Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Task 1

This report consists of two task which are generally divided into two part namely task 1 and task 2. In this report an organization has acquired more than eight zones across Sydney which is being used for accommodation in the large number of departments. A proper network diagram has been provided by making use of private IP address 10.0.0.0. The network is designed in such a way that it should provide eight buildings which are used for forming a network. A suitable diagram has been provided regarding the design of subnet in a network for various departments like English school, accounting school, transport office, research office, office of sales, information technology school, head office and lastly public wireless access for authorized group which can easily provide 600 devices for anyone at eight different zones.

In the part B of the report a proper explanation has been provided for various kinds for communication networks and important roles played by network analyzer. A proper analysis has been done regarding the network analyzer tool which are currently available in market. Advantages, associated cost and ease of usability of an application with various kinds of network analyzer has been discussed in brief in the coming of this report.

This particular organization has around eight sites in Sydney which has mainly eight divisions namely English schools, accounting school, transport office, research office, Sales office, information system technology, head office, public wires. The company has a private network named 10.0.0.0 which is considered to be private address. The company expects to have more than 1600 workstation and wireless device from various sites.

Subnet Name

Needed Size

Allocated Size

Address

Mask

Dec Mask

Assignable Range

Broadcast

Public wireless

600

1022

10.0.0.0(N.A)

/22

255.255.252.0

10.0.0.1 - 10.0.3.254

10.0.3.255

Information technology school

550

1022

10.0.4.0

/22

255.255.252.0

10.0.4.1 - 10.0.7.254

10.0.7.255

English school

480

510

10.0.8.0

/23

255.255.254.0

10.0.8.1 - 10.0.9.254

10.0.9.255

Accounting school

250

254

10.0.10.0

/24

255.255.255.0

10.0.10.1 - 10.0.10.254

10.0.10.255

Transport Office

130

254

10.0.11.0

/24

255.255.255.0

10.0.11.1 - 10.0.11.254

10.0.11.255

Head Office

90

126

10.0.12.0

/25

255.255.255.128

10.0.12.1 - 10.0.12.126

10.0.12.127

Research Office

67

126

10.0.12.128

/25

255.255.255.128

10.0.12.129 - 10.0.12.254

10.0.12.255

Sales Office

40

62

10.0.13.0

/26

255.255.255.192

10.0.13.1 - 10.0.13.62

10.0.13.63


In the public wireless network, the require size allocated for 600 host which has been allocated to 1022 host using subnet technique. It has address of 10.0.0.0 with mask of around 22. It has a Dec mask of value 255.255.252.0. The allocated size is of 1022 because one value is equal to 255 so (255*4=1020). It has assignable range between 10.0.0.1- 10.0.3.254 and has a broadcast value address of 10.0.3.255 and network address of value 10.0.0.0.

 

Figure 1: Showing the network architecture of the Organization

(Source: Created by author)

In the information technology school, the needed size can be considered to be 550 which has been ultimately provided to 1022 host by making use of subnet technology. It has a network address of 10.0.4.0 which has a mask of 22. The allocated size is of 1022 because one value is equal to 255 so (255*4=1020) It claims to have Dec mask of value 255.255. 252.0 with an accessible of range between (10.0.4.1 – 10.0.7.254). It has a broadcast address of value 10.0.7.255.

Protocol for communication network

In English school, the needed size is considered to be of value of 480 and it has allocated size of value 510. The allocated size is 510 because one value result to (255*2= 510). It has a network addresses of 10.0.8.0 with a mask of 23 and Dec mask of value 255.255.254.0. It provides an assignable range of (10.0.8.1-10.0.9.254) with a broadcast address 10.0.9.255.

 In Accounting school, the needed size is of value 250 and it claims to provide an allocated value of 254. It has a network address 10.0.10.0 with has a mask of 24. It has a Dec Mask of value 255.255.255.0 with assignable range of (10.0.10.1- 10.0.10.254). It has a broadcast address of 10.0.10.255.

 In the transport office, the needed size is 130 and it provides an allocated size of 254. It has network address 10.0.11.0 with mask of 24. It has Dec mask of value 255.255.255.0. It has an assignable range value of (10.0.11.1 - 10.0.11.254). It has broadcast address of 10.0.11.255.

