Analyzing Network Communication Technologies

Verified

Added on  2020/03/07

|17
|2878
|167
AI Summary
This assignment delves into the world of modern network communication technologies. It examines Named Data Networking (NDN) as an innovative paradigm shift from traditional client-server architectures. The analysis extends to Multipath TCP, a protocol designed to enhance performance and reliability in challenging network conditions. Students are tasked with understanding the applications, benefits, and potential challenges associated with both NDN and Multipath TCP within various network environments.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: TCP/IP NETWORKING
TCP/IP NETWORKING
[Name of the student]
[Name of the University]

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1TCP/IP NETWORKING
Table of Contents
Introduction 2
Task 1.A. Addressing solution 2
Task 1. B. Explanation 6
Task 2. A. Communication protocol & Role of network analyzers 7
Task 2. B. Network analyzer tools 10
Benefits and Usability 10
Associated costs 10
Recommendation 11
Conclusion 12
References 13
Document Page
2TCP/IP NETWORKING
Introduction
The M2M solution is going to implement a network architecture for their six buildings.
They initially have a private internet protocol, which is being distributed among these six
buildings. In this report, this IP distribution is specified along with the network address
distribution diagram according to the requested scenario (Bredel et al., 2014). However, the
M2M solution has approximately 1200 workstation in a total of their all sites. A network
diagram is prepared in this paper, where all network sites are defining as a building and showing
the internet connectivity.
Document Page
3TCP/IP NETWORKING
Task 1.A. Addressing solution
Figure 1: The address solution diagram of M2M
(Source: Created by author)
The M2M solution has six different builds with one 10.0.0.0 private internet protocol.
Conversely, in the above figure 1, it is shown that the M2M solution has different subnets with
different buildings. These subnets are divided according to the given require address for each

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4TCP/IP NETWORKING
building. However, each of these subnets shown in the above figure 1 is provided with more
details underneath.
Finance Office:
IP Address: 10.0.0.0
Network
Address: 10.0.0.0
Usable Host
IP Range: 10.0.0.1 - 10.0.1.254
Broadcast
Address: 10.0.1.255
Total Number
of Hosts: 512
A number of
Usable Hosts: 510
Subnet Mask: 255.255.254.0
Wildcard
Mask: 0.0.1.255
Binary Subnet
Mask: 11111111.11111111.11111110.00000000
IP Class: B
CIDR
Notation: /23
IP Type: Private
Document Page
5TCP/IP NETWORKING
Transport Office:
IP Address: 10.0.2.0
Network
Address: 10.0.2.0
Usable Host
IP Range: 10.0.2.1 - 10.0.2.254
Broadcast
Address: 10.0.2.255
Total Number
of Hosts: 256
A number of
Usable Hosts: 254
Subnet Mask: 255.255.255.0
Wildcard
Mask: 0.0.0.255
Binary Subnet
Mask: 11111111.11111111.11111111.00000000
IP Class: C
CIDR
Notation: /24
IP Type: Private
Research Office:
IP Address: 10.0.3.0
Network
Address: 10.0.3.0
Usable Host
IP Range: 10.0.3.1 - 10.0.3.126
Broadcast
Address: 10.0.3.127
Total Number
of Hosts: 128
A number of
Usable Hosts: 126
Subnet Mask: 255.255.255.128
Wildcard
Mask: 0.0.0.127
Binary Subnet
Mask: 11111111.11111111.11111111.10000000
Document Page
6TCP/IP NETWORKING
IP Class: C
CIDR
Notation: /25
IP Type: Private
Sales Office:
IP Address: 10.0.3.128
Network Address: 10.0.3.128
Usable Host IP Range: 10.0.3.129 - 10.0.3.190
Broadcast Address: 10.0.3.191
Total Number of Hosts: 64
A number of Usable Hosts: 62
Subnet Mask: 255.255.255.192
Wildcard Mask: 0.0.0.63
Binary Subnet Mask: 11111111.11111111.11111111.11000000
IP Class: C
CIDR Notation: /26
IP Type: Private
Information technology:
IP Address: 10.0.3.192
Network Address: 10.0.0.0
Usable Host IP Range: 10.0.0.1 - 10.0.3.254
Broadcast Address: 10.0.3.255
Total Number of Hosts: 1,024
A number of Usable Hosts: 1,022
Subnet Mask: 255.255.252.0
Wildcard Mask: 0.0.3.255
Binary Subnet Mask: 11111111.11111111.11111100.00000000
IP Class: B

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7TCP/IP NETWORKING
CIDR Notation: /22
IP Type: Private
Head Office:
IP Address: 10.0.4.0
Network Address: 10.0.4.0
Usable Host IP Range: 10.0.4.1 - 10.0.4.62
Broadcast Address: 10.0.4.63
Total Number of Hosts: 64
A number of Usable Hosts: 62
Subnet Mask: 255.255.255.192
Wildcard Mask: 0.0.0.63
Binary Subnet Mask: 11111111.11111111.11111111.11000000
IP Class: C
CIDR Notation: /26
IP Type: Private
Task 1. B. Explanation
If a building has more than 1,024 hosts, then it might have some broadcast traffic issues
over the network. The subnet /22 or 255.255.252.0 contain a maximum of 1,022 hosts addresses
space, where required hosts 1,024. Therefore, the require subnet range is not enough to meet the
requirement, then if redesign the subnet mask and make it /21 or 255.255.248.0. However, the
/21 subnet mask can hold all required address space, but it can accommodate 2,046 hosts.
Therefore, 2,046-1,024=1,022 hosts are being unused.
Document Page
8TCP/IP NETWORKING
Task 2. A. Communication protocol & Role of network analyzers
A network protocol defines a set of rules as well as it conveys a communication channel
between two or more network devices. The M2M solution has around 1200 hosts in their six
sites. Therefore, they need to used appropriate mechanisms for devices to identify as well as
make the connection between each other (Chen, Yuan & Muntean, 2013). These protocols are
also responsible for formatting rules that can specify how the data obtained from network
devices as well as sent over the network. However, network protocol mechanism also useful to
enhance the performance of the network by data compression and message acknowledgement.
The M2M has a reserved private internet protocol 10.0.0.0 to connect all buildings.
Therefore, it must use modern protocols for networking, which conveys packet switching
techniques to receive and send a message in the form of packets. A packet is part of an amount of
original data, which is subdivided into pieces that are re-assembled at their destination device
(Demmer, Ott & Perreault, 2014). However, in networking, there is two level of protocols
available, such as high level protocol (TCP, UDP, HTTP as well as FTP) and low-level protocol.
In generally, high level protocols interact with applications like web browsers while a lower
level protocols interact with network adapters as well as other required network devices.
According to the M2M solution network, architecture routing protocols also required
identifying other routers in the network. Routing protocols are designed for used in the routers to
manage the pathway between source to a destination device (Goralski, 2017). There are few well
known routings protocols are EIGRP, BGP as well as OSPF. However, the M2M solution can
implement the OSPF routing protocols to connect their private networking sites with a core
router, as shown in the above figure 1.
Document Page
9TCP/IP NETWORKING
A network analyzer can be an instrument or software that measure the network
performance by some network parameters. Presently, the M2M solution has introduced six
different sites that can be connected to the internet, therefore they have to use an analysis tool to
check network performance as well as vulnerability (Mena, Bankole & Gerla, 2017).
Figure 2: ZVA40 vector network analyzer
(Source: Nguyen, Minh & Yamada, 2013, pp-4)
The above network analyzer mostly used for measure high frequency and operating
frequency of this machine is 5Hz to 1.05THz. This network analyzer can test the stability of the
M2M solution network of ultrasonic components or open loops. The vector network analyzer
measures booth phase and amplitude properties.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10TCP/IP NETWORKING
The network analyzer software also helps to summarize raw data into something that
make sense to a user, who is not enough savvy to networking mechanism. This interpretive tool
can provide summary data of the error from any perspective of the application layer (Ren et al.,
2015). For example, if the M2M solution is having some trouble like flooding or denial of
service, then they need to filter in which host or where an unauthorized access attempt. In that
situation, they must use the Wireshark network analyzer tool (shown in figure 3) to filter that
host or malicious user.
Figure 3: Network analyzer software – Wireshark
(Source: Shang et al., 2016, pp-123)
Document Page
11TCP/IP NETWORKING
Task 2. B. Network analyzer tools
Benefits and Usability
Hardware tool such as ZVA40 vector network analyser (shown in figure 2) can measure
the performance by observing some parameters. For instance, a directive is a measure of how
well a coupler can separate signals moving in the different direction (Shang, Droms & Zhang,
2016). Here a vector network analyser test can measure RF switch, filter, couplers, cables,
antennas as well as amplifiers. The M2M solution has some device from the above list, where
they need to monitor those to enhance system uptime. A VNA also checks the source and
receiver device as well as it has advanced error correction mechanism.
A software tool like Wireshark offers many benefits that make it appealing for everyday
use. The Wireshark protocol analyser software can support more than hundreds of protocols
(Yasukata et al., 2016). It can store the captured packets for offline analysis as well as it also
captures live packets. It has been assumed that Wireshark is completely compatible with Linux,
Windows, Solaris, NetBSD, FreeBSD. It can filter packet by provided filter in the filter option in
this software.
Associated costs
Network Device Cost
SL
No. Product Cost
Man
Power
1 Rohde & Schwarz ZVL6 Vector Network Analyzer 9kHz-6GHz
$
12,000.00 6
2 Wireshark Free 6
Total
$
12,000.00 12
Document Page
12TCP/IP NETWORKING
Cost of VNA Installation & Maintenance
SL No. Expertise Cost
1 Network Administration $300.00
2 Network Installation $250.00
3 Network Device Monitor $180.00
4 Network Monitor $200.00
5 Administrator $400.00
6 Maintenance Staff $220.00
Total $1,550.00
Cost of Wireshark Maintenance
SL No. Expertise Cost
1 Network Administration Build Finance $150.00
2 Network Administration Build Transport $150.00
3 Network Administration Build Research $150.00
4 Network Administration Build Sales $150.00
5 Network Administration Build Information $150.00
6 Network Administration Build Head $150.00
Total $900.00
Grand Total Cost $14,450.00
Recommendation
The M2M solution has six sites with a private network but in a different subnet, therefore
after studies their requirement it can be assumed that they need software and hardware both
support for their network administration. Therefore, as stated in above the Rohde & Schwarz
ZVL6 Vector Network Analyser is recommended hardware device that can provide an advance
error correction mechanism. However, the hardware related issues are solved by the Rohde &
Schwarz ZVL6 Vector Network Analyser, apart from that a network analyser software
Wireshark also required for maintenance or inspect network protocols as well as prevent
unauthorized access.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13TCP/IP NETWORKING
Conclusion
This report includes all network related solutions for the M2M solution. The M2M
solution wants to develop a new network infrastructure which is completely defined in this
report. The network diagram shows the convenient addressing solution for the M2M solution,
which is being implemented for their sites. This organization also wants to know about their
maintenance procedures, which is defined as network analyzer tool. There is two type of tools
are discussed above, where both are essential for the M2M solution. The reason behind the
necessity of that device also defined in this report, which helps the M2M solution to better
understand. However, from this above study and developed addressing the solution, it can be
concluded that this document covers up all aspect of the M2M solution and provide the best
solution for their network infrastructure.
Document Page
