Network Analysis Tools and Techniques
VerifiedAdded on 2020/02/24
|13
|2194
|42
AI Summary
This assignment delves into the world of network analysis tools. It examines popular tools such as Wireshark, OpenNMS, and Microsoft Network Monitor, highlighting their functionalities, advantages, and limitations. The discussion covers aspects like packet analysis, network performance monitoring, troubleshooting capabilities, and cost considerations. Wireshark is particularly emphasized as a recommended tool for its comprehensive features and user-friendly interface.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: INTERNETWORKING AND ADDRESSING SCHEMES
M2m Internetworking And Addressing Schemes
[Student Names]
[Institution Name]
M2m Internetworking And Addressing Schemes
[Student Names]
[Institution Name]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNETWORKING AND ADDRESSING SCHEMES 2
TASK 1
a.The designing of address solution.
The M2M network requires an address scheme where it is using IP address named as
10.0.0.0 to come up with the subnets IP addresses.Below is the calculations involved in obtaining
the address of the various office as follows:
1st Finance Office with 260 workstations
Calculations:
This department has a total of 260 workstations therefore requires a total of 260 hosts Ip
addresses this can be calculated as below:
Hosts bits =2^k-2=260
2^k=260+2 ---------> 2^k=262
This gives the Host bits as 9 bits .
Hence =8+8+8+8-9=23.
The network subnet mask is given in binary format as
11111111.11111111.11111110.00000000.
The network subnet mask is given in number format as i.e 255.255.254.000.
Therefore the Block size is given as 2^9=512.
Therefore the subnet IP address ranges from 10.0.0.0/23 to 10.0.0.511/23 with 260 workstations.
TASK 1
a.The designing of address solution.
The M2M network requires an address scheme where it is using IP address named as
10.0.0.0 to come up with the subnets IP addresses.Below is the calculations involved in obtaining
the address of the various office as follows:
1st Finance Office with 260 workstations
Calculations:
This department has a total of 260 workstations therefore requires a total of 260 hosts Ip
addresses this can be calculated as below:
Hosts bits =2^k-2=260
2^k=260+2 ---------> 2^k=262
This gives the Host bits as 9 bits .
Hence =8+8+8+8-9=23.
The network subnet mask is given in binary format as
11111111.11111111.11111110.00000000.
The network subnet mask is given in number format as i.e 255.255.254.000.
Therefore the Block size is given as 2^9=512.
Therefore the subnet IP address ranges from 10.0.0.0/23 to 10.0.0.511/23 with 260 workstations.
INTERNETWORKING AND ADDRESSING SCHEMES 3
2nd Transport Office with 130 workstations
Calculations:
This department has a total of 130 workstations therefore requires a total of 130 hosts IP
addresses this can be calculated as below:
Hosts bits =2^k-2=130
2^k=130+2 ---------> 2^k=132
This gives the Host bits as 8 bits .
Hence =8+8+8+8-8=24.
The network subnet mask is given in binary format as 11111111.11111111.11111111.00000000
The network subnet mask is given in number format as i.e 255.255.255.000.
Therefore the Block size is given as 2^8=256
Therefore the subnet IP address ranges from 10.0.1.0/24 to 10.0.1.255/24 with 130 workstations.
3rd Research Office with 120 workstations
Calculations:
This department has a total of 120 workstations therefore requires a total of 120 hosts IP
addresses this can be calculated as below:
Hosts bits =2^k-2=120
2^k=120+2 ---------> 2^k=122
This gives the Host bits as 7 bits .
2nd Transport Office with 130 workstations
Calculations:
This department has a total of 130 workstations therefore requires a total of 130 hosts IP
addresses this can be calculated as below:
Hosts bits =2^k-2=130
2^k=130+2 ---------> 2^k=132
This gives the Host bits as 8 bits .
Hence =8+8+8+8-8=24.
The network subnet mask is given in binary format as 11111111.11111111.11111111.00000000
The network subnet mask is given in number format as i.e 255.255.255.000.
Therefore the Block size is given as 2^8=256
Therefore the subnet IP address ranges from 10.0.1.0/24 to 10.0.1.255/24 with 130 workstations.
3rd Research Office with 120 workstations
Calculations:
This department has a total of 120 workstations therefore requires a total of 120 hosts IP
addresses this can be calculated as below:
Hosts bits =2^k-2=120
2^k=120+2 ---------> 2^k=122
This gives the Host bits as 7 bits .
INTERNETWORKING AND ADDRESSING SCHEMES 4
Hence =8+8+8+8-7=25.
