ITC542 Internetworking With TCP

Hello, this question is here because we've worked on this and other similar assignments. If you don't know the answer, you can ask us for help. We guarantee an original paper free from Plagiarism.

Order a Similar Paper Order Different Paper

We got you covered for the whole semester.

Question:

This simple addressing solution is a detailed one with diagrams and step-by workouts of the calculations. It leaves room for growth and is easy to manage and wastes the least possible IP address space.

b. Describe what will happen to your design if there are more hosts per network than 1 024.

A 600-word (+/- 10 percent report to the board proposing to allow network analyzers for diagnostic purposes in a new network architecture.

Your report should contain:

Brief explanation of protocol in relation to communication networks and the role network analysts.

The Task 1 example should provide an example of how network analysers could be used.

A review of the available network analysis tools.

The analysis should contain the following:

Benefits, associated cost, usability

Recommendation by you as to which tool you would prefer to use, and why.

Answer:

The M2M network needs an address scheme. It uses IP address 10.0.0.0 to get subnets IP addresses.

1st Finance Office, 260 workstations

This department is home to 260 workstations. It therefore needs 260 Ip addresses.

Hosts bits =2k-2=260

This means that the Host bits are now 9 bits

Therefore =8+8+8+8+8+8-9=23.

The network subnet mask is presented in number format like i.e.255.255.254.000.

Thus, the Block size can be expressed as 29=512

This subnet IP address is a range of 10.0.0.0/23 through 10.0.0.511/23 with 265 workstations.

2nd Transport Office, 130 workstations

This department has a total 130 workstations. It therefore needs 130 hosts IP addresses. The following can be calculated:

Hosts bits =2k-2=130

This means that the Host bits are now 8 bits

Thus =8+8+8+8+8-8=24.

The network subnet mask is presented in number format like 255.255.255.000.

Thus, the block size is 28=256

This subnet IP address is a range of 10.0.1.0/24 through 10.0.1.255/24 with 130 Workstations.

3rd Research Office featuring 120 workstations

This department has 120 workstations. It therefore needs 120 hosts IP addresses. The following can be calculated:

Hosts bits =2k-2=120

This means that the Host bits are now 7 bits

Also, 8+8+8+8+8+8+8-7=25.

The network subnet mask is presented in number format like i.e.255.255.255.128.

Thus, the Block size can be expressed as 27=128

This subnet IP address is a range of 10.0.2.0/25 to10.0.2.127/25 with 120 Workstations.

Fourth Sales Office, 40 workstations

This department has 40 workstations. It therefore needs 40 hosts IP addresses. The following can be used to calculate the number:

Hosts bits =2k-2=40

This means that the Host bits are now 6 bits

Therefore =8+8+8+8+8-7=26.

Thus, the block size is 26=64

This subnet IP address is a range of 10.0.3.0/26 to10.0.3.63/26 and includes 40 workstations.

5th Information technology with 52 workstations

This department has a total number of 520 workstations. It therefore needs a total IP address of 520 hosts. The following can be calculated:

Hosts bits =2k-2=520

This means that the Host bits are now 10 bits.

Thus =8+8+8+8+8-10=22.

Thus, the Block size can be expressed as 210=1024

This subnet IP address is a range of 10.0.4.0/22 through 10.0.4.1023/22 and includes 520 workstations.

6th Head office with 520 workstations

This department is home to 60 workstations. It therefore needs 60 IP addresses.

Hosts bits =2k-2=60

This means that the Host bits are now 6 bits

Thus =8+8+8+8+8+8-6=26.

Thus, the block size is 26=64

This subnet IP address is a range of 10.0.5.0/26 through 10.0.5.64/26 and includes 60 workstations.

Design: What Happens When Hosts Increase Above 1024 Per Building?

These networks will be unable to host devices if the number of host hosts in each house exceeds 1024 hosts. To accommodate them, it is necessary to increase the hosts mask to approximately /21 or higher. This will give the networks at least 2046 hosts addresses.

Communication Network Protocols

Information technology uses communication protocols. These are rules that network devices use to communicate with each other. They act as an interface between the two networking devices.

The protocols are used to transmit data via network telecommunication. They work by transferring data signals from the computer’s hardware through network software.

Open system interconnection is a standard model in networking. It includes a correction for layers and is internationally used.

The following protocols are used in the internet network:

Transmission Control Protocols, also known as TCP, are used to transmit data packets between two points.

Internet Protocols, (IP),This protocol uses some rules for sending and receiving messages via the internet address level.

Hypertext Transfer Protocols (HTTP), this protocol allows applications that are the same to communicate at distant distances via the internet.

Other protocols are used in networking. These include Borders Gateway Protocols, (BGP), and Dynamic Hosts Configuration Protocols Protocols (DHCP). They also use some rules to communicate.

The protocol is broken into seven OSI layers. These layers aid in the propagation data packets from their source to their destinations.

Layer seven: Application layer.

This layer allows communication to be established between two nodes on a network. In this layer, the sender device creates contents, sends them through the network, and the recipient device opens them.

Layer six: The presentation layers.

This is a layer in the computer operating systems. It converts data from one format to the other.

Layer five: Session layer.

This layer aids in the recovery of broken communication or communication that has been interrupted.

Layer four: The transport layer.

This is the layer that regulates the movement of data packets through the network. However it also controls the delivery of data packets.

Layer three: Network layer.

This layer is responsible for routing data packets, and determining the destination addresses of packets within the network.

Layer two: Data-link layer.

This layer creates a physical connection to the network. However it also converts data packets to frames in the network. It consists of two layers, the linking controls layer, and the media access control layer where the network cables can be used.

Layer one: This is the physical layer.

This is the layer responsible for transmitting data bits via the recommended network hardware.

Roles Of Network Analysts.

This is a correction to the hardware system or software program. It is installed in the network, or on a computer hardware, in order prevent malicious activities by unauthorised persons (Cory (2015)).

The network analyzers are designed to augment firewalls and other anti-virus programs on your computer. It can also be used for the following:

To update the administrator’s statistical data on any event occurring in the computer networks.

To test antivirus software, and to see if there are any vulnerabilities.

Detecting unusual levels of network traffic

How to determine the strange characteristics of the data packets used in the network.

It determines which packets are coming from where and what destination they will be going to.

It is used for configurations of network alarms that alert network systems to possible threats.

It is used for tracing data within transmitting packets.

It is used to monitor bandwidth usage for a specific period.

It is used for setting up network applications.

This data is displayed in user friendly panels.

Analyze of various network analyzer tools.

The wireshark is an extremely powerful market protocol analyzer that can be obtained free of cost or for a nominal fee.

This tool is recommended by network analysts as the best because it has the most standardized features. The tool also supports offline analysis and live capturing on many platforms, including windows and Linux.

Access to network data is possible through the graphical user interfaces or the TTY modes TShark utilities.

Other features include powerful displays filter, VoIP analysis, the ability to open multiple formats, the ability to read Ethernets, Bluetooth signals and enable decryption among other things (Richard (2015)).

This network analysis tool is automated to detect and manage any activity in the network and notify,measuring its performance. Additionally, it offers some features that enhance the service delivered.

This tool has two modules on the client side. It will aid them in locating the networks and detect any bandwidth losses, alarms, or any network-related interfaces.

Microsoft Network Monitor can be used to analyze packets and capture, view and analyse traffic within any network being analyzed.

This tool allows the user to troubleshoot problems in the network and in any software it uses. It can also be used with many protocols that detect sessions, wireless protocols, and the detection of most common traffic in the network (Andrew (2014)).

Benefits, Associated Costs and Ease of Useability

The Network analyzer is an important tool. It allows you to capture the analyzing of netflow, Jflow and Sflow within the network system.

The tool allows you to track the traffic of computer networks through the identification of network users. Details are also updated simultaneously (Behrouz (2015)).

This tool is useful in analysing network activity. It helped network users trace various operations. However, there are some advantages as we will discuss below.

The network’s operation and maintenance cost can be reduced.

Increased network speed for users

It allows for greater flexibility in the network.

The Top Network Analysis Tools

There are many network analyze tools available that can be used for analysing the computer network. Wireshark, however, is the most preferred network analysis tool. This is because it is robust and can analyze any size network.

The wireshark software is very user-friendly and makes use of the T-Sharks properties.

The tool displays data and can also be used to filter out data packets that have errors. It also analyzes Voices (William 2014).

If you don't know the answer to this question, you can ask us for help. We guarantee an original paper free from Plagiarism.

Order a Similar Paper Order Different Paper

You can trust us with any of your assignments. We got you covered for the whole semester. We dedicate one writer to do all your assignments

Leave a Reply

Your email address will not be published. Required fields are marked *