Network Analysis Tools and Techniques

Verified

Added on  2020/02/24

|15
|2485
|97
AI Summary
This assignment delves into the realm of network analysis tools, focusing on popular options such as Zenmap and Advanced IP Scanner. It explores their functionalities, including network scanning, port detection, operating system identification, and bandwidth monitoring. The assignment also examines the benefits of using these tools, such as cost savings, improved network speed, and enhanced flexibility. Finally, it recommends Angry IP Scanner as a suitable tool due to its user-friendliness, portability, and comprehensive features.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: INTERNETWORKING WITH TCP/IP
Solutions Internetworking
[Student Names]
[Institution Name]

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTERNETWORKING WITH TCP/IP 2
TASK 1
Designing of a addressing solution
The M2M is a proposed network system that will help the organization to link all its
offices however IP addressing is required to be done where public IP address 10.0.0.0 will be
used ,therefore the internet protocol to be followed will be done some configurations in order to
set up the respective IP address ,subnet masks and the gateways of each office subnetwork.
The IP addressing is used to do configuration in the six subnetworks through dividing
that network IP address to various small subnets, the resulting six offices subnets after the
process of IP addressing they will be linked together and the devices will be able to communicate
with each other.
While doing the M2M IP addressing the subnet masks will be a must to be used in order
to split the IP address in two main parts where one identify the host device and the other one
identify the current network which hosts it.
IP address in context of the Networks and hosts.
The IP address is the combination of 32 bits number that helps in identifying the host in a
certain network which can be a computer ,printer or an alarm in that given network.
This address has combination of four numbers which are having dots to divide them and
some numbers represents the host while other the network where the host is located ,the IP
address is always in this format NNN.NNN.NNN.HHHH.
The TCP/IP Subnet masks.
The subnet mask is referred to as a number that ideally facilitates functionality of the IP
protocols where it located where the host is connected either in the local network or is in the
remote network.
This subnet mask also is represented as series of 1s or numbers as in below example
11111111.11111111.00000000.00000000 which in number form is 255.255.000.000 and every
Document Page
INTERNETWORKING WITH TCP/IP 3
ip address will be associated with a given subnet masks for instance 192.168.1.1 ip address can
have 255.255.255.192 subnet mask.
The Subnetting in IP addressing.
During the addressing period the network get more divisions which are done by network
administrators ,this is done to ensure there is appropriate reconciliation between the address
schemes and physical networks system, where each network section is assigned a certain number
of addresses to ensure the hosts fits properly.
For instance if the network is having 200 workstations the administrator can assign
10.0.0.1 to 10.0.0.201 ip addresses to enable all devices to be connected.
Therefore below is the various procedure used to assign the respective IP addresses to the
various M2M network using the 10.0.0.0 private IP address.
Network in the Finance Office with 260 workstations
Working:
A network with 260 workstations
Number of Hosts=2x-2=260
2x=262
2x =262
Therefore , the Host bits=9
calculating subnet mask =8+8+8+8-9=23
Subnet mask = 11111111.11111111.11111110.00000000 i.e 255.255.254.000
Size of the block = 29=512
Document Page
INTERNETWORKING WITH TCP/IP 4
The network addresses ranges from 10.0.0.0/23 to 10.0.0.511/23 to accommodate 260
workstations.
Below is the table summary of this network.
Network name Finance Office network
Start network address 10.0.0.0/23
End network address 10.0.0.511/23
Mask address 255.255.254.000
Number of host addresses available 512
Network in the Transport Office with 130 workstations
Working:
A network with 130 workstations
Number of Hosts=2x -2=130
2x =132
2x =262
therefore , the Host bits=8
calculating subnet mask =8+8+8+8-8=24
Subnet mask = 11111111.11111111.11111111.00000000 i.e 255.255.255.000
Size of the block = 28=256
The network addresses ranges from 10.0.1.0/24 to 10.0.1.255/24 to accommodate 130
workstations.
Below is the table summary of this network.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTERNETWORKING WITH TCP/IP 5
Network name Transport Office network
Start network address 10.0.1.0/24
End network address 10.0.1.255/24
Mask address 255.255.255.000
Number of host addresses available 256
Network in the Research Office with 120 workstations
Working:
A network with 120 workstations
Number of Hosts=2x-2=120
2x=122
therefore , the Host bits=7
calculating subnet mask =8+8+8+8-7=25
Subnet mask = 11111111.11111111.11111111.10000000 i.e 255.255.255.128
Size of the block = 27=128
The network addresses ranges from 10.0.2.0/25 to 10.0.2.127/25 to accommodate 120
workstations.
Network name Research Office network
Start network address 10.0.2.0/25
End network address 10.0.2.127/25
Document Page
INTERNETWORKING WITH TCP/IP 6
Mask address 255.255.255.128
Number of host addresses available 120
Network in the Sales Office with 40 workstations
Working:
A network with 40 workstations
Number of Hosts=2x-2=40
2x=42
therefore , the Host bits=6
calculating subnet mask =8+8+8+8-6=26
Subnet mask = 11111111.11111111.11111111.11000000 i.e 255.255.255.192
Size of the block = 26=64
The network addresses ranges from 10.0.3.0/26 to 10.0.3.63/26 to accommodate 40
workstations.
Network name sales Office network
Start network address 10.0.3.0/26
End network address 10.0.3.63/26
Mask address 255.255.255.192
Number of host addresses available 64
Network in the Information technology Office with 520 workstations
Working:
A network with 520 workstations
Document Page
INTERNETWORKING WITH TCP/IP 7
Number of Hosts=2x-2=520
2x=522
Therefore , the Host bits=10
calculating subnet mask =8+8+8+8-10=22
Subnet mask = 11111111.11111111.11111100.00000000 i.e 255.255.252.000
Size of the block = 210=1024
The network addresses ranges from 10.0.4.0/22 to 10.0.4.1023/22 to accommodate 520
workstations.
Network name Information technology Office network
Start network address 10.0.4.0/22
End network address 10.0.4.1023/22
Mask address 255.255.252.000
Number of host addresses available 520
Network in the Head Office with 60 workstations
Working:
A network with 60 workstations
Number of Hosts=2x-2=60
2x=62
Therefore , the Host bits=6

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTERNETWORKING WITH TCP/IP 8
calculating subnet mask =8+8+8+8-6=26
Subnet mask = 11111111.11111111.11111111.11000000 i.e 255.255.255.192
Size of the block = 26=64
The network addresses ranges from 10.0.5.0/26 to 10.0.5.64/26 to accommodate 60
workstations.
Network name Head Office network
Start network address 10.0.5.0/26
End network address 10.0.5.64/26
Mask address 255.255.255.192
Number of host addresses available 60
b. Effect of network design if the number of hosts per network jumps to above 1,024 per
building.
When number of hosts in the respective network jump above 1024 there will be
challenge in accommodating the additional devices ,however to solve this the network will
require to be solved through network expansion to accommodate more than 2046 hosts and it is
achieved by expanding mask to /21.
TASK 2
Communication networks Protocols in and the role of network analyzers.
Protocol in communication networks
In information technology and the computing world there is wide use of network
protocols where they consists of some rules set aside that do govern the communication of the
network devices ,therefore the protocols are the one used to enable network devices to
communicate to each other.
Document Page
INTERNETWORKING WITH TCP/IP 9
In the stage of communicating by the network devices the protocol is the one responsible
of transmission of the data amongst the network hardware and the respective software used.
The open systems interconnection is a types of a model that is made of correction of
layers and is developed to be used in a standard that is internationally recognized this OSI model
give the various layers in a given type of a protocol as some discussed below:
Transmissions Control Protocols (TCP), is a protocol that uses some rules for sending
messages to other network devices in data packet format.
Internet Protocols (IP), is a protocol where sending and reception of messages happens at
the level of the internet address.
Hypertext Transfer Protocols (HTTP), is a protocol where remote common applications
uses during the communication process.
There are various layers which are found in the network protocols and is referred to as the
OSI layers, these layers are seven in number where the topmost is the seventh layer ,however
these layers are assigned distinct duties and the devices in the network transmit signals to each
other during communication process through all these layers ,below are the respective layers and
their functions:
Seventh layer is The application layer.
In this layer the communication of the devices get established and then the materials to be
transmitted is made, transmitted and received by the respective recipients.
Sixth layer is The presentation layer.
This is a layer that is found in the operating system and it facilitates the network to
convert the signals transmitted to analog at the sender and receiver and to digital signals during
transmission process.
Fifth layer is The session layer.
Document Page
INTERNETWORKING WITH TCP/IP 10
This is the layer that is responsible of controlling of communications and therefore it
recreates the any broking communications or which is facing some interruptions.
Fourth layer is The transport layer.
This layer plays a role of guiding the movement of the data packets in a given network
system ,however it ensures that the packet is delivered and incase of errors it detects them and
removes them at the data packet’s destination.
Third layer is The network layer.
This is the layers which allocates the addresses and the routes of the data packets and it
makes the IP of the respective network system.
Second layer is The data-link layer.
This is the layer that forms the physical part of the network where the conversion of data
packets to network frames is done ,however there are two parts in this which are logical link
layer together with the media access controls layer which are made of network cables.
First layer is The physical layer.
This is the first layer that assists in transmission of the bits streams through the network
systems ,these bits can be either in radio, optic, or electrical signals format through the
appropriate hardware devices.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
INTERNETWORKING WITH TCP/IP 11
Roles of analysers
The network analyzers is combinations of the set of hardware and software program or
