country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

The Analysis Of The Communication Protocol

tag 0 Download6 Pages 1,497 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Questions:

1.What is a Protocol in the Context of Communication Network? Describe the purpose of Protocol analysis. Your answer should Contain Description of a real-time situation where Protocol analyser can be used. List any three popular protocol analyzer solutions currently available in the Market. 

2.You are asked to visit a Pharmaceutical Company to help troubleshoot some Network Connectivity Problems. The Company’s network consists of 11 Workstations connected by a single 24 port hub. The Company Manager describes the problem as consistent and explains that every Morning there is a five minute delay to Connect to the main Server. The Manager Indicates that every user on the network has the same problem. Using your Protocol analyzer where would you tap into this network and why? Explain how this network is different to Modern Networks. 

3.As a Network administrator for a medium sized company, you have been asked to design a network by utilizing 10.0.0.0 private IP address. The Network will span six buildings with a router in each building to join the networks. Currently, the Company has approximately a total of 1,000 workstations in the following locations:

Building A - 200 workstations
Building B - 125 workstations
Building C - 135 workstations
Building D - 122 workstations
Building E - 312 workstations

4.Explain the purpose of QoS on a TCP/IP network. Define the basic Purpose and differentiate between IP precedence, TOS, ECN and Diffserv Functionalities.
 
 

Answers:

1.The communication protocol is basically a set of rules that deals with two or more entities in the communication system (Manbachi et al., 2014). The entities transfer the data through a variety of physical quantities. The protocol or the set rules provides the definitions of the semantics and the syntax for the communications. It also helps in recovery from the error. The protocol is imposed by either the hardware or the software or by collaboration of both the hardware and the software. The protocols are available I the telecommunication network at various levels.  There has been a set of rules that are defined for the hardware level. The OSI model also has a set of rules at every level. The protocols are recognized and followed by both ends of the connection.

The analysis of the protocol is an experimental method. It is used for collecting the evidences of the transitional states. The system is generally concerned with the utilization of the methods in the functions for the calculations. The analyzer is basically a program or a collection of the hardware that are traffic passing or logging at any part of the digital network. The “network probe” is an analyzer of the protocols that can monitor the real time network traffic. The analyzer is used for identifying the sources for which the network lags.        

2.The hub has been an easy tool to hook up anywhere in-line with the server (Khalaf et al., 2017). This is because of the packets that are arriving at a single point would generally spread over the other parts of the network. The traffic that is being transferred can be observed by all the ports in the hub. The network where only the hubs are present and there is no switch or router in the network, the data would be visible to all the nodes in the network. The analyzer then could be plugged in at any point on the network. In the provided scenario the pharmaceutical firm comprises of 11 workstation that are connected to a hub consisting of 24 ports. And in addition to this to tap into the network a switch is to be used. This can be done as the packets can be transmitted only to the devices that are connected to the port with their MAC addresses. The machines could be connected with the help of the switch and with their MAC addresses.

 


The benefits of the switch would be:

  • With the help of the switch any type of hub can split and connected to various server ports.
  • The switch has capabilities to monitor the network.
  • The real scenarios of the modern world has made the switches different and very essential to use.

The following differences could be identified in between the distance routing vector and the link state routing (Garcia-Luna-Aceves, 2014):

The link state routing is faster than the distance vector in converging.

The distance vector is more robust than the link state.

 


The link state is simpler than the distance vector.

The infrastructural requirements of the link state is more than the distance vector.

The distance vector uses the Bellman-Ford algorithm. While the link state uses the shortest path first algorithm.

The link state supports the class less as well as the class full subnets, whereas the distance vector only supports the class-full routine.

The link state can create neighbor table, topology table and the routing table whereas the distance vector can create only the routing table.

The distance vector has lower memory requirements than the link state.

The configuration of the distance vector is easier than the link state.

The example of the link state are IS-IS, OSPF. The example of the distance vector are IGRP and RIP.

 

Figure: Distance Vector and Link State

Source: (created by Author)

3.Class subnet mask = 255.0.0.0

Binary notation = 11111111.00000000.00000000.00000000.