The network subnet mask is given in binary format as 11111111.11111111.11111111.10000000
The network subnet mask is given in number format as i.e 255.255.255.128.
Therefore the Block size is given as 2^7=128
Therefore the subnet IP address ranges from 10.0.2.0/25 to 10.0.2.127/25 with 120 workstations.
4th Sales Office with 40 workstations
Calculations:
This department has a total of 40 workstations therefore requires a total of 40 hosts IP addresses
this can be calculated as below:
Hosts bits =2^k-2=40
2^k=40+2 ---------> 2^k=42
This gives the Host bits as 6 bits .
Hence =8+8+8+8-7=26.
The network subnet mask is given in binary format as 11111111.11111111.11111111.11000000
The network subnet mask is given in number format as i.e 255.255.255.192.
Therefore the Block size is given as 2^6=64
Therefore the subnet IP address ranges from 10.0.3.0/26 to 10.0.3.63/26 with 40 workstations.
Hence =8+8+8+8-7=25.
The network subnet mask is given in binary format as 11111111.11111111.11111111.10000000
The network subnet mask is given in number format as i.e 255.255.255.128.
Therefore the Block size is given as 2^7=128
Therefore the subnet IP address ranges from 10.0.2.0/25 to 10.0.2.127/25 with 120 workstations.
4th Sales Office with 40 workstations
Calculations:
This department has a total of 40 workstations therefore requires a total of 40 hosts IP addresses
this can be calculated as below:
Hosts bits =2^k-2=40
2^k=40+2 ---------> 2^k=42
This gives the Host bits as 6 bits .
Hence =8+8+8+8-7=26.
The network subnet mask is given in binary format as 11111111.11111111.11111111.11000000
The network subnet mask is given in number format as i.e 255.255.255.192.
Therefore the Block size is given as 2^6=64
Therefore the subnet IP address ranges from 10.0.3.0/26 to 10.0.3.63/26 with 40 workstations.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNETWORKING AND ADDRESSING SCHEMES 5
5th Information technology with 520 workstations
Calculations:
This department has a total of 520 workstations therefore requires a total of 520 hosts IP
addresses this can be calculated as below:
Hosts bits =2^k-2=520
2^k=520+2 ---------> 2^k=522
This gives the Host bits as 10 bits .
Hence =8+8+8+8-10=22.
The network subnet mask is given in binary format as 11111111.11111111.11111100.00000000
The network subnet mask is given in number format as i.e 255.255.252.000.
Therefore the Block size is given as 2^10=1024
Therefore the subnet IP address ranges from 10.0.4.0/22 to 10.0.4.1023/22 with 520
workstations.
6th Head Office with 520 workstations
Calculations:
This department has a total of 60 workstations therefore requires a total of 60 hosts IP addresses
this can be calculated as below:
Hosts bits =2^k-2=60
2^k=60+2 ---------> 2^k=62
This gives the Host bits as 6 bits .
5th Information technology with 520 workstations
Calculations:
This department has a total of 520 workstations therefore requires a total of 520 hosts IP
addresses this can be calculated as below:
Hosts bits =2^k-2=520
2^k=520+2 ---------> 2^k=522
This gives the Host bits as 10 bits .
Hence =8+8+8+8-10=22.
The network subnet mask is given in binary format as 11111111.11111111.11111100.00000000
The network subnet mask is given in number format as i.e 255.255.252.000.
Therefore the Block size is given as 2^10=1024
Therefore the subnet IP address ranges from 10.0.4.0/22 to 10.0.4.1023/22 with 520
workstations.
6th Head Office with 520 workstations
Calculations:
This department has a total of 60 workstations therefore requires a total of 60 hosts IP addresses
this can be calculated as below:
Hosts bits =2^k-2=60
2^k=60+2 ---------> 2^k=62
This gives the Host bits as 6 bits .
INTERNETWORKING AND ADDRESSING SCHEMES 6
Hence =8+8+8+8-6=26.
The network subnet mask is given in binary format as 11111111.11111111.11111111.11000000
The network subnet mask is given in number format as i.e 255.255.252.192.
Therefore the Block size is given as 2^6=64.
Therefore the subnet IP address ranges from 10.0.5.0/26 to 10.0.5.64/26 with 60 workstations.
b. What happens to design when host number rise above 1024 per building.
When the numbers of the host in each building rise beyond 1024 host these networks will
not be able to host those devices in the network however to accommodate them one require to
expand the ip hosts address by increasing the hosts mask to around /21 or more and this will
enable the networks to have at least 2046 hosts addresses.