In the head office the need size for host is 90 with allocated size of 126 host. It has a network address 10.0.12.0 with mask 25. It has a Dec mask 255.255.255.128 with assignable range (10.0.12.1 - 10.0.12.126). It has a broadcast address 10.0.12.127.

 In the research office the needed size of 90 host with an allocated size of value 126 host. It has a network address 10.0.12.128 with mask 25. It has a Dec mask 255.255.255.128 with assignable range of (10.0.12.129 - 10.0.12.254). It has a broadcast address of 10.0.12.255.

In the sales office the needed size is for 40 host with an allocated size for host of 62. It has a network address 10.0. 13.0 with mask 26. It has a Dec mask of 255.255.255. 192 with an assignable range (10.0.13.1 - 10.0.13.62). It has a broadcast address 10.0.13.63.

In English school if the number of host jumps over 1500 then there will be loss in IP addresses.  (2046- 1500= 546) number of host IP will be lost and this is considered to be a disadvantage. So redesigning of network is required to eliminate all kinds of issues.

A network protocol generally defines certain rules and navigation which are used for communication between various kind of devices related to networking. Network protocols is generally inclusive of various kinds of devices which is used for making connection with various kinds of devices which generally focus on the idea that how data is generally packed into small messages and sent accordingly. The latest form of protocols for system generally makes use of packet switching method which is used for sending and receiving messages into various small pieces which can be easily collected and re-assembled at the place of destination.

Role of network analyzer

Internet protocol generally contains a set of relation which contain high level of protocol like TCP, UDP, FTP which contain integration with the various IP which is used for additional capabilities. There is some lower level protocol namely ARP which also exist simultaneously with various kinds of IP. Generally high level of protocol in the family of IP which provides close interaction with various with various kinds of application browser with various kinds of adapters of network.

Various kinds of technology like Wi-Fi, Bluetooth have now become a common platform. Network protocols are generally designed for making use of wireless networks which ultimately provides roaming of mobile devices that deals with problems related to variable data rates and security of network.

Routing protocols are special kind of protocol which are used for designing of network routers on a network system which is available on the internet. Routing protocol generally helps in managing of routers between two points namely source and destination. Latest operating system generally make use of built in software system which are generally used for supporting various network protocols. Various of kinds of application are web browsers which generally contains various libraries of software which generally provide support for proper functioning of application.

Role of network analyzer:   Network Analyzer are also known as Packet Sniffers which are generally considered to be one of the best tool. This type of tool is generally found inside the toolkit of Network Engineer. It allows the various user so that it can be easily capture various network packets. Network analyzer generally provide help for uncover, fix network problems and diagnosis and they are also used by various kinds of hackers so that possible information can be easily accessed.

  • Real time utilization of network cards
  • Configurable size of buffer
  • Diagram related to IP conversation and transaction sequence
  • Tools for automatic diagnosis
  • Advance filtering

Real time based network utilization is considered to be a useful tool as it helps in calculation of bandwidth for various network packets.  

Capsa Free: A network analyzer is generally used for designing, monitoring, analysis. Capsa free is a free software from colasoft which provides the power to analyze and monitor more than 300 kinds of protocols. User should provide network profiles provides customizable reports can provide alarm related tools. The cost of capsa free network tool analyzer is around 295 dollars.

Zenoss Core: An integrated network and system provides management tool which provides metrics for availability, events and proper configuration of system for management platform availability, performance and configuration of device across various networks.

Analysis of currently available tools

Network Miner: Network traffic are considered to be only things which should be taken as an analyzing tool for windows. This software is generally provided by security organization Netresec which is used for collection of data regarding host on the network which is generally present on the opposite side of the network. The cost of network miner is around 900 dollars.

Angry IP scanner: It is considered to be simple IP scanner which makes use of multi-threading model for scanning methods which mainly aims in providing scanning at a rapid rate which can be saved in CSV, TXT and many other formats.

Wireshark: Wireshark is a network analyzer which mainly drills down into deeply into network activity for network activity in various range of platform which is inclusive of Linux, FreeBSD.

TC console:  Organization mainly focus on batter of information which is used for having information which can provide huge boost in the visibility of a network through a tool named TC Console. TC console provides historical views regarding the malicious activity of a network.

