Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Designing of Addressing Solution

Discuss about the Spectroscopic Methods for Nanomaterials Characterization.

The M2M Solutions is a medium sized organization. The organization currently looking to expand its operations, and hence they are required to relay their network structure. For the purpose of relaying the network architecture I have been entrusted with task of taking the full responsibility of the task. I have also been also provided with a team of several administrators of the system.

The task one of this report contains the information about the designing of the Addressing solution for the organization.

The report provides the design for the Simple Addressing solution, the description of the Simple Addressing Design and also provides information about the subnetting techniques and the network divisions that are implemented for the system. In addition to this, some additional justification for the network design has also been provided in the report.

The M2M Company has already provided the information about their requirements. The company has acquired about six sites across the city of Sydney. They are looking to implement a network for the six different department of the company. The six different departments that are present in the company are the Finance department, Transport Office, Research Office, Sales Office, Information System and the Head Office. Now the company is looking to implement a network that would be connecting all the departments of the company to the single network. The company is also looking to subnet their network and it is also informed that they would be having a single subnet for each of the departments in the company. In addition to this, the design is required to accommodate around 1200 work station in their network. In addition to this, the distribution of the workstation of the company is done in the following process:

  • Finance Office - 260 workstations
  • Transport Office - 130 workstations
  • Research Office - 120 workstations
  • Sales Office - 40 workstations
  • Information technology - 520 workstations
  • Head Office - 60 workstations

Hence, the network that is implemented should be accommodating the aforesaid number of machines in the system.

The network design is implemented according to the requirement stated by the company. For the implantation the system central server is connected to the six departments of the company. The six different servers are implemented for the six different sectors of the company that they need to integrate into their system. Hence, the network would be subnetted efficiently into six different sub networks. This provides the company with the benefit of stopping the access to the different administrators of the different networks. Hence, this would be providing various type secure facilities for the network of the company. In addition to this, the authentication aspect within the network would also be improved efficiently by this design. The calculations and the further discussions of the network are provided below.

Network Subnetting Techniques and Divisions

For the subnetting of the network the major network was selected as 10.0.0.0/20.

The available IP addresses in major network: 4094

The number of IP addresses needed: 1130

The available IP addresses in allocated subnets: 2036


In addition to this, it should also be noted that about 50% of available major network address space is used and about 56% of subnetted network address space is used. The table provided below displays the subnetting procedures efficiently.

Subnet Name

Needed Size

Mask

Dec Mask

Assignable Range

Broadcast

Address

Allocated Size

Finance_Offfice

260

/23

255.255.254.0

10.0.4.1 - 10.0.5.254

10.0.5.255

10.0.4.0

510

Transport_Office

130

/24

255.255.255.0

10.0.6.1 - 10.0.6.254

10.0.6.255

10.0.6.0

254

Research_Office

120

/25

255.255.255.128

10.0.7.1 - 10.0.7.126

10.0.7.127

10.0.7.0

126

Sales_Office

40

/26

255.255.255.192

10.0.7.193 - 10.0.7.254

10.0.7.255

10.0.7.192

62

Infiormation_Technology

520

/22

255.255.252.0

10.0.0.1 - 10.0.3.254

10.0.3.255

10.0.0.0

1022

Head_Office

60

/26

255.255.255.192

10.0.7.129 - 10.0.7.190

10.0.7.191

10.0.7.128

62

The network design is according to the needs mentioned by the company. The network would be providing efficient communication facilities for the company and also the network would allow integration of the different departments of the company within the same network efficiently. The network would also provide very efficient security and the very efficient authentication facilities for the company. The network has also been designed efficiently for implementation of the network that would be accommodating about 1200 in the system. In addition to this the division of the network has also been done according to the requirements mentioned by the M2M Company. The sub netting of the company is also according to the requirements of the mentioned by the company. The system would also allow only the allocated number of machine in the network. The subnet /20 are being used in this system. Hence, the total number of addresses that would be allowed in this system is 4096. But if the number of addresses in each building exceeds more than 1024 them it would be impossible to allocate that number of addresses in the network. As 1024 x 6 exceeds more than 4096 addresses and hence, this would result in the congestion of the network.

