Calculations for IP Address Allocation
The M2M network requires an address scheme where it is using IP address named as 10.0.0.0 to come up with the subnets IP addresses.Below is the calculations involved in obtaining the address of the various office as follows:
1st Finance Office with 260 workstations
Calculations:
This department has a total of 260 workstations therefore requires a total of 260 hosts Ip addresses this can be calculated as below:
Hosts bits =2^k-2=260
2^k=260+2 ———> 2^k=262
This gives the Host bits as 9 bits .
Hence =8+8+8+8-9=23.
The network subnet mask is given in binary format as 11111111.11111111.11111110.00000000.
The network subnet mask is given in number format as i.e 255.255.254.000.
Therefore the Block size is given as 2^9=512.
Therefore the subnet IP address ranges from 10.0.0.0/23 to 10.0.0.511/23 with 260 workstations.
2nd Transport Office with 130 workstations
Calculations:
This department has a total of 130 workstations therefore requires a total of 130 hosts IP addresses this can be calculated as below:
Hosts bits =2^k-2=130
2^k=130+2 ———> 2^k=132
This gives the Host bits as 8 bits .
Hence =8+8+8+8-8=24.
The network subnet mask is given in binary format as 11111111.11111111.11111111.00000000
The network subnet mask is given in number format as i.e 255.255.255.000.
Therefore the Block size is given as 2^8=256
Therefore the subnet IP address ranges from 10.0.1.0/24 to 10.0.1.255/24 with 130 workstations.
3rd Research Office with 120 workstations
Calculations:
This department has a total of 120 workstations therefore requires a total of 120 hosts IP addresses this can be calculated as below:
Hosts bits =2^k-2=120
2^k=120+2 ———> 2^k=122
This gives the Host bits as 7 bits .
Hence =8+8+8+8-7=25.
The network subnet mask is given in binary format as 11111111.11111111.11111111.10000000
The network subnet mask is given in number format as i.e 255.255.255.128.
Therefore the Block size is given as 2^7=128
Therefore the subnet IP address ranges from 10.0.2.0/25 to 10.0.2.127/25 with 120 workstations.
4th Sales Office with 40 workstations
Calculations:
This department has a total of 40 workstations therefore requires a total of 40 hosts IP addresses this can be calculated as below:
Hosts bits =2^k-2=40
2^k=40+2 ———> 2^k=42
This gives the Host bits as 6 bits .
Hence =8+8+8+8-7=26.
The network subnet mask is given in binary format as 11111111.11111111.11111111.11000000 The network subnet mask is given in number format as i.e 255.255.255.192.
Therefore the Block size is given as 2^6=64
Therefore the subnet IP address ranges from 10.0.3.0/26 to 10.0.3.63/26 with 40 workstations.
5th Information technology with 520 workstations
Calculations:
This department has a total of 520 workstations therefore requires a total of 520 hosts IP addresses this can be calculated as below:
Hosts bits =2^k-2=520
2^k=520+2 ———> 2^k=522
This gives the Host bits as 10 bits .
Hence =8+8+8+8-10=22.
The network subnet mask is given in binary format as 11111111.11111111.11111100.00000000 The network subnet mask is given in number format as i.e 255.255.252.000.
Therefore the Block size is given as 2^10=1024
Therefore the subnet IP address ranges from 10.0.4.0/22 to 10.0.4.1023/22 with 520 workstations.
6th Head Office with 520 workstations
Calculations:
This department has a total of 60 workstations therefore requires a total of 60 hosts IP addresses this can be calculated as below:
Impact of Increasing Number of Hosts per Network
Hosts bits =2^k-2=60
2^k=60+2 ———> 2^k=62
This gives the Host bits as 6 bits .
Hence =8+8+8+8-6=26.
The network subnet mask is given in binary format as 11111111.11111111.11111111.11000000 The network subnet mask is given in number format as i.e 255.255.252.192.
Therefore the Block size is given as 2^6=64.
Therefore the subnet IP address ranges from 10.0.5.0/26 to 10.0.5.64/26 with 60 workstations.
When the numbers of the host in each building rise beyond 1024 host these networks will not be able to host those devices in the network however to accommodate them one require to expand the ip hosts address by increasing the hosts mask to around /21 or more and this will enable the networks to have at least 2046 hosts addresses.
In the information technology there is uses of communication protocols which are set of rules which the network devices use while communicating with each other ,therefore it acts as an interface between two networking devices.
During the transmission of data through the network telecommunication the protocols are used to transmit the data signals from the computer hardware through network software in a given network system.
In the networking there are standard models called open system interconnection and has a correction of layers and it is a standard that is used as an internationally.
There are various protocols used in the network through the internet as follows:
- Transmissions Control Protocols (TCP), this is used to transmit the data packets from one point to another inform of a message.
