Discuss about the Clinical Trials Network Protocol.
In this report within six individual buildings, a network architecture implementation will be done which is considered as M2M solution. The solution will be consisting of secret internet standard that will be shared among the different buildings. Within this report, the sharing of the IP is identified as such as the network address sharing model in accordance with the requested case study (Garay, Kiayias, & Leonardos, 2015). The number workstations that M2M solution is consisting of is almost twelve hundred in total. The provided network diagram within the report has provided a brief idea regarding the internet connectivity.
The organization has six different buildings to be accommodate 1200 host, therefore they need to distribute their private internet protocol in different subnets. The M2M solution have a private internet protocol 10.0.0.0, which is being distributed among their sites. However, from the above figure it can be assumed that how they are connected to the internet and their inter-networking topology. Consequently, the following subnet calculation is prepared for M2M solution, which is being assign to each site of this organization.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Slash notation |
Subnet Mask |
Assignable Range |
Broadcast |
Finance Office |
260 |
510 |
10.0.4.0 |
/23 |
255.255.254.0 |
10.0.4.1 - 10.0.5.254 |
10.0.5.255 |
Transport Office |
130 |
254 |
10.0.6.0 |
/24 |
255.255.255.0 |
10.0.6.1 - 10.0.6.254 |
10.0.6.255 |
Research Office |
120 |
126 |
10.0.7.0 |
/25 |
255.255.255.128 |
10.0.7.1 - 10.0.7.126 |
10.0.7.127 |
Sales Office |
40 |
62 |
10.0.7.192 |
/26 |
255.255.255.192 |
10.0.7.193 - 10.0.7.254 |
10.0.7.255 |
Information technology |
520 |
1022 |
10.0.0.0 |
/22 |
255.255.252.0 |
10.0.0.1 - 10.0.3.254 |
10.0.3.255 |
Head Office |
60 |
62 |
10.0.7.128 |
/26 |
255.255.255.192 |
10.0.7.129 - 10.0.7.190 |
10.0.7.191 |
Finance Office:
IP Address: |
10.0.4.0 |
Netmask: |
255.255.254.0 |
Wildcard Mask: |
0.0.1.255 |
CIDR Notation: |
/23 |
Network Address: |
10.0.4.0 |
Usable Host Range: |
10.0.4.1 - 10.0.5.254 |
Broadcast Address: |
10.0.5.255 |
Binary Netmask: |
11111111.11111111.11111110.00000000 |
Total number of hosts: |
512 |
Number of usable hosts: |
510 |
Transport Office:
IP Address: |
10.0.6.0 |
Netmask: |
255.255.255.0 |
Wildcard Mask: |
0.0.0.255 |
CIDR Notation: |
/24 |
Network Address: |
10.0.6.0 |
Usable Host Range: |
10.0.6.1 - 10.0.6.254 |
Broadcast Address: |
10.0.6.255 |
Binary Netmask: |
11111111.11111111.11111111.00000000 |
Total number of hosts: |
256 |
Number of usable hosts: |
254 |
Research Office:
IP Address: |
10.0.7.0 |
Netmask: |
255.255.255.128 |
Wildcard Mask: |
0.0.0.127 |
CIDR Notation: |
/25 |
Network Address: |
10.0.7.0 |
Usable Host Range: |
10.0.7.1 - 10.0.7.126 |
Broadcast Address: |
10.0.7.127 |
Binary Netmask: |
11111111.11111111.11111111.10000000 |
Total number of hosts: |
128 |
Number of usable hosts: |
126 |
Sales Office:
IP Address: |
10.0.7.192 |
Netmask: |
255.255.255.192 |
Wildcard Mask: |
0.0.0.63 |
CIDR Notation: |
/26 |
Network Address: |
10.0.7.192 |
Usable Host Range: |
10.0.7.193 - 10.0.7.254 |
Broadcast Address: |
10.0.7.255 |
Binary Netmask: |
11111111.11111111.11111111.11000000 |
Total number of hosts: |
64 |
Number of usable hosts: |
62 |
Information technology:
IP Address: |
10.0.0.0 |
Netmask: |
255.255.252.0 |
Wildcard Mask: |
0.0.3.255 |
CIDR Notation: |
/22 |
Network Address: |
10.0.0.0 |
Usable Host Range: |
10.0.0.1 - 10.0.3.254 |
Broadcast Address: |
10.0.3.255 |
Binary Netmask: |
11111111.11111111.11111100.00000000 |
Total number of hosts: |
1,024 |
Number of usable hosts: |
1,022 |
Head Office:
IP Address: |
10.0.7.128 |
Netmask: |
255.255.255.192 |
Wildcard Mask: |
0.0.0.63 |
CIDR Notation: |
/26 |
Network Address: |
10.0.7.128 |
Usable Host Range: |
10.0.7.129 - 10.0.7.190 |
Broadcast Address: |
10.0.7.191 |
Binary Netmask: |
11111111.11111111.11111111.11000000 |
Total number of hosts: |
64 |
Number of usable hosts: |
62 |
The main challenge in accommodating 1,024 hosts in a site is broadcasting in this network. A broadcasting is technique of sending data packet though all the host in a network, if any network having any broadcasting issue than it might be causes a rollover. However, if any network having more than 1,022 hosts in a network, where require hosts per site is 1,024 then it also deal with wastages of internet protocol issue.
