Task 1
M2M is a medium sized organization that is looking to expand its organizations. They are required looking to reconfigure the network structure for the system. I have been asked to supervise the reconstruction of the network of the company.
The report provides the information about the design of the reconstructed network for the company.
The task one in the report the information about the requirement for the company and also the design of the network system has been provided in the report. In addition to this, justification and the description about the network has also been provided ion the report.
The M2M Company has provided the data about their prerequisites. The organization has obtained around six destinations over the city of Sydney. They are hoping to execute a system for the six distinctive division of the organization. Presently the organization is hoping to execute a system that would be associating every one of the branches of the organization to the single system. The six distinct divisions that are available in the organization are the Finance office, Transport Office, Research Office, Sales Office, Information System and the Head Office. The organization is additionally looking to subnet their system and it is likewise educated that they would be having a solitary subnet for each of the divisions in the organization. Likewise, the outline is required to suit around 1200 work station in their system. In addition to this, the distribution of the workstation of the company is done in the following process:
- Finance Office – 260 workstations
- Transport Office – 130 workstations
- Research Office – 120 workstations
- Sales Office – 40 workstations
- Information technology – 520 workstations
- Head Office – 60 workstations
The network that is to be implemented should be able to accommodate all the machines in their system and also they should be able to perform all the required functions of the system mentioned by the company.
The network design is done according to the requirements that are stated by the M2M Company. In the implemented system the server is located centrally. To this central server the servers of the different department of the company are connected. The six distinct servers are executed for the six unique segments of the organization that they have to incorporate into their framework. Henceforth, the system would be subnetted proficiently into six diverse sub systems. This gives the organization the advantage of ceasing the entrance to the diverse overseers of the distinctive systems. Henceforth, this would be giving different sort secure offices to the system of the organization. The subnetting calculations are provided in this segment of the report.
Provided information about the network of the company
The major network is 10.1.0.0/21. The number of available IP addresses in major network is 2046. The Number of IP addresses required for the network is 1130.
Available IP addresses in allocated subnets: 2036. About 100% of available major network address space is used.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Information_Technology |
520 |
1022 |
10.1.0.0 |
/22 |
255.255.252.0 |
10.1.0.1 – 10.1.3.254 |
10.1.3.255 |
Finance_Offfice |
260 |
510 |
10.1.4.0 |
/23 |
255.255.254.0 |
10.1.4.1 – 10.1.5.254 |
10.1.5.255 |
Transport_Office |
130 |
254 |
10.1.6.0 |
/24 |
255.255.255.0 |
10.1.6.1 – 10.1.6.254 |
10.1.6.255 |
Research_Office |
120 |
126 |
10.1.7.0 |
/25 |
255.255.255.128 |
10.1.7.1 – 10.1.7.126 |
10.1.7.127 |
Head_Office |
60 |
62 |
10.1.7.128 |
/26 |
255.255.255.192 |
10.1.7.129 – 10.1.7.190 |
10.1.7.191 |
Sales_Office |
40 |
62 |
10.1.7.192 |
/26 |
255.255.255.192 |
10.1.7.193 – 10.1.7.254 |
10.1.7.255 |
The designing of the network has been done according to the requirements of the company and it is also seen that all the requirements of the company are met efficiently by the network. The system has likewise been planned proficiently for execution of the system that would be pleasing around 1200 in the framework. The subnet of the organization is likewise as indicated by the prerequisites of the said by the organization. The framework would likewise permit just the allotted number of machine in the system. The subnet/21 is being utilized as a part of this framework. Thus, the aggregate number of addresses that would be permitted in this framework is 2046. Hence, if the total number of addresses form each of the buildings the increased to more than 1024, then it would be very difficult for the system to accommodate so many addresses in the network.
Conclusion
For conclusion of this part of the report it can be said the task 1 related with the efficient design of the solution required by the M2M Company. The report provides the information about the design of the reconstructed network for the company. The task one in the report provides the information about the requirement for the company and also the design of the network system has been provided in the report. In addition to this, justification and the description about the network has also been provided in this part of the report.
M2M is a medium sized organization that is looking to expand its organizations. They are required looking to reconfigure the network structure for the system. I have been asked to supervise the reconstruction of the network of the company.
This part of the report provides the information about the use of the network analyzers by the company.