For conclusion it can be said that the network design provided for the network would be helpful for the company to implement their network in which the sub network would be efficiently divided for the company. This report provides the details about the network design. The task one of this report contains the information about the designing of the Addressing solution for the organization. The report provides the design for the Simple Addressing solution, the description of the Simple Addressing Design and also provides information about the subnetting techniques and the network divisions that are implemented for the system. In addition to this, some additional justification for the network design has also been provided in the report.

The M2M Solutions is a medium sized organization. The organization currently looking to expand its operations, and hence they are required to relay their network structure. For the purpose of relaying the network architecture I have been entrusted with task of taking the full responsibility of the task. I have also been also provided with a team of several administrators of the system.

Current Company Policies and Network Analyzers

The task two in this report provides the information about the current company policies and the discussions involving the network analyzers.

The report provides the information about the protocols that are used for the communication in the network, the role of the network analyzer, selection of the network analyzer and the various type of benefits for the network analyzer tool and other discussions about the tool.    

The company policies do not involve the use of network analyzers in their network although the network analyzers are very efficient for the company to carry out their processes. In addition to this, the network analyzer would also help the company tom identify the flaws that are existent within the network. The information about the protocols that are being used in the network is provided below.

The main protocols that are being used for the network are HTTP, FTP and SMTP protocol. The HTTP is the hyper text transfer protocol, the FTP is the File transfer protocol and the SMTP is the Simple mail transfer protocol. The HTTP protocol would enable the network to have access to the internet connection and system would be able to go online. In addition to this, the FTP protocol would allow the systems in enable to transfer files within the network. The SMTP protocol would enable the components of the network to communicate among them very efficiently. In addition to this, the communication in between the staffs of the company would also be very efficient and they would be able to exchange emails among themselves.

The network analyzer is combination of the hardware and software. It plays various type of roles for the network:

  • It can be used for the analysis of the network.
  • It can also be used for the security of the network.

The wire shark framework is used as a network analyzer for the analysis of the network that is designed in task one. The wireshark network analyzer would be able to perform the analysis about the data packets that are being transferred within the network. They are also going to trace the packets that are flowing through the network.

Wireshark is one the most efficient tool that can be used as a network analyzer In addition to this; the product is very popular in the market and posses quite a high ranking in the market for the network analyzer department.

Wireshark provides various type of benefits for the network implemented by the users.

Firstly, it supports a wide range of protocols that vary from the IP and DHCP to the AppleTalk and BitTorrent. In addition to this, with each of the update the tool is updated and a new protocol is added to the application on a daily basis. The analyzer supports about 850 protocols.

The tool also helps in the analysis of the network and performs excellent monitoring of the systems. Hence, they protect the systems form the external intruders.

The WireShark Network Protocol Analyzer tool is an open source tool that can be used for both the individual use and also for the commercial uses as well. The cost for the implementation of the analyzer on the network system is also very minimal and there are no external hardware requirements for the analyzer. Hence, the associated cost for the analyzer is almost nil.  

For using the tool the minimum requirements of the network are:

60mb disk space, they also need a CPU with a clock speed of about 400 Mhz. In addition to this, system is required to possess a Network Interface Controller. 

For conclusion it can be said that the Wireshark Network Protocol Analyzer is the best tool that can be used for the network that is designed for the M2M to implement. The information about the current company policies and the discussions involving the network analyzers have been provided in this report. The report provides the information about the protocols that are used for the communication in the network, the role of the network analyzer, selection of the network analyzer and the various types of benefits for the network analyzer tool and other discussions about the tool. The usability of the network analyzer has also been provided in this report.

Alexander, G., & Crandall, J. R. (2015, April). Off-path round trip time measurement via TCP/IP side channels. In Computer Communications (INFOCOM), 2015 IEEE Conference on (pp. 1589-1597). IEEE.