Communication protocols are required to provide end to end reliable data transmission. A commutation protocol can be define as a set of rule that responsible to provided secure and reliable data transmission (Chaubey et al., 2015). The M2M solution has around 1200 has in their six building. Consequently, they have to utilize suitable systems for network devices to recognize and additionally make the association between each other. These protocols are likewise in charge of arranging decides that can determine how the information acquired from network devices and additionally sent over the system. Consequently, the communication protocol component likewise valuable to improve the execution of the system by message verification as well as data compression.
As per the M2M solution networking infrastructure, design directing conventions additionally required distinguishing different switches in the system. The router is assignment with a routing protocol for utilized as a part of the switches to deal with the pathway between sources to destination (Garay, Kiayias & Leonardos, 2015). There are few well-known routings protocols are BGP, EIGRP and also OSPF. Through, the M2M solution it can execute the OSPF protocol for their association to manage private systems administration locales with a center switch, as appeared in the above figure 1.
Recommendation
The network protocol analyzer can be an instrument or programming that measure the system execution by some system parameters. Moreover, the M2M arrangement has presented six distinct destinations that can be associated with the web, hence they need to utilize an examination device to check vulnerability and performance as well (Namesh & Ramakrishnan, 2015).
The network analyzer programming likewise compresses crude information into something that sounds good to a client, who is insufficient shrewd with network administration component. This interpretive apparatus can give outline information of the mistake from any view of the application layer (Williams & Yumerefendi, 2017). For instance, if the M2M arrangement is having some inconvenience like DOS attack or flooding, at that point they have to channel in which have or where an unapproved get to endeavor. In that circumstance, they should utilize the Wireshark organize analyzer device to channel that host or malignant client.
The network analysers are used to analyse traffic all over the network of M2M solution. There are two type of network analysers are available in the market such as a hardware device to tracer the bandwidth, signal strength etc. as well as a software for data packets analysis. Therefore, according to their category they have different specific functionality and features as well (Segata et al., 2014). Consequently, a hardware device is ZVA40 vector network analyser and Wireshark packet capturing tool is required in M2M solution to check their functionality.
A network protocol analyser like Wireshark offers many advantages that make it engaging for regular utilize in most of the organization. The Wireshark network traffic analyser can be utilized more than one hundred of network protocol. It can store the captured transmitted data for offline or live examination, where the organization can filter out vital information (Chaubey et al., 2015). It has been expected that Wireshark is very much compatible with Linux, NetBSD, Windows, Solaris, and FreeBSD.
The hardware tool is being utilized in M2M solution is vector network analyser ZVA40 can measure the network traffic by watching a few parameters. For example, an order is a measure of how well a coupler can isolate signals moving the diverse way (Burns et al., 2016). Therefore, VAN is use to test the following component of M2M solution network infrastructure radio wires, RF switch, couplers, channel, links, and in addition intensifiers. It also helps the organization to increase the system uptime by utilizing its auto error correction methodology.
Conclusion
In this report the M2M solution have a private network 10.0.0.0 which is being divided among six, hence after examinations their prerequisite it can be expected that they require hardware device and software both can help for their organization. Subsequently, as expressed in over the Rohde and Schwarz ZVL6 Vector Network Analyser is suggested equipment gadget that can give a propel error correcting component. In any case, the equipment related issues are measured by the Rohde and Schwarz ZVL6 Vector Network Analyser, aside from that a network analyser programming Wireshark is required for inspect their internal network and access of the outside of their network as well.
