CN5122 - Network Design and Analysis with Cisco Packet Tracer

Verified

Added on  2023/04/07

|55
|7231
|108
Practical Assignment
AI Summary
This assignment focuses on network analysis and design using Cisco Packet Tracer, covering essential concepts such as IP addressing, subnetting, and network topologies. It details how to determine network IP addresses, IP masks, and subnetting for given IP addresses, including calculations for net-mask length, network address, and broadcast address. The assignment also discusses the types of cables used for network connections, such as twisted pair and crossover cables, and their respective applications. Furthermore, it demonstrates network design and configuration of the IP protocol within the Cisco Packet Tracer environment, highlighting security systems and device configurations. The document is contributed by a student and available on Desklib, a platform offering various study tools for students.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
TITLE: Networking Analysis and Design Using Cisco Packet Tracer
Networking Analysis and Design Using Cisco Packet Tracer
Student’s ID: 1705253
Student’s ID: 1604308
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
i
Executive Summary
Computer network can be analyzed and designed using Cisco Packet Tracer. Network operates
using by connecting the computers and its peripherals within that network using switches and
routers as the main devices. This two devices allows perfect and simplified communications within
that network. Routers and switches may look similar but there functions greatly differ from each
other. Switch connects devices such computers, printers, servers by creating the sharing resource to
all those devices. It allows communication and sharing of information's between such devices in
that network. Cisco Packet Tracer is the a tool that can be used practical to do designing and
analysis before the final physical configuration and installations. A logical topology is the criteria
or the structure that is used to connect all the devices within a network. Logical topology is a
connection where the node is used as the main structure. Logical topology can also refers to signal
topology of a network. This is defined as how signals passes through a physical network. The set up
and transmissions of the signals in that network is restricted within the network protocols. The
connections of this devices can be in several types of topology such as star, ring among other
topology.
Document Page
ii
TABLE OF CONTENTS
Page
TITLE................................................................................................................…………... ……..i
EXECUTIVE SUMMARY ....................................................................................................…..ii
TABLE OF CONTENTS .............................................................................................………….iii
INTRODUCTION ........................................................................................................................ iv
OBJECTIVES AND OVERVIEW ........................................................................................…...v
CHAPTER
Student ID: 1705253
How we can determine Network IP Address, IP Mask, and Sub-netting
for the given IP Address. ......................................................................................…………1
Cables used for connection ................................................................................…………..4
Configure Logical Topology………………………………………………………………5
Demonstration of network design and configuration of the IP protocol in
Cisco packer tracer……………………………………………………………………….17
Student ID: 1705253
How we can determine Network IP Address, IP Mask, and Sub-netting
for the given IP Address. ......................................................................................……….18
Cables used for connection ................................................................................………...21
Configure Logical Topology……………………………………………………………..22
Demonstration of network design and configuration of the IP protocol in
Cisco packer tracer……………………………………………………………………….37
Document Page
SECURITY SYSTEMS ON THE BOTH ROUTERS AND ALL OTHER ACTIVE DEVICES..33
CONFIGURE ALL DEVICES INCLUDING THE ROUTERS AND SWITCHES……………..38
CONCLUSION…………………………………………………………………………………40
REFERENCES ...............................................................................................................…….. .41
iii
Introduction
Computer network can be analyzed and designed using Cisco Packet Tracer. Network operates
using by connecting the computers and its peripherals within that network using switches and
routers as the main devices. This two devices allows perfect and simplified communications within
that network. Routers and switches may look similar but there functions greatly differ from each
other. Switch connects devices such computers, printers, servers by creating the sharing resource to
all those devices. It allows communication and sharing of information's between such devices in
that network. Cisco Packet Tracer is the a tool that can be used practical to do designing and
analysis before the final physical configuration and installations. A logical topology is the criteria
or the structure that is used to connect all the devices within a network. Logical topology is a
connection where the node is used as the main structure (Kreutz, Ramos, Verissimo, Rothenberg,
Azodolmolky & Uhlig, 2015). Logical topology can also refers to signal topology of a network.
This is defined as how signals passes through a physical network. The set up and transmissions of
the signals in that network is restricted within the network protocols. The connections of this
devices can be in several types of topology such as star, ring among other topology.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
iv
Objectives and overview of the course work
Network operates by connecting the computers and its peripherals within that network using
switches and routers as the main devices. This two devices allows perfect and simplified
communications within that network. Routers and switches may look similar but there functions
greatly differ from each other. Switch connects devices such computers, printers, servers by creating