TASK 2
The Communication networks protocols and the roles of network
analyzers.
Communication networks Protocols.
In the information technology there is uses of communication protocols which are set of
rules which the network devices use while communicating with each other ,therefore it acts as an
interface between two networking devices.
During the transmission of data through the network telecommunication the protocols
are used to transmit the data signals from the computer hardware through network software in a
given network system.
In the networking there are standard models called open system interconnection and has a
correction of layers and it is a standard that is used as an internationally.
Hence =8+8+8+8-6=26.
The network subnet mask is given in binary format as 11111111.11111111.11111111.11000000
The network subnet mask is given in number format as i.e 255.255.252.192.
Therefore the Block size is given as 2^6=64.
Therefore the subnet IP address ranges from 10.0.5.0/26 to 10.0.5.64/26 with 60 workstations.
b. What happens to design when host number rise above 1024 per building.
When the numbers of the host in each building rise beyond 1024 host these networks will
not be able to host those devices in the network however to accommodate them one require to
expand the ip hosts address by increasing the hosts mask to around /21 or more and this will
enable the networks to have at least 2046 hosts addresses.
TASK 2
The Communication networks protocols and the roles of network
analyzers.
Communication networks Protocols.
In the information technology there is uses of communication protocols which are set of
rules which the network devices use while communicating with each other ,therefore it acts as an
interface between two networking devices.
During the transmission of data through the network telecommunication the protocols
are used to transmit the data signals from the computer hardware through network software in a
given network system.
In the networking there are standard models called open system interconnection and has a
correction of layers and it is a standard that is used as an internationally.
INTERNETWORKING AND ADDRESSING SCHEMES 7
There are various protocols used in the network through the internet as follows:
Transmissions Control Protocols (TCP), this is used to transmit the data packets from one
point to another inform of a message.
Internet Protocols (IP),This is the protocol that uses some rules to send and receive
message via the internet address levels.
Hypertext Transfer Protocols (HTTP) this is a protocol that enables applications which
are same to communicate in remote distances through the internet.
However there are other protocols used in the networking which include; Borders Gateway
Protocols (BGP) and Dynamic Hosts Configurations Protocols (DHCP) and they also utilizes
some set rules to communicate as well.
The protocols is divided into layers called OSI layers which are seven and they assist in
propagation of data packets from the source to the destinations as discussed below:
Layer seven: The application layer. This is a layer that is used to establish communication
between two nodes in a network ,in this layer the sender device creates contents and send
through the network and the recipient devices opens the sent content ,therefore this layer assist in
creating, sending and opening of content.
Layer six: The presentation layer. This is a layer located in the computers operating
systems and it converts data from one formats to another formats ,that is analog signal to digital
signal at the senders device and digital signal to analog signals at receivers device.
Layer five: The session layer. This is layer that assists in recreation of the broken
communication or any communication that has some interruptions.
Layer four: The transport layer. This is the layer in which the movements of data packets
is regulated though the network ,however also it controls delivering of data packets where it does
error detection and elimination before the packets get to the destinations.
There are various protocols used in the network through the internet as follows:
Transmissions Control Protocols (TCP), this is used to transmit the data packets from one
point to another inform of a message.
Internet Protocols (IP),This is the protocol that uses some rules to send and receive
message via the internet address levels.
Hypertext Transfer Protocols (HTTP) this is a protocol that enables applications which
are same to communicate in remote distances through the internet.
However there are other protocols used in the networking which include; Borders Gateway
Protocols (BGP) and Dynamic Hosts Configurations Protocols (DHCP) and they also utilizes
some set rules to communicate as well.
The protocols is divided into layers called OSI layers which are seven and they assist in
propagation of data packets from the source to the destinations as discussed below:
Layer seven: The application layer. This is a layer that is used to establish communication
between two nodes in a network ,in this layer the sender device creates contents and send
through the network and the recipient devices opens the sent content ,therefore this layer assist in
creating, sending and opening of content.
Layer six: The presentation layer. This is a layer located in the computers operating
systems and it converts data from one formats to another formats ,that is analog signal to digital
signal at the senders device and digital signal to analog signals at receivers device.
Layer five: The session layer. This is layer that assists in recreation of the broken
communication or any communication that has some interruptions.
Layer four: The transport layer. This is the layer in which the movements of data packets
is regulated though the network ,however also it controls delivering of data packets where it does
error detection and elimination before the packets get to the destinations.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
INTERNETWORKING AND ADDRESSING SCHEMES 8
Layer three: The network layer. This is the layer that aids the routing of data packets and
determination of the packets destination addresses in the network.