some special types of devices ,this tool when it is used in the network it ensures safety against
the network attacks by the hackers or malicious attackers .
The analyzers usually supplements the computers anti-malwares which is installed together
with set network firewalls ,however this tool is used to perform various functions which
includes the following:
To update on any activity happening in the network to the network admin.
To do test of the anti malwares and viruses applications in order to detect any possibility
to have any vulnerability.
To identify any rise or decline in the level of the networks traffics .
To identify if there is some abnormality in terms of the data packets characteristics.
Tracing of the origination and destinations of the data packets.
To setup an alarm device to give warning of possible threats in the networks systems.
To analyze the total bandwidth consumed in a network for a given period of time.
It helps while creating the plug-ins for some software programs.
It displays the network analysis data statistics in a given dashboard panel which is easily
read by the network administrators.
The network analyzer tool analysis.
i. OpenNMS
This is an application software that enables the discovering automatically, managing of
events and notifications ,assessing of the network performances, and services improvements
features.
Document Page
INTERNETWORKING WITH TCP/IP 12
However this tool has both the clients applications side for any mobile device that allows
them to access the network and enable viewing of outage, devices alarming and also monitoring
of the various network interfaces (Richard, 2015).
iii. Advanced IP Scanner
This is a tool that is efficient and is used easily and at a fast pace while doing network
scanning ,this tool detects all network connected devices like computers and mobile
devices ,through this tool users connects to HTTPS ,FTPS and files to any machine remotely
( Douglas, 2015).
Therefore the network administrators can be able to close any device in the network with
suspicious activities.
Document Page
INTERNETWORKING WITH TCP/IP 13
ii. Zenmap
This is a network analyzing tool is a powerful network scanning tool that is made of graphic
user interface mainly used in Nmaps securities scanners.
This tool is easily installed in either windows ,Linux or even Mac operating systems ,this tool
however is used in capturing of live features and the captured images are reviewed later ,
The Zenmap tool also can be used together with the Nmap to enable it make inventories of
the networks ,to monitor hosts all the time ( Cory, 2015)..
The Zenmap tool has special feature like discovering of the hosts, scanning of the ports,
detecting the versions ,detecting the operating systems, able to scan websites, supporting of the
IPV6 ,supporting of the Npind and speedy scanning among many.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTERNETWORKING WITH TCP/IP 14
Benefits, associated costs, ease of usability of network analysis tools.
The network analyzers are used in capturing and analysis of NetFlows, J-flows and SFlows
and the results assists one get the type of network traffics in the networks (Andrew, 2014).
However these tools enables the users to identify bandwidth in the network and the traffics in
the network which is displayed in real time and this enable the administrators know who is using
the network’s bandwidths (Behrouz, 2015).
There are various benefits which are linked to the tools and are very effective to businesses
operations ,below are some of the benefits of the network analysis tools:
1. Saving on costs.
2. Improving network Speed
3. Enabling the network to be Flexible.
Document Page
INTERNETWORKING WITH TCP/IP 15
Recommended network analytical tool.
The network scanning can be achieved through use of various tools which assist one to
detect some of the events done in the network, however the most recommended tool is Angry IP
scanner this is because is readily available and it is flexible since it can be used in any platform
and it is very simplified for use and is very fast in scanning the network.
This tool is supported by some features like portability, ping checkers, information about
the NETBIOS ,indentifies the names of hosts easily, uses multithreads while scanning ,saves the
scanning results in multiple reports ,detection of MAC addresses, detection of any user longed in
users, and detects any plug-ins as well (William, 2014).
.
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]