur. - Flow Control: Source and destination hosts use flow control to negotiate correct timing to avoid overwhelming the destination and ensure information is received. - Response Timeout: Hosts on the network have rules that specify how long to wait for responses and what action to take if a response timeout occurs. 2.4 Bandwidth Network bandwidth is a measurement indicating the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time. Typically, bandwidth is represented in the number of bits, kilobits, megabits or gigabits that can be transmitted in 1 second. Synonymous with capacity, bandwidth describes data transfer rate. Bandwidth is not a measure of network speed -- a common misconception. Why bandwidth is important: Bandwidth is not an unlimited resource. In any given deployment location, such as a home or business, there is only so much capacity available. Sometimes, this is due to physical limitations of the network device, such as the router or modem, cabling or wireless frequencies being used. Other times, bandwidth is intentionally rate-limited by a network administrator or internet or wide area network (WAN) carrier. 20 Figure 9 Switch P3. Discuss the operating principles of networking devices and server types 3.1 Network devices Switch: Switch is an important switching device in the network, used to connect network segments together in a star topology. In this topology, the switch plays a central hub and all other satellite devices including computers are connected here, thereby creating a temporary connection for data transfer. In addition, the Switch supports Full Duplex technology to expand the bandwidth of the transmission line, which other devices cannot do. The switch device can be understood simply as the data police of the information flow of a local network. It has the ability to select the path to determine the switch frame (unit of the data link layer) and the LAN to operate more efficiently. Router: Router (router) is a network device that forwards packet data between network computers. Understandably,the router performs "information directing" on the Internet. Data is sent over the Internet in the form of packets, such as web pages or emails. Packet data will be forwarded from one router to another through small networks, interconnected to form a network link, until the packet data reaches its destination. The process of converting packet data, how to get the packet data to the correct "address" that you read will be explored in more detail in the router section Routing process of the Router. 23 Figure 12 : DHCP Once a device is turned on and connected to a network with a DHCP server, it sends a request to this server,called a DHCPDISCOVER request. After the DISCOVER packet reaches the DHCP server, the server will try to keep an IP address that the device can use, and then provide the client with a DHCPOFFER package. DNS: DNS Server or Domain Name System is a system named in order for computers and services to participate in the Internet. It links a variety of information to the domain assigned to them so that users can use that domain to find out what information they need to know. It is important to choose a domain name that makes sense for the user, which is associated with other network devices to locate and provide information to users around the world. DNS Servers are responsible for assigning domains and mapping names to IP addresses by specifying the authorized servers for each domain. Servers with assigned authority names are responsible for their own domain names and in turn can assign their proprietary other server names to subdomains. 24 Figure 13: DNS FTP: FTP or File Transfer Protocol is a way to transfer files from one computer to another by the internet. FTP is a TCP/IP-basednetwork file transfer protocol, usually used to upload files to Host Servers with a default port of 21. Once linked together, the client can handle a number of file operations: download/rename/delete files on the server to the personal server and download files from the personal machine to the server. However, the transmission speed factor also plays an important role in the transmission of data via FTP. Figure 14: FTP Client: Client-server is a well-known model in computer networking, very widely adopted, and is the model of every existing website. The idea of this model to the server (acting as a service provider), the server will process and return the result to the server. In this model, the application program is divided into two components: Server and Client. Client is also known as a client, it includes computers and electronic devices in general. Server, also known as a server, is a place to install service programs and store resources. 