Conclusion 

From the above discussion in the report it can be easily concluded that this report comprises of two parts namely task 1 and task 2. In the task 1 a table has been provided about the various departments like public wireless, information technology, English school, accounting school, transport office, head office, research office and sales office with the idea like which body can make use of which subnet and how much. The assignable range has been provided with respect to each and every subnet. A diagram has been provided regarding the arc network architecture of the organization. In the part 2 of the report the protocol for communication has been provided. The roles and responsibility of network analyzer has been provided with respect to this organization. An analysis has been done regarding the currently available network analyzer tool like Capsa Free, Zenoss Core, Network Miner, angry IP scanner, TC console has been discussed in brief in the above pages of the report.

From the above discussion it is highly recommended to use Wireshark network analyzer because it provide certain number of advantages over the other analyzer tool like

  • It is free to download and very convenient and easy to use.
  • It is easily available in certain number of platform like windows and Linux.
  • User can easily see and make use of brief information about various kinds of packets which are generally associated in a network.
  • It is not private application rather than it can be used in multiple platform like Cisco Prime.  

Ahlgren, B., Dannewitz, C., Imbrenda, C., Kutscher, D., & Ohlman, B. (2012). A survey of information-centric networking. IEEE Communications Magazine, 50(7).

Amadeo, M., Campolo, C., & Molinaro, A. (2012, June). Content-centric networking: is that a solution for upcoming vehicular networks?. In Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications (pp. 99-102). ACM.

Carofiglio, G., Gallo, M., & Muscariello, L. (2012, March). ICP: Design and evaluation of an interest control protocol for content-centric networking. In Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on(pp. 304-309). IEEE.

Cui, S., Han, Z., Kar, S., Kim, T. T., Poor, H. V., & Tajer, A. (2012). Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions. IEEE Signal Processing Magazine, 29(5), 106-115.

Han, D., Anand, A., Dogar, F., Li, B., Lim, H., Machado, M., ... & Byers, J. W. (2012). XIA: Efficient support for evolvable internetworking. USENIX.

Kardes, H., Gunes, M., & Oz, T. (2012, January). Cheleby: A subnet-level internet topology mapping system. In Communication Systems and Networks (COMSNETS), 2012 Fourth International Conference on (pp. 1-10). IEEE.

Li, L. E., Mao, Z. M., & Rexford, J. (2012, October). Toward software-defined cellular networks. In Software Defined Networking (EWSDN), 2012 European Workshop on (pp. 7-12). IEEE.

Salsano, S., Detti, A., Cancellieri, M., Pomposini, M., & Blefari-Melazzi, N. (2012, August). Transport-layer issues in information centric networks. In Proceedings of the second edition of the ICN workshop on Information-centric networking(pp. 19-24). ACM.

Streibelt, F., Böttger, J., Chatzis, N., Smaragdakis, G., & Feldmann, A. (2013, October). Exploring EDNS-client-subnet adopters in your free time. In Proceedings of the 2013 conference on Internet measurement conference (pp. 305-312). ACM.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2022). Essay: Network Analysis And Subnetting For An Organization In Sydney.. Retrieved from https://myassignmenthelp.com/free-samples/itc542-internet-working-with-tcpip/roles-played-by-network-analyzer-file-CA2A51.html.

"Essay: Network Analysis And Subnetting For An Organization In Sydney.." My Assignment Help, 2022, https://myassignmenthelp.com/free-samples/itc542-internet-working-with-tcpip/roles-played-by-network-analyzer-file-CA2A51.html.

My Assignment Help (2022) Essay: Network Analysis And Subnetting For An Organization In Sydney. [Online]. Available from: https://myassignmenthelp.com/free-samples/itc542-internet-working-with-tcpip/roles-played-by-network-analyzer-file-CA2A51.html
[Accessed 21 November 2024].

My Assignment Help. 'Essay: Network Analysis And Subnetting For An Organization In Sydney.' (My Assignment Help, 2022) <https://myassignmenthelp.com/free-samples/itc542-internet-working-with-tcpip/roles-played-by-network-analyzer-file-CA2A51.html> accessed 21 November 2024.

My Assignment Help. Essay: Network Analysis And Subnetting For An Organization In Sydney. [Internet]. My Assignment Help. 2022 [cited 21 November 2024]. Available from: https://myassignmenthelp.com/free-samples/itc542-internet-working-with-tcpip/roles-played-by-network-analyzer-file-CA2A51.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close