ITC542 Internetworking with TCP- Network Analyzer Tool
Tasks
In your role as a Solutions Architect at M2M Solutions, you are leading a team of several system administrators. M2M solutions is a medium sized organisation and is currently expanding its operations.Finance Office - 260 workstations
Transport Office - 130 workstations
Research Office - 120 workstations
Sales Office - 40 workstations
Information technology - 520 workstations
Head Office - 60 workstations
b.Explain what happens to your design if the number of hosts per network jumps to over 1,024 per building.
2. Currently the company policy does not allow the use of network analysers on the organisational network. You have recently had a team meeting where all the staff are of the view that the use of network analysers can bring more efficiency in troubleshooting processes.
b. An analysis of currently available network analyser tools. The analysis should contain:
i. Benefits, associated costs, ease of usability
ii. Recommendation from you, as to what tool would you prefer to use and why.
Answers
1a. Design of the Network using Simple Addressing Solution
The design of the network is created is proposed for the M2M solution and the requirement of the organization is studied for the preparation of the network diagram. There is a need of connecting 1200 nodes and workstation in the network and the private address 10.1.1.1 is used for the whole network. The number of workstation required to be installed in each of the office is given in the requirement and the network solution is created according to it. A central router is installed for communicating with the branches and the offices of the organization. Each of the workstation in the office are assigned with a router and switch is used for connecting the hosts. The subnet is calculated for the allocation of the hosts and the range of the IP address is required to be calculated for the accommodation of the IP address. VLSM technique is applied for the calculation and some extra IP address are allocated such that the future growth of the organization can be easily handled.
Figure 1: Proposed network solution for the M2M solution
(Source: Created by author)
align: justify;">There are several risk related with the development of the network solution and it is required to be resolved for increasing proficiency of the proposed network solution. A proper cabling plan is required to be followed for increasing the transmission speed and minimizing the congestion in the network. The unused ports in the switches is required to be disabled such that the intruders cannot use it for accessing the network resources. A firewall is installed in the entry and the exit point of the network such that the traffic can be monitored and controlled (Vasilakos, Zhang & Spyropoulos, 2016). Each of the routers are configured with a different subnet and the routers are configured with border gateway protocol for communicating with each other. Access control list is required to be configured on the router for permitting or denying access of the network resources. The nodes and the workstations connected in the network are assigned with the static IP address calculated from the addressing scheme such that the official network cannot be used by the employees with their personal usage (Kulkarni & Agrawal, 2014). Servers are also required to be installed for communicating between the employees and scope of future expansion is there for the network to meet the growing demand of the organization. The backbone of the network is required to be strong and thus fiber optics cable is used for communication for communicating with the different branches.
Simple Addressing Solution
The simple addressing solution is created for the accommodation of the all the 1130 IP address needed in different offices of the organization. The routers are required to be configured according to the addressing solution for the development of the network and increase the efficiency of the organizational network.
Private IP address: 10.1.0.0/21
Maximum number of IP address available in the network: 2046
Number of IP address required for the accommodation of the Workstation: 1130
Number of IP address allocated in the network: 2036
Subnet Name |
Allocated Size |
Needed Size |
Address |
Dec Mask |
Mask |
Assignable Range |
Broadcast |
Finance Office |
510 |
260 |
10.1.4.0 |
255.255.254.0 |
/23 |
10.1.4.1 - 10.1.5.254 |
10.1.5.255 |
Transport Office |
254 |
130 |
10.1.6.0 |
255.255.255.0 |
/24 |
10.1.6.1 - 10.1.6.254 |
10.1.6.255 |
Research Office |
126 |
120 |
10.1.7.0 |
255.255.255.128 |
/25 |
10.1.7.1 - 10.1.7.126 |
10.1.7.127 |
Sales Office |
62 |
40 |
10.1.7.192 |
255.255.255.192 |
/26 |
10.1.7.193 - 10.1.7.254 |
10.1.7.255 |
Information Technology |
1022 |
520 |
10.1.0.0 |
255.255.252.0 |
/22 |
10.1.0.1 - 10.1.3.254 |
10.1.3.255 |
Head Office |
62 |
60 |
10.1.7.128 |
255.255.255.192 |
/26 |
10.1.7.129 - 10.1.7.190 |
10.1.7.191 |
b. Explanation
With the increase in the number of host per network of the office building the subnets are calculated and the current network configuration is required to be changed in the routers for application of the change. The subnets are calculated for the accommodation of the 1024 hosts per network and this causes change in the static IP address of the hosts, unblocking the ports on the switches and configuring the routers with the new IP address and the subnet mask. Multiple subnets are created for the network and for addition of the host there are different technique that can be applied but the cost effective solution is the reconfiguration of the routers and the other hardware devices connected in the network. Some IP bits are kept in reserve and the host formula is used calculating the new subnet and accommodate the increased number of hosts in the network. The calculation work and the result is given below:
Finance Office:
Address 10.0.0.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.0.1 - 10.0.3.254
Transport Office:
Address 10.0.4.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.4.1 - 10.0.7.254
Research Office:
Address 10.0.8.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.8.1 - 10.0.11.254
Sales Office:
Address 10.0.12.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.12.1 - 10.0.15.254
Information Technology:
Address 10.0.16.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.16.1 - 10.0.19.254
Head Office:
Address 10.0.20.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.20.1 - 10.0.23.254
2a. Protocols in the communication Network and role of network analyzer tool
The protocol requirements in the network are HTTP, FTP and SMTP. The HTTP is the hyper text transfer protocol, SMTP is the Simple mail transfer protocol and FTP is the File transfer protocol. The HTTP protocol would empower the system to approach the web association and framework would have the capacity to go on the web. Furthermore, the FTP protocol would enable the frameworks in empower to exchange records inside the system (Edwards & Bramante, 2015). The SMTP protocol would empower the segments of the system to convey among them proficiently. Furthermore, the correspondence in the middle of the staffs of the organization would likewise be extremely productive and they would have the capacity to trade messages among themselves.
M2M Solutions is a company that is medium sized and they are looking to expand their operations. Therefore they are required to reconstruct the network structure for their company. I have been entrusted with the job of implementing a network design. The organization strategies don't include the utilization of network analyzers in their system in spite of the fact that the network analyzers are extremely productive for the organization to do their procedures. Likewise, the network analyzer would likewise enable the organization tom to recognize the imperfections that are existent inside the system. The data about the protocols that are being utilized as a part of the system is given beneath.
The network analyzer is very useful for the network and it provides various type of facilities for the network. The network analyzer serves different type of purposes for the network and the main roles of the network analyzer are:
- The network analyzer performs an excellent analysis of the network and also the monitors the network efficiently.
- The network analyzer plays the role of a security system for the network.
b. Currently available network analyzer tool
The wireshark network analyzer tool can be used in different formats by the network. The tool acts as a network analyzer for the network. They are also used for the purpose of monitoring the network. They perform analysis of the data and the files that flows throughout the network. Tracing the packets is one of the process that is performed by the analyzer tool (Clavel et al., 2015). Wireshark is one the most effective software that can be utilized as a system analyzer likewise; the item is extremely prevalent in the market and forces a significant high positioning in the market for the division of network analyzer.
i. Benefits, associated costs, ease of usability
The network analyzer protocol is very beneficial to the network. The device additionally helps in the examination of the system and performs observing of the frameworks. Henceforth, they secure the frameworks shape the outer gatecrashers. It supports an extensive variety of protocols such as the IP, BitTorrent, AppleTalk and DHCP. Likewise, with each of the refresh the apparatus is refreshed and another convention is included to the application a regular routine. The network analyzer underpins around eight hundred and fifty protocols.
The Wireshark Network analyzer is a tool that is free to use and hence it does not require any additional cost for the company to bear. The cost for the implementation of the system is almost null. The cost for the incorporation of the analyzer on the system framework is extremely insignificant. Thus, the related cost for the analyzer is nearly nil. For utilizing the instrument the base necessities of the system are: 60mb space on the hard drive, a processor that has a clock speed of about 400 Mhz. Additionally the Network Interface Controller is also recommended.
ii. Recommendation and preferences of using the tool
For recommendation it can be said that:
Understanding data: The user of the network should be able to understand the type of data and also the flow of the data through the network. This would result in better handling of the network analyzer.
Understanding configurations: The configurations in the network should also be utilized efficiently by the user and they should also be able to understand all the major functionalities in the network.
It can be said that the selected network analyzer for the designed network layout. The task 2 of this report is concerned with the information about the network analyzer. M2M Solutions is a company that is medium sized wants to expand their operations. Therefore the company is required to reconstruct the network structure for their company. The job of implementing a network design has been entrusted to me. The organization strategies don't include the utilization of network analyzers in their system in spite of the fact that the network analyzers are extremely productive for the organization to do their procedures. But the staffs are looking to cite the importance of the network analyzer tool to the company. This report provides the required information about the tool.
Bibliography
Clavel, F., Savary, E., Angays, P., & Vieux-Melchior, A. (2015). Integration of a new standard: A network simulator of IEC 61850 architectures for electrical substations. IEEE Industry Applications Magazine, 21(1), 41-48.
Edwards, J., & Bramante, R. (2015). Networking self-teaching guide: OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and maintenance. John Wiley & Sons.
Goralski, W. (2017). The Illustrated network: How TCP/IP works in a modern network. Morgan Kaufmann.
Kulkarni, S., & Agrawal, P. (2014). Introduction. In Analysis of TCP Performance in Data Center Networks (pp. 1-15). Springer New York.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP architecture. NDN Project, Tech. Rep. NDN-0038.
Shojafar, M., Cordeschi, N., Abawajy, J. H., & Baccarelli, E. (2015, December). Adaptive energy-efficient qos-aware scheduling algorithm for tcp/ip mobile cloud. In Globecom Workshops (GC Wkshps), 2015 IEEE (pp. 1-6). IEEE.
Sidler, D., Alonso, G., Blott, M., Karras, K., Vissers, K., & Carley, R. (2015, May). Scalable 10Gbps TCP/IP stack architecture for reconfigurable hardware. In Field-Programmable Custom Computing Machines (FCCM), 2015 IEEE 23rd Annual International Symposium on (pp. 36-43). IEEE.
Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (Eds.). (2016). Delay tolerant networks: Protocols and applications. CRC press.
Buy ITC542 Internetworking with TCP- Network Analyzer Tool Answers Online
Talk to our expert to get the help with ITC542 Internetworking with TCP- Network Analyzer Tool Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.