25 Figure 15: Client Mail: A mail server or mail server is a place to store, categorize, and organize all incoming emails before being sent on the internet. Figure 16: Mail server Although you can send and receive emails in a split second, in fact, when the email is sent, it will go through a series of complex transition stages (other than the email address, these steps are more complicated) before reaching the recipient's mailbox. Web: A web server is a large computer connected to the user's computer network. This computer contains all the data of one or more websites it is authorized to process. Each web server has its own IP and is capable of reading multiple files such as HTML,HTM... Web servers often have large storage capacity and high processing speed to ensure the ability to store and operate data warehouses on the internet. The web server works continuously to provide data across the network of computers it connects to. 28 Figure 20 : Workstation hardware Networking Software: Networking software is a foundational element for any network. It helps administrators deploy, manage, and monitor a network. Traditional networks are made up of specialized hardware, such as routers and switches, that bundle the networking software into the solution. An Operating System (0.S.) is a System software that manages the hardware resources and provides services to the Application software. There are many types of operating systems depending upon its features and functionalities. They can be Batch O.S., Multitasking O.S., Multiprocessing O.S., Network O.S., Hybrid O.S., etc. Now, we'll see some common features of the Network O.S. Network Operating System is a computer operating system that facilitates to connect and communicate various autonomous computers over a network. An Autonomous computer is an independent computer that has its own local memory, hardware, and O.S. It is self-capable to perform operations and processing for a single user. They can either run the same or different O.S. Network interface card (NIC) drivers are computerized instructions and information that are required for a NIC card to be operational after it is installed into or connected to a computer. These instructions usually are written by highly proficient computer programmers who might program in a variety of programming languages such as C or C++. A NIC card is a hardware device, and hardware drivers might be thought of as the computer code or machine language that "drives" hardware or makes it work. If a NIC card was physically connected to a machine but there were no NIC drivers available to provide the instructions and information necessary to permit the machine to know that the device had been attached and how it is supposed to work, network connectivity would not be achieved.are written by highly proficient computer programmers who might program in a variety of programming languages such as C or C++. A NIC card is a hardware device, and hardware drivers might be thought of as the computer code or machine language that "drives" hardware or makes it work. If a NIC card was physically connected to a machine but there were no NIC drivers available to provide the instructions and information necessary to permit the machine to know that the device had been attached and how it is supposed to work, network connectivity would not be achieved. 29 Figure 21 : NIC Although NIC drivers are developed in a specific programming language just as computer software is, they usually are not referred to as computer programs or software because they tend to be smaller in file size and have the specific purpose of "driving" a piece of hardware. They are, however, sometimes called driver software The interdependency of workstation hardware with networking software A work station is a computer intended for individual use that is faster and more capable than a personal computer. Since they are PCs, they can also be used independently of the mainframe assuming they have their own applications installed and their own hard disk storage. We are going to discuss the interdependence of workstation hardware with relevant networking software. Network interface card is a computer hardware part that enables computers to be combined together in a network usually a local area network. Computers that are networked always communicate with each other using a specified protocol for transferring data packets. Network Interface Card acts as a translator letting machine mutually send and obtain data on a LAN. Specialists in information system frequently use these cards to setup wireless or wired connections networks. M1.Compare common networking principles and how protocols enable the effectiveness of networked systems 5.1 Compare circuit switching and packet switching Circuit switching: Circuit switching is a method of implementing a telecommunications network in which two network nodes establish a dedicated communications channel (circuit) through the network before the nodes may communicate. The circuit guarantees the full bandwidth of the channel and remains connected for the duration of the communication session. 