- Internet Protocols (IP),This is the protocol that uses some rules to send and receive message via the internet address levels.
- Hypertext Transfer Protocols (HTTP) this is a protocol that enables applications which are same to communicate in remote distances through the internet.
However there are other protocols used in the networking which include; Borders Gateway Protocols (BGP) and Dynamic Hosts Configurations Protocols (DHCP) and they also utilizes some set rules to communicate as well.
The protocols is divided into layers called OSI layers which are seven and they assist in propagation of data packets from the source to the destinations as discussed below:
Layer seven: The application layer. This is a layer that is used to establish communication between two nodes in a network ,in this layer the sender device creates contents and send through the network and the recipient devices opens the sent content ,therefore this layer assist in creating, sending and opening of content.
Layer six: The presentation layer. This is a layer located in the computers operating systems and it converts data from one formats to another formats ,that is analog signal to digital signal at the senders device and digital signal to analog signals at receivers device.
Layer five: The session layer. This is layer that assists in recreation of the broken communication or any communication that has some interruptions.
Layer four: The transport layer. This is the layer in which the movements of data packets is regulated though the network ,however also it controls delivering of data packets where it does error detection and elimination before the packets get to the destinations.
Layer three: The network layer. This is the layer that aids the routing of data packets and determination of the packets destination addresses in the network.
Layer two: The data-link layer. This is layers that establish connection through the network physically ,however it is used to do conversion of data packets to data frames in the network ,this layer is made of two parts namely linking controls layer and media access control layers where the network cables are used.
Proposal for Using Network Analyzers for Diagnostic Purposes
Layer one: The physical layer. This is the layer that is responsible of transmitting of the streams of data bits which is either in radio, electrical or optic signals through the recommended network hardware.
This is a correction of the hardware system and software program ,this is installed in the network or in some computer hardware in order to prevent any malicious activities in the network by some unauthorized persons (Cory, 2015)..
The network analyzers is meant to supplement the firewalls and the anti-virus applications in the computer and it can be used to do the following:
- To update the administrator’s every statistical data about any event that happens in the computer network.
- To test antivirus software and test whether there is any vulnerability.
- Detecting any of the un usual level of the network traffic.
- Determining the odd characteristics of the data packets in the networking.
- It determines the packets sources and their respective destinations.
- It is used to do configurations of network alarms to alert any possible threats to the network system.
- It is used to trace a series of data in any transmitting data packets.
- It helps to monitor the usage of the bandwidth in a certain period of time.
- It is used to set up some network applications.
- This is used to display statistics data in users friendly panels.
i. Wiresharks
The wireshark is very powerful networks protocols analyzer in the markets which can be obtained freely or through pay.
This tool is the most recommended tool in the network analysis tools since it is the most standardized ,this tool has multiple tools which includes live capturing and analysis in offline modes and support of many platforms like windows and linux.
The data used in the network is accessed though the graphical user interfaces and the TTY-modes TShark utilities.
However there are other features of this tool which entails powerful displays filter ,VoIP analysis ,ability to open multiple files formats ,ability to read Ethernets, Bluetooth’s signals ,also to enable decryption of signals among others (Richard, 2015).
This is a network analysis tool that automated to discover ,and management of any activities in the and notification ,measuring the network performance, and also it has some features that boost the service delivered.
This tools has two modules in the clients side this will assist them to locate the networks and detect any bandwidth loss, the network alarms and any network related interfaces. (Richard, 2015).
Microsoft Network Monitor is a analytical tool that do packets analysis and it therefore captures, views and analysis the traffics in any network being analysed.
This tool allow the users to do troubleshooting incase of any problem identified in the network or in any of software used in it ,however this tool can be used in many protocols where it detects the sessions ,monitors wireless protocol and detection of most frequent traffic in the network (Andrew, 2014).
The Network analyzer tool is a very important tool that enables the user to capture the analyzing netflow ,Jflow ,and Sflow in the network system .
The tool is used in tracing the computer networks traffic through identifying network users of the bandwidth and the details are updated simultaneously (Behrouz, 2015).
However this tool is used in analyzing the network activity and it helped the network users to trace the various operations and there are some benefits as discussed below:
- Minimizing the networks operation and maintenance cost.
- Raising the network speed for the users.
- It makes the network more flexible.
There are various network analysis tool which are used to analyze the computer network ,however for the three network analysis tool the wireshark is the most recommended for analyzing the network in the world ,this is because it is strong and analysis any size of network.
The wireshark tool is best due to some desirable features where it is made of graphics which are user friendly where it uses the T-Sharks properties.
However the tool is used to do the display of data analyzed and also used to do filtering of the packets of data which has errors and also do analysis of Voices transmitted too (William,2014).