Bauer, G., Bawej, T., Behrens, U., Branson, J., Chaze, O., Cittolin, S., ... & Dupont, A. (2014). 10 Gbps TCP/IP streams from the FPGA for high energy physics. In Journal of Physics: Conference Series (Vol. 513, No. 1, p. 012042). IOP Publishing.

Bishop, S., Fairbairn, M., Norrish, M., Ridge, T., Sewell, P., Smith, M., & Wansbrough, K. (2015). Engineering with Logic: Rigorous Specification and Validation for TCP/IP and the Sockets API. URL: https://www. cl. cam. ac. uk/pes20/Netsem/paper3. pdf.

Black, E. D. (2017). Introduction to the Network Analyzer and the Digital Fast Fourier Transform (FFT).

Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85-96.

Jerger, M., Vasseli, Z., & Fedorov, A. (2017). In situ characterization of qubit control lines: a qubit as a vector network analyzer. arXiv preprint arXiv:1706.05829.

Lewandowski, A., Wiatr, W., Gu, D., Orloff, N. D., & Booth, J. (2017). A Multireflect-Thru Method of Vector Network Analyzer Calibration. IEEE Transactions on Microwave Theory and Techniques, 65(3), 905-915.

Micheli, D., Pastore, R., Vricella, A., Delfini, A., Marchetti, M., & Santoni, F. (2017). Electromagnetic Characterization of Materials by Vector Network Analyzer Experimental Setup. Spectroscopic Methods for Nanomaterials Characterization, 195.

Savin, A. A. (2013, October). A novel factor verification technique for one-port vector network analyzer. In Microwave Conference (EuMC), 2013 European(pp. 60-63). IEEE.

Savin, A. A., Guba, V. G., Rumiantsev, A., & Maxson, B. D. (2014, June). Estimation of complex residual errors of calibrated two-port vector network analyzer. In ARFTG Microwave Measurement Conference (ARFTG), 2014 83rd (pp. 1-4). IEEE.

Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP architecture. NDN Project, Tech. Rep. NDN-0038.

Shojafar, M., Cordeschi, N., Abawajy, J. H., & Baccarelli, E. (2015, December). Adaptive energy-efficient qos-aware scheduling algorithm for tcp/ip mobile cloud. In Globecom Workshops (GC Wkshps), 2015 IEEE (pp. 1-6). IEEE.

Tiwari, A., Jaiswal, M., Varma, N., & Joshi, B. L. (2014). TCP/IP Protocol Suite, Attacks, and Security Tools. URl= https://www. academia. edu/7134687/TCP_IP_Protocol_Suite_Attacks_and_Security_Tools.

Yasukata, K., Honda, M., Santry, D., & Eggert, L. (2016, June). StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs. In USENIX Annual Technical Conference (pp. 43-56).

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Designing Addressing Solution For M2M Essay, Optimizing Length To 70 Characters.. Retrieved from https://myassignmenthelp.com/free-samples/spectroscopic-methods-nanomaterials-characterization.

"Designing Addressing Solution For M2M Essay, Optimizing Length To 70 Characters.." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/spectroscopic-methods-nanomaterials-characterization.

My Assignment Help (2018) Designing Addressing Solution For M2M Essay, Optimizing Length To 70 Characters. [Online]. Available from: https://myassignmenthelp.com/free-samples/spectroscopic-methods-nanomaterials-characterization
[Accessed 19 April 2024].

My Assignment Help. 'Designing Addressing Solution For M2M Essay, Optimizing Length To 70 Characters.' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/spectroscopic-methods-nanomaterials-characterization> accessed 19 April 2024.

My Assignment Help. Designing Addressing Solution For M2M Essay, Optimizing Length To 70 Characters. [Internet]. My Assignment Help. 2018 [cited 19 April 2024]. Available from: https://myassignmenthelp.com/free-samples/spectroscopic-methods-nanomaterials-characterization.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close