In network communication, the protocol is defined as the rules by which two devices communicate over the given communication channel. All rules governing like syntax, communication initiation /Termination and packet size are all govern by the protocol itself. In case of any error the protocol must take care of the error and avoid the termination of the conversation.
A network analyzer analyzes the packets captured on the communication channel during the communication between the network devices. Network analyze could be a software or hardware or even combination of both. These types of devices help in analyzing the traffic over the network and helps in troubleshooting any situation that relates to the network communication. The network analyzer is not a tool that can replace the firewall or anti-virus but these tools can enhance the functionality of these tools providing the better security and avoiding the risk of any attacks.
A network hub is the device that is designed to connect the various devices to each other without understanding the data being communicated. When a hub receives the packet, it is transferred to all the connected devices to the hub. Switches on the other side are much more intelligent than hubs, the switches process and examine all the data communicated on the network and transferred it to the matching destination whose address matches the residing nodes. If the matching one is not found the packet is simply dropped from the network.
The current system is slow due to the fact it has connected the devices using the Hub, as the hub being the dumb device and its transmits all the data to all the nodes, it leads to the situation of collisions and congestions. This leads to delay in the overall network hence leading to the number of retransmission of data packets that would lead to slower network as same work is done using more packets and more time is consumed in communications. If we use the network analyzer we would then receive in the output log lot of ICMP and LLC packets, this shows the ping request and data packets being transmitted all over the place and network receiving all the data which is meant for the single machine. (Yih-Chun Hu, Johnson, & Perrig, n.d.)
The solution to the situation is to use the network switch for the communication that would greatly bring down the number of ICMP and LLC packets on the network. This would also mean lesser congestion on the network and lower the traffic and systems would start with better speeds and would take less time booting up.
In computer networks the path from one destination to other require the machines to follow certain algorithms for making the decisions. There are two major routing protocols for this:
These are two major classes of routing protocol in which Distance vector uses Bellman ford, Ford-Fulkerson Algorithms to calculate the optimal paths.
This routing protocol is quite simple protocol, it allows the routers to automate the process of packet delivery using the shortest path in order to reach the destination. The shortest path metric is cost that is associated with link. (Munaretto, Badis, Al Agha, & Pujolle, n.d.)
The protocol tracks the status of the connection with all the nodes and keep the track of speeds offered by the link. The status also includes if the link is up or not and how much time is needed for the packet to reach the required destination. Routers are needed to keep checking the paths and links in order to have updated routing information. This is why the link state is more complex hardware and have more overhead as compared to the Distance Vector. (Tao, Gao, Wang, Zhang, & Ma, 2016)
As in the figure 1 using the Distance Vector Routing the path that would be taken is A->B, whereas the Link state would take A->C->D->B that is 10 times faster than the Distance vector. If all the channels have same speed the Distance vector is preferred and if Link state is preferred in situation where speeds of links are different. (Yih-Chun Hu, Johnson, & Perrig, n.d.)
Subnetting is the process in which the network is divided into smaller networks in order to manage the congestion and collisions in the network. The division is done over the layer 3 of the OSI model of IP address. Current subnet is to have at least 6 networks with 1024 nodes each using the IP address 10.0.0.0. Current requirements are as follows: (Manaf, & Bataona, 2014) (Tozal, & Sarac, 2011)
With the given input the network would be subnetted using the subnet mask of 255.224.0.0 or “/11” that would provide 2097152 number of IP address each subnet. The List of networks is:
The technology in network is more concerned in order to get the throughput and pumping of the data to the nodes regardless of how the data is being communicated in the network. In such situations, many packets might be even stored in buffered or dropped if the situation arise of overflow situation. The applications such as RTMP the situation is not at all idea hence the in order to have the optimal data transfer with constant bandwidth the protocol needs to have the feature known as “Quality of Service” known as QoS.