The task two in this report contains the information about the communication protocols required for the network, the role of the network analyzers. In addition to this, the benefits about the network analyzer and various other type of discussion about the network analyzer tool are done in this part of the report.
The protocols that are used for the communication within the network are HTTP, SMTP and FTP. Http is the Hypertext transfer protocol; this helps the network connectivity to the network. The SMTP is the simple mail transfer protocol, the simple mail transfer protocol enable efficient communication in between the different components of the network. This also helps the different users within the network to send and receive mails in between themselves. The FTP protocol is the File transfer protocol. This helps the network components to interchange the fie in between themselves and also this helps in the exchange of data within the network.
Design of the Simple Addressing solution
The company policies restrict them from using the network analyzers in the network. But from the point of view of the staffs of the company the network analyzers are very efficient for their network. The network analyzers play a vital role for the network. The role that are cited by the staffs of the company are:
- They are very efficient in providing security for the network
- They also providing very efficient monitoring for the system
In the design described in task 1, the use of Wireshark network protocol analyzer would be very useful for the company. The wireshark network analyzer performs various type tasks for the network.
The selection network analyzer is based on various factors. The wireshark protocol analyzer tool is very efficient and also the network is analyzer is very efficient. They also have a very high ranking in the market.
The benefits of the tool are:
- They support a variety of protocol such as IP, DHCP, AppleTalk and BitTorrent. They support about 850 protocols.
- The tool also helps in the analysis of the network and they also perform efficient monitoring procedures.
The network analyzer is a open source product and hence, they are available for free in the market. Hence, no additional cost for the implementation of the network analyzer is required by the company.
The tool is very useful for the company. For using the tool the minimum requirements are 60mb disk space, they also need a CPU with a clock speed of about 400 Mhz. The system also requires a Network Interface controller.
Conclusion
For conclusion it can be said that, network analyzer is a very important tool for the company to be implemented in the network. The Wire shark network protocol analyzer is used for the implementation in the network. The task two in this report contains the information about the communication protocols required for the network, the role of the network analyzers. In addition to this, the benefits about the network analyzer and various other type of discussion about the network analyzer tool are done in this part of the report.
Alqahtani, A. H., & Iftikhar, M. (2013). TCP/IP attacks, defenses and security tools. International Journal of Science and Modern Engineering (IJISME), 1(10).
Han, S. N., Lee, G. M., & Crespi, N. (2014). Semantic context-aware service composition for building automation system. IEEE Transactions on Industrial Informatics, 10(1), 752-761.
Langenbach, U., Berthe, A., Traskov, B., Weide, S., Hofmann, K., & Gregorius, P. (2013, September). A 10 GbE TCP/IP hardware stack as part of a protocol acceleration platform. In Consumer Electronics¿ Berlin (ICCE-Berlin), 2013. ICCEBerlin 2013. IEEE Third International Conference on (pp. 381-384). IEEE.
Lansiti, M., & Lakhani, K. R. (2017). The truth about blockchain. Harvard Business Review, 95(1), 119-127.
Lee, S., Tewolde, G., & Kwon, J. (2014, March). Design and implementation of vehicle tracking system using GPS/GSM/GPRS technology and smartphone application. In Internet of Things (WF-IoT), 2014 IEEE World Forum on (pp. 353-358). IEEE.
Li, H., Chen, X., Huang, B., Tang, D., & Chen, H. (2014). High bandwidth visible light communications based on a post-equalization circuit. IEEE photonics technology letters, 26(2), 119-122.
Persson, M., Fhager, A., Trefná, H. D., Yu, Y., McKelvey, T., Pegenius, G., … & Elam, M. (2014). Microwave-based stroke diagnosis making global prehospital thrombolytic treatment possible. IEEE Transactions on Biomedical Engineering, 61(11), 2806-2817.
Tömösközi, M., Seeling, P., Ekler, P., & Fitzek, F. H. (2015, August). Performance Evaluation and Implementation of IP and Robust Header Compression Schemes for TCP and UDP Traffic in the Wireless Context. In Engineering of Computer Based Systems (ECBS-EERC), 2015 4th Eastern European Regional Conference on the (pp. 45-50). IEEE.
Wang, Q., Wang, W. T., Chen, W., Liu, J. G., & Zhu, N. H. (2017). Optical Vector Network Analyzer with an Improved Dynamic Range Based on a Polarization Multiplexing Electro-Optic Modulator. Chinese Physics Letters, 34(5), 054205.