The 1s in the subnet mask are bits that designate the network address.

The 0s in the subnet mask are host address bits.

 


Number of hosts in the subnet = 16777214.

Sum of 2048 possible subnets = 1111111111111.

255=11111111 number of subnet masks is the standard one.

Subnet mask for the network = 255.255.248.0 or /21

The binary address =11111111.11111111.11111000.00000000.

Total number of 2048 possible host IP addresses in every subnet. =1111111111111.

Hence, number of IP addresses per subnet used for hosts over the network is 2048 - 2 = 2046.Thus the total number of allowable hosts technically possible is 2046. Therefore, it would not be a problem even if the number of host per network is more than 1024 per building.

4.The QoS is the Quality of Service of a TCP/IP network (Beloglazov & Buyya, 2013). It is the set of rule which sets the priority of the different type of operations on the network. It assigns the particular task to the particular points on the network. In addition to it provides the order of priority according to the MAC addresses of the systems. The QoS also monitors the system performances.

There are various kind of header fields. IP precedence is one of the header fields. IP precedence is a field in the IP data packets. It basically provides the status of the packet. The IP precedence provides the order of the priority of the packets. The IP precedence are defined as following:

111- Network Control

110- Internetwork Control

101- Critic/ECP

011- Flash Override

 


010- Immediate

001-Priority 

000-Routine

In addition to this, the TOS means the type of Services. It is also one of the header fields. But unlike the IP Precedence it provides the type of services for the data packets. It is 8 bits while the IP Precedence is only 3 bits.

Other header files are the ECN and the Diffserv fields. The ECN is the explicit congestion notification. It provides the congestion notifications for the data packets. It consists of only 0 or 1 bits. Diffserv is the differentiated services of the computer networks. It basically performs the task of differentiating the types of services of the networks and the data packets. IT is usually 7-2 bits.

 

References

Beloglazov, A., & Buyya, R. (2013). Managing overloaded hosts for dynamic consolidation of virtual machines in cloud data centers under quality of service constraints. IEEE Transactions on Parallel and Distributed Systems, 24(7), 1366-1379.

Garcia-Luna-Aceves, J. J. (2014, September). Name-based content routing in information centric networks using distance information. In Proceedings of the 1st international conference on Information-centric networking (pp. 7-16). ACM.

Hemmati, E., & Garcia-Luna-Aceves, J. J. (2015, September). A new approach to name-based link-state routing for information-centric networks. In Proceedings of the 2nd International Conference on Information-Centric Networking (pp. 29-38). ACM.

Khalaf, A. M., El Salam, M. S. A., & Ahmed, K. A. (2017, February). Investigation of different ethernet wiring and different frame size to enhance the performance of LAN. In Advanced Communication Technology (ICACT), 2017 19th International Conference on (pp. 787-796). IEEE.

Manbachi, M., Nasri, M., Shahabi, B., Farhangi, H., Palizban, A., Arzanpour, S., ... & Lee, D. C. (2014). Real-time adaptive VVO/CVR topology using multi-agent system and IEC 61850-based communication protocol. IEEE Transactions on Sustainable Energy, 5(2), 587-597.

Prete, L. R., Schweitzer, C. M., Shinoda, A. A., & de Oliveira, R. L. S. (2014, June). Simulation in an SDN network scenario using the POX Controller. In Communications and Computing (COLCOM), 2014 IEEE Colombian Conference on (pp. 1-6). IEEE.

TamasSelicean, D., Pop, P., & Steiner, W. (2015, April). Timing analysis of rate constrained traffic for the TTEthernet communication protocol. In Real-Time Distributed Computing (ISORC), 2015 IEEE 18th International Symposium on (pp. 119-126). IEEE.

Wu, J., Chen, L., Feng, Y., Zheng, Z., Zhou, M. C., & Wu, Z. (2013). Predicting quality of service for selection by neighborhood-based collaborative filtering. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 43(2), 428-439.

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). The Analysis Of The Communication Protocol . Retrieved from https://myassignmenthelp.com/free-samples/the-analysis-of-the-communication-protocol.

"The Analysis Of The Communication Protocol ." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/the-analysis-of-the-communication-protocol.