30 Figure 22: Circuit switching In telecommunications, packet switching is a method of grouping data that is transmitted over a digital network into packets. Packets are made of a header and a payload. Data in the header is used by networking hardware to direct the packet to its destination, where the payload is extracted and used by application software. Packet switching is the primary basis for data communications in computer networks worldwide. Figure 23 : Packet switching 33 Switching to DNS servers optimized for efficiency can speed up your surfing, whether in a home or business setting. Speaking of a business setting, some companies offer DNS services with business-friendly add-ons. For example, they can filter out malicious websites at the DNS level, so the pages never reach an employee's browser. They may also contain a lot of information to work in companies. I mentioned that your DNS server caches popular requests, so it can respond quickly, without having to query other components of the Domain Name System. So, to build a system with high securities for DNS server, a rack mount server is considered. A rack mount server is a computer dedicated to use as a server and designed to be installed in a framework called a rack.The rack consists of multiple mounting slots known as bays, each are designed to hold a hardware unit secured in place with screws. A single rack can contain different servers stacked one over the other, solidifying network assets and limiting the required floor space. The rack server design additionally streamlines cabling among system segments. In a hardware rack loaded up with servers, an uncommon cooling framework is important to avert exorbitant warmth development that would some way or another happen when many power-disseminating parts are kept in a little. References Andrew Froehlich, W. G. N. F., 2018. searchnetworking.techtarge. [Online] Available at: https://searchnetworking.techtarget.com/definition/bandwidth [Accessed 19 August 2021]. Anon., 2014. 123docz.net. [Online] Available at: https://123docz.net/document/4985-thiet-ke-lan-wan.htm [Accessed 22 August 2021]. Anon., 2016. sdxcentral. [Online] Available at: https://www.sdxcentral.com/networking/sdn/definitions/networking-software/ [Accessed 19 August 2021]. Anon., 2018. tcpipguide. [Online] Available at: http://www.tcpipguide.com/free/t_InternationalNetworkingStandardsOrganizations.htm#::text=Key%2 0Concept%3A%20There%20are%20a,%2C%20ITU%2DT%20and%20ETSI. [Accessed 18 August 2021]. Anon., 2018. techterms. [Online] Available at: https://techterms.com/definition/network [Accessed 17 August 2021]. Anon., 2020. geeksforgeeks. [Online] 34 Available at: https://www.geeksforgeeks.org/difference-between-physical-and- logicaltopology/ [Accessed 19 August 2021]. Anon., 2021. alliedtelesis. [Online] Available at: https://www.alliedtelesis.com/sites/default/files/documents/white papers/distributed_collapsed backbone_reva.pdf [Accessed 18 August 2021]. Anon., 2021. cnet. [Online] Available at: https://www.cnet.com/products/dell-poweredge-r320-rack-mountable- xeone5-2407v2-2-4-ghz-8-gb-1-tb/ [Accessed 22 August 2021]. Anon., 2021. geeksforgeeks. [Online] Available at: https://www.geeksforgeeks.org/difference-between-circuit-switching- andpacket-switching/ [Accessed 22 August 2021]. Anon., 2021. Power Point Slides Networking. HCM, Greenwich University VietNam. Anon., n.d. [Online] Available at: https://www.slideshare.net/nhumar/internet-and-networking [Accessed 16 August 2021]. Contributor, S., 2015. dnsstuff. [Online] Available at: https://www.dnsstuff.com/what-is-network-topology [Accessed 19 August 2021] Datta, S., 2018, baeldung. Available at: https://www.baeldung.com/cs/popular-network-protocols [Accessed 18 August 2021] Jahejo, A., 2018. computernetworktopology Available at: https://computernetworktopology.com/metropolitan-area-network/ [Accessed 18 August 2021]. Jahejo, A., 2019. computernetworktopology Available at: https://computernetworktopology.com/local-area-network/ [Accessed 17 August 2021] Jim Kurose, K. R., 2020. Computer Networking: A Top-Down Approach. 8th ed. s.l.:Pearson. McCauley, G., 2019. fieldengineer. Available at: https://www.fieldengineer.com/blogs/what-is-a-computer-network [Accessed 16 August 2021]. 35 Melnick, J., 2019. blog.netwrix. Available at: https://blog.netwrix.com/2019/01/08/network-devices-explained/ [Accessed 19 August 2021]. Rehman, J., 2020. itrelease. Available at: https://www.itrelease.com/2018/07/advantages-and-disadvantages- ofpersonal-area-network- [Accessed 17 August 2021]. Roomi, M., 2018. hitechwhizz. Available at: https://www.hitechwhizz.com/2020/07/6-advantages-and- disadvantagesdrawbacks-benefits-of-wan.html [Accessed 17 August 2021]. Yadav, S., 2020. snabaynetworking. Available at: https://snabaynetworking.com/enterprise-non-public-network-private-network/
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved