ITC542 Internetworking with TCP/IP: Protocol Analysis
Questions:
Q 1
What is a protocol in the context of communication network? Describe the purpose of protocol analysis. Your answer should contain description of a real-time situation where protocol analyser can be used. List any three popular protocol analyzer solutions currently available in the market. [ 5 Marks]
Question 2
You are asked to visit a pharmaceutical company to help troubleshoot some network connectivity problems. The company’s network consists of 11 workstations connected by a single 24 port hub. The company manager describes the problem as consistent and explains that every morning there is a five minute delay to connect to the main server. The manager indicates that every user on the network has the same problem. Using your protocol analyzer where would you tap into this network and why? Explain how this network is different to modern networks. [ 5 Marks]
Question 3
Differentiate between distance vector routing and link state routing. Your answer should describe the key features of the two utlising some real time examples and where possible supported by diagrams. [ 5 Marks]
Question 4
Complete following Hands-On Projects from the prescribed textbook (Pyles, Carell & Tittel 2017).
- Hands-On Project 1-1
- Hands-On Project 1-2
In order to complete this activity, students should insert screenshots in the assignment document along with a short description of each step taken to complete the projects. [ 5 Marks]
Question 5
As a network administrator for a medium sized company, you have been asked to design a network by utilizing 10.0.0.0 private IP address. The network will span six buildings with a router in each building to join the networks. Currently, the company has approximately a total of 1,000 workstations in the following locations:
- Building A - 200 workstations
- Building B - 125 workstations
- Building C - 135 workstations
- Building D - 122 workstations
- Building E - 312 workstations
- Building F - 105 workstations
It is assumed that each building will have its own single subnet, design a simple addressing solution that leaves room for growth and is easy to administer. Explain what happens to your design if the number of hosts per network jumps to over 1,024 per building. [ 5 Marks]
Question 6
Explain the purpose of QoS on a TCP/IP network. Define the basic purpose and differentiate between IP precedence, TOS, ECN and Diffserv functionalities. [ 5 Marks]
Rationale
This assessment aims to assess the following learning objectives of this subject:
- be able to analyse IP addressing requirements and design an addressing scheme;
- be able to analyse the requirements of IP routing and choose appropriate routing methods;
- be able to demonstrate how internetworking devices obtain their network configuration;
- be able to explain how data flows through the internet; and
- be able to ascertain and evaluate selection of applications and protocols for transferring data across the internet.
Answers:
A 1:
Protocols can be defined as the special set of rules used for the sending and receiving the data packets in the network. The protocols finds is application in the specifying the interaction between the entities used for communication. With respect to the network the protocols are used for interchanging data using the hardware devices and algorithms (Hoque et al., 2014). In the OSI model more than one protocol are use in each layer and is use for exchanging the information. In case of TCP/IP communication different protocols are used like TCP, IP, FTP, etc.
The protocol analysis is a research methodology used for studying the procedures used in the system for computing the function. Essentially the engineering of protocol analysis depends on layering of various system conventions and distinctive specialized gadgets. In the convention investigation the information which is available on one layer is speak with other information display on a similar layer and after the correspondence procedure they can exchange starting with one framework then onto the next organized framework (Elias & Ali, 2014). Protocol analysis additionally assumes its essential part in checking the activity of systems administration amid transmission.
A
protocol analyzer can be used when a lag is noticed in the network or there the data packets are getting lost before they reach the destination address. If the users connected in a network send s a file to another user and it does not received and gets lost then there is a need to implement the protocol analyzed for monitoring the network traffic and flow of the data packets (Shi, Wang & Xu, 2015).
Protocol analyzer currently available in the market is as follows:
- Ethereal
- OptiView Protocol Expert
- Netasyst Network Analyzer
A 2:
The network protocol analyzer is utilized for finding the 5 minute deferral while building up an association between the principle server and the work station. The network protocol analyzer is a mix of programming and equipment that is required to be introduced in the organization's system and discover the measurements of the present movement of the system (Goyal & Arora, 2017). The protocol analyzer analyzes the unusual level of traffic arising from which point and is required to be connected with the hub that centrally connects the work stations and the server. The hub shares the data with all the 24 port even if no device is connected with the port. This is the reason to tap the hub and find the traffic generation point and the cause of the delay in the server.
The network infrastructure of the given pharmaceutical company is outdated because the Hubs are now obsolete because it causes delay in the network by broadcasting the data packets to all the ports. The hubs are being replaced with switch and it increases the efficiency of the network. The switch passes the data only to the device connected to the port having a valid Mac address and can be programmed for eliminating the passage of unnecessary data packets and information.