Layer two: The data-link layer. This is layers that establish connection through the network
physically ,however it is used to do conversion of data packets to data frames in the
network ,this layer is made of two parts namely linking controls layer and media access control
layers where the network cables are used.
Layer one: The physical layer. This is the layer that is responsible of transmitting of the
streams of data bits which is either in radio, electrical or optic signals through the recommended
network hardware.
Roles of network analyzers.
This is a correction of the hardware system and software program ,this is installed in the
network or in some computer hardware in order to prevent any malicious activities in the
network by some unauthorized persons (Cory, 2015)..
The network analyzers is meant to supplement the firewalls and the anti-virus applications in
the computer and it can be used to do the following:
To update the administrator’s every statistical data about any event that happens in the
computer network.
To test antivirus software and test whether there is any vulnerability.
Detecting any of the un usual level of the network traffic.
Determining the odd characteristics of the data packets in the networking.
It determines the packets sources and their respective destinations.
It is used to do configurations of network alarms to alert any possible threats to the
network system.
It is used to trace a series of data in any transmitting data packets.
It helps to monitor the usage of the bandwidth in a certain period of time.
It is used to set up some network applications.
This is used to display statistics data in users friendly panels.
Layer three: The network layer. This is the layer that aids the routing of data packets and
determination of the packets destination addresses in the network.
Layer two: The data-link layer. This is layers that establish connection through the network
physically ,however it is used to do conversion of data packets to data frames in the
network ,this layer is made of two parts namely linking controls layer and media access control
layers where the network cables are used.
Layer one: The physical layer. This is the layer that is responsible of transmitting of the
streams of data bits which is either in radio, electrical or optic signals through the recommended
network hardware.
Roles of network analyzers.
This is a correction of the hardware system and software program ,this is installed in the
network or in some computer hardware in order to prevent any malicious activities in the
network by some unauthorized persons (Cory, 2015)..
The network analyzers is meant to supplement the firewalls and the anti-virus applications in
the computer and it can be used to do the following:
To update the administrator’s every statistical data about any event that happens in the
computer network.
To test antivirus software and test whether there is any vulnerability.
Detecting any of the un usual level of the network traffic.
Determining the odd characteristics of the data packets in the networking.
It determines the packets sources and their respective destinations.
It is used to do configurations of network alarms to alert any possible threats to the
network system.
It is used to trace a series of data in any transmitting data packets.
It helps to monitor the usage of the bandwidth in a certain period of time.
It is used to set up some network applications.
This is used to display statistics data in users friendly panels.
INTERNETWORKING AND ADDRESSING SCHEMES 9
Analysis of various Network analyzer tools.
i. Wiresharks
The wireshark is very powerful networks protocols analyzer in the markets which can be
obtained freely or through pay.
This tool is the most recommended tool in the network analysis tools since it is the most
standardized ,this tool has multiple tools which includes live capturing and analysis in offline
modes and support of many platforms like windows and linux.
The data used in the network is accessed though the graphical user interfaces and the
TTY-modes TShark utilities.
However there are other features of this tool which entails powerful displays filter ,VoIP
analysis ,ability to open multiple files formats ,ability to read Ethernets, Bluetooth’s signals ,also
to enable decryption of signals among others (Richard, 2015).
.
Analysis of various Network analyzer tools.
i. Wiresharks
The wireshark is very powerful networks protocols analyzer in the markets which can be
obtained freely or through pay.
This tool is the most recommended tool in the network analysis tools since it is the most
standardized ,this tool has multiple tools which includes live capturing and analysis in offline
modes and support of many platforms like windows and linux.
The data used in the network is accessed though the graphical user interfaces and the
TTY-modes TShark utilities.
However there are other features of this tool which entails powerful displays filter ,VoIP
analysis ,ability to open multiple files formats ,ability to read Ethernets, Bluetooth’s signals ,also
to enable decryption of signals among others (Richard, 2015).
.
INTERNETWORKING AND ADDRESSING SCHEMES 10
ii. OpenNMS
This is a network analysis tool that automated to discover ,and management of any activities
in the and notification ,measuring the network performance, and also it has some features that
boost the service delivered.
This tools has two modules in the clients side this will assist them to locate the networks and
detect any bandwidth loss, the network alarms and any network related interfaces. (Richard,
2015).
iii. Microsoft Network Monitor
Microsoft Network Monitor is a analytical tool that do packets analysis and it therefore
captures, views and analysis the traffics in any network being analysed.