My Assignment Help (2018) The Analysis Of The Communication Protocol [Online]. Available from: https://myassignmenthelp.com/free-samples/the-analysis-of-the-communication-protocol
[Accessed 03 April 2020].

My Assignment Help. 'The Analysis Of The Communication Protocol ' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/the-analysis-of-the-communication-protocol> accessed 03 April 2020.

My Assignment Help. The Analysis Of The Communication Protocol [Internet]. My Assignment Help. 2018 [cited 03 April 2020]. Available from: https://myassignmenthelp.com/free-samples/the-analysis-of-the-communication-protocol.


With time, MyAssignmenthelp.com has become one of the best college essay writing services. Our all rounded services give students the confidence to overcome assignment related issues. Our services are fast enough to meet most urgent deadlines. We are capable of delivering fast essay writing services with the help of our specially designed provisions and writers' teams. Our urgent essay help services guarantee most rapid delivery of assignment solutions. Some of our most popular essay services are application essay help, exploratory essay help, literary review essay help and argumentative essay help.

Latest Networking Samples

MN506 System Management Demonstration System

Download : 0 | Pages : 8

Answer: Introduction For the development of the report the first scenario of development of a local area network (LAN) to support Windows Server and Client Environment is selected. Here the organization has a requirement to develop a centralized authentication system and print server configuration such that the users connected in the local area network can use the network printer for the management of their printing jobs. The server is also n...

Read More arrow

ITNE2002 Network And Information Security 2

Download : 0 | Pages : 3
  • Course Code: ITNE2002
  • University: Victorian Institute Of Technology
  • Country: Australia

Answer: Introduction Mobile security has become increasingly important in the field of mobile computingIn this modern era, the security of mobile phones is one of the biggest issue faced by users.The aim of this presentation is to analysis the security-related issues of smartphones and mitigation tools to reduce such a problem. Smart phones security issues There are numerous kinds of security threats and issues occur in the smart phones which...

Read More arrow

BN305 Virtual Private Network And Medium Enterprise

Download : 0 | Pages : 10

Answer: Introduction: This report has been mainly associated with discussing the creation of a medium-sized enterprise for the purpose of connecting each and every department of an organization so as to improve the current capacity of the organization so as to accommodate the future growth. The report documents all the technologies which can be applied so as to develop the new solution. The report also consists of the scope as well as the lim...

Read More arrow

CSC00240 Network Design For USoft Headquarters Expansion

Download : 0 | Pages : 8

Answer: Introduction: In the following report, user requirements regarding network expansion and implementation are documented side by side analysing the Local Area Network (LAN) of uSoft.com headquarters. The headquarters of the company uSoft is undergoing an expansion and the associated networks are also to be affected. Having conducted the necessary calculations to provide network accesses to all endpoints of the expanded network, diagram...

Read More arrow

G444 Networking 2

Downloads : 2 | Pages : 5

Answers: Difference between classless and classful addressing Classful addressing Same subnet mask is used by the entire network. Classful addressing is divided in two segments i.e. network ID and host ID Classless addressing It utilises Variable length subnet mask. Different subnet mask is used by same network. Network and host id has no restrictions. Classless routing is deprived of subnet mask. Reason why class A&rsqu...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,241,609

Orders

4.9/5

Overall Rating

5,067

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

416 Order Completed

95% Response Time

Tyler Moore

MBA in Accounting

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

The assignment was return to me on time has to make corrections and adjustment myself but still made a good grade. thanks

flag

User Id: 392946 - 02 Apr 2020

Australia

student rating student rating student rating student rating student rating

OMG this was totally better than expected and worth every penny!!! I suck at math so i\'m excited to see my grade!

flag

User Id: 394019 - 02 Apr 2020

Australia

student rating student rating student rating student rating student rating

Very happy with work provided by My assignment help.com. Excellent work. Always with in deadline.

flag

User Id: 228464 - 02 Apr 2020

Australia

student rating student rating student rating student rating student rating

Haven\'t get result yet but already feel like a great piece of writing, no disappoint.

flag

User Id: 329158 - 02 Apr 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?