A 3:
In case of distance vector routing a network calculation is used for calculating the distance of the source and the destination by sending a list of the know network to the next or neighbor router but in case of link state routing the router have all the information about the network such as which state is up or down and it also have the information about the speed of the network (Moussaoui, Semchedine & Boukerram, 2014). In distance vector routing a shorter path is chosen by the router irrespective of the transmission medium but in link state routing the path is selected based on the medium used for interconnecting the device and irrespective of the number of hops.
Some example of distance vector routing protocol are as follows:
- Appletalk RTMP
- IP RIP
- IPX RIP, and
- IGRP
Some examples of link state routing are:
- OSPF
A diagram is created and used for understanding the working of the Distance vector and the link state routing
Figure : Distance vector and Link state routing
(Source: Moussaoui, Semchedine & Boukerram, 2014)
In case of distance vector routing the packet would pass through A, B because it is the shortest path to reach the destination. The network speed is not calculated and the packets would take 10x more time to reach if the path A, C, D and B was followed.
This problem is solved in case of linked state routing where the network speed is calculated and the router would select the path A, C, D, B to reach the destination address.
A 4:
i. Hands-On Project 1-1: Installation of Wireshark
Figure 1: Downloading wireshark from www.wireshark.org
Figure 2: Accepting license aggement for installing wireshark
Figure 3: Choosing components for installation
Figure 4: Selecting additional task for installation
Figure 5: Selecting directory for installation
Figure 6: Selecting WinPcap for installation
Figure 7: Installation of WinPcap
ii. Hands-On Project 1-2: Capturing the Basic Packets and Exploring Basic Packet Statistics
Figure 8: Accessing Wireshark from All Programs
Figure 16: Viewing IO graph statistics
A 5:
From the above requirement the addressing solution is designed that would be easy for the network administrator to implement in the company’s network infrastructure.
- Major Network: 0.0.0/21
- Available IP addresses in major network: 2046
- Number of IP addresses needed: 999
- Available IP addresses in allocated subnets: 1396
- About 69%of available major network address space is used
- About 72%of subnetted network address space is used
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
A |
200 |
254 |
10.0.2.0 |
/24 |
255.255.255.0 |
10.0.2.1 - 10.0.2.254 |
10.0.2.255 |
B |
125 |
126 |
10.0.4.0 |
/25 |
255.255.255.128 |
10.0.4.1 - 10.0.4.126 |
10.0.4.127 |
C |
135 |
254 |
10.0.3.0 |
/24 |
255.255.255.0 |
10.0.3.1 - 10.0.3.254 |
10.0.3.255 |
D |
122 |
126 |
10.0.4.128 |
/25 |
255.255.255.128 |
10.0.4.129 - 10.0.4.254 |
10.0.4.255 |
E |
312 |
510 |
10.0.0.0 |
/23 |
255.255.254.0 |
10.0.0.1 - 10.0.1.254 |
10.0.1.255 |
F |
105 |
126 |
10.0.5.0 |
/25 |
255.255.255.128 |
10.0.5.1 - 10.0.5.126 |
10.0.5.127 |
There is a need for recalculating the subnet mask if the requirement of the number of host jumps to 1024. The VLSM technique is used for the allocation of the host address because less number of IP address are wasted selecting this technique and increases the efficiency of the network. The host formula is used for the calculation of the subnet and 1024 host are accommodated for each of the six buildings connected in the network. The calculated subnet mask is shown below.
- Subnet A 10.0.0.0 /22 255.255.252.0 10.0.0.1 - 10.0.3.254
- Subnet B 10.0.4.0 /22 255.255.252.0 10.0.4.1 - 10.0.7.254
- Subnet C 10.0.8.0 /22 255.255.252.0 10.0.8.1 - 10.0.11.254
- Subnet D 10.0.12.0 /22 255.255.252.0 10.0.12.1 - 10.0.15.254
- Subnet E 10.0.16.0 /22 255.255.252.0 10.0.16.1 - 10.0.19.254
- Subnet F 10.0.20.0 /22 255.255.252.0 10.0.20.1 - 10.0.23.254
A 6:
QoS or quality of service is applied in a network where there is a requirement to control and monitor the data packets. It is a primary IP based concept and used in the TCP/Ip network for the following purpose:
- Predicting the response time of the network
- Managing the delay caused in the sensitive applications used in the network
- Managing the jitters for the sensitive applications
- Controlling the loss of data packets during congestion of the network (Mancas & Mocanu, 2013)
- For setting priorities to the traffic
- Dedication of bandwidth to the application service
- Avoiding congestion in the network
IP precedence - In the Qos the data packets are marked and classified according to the network policy and the traffic of the network and it can be carried out with the help of IP precedence and DSCP. It is most effective in case of long distance transmission (Feng et al., 2014). In the IP packets the first 3 bits are the IP precedence and it is used for setting the value or priority of the packets. During congestion the router can drop the packet with lower values.
TOS - Type of service is the next 4 bits of the TOS byte and it used for specifying the delay. The bits are assigned to the IP packets for setting priority to the IP packets sent over the network. For the 3rd bit 0 stands for normal delay and 1 stands for low delay, for the 4th bit, 0 is equal to normal throughput and 1 is equal to high throughput, for the 5th bit 0 is normal reliability and 1 is high reliability. One extra bit is reserved for future use (Mancas & Mocanu, 2013).
ECN – Explicit congestion notification is an extension used for controlling the transmission and the internet protocol. It is used for getting end to end notification about the congestion in the network without loss in the data packets (Zhang et al., 2016). Using the ECn a mark is set up in the IP header without dropping the network packet.
Diffserv functionalities – In case of the differentiated services the first six bits are used for setting a codepoint that affects the per hop behavior for each of the node. The codepoint is also termed as DSCP value and is quite similar to the TOS byte (Geib & Black 2017). In DiffServ the each of the device are configured separately and the codepoints are used for setting different priorities in the network. Using Diffserv more number of priorities can be set in the router than the TOS.
Bibliography
Clavel, F., Savary, E., Angays, P., & Vieux-Melchior, A. (2015). Integration of a new standard: A network simulator of IEC 61850 architectures for electrical substations. IEEE Industry Applications Magazine, 21(1), 41-48.
Elias, M. S., & Ali, A. Z. M. (2014). Survey on the challenges faced by the lecturers in using packet tracer simulation in computer networking course. Procedia-Social and Behavioral Sciences, 131, 11-15.
Feng, S., Hu, C., Ma, K., Zhang, X., Lan, W., & Chen, H. (2014). Implementation and Application of QoS in Power Ethernet Switch. Advanced Materials Research.
Geib, R., & Black, D. (2017). Diffserv-interconnection classes and practice.
Goyal, V., & Arora, G. (2017). Implementation of Enhanced Interior Gateway Routing Protocol (EIGRP) in IPv6 Network. Research Journal of Advanced Engineering and Science, 2(1), 90-95.
Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications, 40, 307-324.
Jang, J. Y., & Kim, N. W. (2014). The case study for Implementation and verification of Network based on VLSM. The Journal of the Korea institute of electronic communication sciences, 9(11), 1267-1276.
Jing, R., Zhang, C., Zhao, Y., Ma, Y., Li, J., Huo, X., ... & Fu, S. (2015, March). Experimental demonstration of hierarchical control over multi-domain OTN networks based on extended OpenFlow protocol. In Optical Fiber Communication Conference (pp. W4J-4). Optical Society of America.
Mancas, C., & Mocanu, M. (2013, July). QoS optimization in congested multimedia networks. In Telecommunications and Signal Processing (TSP), 2013 36th International Conference on (pp. 38-42). IEEE.
Moussaoui, A., Semchedine, F., & Boukerram, A. (2014). A link-state QoS routing protocol based on link stability for Mobile Ad hoc Networks. Journal of Network and Computer Applications, 39, 117-125.
Shi, H. H., Wang, Y. J., & Xu, X. (2015, June). Teaching the single arm routing method for communication between VLANs of ioT based on Packet Tracer. In Management, Information and Educational Engineering: Proceedings of the 2014 International Conference on Management, Information and Educational Engineering (MIEE 2014), Xiamen, China, November 22-23, 2014 (pp. 337-340). CRC Press.
Zhang, H., Chen, S., Wang, Q., & Liu, J. (2016). A Congestion Control Mechanism for Streaming Media Transmission Over Wireless Environment. International Journal of Multimedia and Ubiquitous Engineering, 11(8), 257-270.
Buy ITC542 Internetworking with TCP/IP: Protocol Analysis Answers Online
Talk to our expert to get the help with ITC542 Internetworking with TCP/IP: Protocol Analysis Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.