1.The communication protocol is basically a set of rules that deals with two or more entities in the communication system (Manbachi et al., 2014). The entities transfer the data through a variety of physical quantities. The protocol or the set rules provides the definitions of the semantics and the syntax for the communications. It also helps in recovery from the error. The protocol is imposed by either the hardware or the software or by collaboration of both the hardware and the software. The protocols are available I the telecommunication network at various levels. There has been a set of rules that are defined for the hardware level. The OSI model also has a set of rules at every level. The protocols are recognized and followed by both ends of the connection.
The analysis of the protocol is an experimental method. It is used for collecting the evidences of the transitional states. The system is generally concerned with the utilization of the methods in the functions for the calculations. The analyzer is basically a program or a collection of the hardware that are traffic passing or logging at any part of the digital network. The “network probe” is an analyzer of the protocols that can monitor the real time network traffic. The analyzer is used for identifying the sources for which the network lags.
2.The hub has been an easy tool to hook up anywhere in-line with the server (Khalaf et al., 2017). This is because of the packets that are arriving at a single point would generally spread over the other parts of the network. The traffic that is being transferred can be observed by all the ports in the hub. The network where only the hubs are present and there is no switch or router in the network, the data would be visible to all the nodes in the network. The analyzer then could be plugged in at any point on the network. In the provided scenario the pharmaceutical firm comprises of 11 workstation that are connected to a hub consisting of 24 ports. And in addition to this to tap into the network a switch is to be used. This can be done as the packets can be transmitted only to the devices that are connected to the port with their MAC addresses. The machines could be connected with the help of the switch and with their MAC addresses.
The link state routing is faster than the distance vector in converging.
The distance vector is more robust than the link state.
The link state is simpler than the distance vector.
The infrastructural requirements of the link state is more than the distance vector.
The distance vector uses the Bellman-Ford algorithm. While the link state uses the shortest path first algorithm.
The link state supports the class less as well as the class full subnets, whereas the distance vector only supports the class-full routine.
The link state can create neighbor table, topology table and the routing table whereas the distance vector can create only the routing table.
The distance vector has lower memory requirements than the link state.
The configuration of the distance vector is easier than the link state.
The example of the link state are IS-IS, OSPF. The example of the distance vector are IGRP and RIP.
Figure: Distance Vector and Link State
Source: (created by Author)
3.Class subnet mask = 255.0.0.0
Binary notation = 11111111.00000000.00000000.00000000.
The 1s in the subnet mask are bits that designate the network address.
The 0s in the subnet mask are host address bits.
Number of hosts in the subnet = 16777214.
Sum of 2048 possible subnets = 1111111111111.
255=11111111 number of subnet masks is the standard one.
Subnet mask for the network = 255.255.248.0 or /21
The binary address =11111111.11111111.11111000.00000000.
Total number of 2048 possible host IP addresses in every subnet. =1111111111111.
Hence, number of IP addresses per subnet used for hosts over the network is 2048 - 2 = 2046.Thus the total number of allowable hosts technically possible is 2046. Therefore, it would not be a problem even if the number of host per network is more than 1024 per building.
4.The QoS is the Quality of Service of a TCP/IP network (Beloglazov & Buyya, 2013). It is the set of rule which sets the priority of the different type of operations on the network. It assigns the particular task to the particular points on the network. In addition to it provides the order of priority according to the MAC addresses of the systems. The QoS also monitors the system performances.
There are various kind of header fields. IP precedence is one of the header fields. IP precedence is a field in the IP data packets. It basically provides the status of the packet. The IP precedence provides the order of the priority of the packets. The IP precedence are defined as following:
111- Network Control
110- Internetwork Control
101- Critic/ECP
011- Flash Override
010- Immediate
001-Priority
000-Routine
In addition to this, the TOS means the type of Services. It is also one of the header fields. But unlike the IP Precedence it provides the type of services for the data packets. It is 8 bits while the IP Precedence is only 3 bits.
Other header files are the ECN and the Diffserv fields. The ECN is the explicit congestion notification. It provides the congestion notifications for the data packets. It consists of only 0 or 1 bits. Diffserv is the differentiated services of the computer networks. It basically performs the task of differentiating the types of services of the networks and the data packets. IT is usually 7-2 bits.
Beloglazov, A., & Buyya, R. (2013). Managing overloaded hosts for dynamic consolidation of virtual machines in cloud data centers under quality of service constraints. IEEE Transactions on Parallel and Distributed Systems, 24(7), 1366-1379.
Garcia-Luna-Aceves, J. J. (2014, September). Name-based content routing in information centric networks using distance information. In Proceedings of the 1st international conference on Information-centric networking (pp. 7-16). ACM.
Hemmati, E., & Garcia-Luna-Aceves, J. J. (2015, September). A new approach to name-based link-state routing for information-centric networks. In Proceedings of the 2nd International Conference on Information-Centric Networking (pp. 29-38). ACM.