14TCP/IP NETWORKING
References
Bredel, M., Bozakov, Z., Barczyk, A., & Newman, H. (2014, August). Flow-based load
balancing in multipathed layer-2 networks using OpenFlow and multipath-TCP. In
Proceedings of the third workshop on Hot topics in software defined networking (pp.
213-214). ACM.
Chen, S., Yuan, Z., & Muntean, G. M. (2013, April). An energy-aware multipath-TCP-based
content delivery scheme in heterogeneous wireless networks. In Wireless
Communications and Networking Conference (WCNC), 2013 IEEE (pp. 1291-1296).
IEEE.
Demmer, M., Ott, J., & Perreault, S. (2014). Delay-Tolerant Networking TCP Convergence-
Layer Protocol (No. RFC 7242).
Edwards, J., & Bramante, R. (2015). Networking self-teaching guide: OSI, TCP/IP, LANs,
MANs, WANs, implementation, management, and maintenance. John Wiley & Sons.
Georgopoulos, P., Elkhatib, Y., Broadbent, M., Mu, M., & Race, N. (2013, August). Towards
network-wide QoE fairness using openflow-assisted adaptive video streaming. In
Proceedings of the 2013 ACM SIGCOMM workshop on Future human-centric
multimedia networking (pp. 15-20). ACM.
Goralski, W. (2017). The Illustrated network: How TCP/IP works in a modern network. Morgan
Kaufmann.
Hwang, J., Yoo, J., & Choi, N. (2014). Deadline and Incast Aware TCP for cloud data center
networks. Computer Networks, 68, 20-34.
Document Page
15TCP/IP NETWORKING
István, Z., Sidler, D., Alonso, G., & Vukolic, M. (2016, March). Consensus in a Box:
Inexpensive Coordination in Hardware. In NSDI (pp. 425-438).
Li, Z., Chen, Y., Shi, H., & Liu, K. (2016). NDN-GSM-R: a novel high-speed railway
communication system via named data networking. EURASIP Journal on Wireless
Communications and Networking, 2016(1), 48.
Mena, J., Bankole, P., & Gerla, M. (2017, June). Multipath TCP on a VANET: A Performance
Study. In Proceedings of the 2017 ACM SIGMETRICS/International Conference on
Measurement and Modeling of Computer Systems (pp. 39-40). ACM.
Nguyen, K., Minh, Q. T., & Yamada, S. (2013, July). A software-defined networking approach
for disaster-resilient WANs. In Computer Communications and Networks (ICCCN),
2013 22nd International Conference on (pp. 1-5). IEEE.
Pearce, C., & Zeadally, S. (2015). Ancillary impacts of Multipath TCP on current and future
network security. IEEE Internet Computing, 19(5), 58-65.
Peng, Q., Walid, A., Hwang, J., & Low, S. H. (2016). Multipath TCP: Analysis, design, and
implementation. IEEE/ACM Transactions on Networking, 24(1), 596-609.
Ren, Y., Li, J., Shi, S., Li, L., & Chang, X. (2015, May). An interest control protocol for named
data networking based on explicit feedback. In Proceedings of the Eleventh ACM/IEEE
Symposium on Architectures for networking and communications systems (pp. 199-200).
IEEE Computer Society.
Shang, W., Bannis, A., Liang, T., Wang, Z., Yu, Y., Afanasyev, A., ... & Zhang, L. (2016,
April). Named data networking of things. In Internet-of-Things Design and

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16TCP/IP NETWORKING
Implementation (IoTDI), 2016 IEEE First International Conference on (pp. 117-128).
IEEE.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP
architecture. NDN Project, Tech. Rep. NDN-0038.
Torres, D., Friedman, J., Schmid, T., Srivastava, M. B., Noh, Y., & Gerla, M. (2015). Software-
defined underwater acoustic networking platform and its applications. Ad Hoc Networks,
34, 252-264.
Yasukata, K., Honda, M., Santry, D., & Eggert, L. (2016, June). StackMap: Low-Latency
Networking with the OS Stack and Dedicated NICs. In USENIX Annual Technical
Conference (pp. 43-56).
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., ... & Zhang,
B. (2014). Named data networking. ACM SIGCOMM Computer Communication
Review, 44(3), 66-73.
Zinner, T., Jarschel, M., Blenk, A., Wamser, F., & Kellerer, W. (2014, May). Dynamic
application-aware resource management using Software-Defined Networking:
Implementation prospects and challenges. In Network Operations and Management
Symposium (NOMS), 2014 IEEE (pp. 1-6). IEEE.
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]