Conclusion
This report incorporates all network infrastructure related answers for the M2M arrangement. The M2M arrangement needs to build up another system framework which is totally characterized in this report. The system outline demonstrates the helpful tending to answer for the M2M arrangement, which is being actualized for their locales. This association likewise needs to think about their strategies for upgrading, which is characterized as system analyzer device. In this report two different type of network analysis solution was recommended. However, both of these devices are essential for the M2M solution. The purpose for the need of that gadget likewise characterized in this report, which encourages the M2M solution for better get it. Be that as it may, from this above examination and created tending to the arrangement, it can be presumed that all required design and solution for the M2M solution are depicted in this report.
References
Burns, L. J., Logan, B. R., Chitphakdithai, P., Miller, J. P., Drexler, R., Spellman, S., ... & Confer, D. L. (2016). Recovery of unrelated donors of peripheral blood stem cells versus recovery of unrelated donors of bone marrow: a prespecified analysis from the phase III Blood and Marrow Transplant Clinical Trials Network protocol 0201. Biology of Blood and Marrow Transplantation, 22(6), 1108-1116.
Chaubey, N., Aggarwal, A., Gandhi, S., & Jani, K. A. (2015, February). Performance analysis of TSDRP and AODV routing protocol under black hole attacks in manets by varying network size. In Advanced Computing & Communication Technologies (ACCT), 2015 Fifth International Conference on (pp. 320-324). IEEE.
Duchêne, J., Le Guernic, C., Alata, E., Nicomette, V., & Kaâniche, M. (2017). State of the art of network protocol reverse engineering tools. Journal of Computer Virology and Hacking Techniques, 1-16.
Garay, J., Kiayias, A., & Leonardos, N. (2015, April). The bitcoin backbone protocol: Analysis and applications. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 281-310). Springer, Berlin, Heidelberg.
Jiang, L., Yang, X., & Li, T. (2014). The analysis and design for a network protocol analysis system based on WinPcap.
Namesh, C., & Ramakrishnan, D. B. (2015). Analysis of VBF protocol in underwater sensor network for static and moving nodes. International Journal of Computer Networks and Applications, 2(1), 20-26.
Newell, L. F., Verneris, M. R., Panoskaltsis-Mortari, A., Defor, T. E., Blazar, B. R., Cutler, C. S., ... & Holtan, S. (2016). Angiogenic factors, inflammation, and outcomes in myeloablative allogeneic hematopoietic cell transplantation: a biomarker analysis of GVHD prophylaxis in blood and marrow transplant clinical trials network protocol (BMT CTN) 0402. Biology of Blood and Marrow Transplantation, 22(3), S70-S71.
Segata, M., Bloessl, B., Joerer, S., Dressler, F., & Cigno, R. L. (2014, April). Supporting platooning maneuvers through IVC: An initial protocol analysis for the JOIN maneuver. In Wireless On-demand Network Systems and Services (WONS), 2014 11th Annual Conference on (pp. 130-137). IEEE.
Wang, M. H., Yu, C. M., Lin, C. L., Tseng, C. C., & Yen, L. H. (2014, June). KPAT: A kernel and protocol analysis tool for embedded networking devices. In Communications (ICC), 2014 IEEE International Conference on (pp. 1160-1165). IEEE.
Williams, N. C., & Yumerefendi, A. R. (2017). U.S. Patent No. 9,621,441. Washington, DC: U.S. Patent and Trademark Office.
Xiao, M. M., Zhang, S. L., & Luo, Y. P. (2016). Automatic network protocol message format analysis. Journal of Intelligent & Fuzzy Systems, 31(4), 2271-2279.
Xu, Z., Nappa, A., Baykov, R., Yang, G., Caballero, J., & Gu, G. (2014, November). Autoprobe: Towards automatic active malicious server probing using dynamic binary analysis. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 179-190). ACM.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Clinical Trials Network Protocol: An Overview Essay.. Retrieved from https://myassignmenthelp.com/free-samples/clinical-trials-network-protocol.
"Clinical Trials Network Protocol: An Overview Essay.." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/clinical-trials-network-protocol.
My Assignment Help (2018) Clinical Trials Network Protocol: An Overview Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/clinical-trials-network-protocol
[Accessed 22 December 2024].
My Assignment Help. 'Clinical Trials Network Protocol: An Overview Essay.' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/clinical-trials-network-protocol> accessed 22 December 2024.
My Assignment Help. Clinical Trials Network Protocol: An Overview Essay. [Internet]. My Assignment Help. 2018 [cited 22 December 2024]. Available from: https://myassignmenthelp.com/free-samples/clinical-trials-network-protocol.