This tool allow the users to do troubleshooting incase of any problem identified in the
network or in any of software used in it ,however this tool can be used in many protocols where
it detects the sessions ,monitors wireless protocol and detection of most frequent traffic in the
network (Andrew, 2014).
.
ii. OpenNMS
This is a network analysis tool that automated to discover ,and management of any activities
in the and notification ,measuring the network performance, and also it has some features that
boost the service delivered.
This tools has two modules in the clients side this will assist them to locate the networks and
detect any bandwidth loss, the network alarms and any network related interfaces. (Richard,
2015).
iii. Microsoft Network Monitor
Microsoft Network Monitor is a analytical tool that do packets analysis and it therefore
captures, views and analysis the traffics in any network being analysed.
This tool allow the users to do troubleshooting incase of any problem identified in the
network or in any of software used in it ,however this tool can be used in many protocols where
it detects the sessions ,monitors wireless protocol and detection of most frequent traffic in the
network (Andrew, 2014).
.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTERNETWORKING AND ADDRESSING SCHEMES 11
Benefits, associated costs, ease of usability
The Network analyzer tool is a very important tool that enables the user to capture the
analyzing netflow ,Jflow ,and Sflow in the network system .
The tool is used in tracing the computer networks traffic through identifying network users
of the bandwidth and the details are updated simultaneously (Behrouz, 2015).
However this tool is used in analyzing the network activity and it helped the network users to
trace the various operations and there are some benefits as discussed below:
1. Minimizing the networks operation and maintenance cost.
2. Raising the network speed for the users.
3. It makes the network more flexible.
The most Recommended network analysis tools.
There are various network analysis tool which are used to analyze the computer
network ,however for the three network analysis tool the wireshark is the most recommended for
analyzing the network in the world ,this is because it is strong and analysis any size of network.
Benefits, associated costs, ease of usability
The Network analyzer tool is a very important tool that enables the user to capture the
analyzing netflow ,Jflow ,and Sflow in the network system .
The tool is used in tracing the computer networks traffic through identifying network users
of the bandwidth and the details are updated simultaneously (Behrouz, 2015).
However this tool is used in analyzing the network activity and it helped the network users to
trace the various operations and there are some benefits as discussed below:
1. Minimizing the networks operation and maintenance cost.
2. Raising the network speed for the users.
3. It makes the network more flexible.
The most Recommended network analysis tools.
There are various network analysis tool which are used to analyze the computer
network ,however for the three network analysis tool the wireshark is the most recommended for
analyzing the network in the world ,this is because it is strong and analysis any size of network.
INTERNETWORKING AND ADDRESSING SCHEMES 12
The wireshark tool is best due to some desirable features where it is made of graphics
which are user friendly where it uses the T-Sharks properties.
However the tool is used to do the display of data analyzed and also used to do filtering
of the packets of data which has errors and also do analysis of Voices transmitted too
(William,2014).
.
REFERENCES
Andrew,S.T.(2014).Computer Networks ,ITALY: Prentice Hall, Indian International.
The wireshark tool is best due to some desirable features where it is made of graphics
which are user friendly where it uses the T-Sharks properties.
However the tool is used to do the display of data analyzed and also used to do filtering
of the packets of data which has errors and also do analysis of Voices transmitted too
(William,2014).
.
REFERENCES
Andrew,S.T.(2014).Computer Networks ,ITALY: Prentice Hall, Indian International.
INTERNETWORKING AND ADDRESSING SCHEMES 13
Behrouz,A.(2015).Data Communication and Networking,INDIA: CollectionTechnologies.
Cory,B.(2015).Wireless Communication Networks and Systems ,ASIA:Pearson Education
Limited.
Douglas,C.(2015).Internetworking with TCP/IP, Volume 1,USA: Pearson.
Richard, W.S.(2015).TCP/IP Illustrated ,INDIA:Addison-Wesley Professional.
William,S.(2014).Data and Computer Communication,USA: Pearson.
Behrouz,A.(2015).Data Communication and Networking,INDIA: CollectionTechnologies.
Cory,B.(2015).Wireless Communication Networks and Systems ,ASIA:Pearson Education
Limited.
Douglas,C.(2015).Internetworking with TCP/IP, Volume 1,USA: Pearson.
Richard, W.S.(2015).TCP/IP Illustrated ,INDIA:Addison-Wesley Professional.
William,S.(2014).Data and Computer Communication,USA: Pearson.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.