Khalaf, A. M., El Salam, M. S. A., & Ahmed, K. A. (2017, February). Investigation of different ethernet wiring and different frame size to enhance the performance of LAN. In Advanced Communication Technology (ICACT), 2017 19th International Conference on (pp. 787-796). IEEE.
Manbachi, M., Nasri, M., Shahabi, B., Farhangi, H., Palizban, A., Arzanpour, S., ... & Lee, D. C. (2014). Real-time adaptive VVO/CVR topology using multi-agent system and IEC 61850-based communication protocol. IEEE Transactions on Sustainable Energy, 5(2), 587-597.
Prete, L. R., Schweitzer, C. M., Shinoda, A. A., & de Oliveira, R. L. S. (2014, June). Simulation in an SDN network scenario using the POX Controller. In Communications and Computing (COLCOM), 2014 IEEE Colombian Conference on (pp. 1-6). IEEE.
TamasSelicean, D., Pop, P., & Steiner, W. (2015, April). Timing analysis of rate constrained traffic for the TTEthernet communication protocol. In Real-Time Distributed Computing (ISORC), 2015 IEEE 18th International Symposium on (pp. 119-126). IEEE.
Wu, J., Chen, L., Feng, Y., Zheng, Z., Zhou, M. C., & Wu, Z. (2013). Predicting quality of service for selection by neighborhood-based collaborative filtering. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 43(2), 428-439.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). The Analysis Of The Communication Protocol . Retrieved from https://myassignmenthelp.com/free-samples/the-analysis-of-the-communication-protocol.
"The Analysis Of The Communication Protocol ." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/the-analysis-of-the-communication-protocol.
My Assignment Help (2018) The Analysis Of The Communication Protocol [Online]. Available from: https://myassignmenthelp.com/free-samples/the-analysis-of-the-communication-protocol
[Accessed 24 January 2021].
My Assignment Help. 'The Analysis Of The Communication Protocol ' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/the-analysis-of-the-communication-protocol> accessed 24 January 2021.
My Assignment Help. The Analysis Of The Communication Protocol [Internet]. My Assignment Help. 2018 [cited 24 January 2021]. Available from: https://myassignmenthelp.com/free-samples/the-analysis-of-the-communication-protocol.
With time, MyAssignmenthelp.com has become one of the best college essay writing services. Our all rounded services give students the confidence to overcome assignment related issues. Our services are fast enough to meet most urgent deadlines. We are capable of delivering fast essay writing services with the help of our specially designed provisions and writers' teams. Our urgent essay help services guarantee most rapid delivery of assignment solutions. Some of our most popular essay services are application essay help, exploratory essay help, literary review essay help and argumentative essay help.
Answer: Intellectual property may be defined as a commercial product of human intellect, which is valuable either in the abstract or concrete form like a protectable trademark, human intellect or a trade secret (Bently & Sherman, 2014). As per the approach of Berti’s (2009), it can be stated that the intellectual property system is nothing but a crossroads. The developed countries are said to be more associated with the level of enfo...
Read MoreAnswer: Threat Category Control Description Classification Type Accidental Corruption of information Proper shut down of the system The proper shut down of the system will help to save the files containing the information in a proper way. administration prevent Installation of the anti virus. The implementation of the antivirus will protect the data from the a...
Read MoreAnswers: 1. 1. NAT means network address translation, which practically implies that a router or a firewall is translating addresses that come from the incoming interface, into different addresses flowing from the outgoing interface; conversely, when the response to the traffic comes back, it will re-transform the addresses in the original values. The typical case for NAT is to allow sharing of public IP addresses - which are a scarce resourc...
Read MoreAnswer: Introduction The Long term Evolution (LTE)/ Advanced Long Term Evolution (LTE-A) is a wireless communication standard for mobile devices and data networks. LTE provides high speed connectivity due of its higher bandwidths, superior spectrum efficiency with lower latency rates. This report describes about comparison of cellular networks with LTE network and architecture of LTE along with the attacks on LTE network. Comparison of Cellu...
Read MoreAnswer: Part (d) Information from Packets Information Answer Packet number from normal-student.pcap that contains the normal students’ password 26 Packet number from normal-student.pcap in which the server originally sends the cookie to the browser 28 Last 4 HEX digits of the id_hash in the cookie (give the value of the last 4 digits, not the packet number) C8b2 Packet nu...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I am very pleased with this assignment. It was written well and met the requirements that was needed to complete the assignment. I made the necessary grammarly corrections and submitted it on time. I will use this expert again
Australia
I would like to continue working with this writer. He/she was on point. Thanks a lot for your help. This will allow me to understand the topic better and develop the real work.
Australia
Report wriiten as expected but waiting to be graded. I have to change some of the wording but happy with report so far. Lets hope i get a good grade this time.
Australia
Very Good Service provided by My Assignment Help to help me get my scored in all my examination.
Australia