TOS (type of service) a field used in the IPv4 based header for many purposes on the network such as priority queue management, lower the delay using the routes having the high throughput and much reliable services. (Yuanmin Chen, Xiaodong Li, & Wei Mao, 2008)
Manaf, A., & Bataona, D. (2014). Analysis and design of subnetting methods: Hybrid fixed length subnet masking (HFLSM). 2014 International Conference On Electrical Engineering And Computer Science (ICEECS). https://dx.doi.org/10.1109/iceecs.2014.7045228
Munaretto, A., Badis, H., Al Agha, K., & Pujolle, G. A link-state QoS routing protocol for ad hoc networks. 4Th International Workshop On Mobile And Wireless Communications Network. https://dx.doi.org/10.1109/mwcn.2002.1045726
Tao, J., Gao, X., Wang, B., Zhang, X., & Ma, S. (2016). Multi-path based link-state routing mechanism. 2016 18Th International Conference On Advanced Communication Technology (ICACT). https://dx.doi.org/10.1109/icact.2016.7423385
Tozal, M., & Sarac, K. (2011). Subnet level network topology mapping. 30Th IEEE International Performance Computing And Communications Conference. https://dx.doi.org/10.1109/pccc.2011.6108072
Yih-Chun Hu, Johnson, D., & Perrig, A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings Fourth IEEE Workshop On Mobile Computing Systems And Applications. https://dx.doi.org/10.1109/mcsa.2002.1017480
Yuanmin Chen, Xiaodong Li, & Wei Mao. (2008). SIP peering based on distance vector algorithm. 2008 11Th IEEE International Conference On Communication Technology. https://dx.doi.org/10.1109/icct.2008.4716130
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Subnet Level Network Topology Mapping. Retrieved from https://myassignmenthelp.com/free-samples/subnet-level-network-topology-mapping.
"Subnet Level Network Topology Mapping." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/subnet-level-network-topology-mapping.
My Assignment Help (2018) Subnet Level Network Topology Mapping [Online]. Available from: https://myassignmenthelp.com/free-samples/subnet-level-network-topology-mapping
[Accessed 08 April 2020].
My Assignment Help. 'Subnet Level Network Topology Mapping' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/subnet-level-network-topology-mapping> accessed 08 April 2020.
My Assignment Help. Subnet Level Network Topology Mapping [Internet]. My Assignment Help. 2018 [cited 08 April 2020]. Available from: https://myassignmenthelp.com/free-samples/subnet-level-network-topology-mapping.
MyAssignmenthelp.com has been satisfying students' needs over a decade now. With years of experience in providing assignment help, we are capable of understanding students' requirements better and fulfill them perfectly. To meet the students' needs, we have appointed 3000+ experts, who cover more than 100 subjects while assignment help. Some of our popular services include corporate finance assignment help, MATLAB assignment help, database assignment help, operating system assignment help and web development assignment help.
Answer: Introduction OzCo Boats is a family-owned boat building industry based in Coffs Harbour, situated in New South Wales has been operating since 1961. It builds high quality and luxury boats that are made from traditional material. In the current scenario of technological developments, they have to embrace innovative technologies to compete with its competitors and needs to transform its traditional methods of production. If it is contin...Read More
Answer: Part one Chosen topic- Self awareness (From workshop week 2) Activity name Description Time needed Expected Outcomes Things to consider (instructions) Expected barriers 1. Adjective game This activity is about giving an adjective to own self and to others and then to see whether self given adjectives and the adjectives chosen by others ...Read More
Answer: Introduction: Communication is used for the information transformation between different sources. It has different types such as verbal, non-verbal. There are many things to communicate for some purpose. Professionalism is require a better communication for fulfill the basic requirements in business. Business communication is playing a key role in a life of professional person for their professional work. This essa...Read More
Answer: Fair Value Accounting Mark to Market or Fair value accounting shows the current price or the potential of the asset in the market. Assessment of fair value accounting is one to reflect economic reality in the corporate environment. The fair value shows the potential price in which the asset can be bought or sold in respect of the cash flows or the economic benefits flowing from the asset (Goh et al. 2015). The cons and pros of ap...Read More
Answer: Learning from case study I was able to learn with the help of the case study that Telstra which is a provider of the mobile phones along with broadband internet focuses on strategies that help in protecting the community. The knowledge was gathered through the case study that getting involved with the local communities can help an organization in surviving within the competitive environment. The fostering of the inclusive communities ...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I hope I get good mark! I hope I get good mark!I hope I get good mark!I hope I get good mark!I hope I get good mark!I hope I get good mark!
HANDED IN ON TIME THOUGH GAVE A VERY SHORT TIME TO DO SO. THE WORK WAS WELL DONE TOO!!
Always impecable work. I super reccoment this service to anyone. The quality of work and agile delivery are the high points.
this was an excellent assignment I cant understand how the assignments can differ in presentation, is it that some writers are trained and some are not.