the sharing resource to all those devices. It allows communication and sharing of information's
between such devices in that network. Unmanaged switch works outside the box and it doesn't
allow any changes to be made. Home network mainly uses such kind of switches. Managed switch
will always allow you to access and manage the switch. It allows great accessibility and flexibility
to monitor and adjust the traffic flow within the Network (Johannisson, 2017).
Sub-netting is process of utilizing larger networks by dividing them into smaller sub-networks
known as sub-nets. IP address is always used to to identify the sub-net and for broadcasting also
within the sub-net. Smaller networks create smaller broadcast domains therefore less network
broadcast traffic is experienced in the boundaries. Isolation of network by trouble-shouting will
simplify large networks when braked into smaller networks (Keeble, & Wilkinson, 2017).
IP address in classless has no relationship between the the value of byte of the specific address and
number of bits in that network. A different method can be used to calculate the network size in that
IP address. It allows borrowing of the bits that are normally used to extend the network portion. A
router can manipulate binary numbers where 1 is used to identify bit in IP address for that network
and 0 to identify bit in that host addresses used (Xia, Wen, Foh, Niyato, & Xie, 2015).
Document Page
v
Student ID: 1705253
How we can determine Network IP Address, IP Mask, and Sub-netting for the given IP
Address.
The most common IP versions used today are IPv4 and IPv6. IPv4 is stilled used today despite the
availability of the upgrade IPv6. Its 32-bit binary numbers which contains 2 sub-addresses. Internet
and other networks corporate uses IPv4 since it allows 232 addresses which is still useful.
Limitation was mainly lack of enough unique addresses for all the devices in the network. IPv6 is
an upgrade which contains increase number of addresses space and allow 2128 addresses. It's also
improved in terms of IP packet headers efficiency and also routing and security (Comer, 2018) .
IP addresses are design mainly to work over a dynamic network. This implies that IP should only
work without a central directory or monitor which cannot on certain links. IP address is a
connectionless protocol which contains source IP address, destination IP address. The error is
always handled in the upper level protocol instead such as TCP (Oberst, Wegmann, Stodt, Brand, &
Chamarro, 2017).
In both IPv4 and IPv6, its very hard to remember IP address inn every devices attached to them
except on smallest networks. Name resolution technique gives a way much simpler to identify IP
address. This name resolution is handled by the Domain Name System (DNS). A name can be used
in place of the destination IP address. IP address is used for making communications when the
request is initiated (Wang, Carver, Phelan, Sanchez, Garg, Peng, & Porto, 2016).
Document Page
Sub-netting is process of utilizing larger networks by dividing them into smaller sub-networks
known as sub-nets. IP address is always used to to identify the sub-net and for broadcasting also
within the sub-net. Smaller networks create smaller broadcast domains therefore less network
broadcast traffic is experienced in the boundaries. Isolation of network by trouble-shouting will
simplify large networks when braked into smaller networks (Hwang, Ramakrishnan, & Wood,
2015).
IP address in classless has no relationship between the the value of byte of the specific address and
number of bits in that network. A different method can be used to measure the network size in that
portion of the IP address. It allows borrowing of the bits that are normally used to extend the
network portion. A router can manipulate binary numbers where 1 is used to identify bit in IP
address for that network and 0 to identify bit in that host addresses used (Blenk, Basta, Reisslein,
Kellerer, 2016).
1. Calculating the Net-mask Length:
First, we have to convert dotted-decimal of the given net-mask to binary. We will therefore
contiguous 1 bits is counted.
255.255.255.128 : 11111111 11111111 11111111 10000000
-----------------------------------
I counted twenty five - one 1s -------> /25
1
2. Calculating the Network Address:
The network address is the IP address representations of the in the respective binary bits logically.
Perform the logical alignment of the bits in each pair. Then we have to convert our original octets to
decimal (Pathak, Feng, Hu, & Mohapatra, 2015).
160.43.8.0 in binary: 10100000 00101011 000010000 00000000
255.255.255.128 in binary: 11111111 11111111 11111111 10000000
----------------------------------- [Logical AND]
10100000 00101011 000010000 00000000 ------> 160.43.8.0
3. Broadcast Address:
It will converts all host bits to 1s...
IP address
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
160.43.8.0 in binary: 10100000 00101011 000010000 00000000
My network mask will therefore be:
255.255.255.128 is: 11111111 11111111 11111111 10000000 in binary
Therefore we can calculate as follows:
Host bit mask : 00000000 00000000 00000000 01111111
We can calculate the broadcast by making host bits to be 1s:
160.43.8.0 in binary: 10100000 00101011 000010000 00000000
Host bit mask : 00000000 00000000 00000000 01111111
----------------------------------- [Force host bits]
10100000 00101011 00001000 01111111 ----> 160.43.8.255
4. Calculating subnets:
By using of IP address given, it will identify both network and its unique interface. A subnet mask
can determine the end of network IP address when written in decimal notation. When it is expressed
in binary, any binary bit corresponding to IP address in that network has been set to one(Mestres,
Rodriguez-Natal, & Estrada, G. (2017).
Network Address Host Number IP Address
170.52.53.0 0.0.0.0 170.52.53.0/25
2
If we subnet the 170.52.53.0/25 to 4 equal large subnets then we will have our network as follows:
Network Address Subnet 1 Host Number 170.52.53.0/25
Network Address Subnet 2 Host Number 170.52.54.0/25
Network Address Subnet 3 Host Number 170.52.55.0/25
Network Address Subnet 4 Host Number 170.52.56.0/25
The masklenght can be calculated by backing the number in prefix in host bits required to
accommodate 100 hosts. It is calculated using the formula below (Leung, Zhang, X. (2016);
Host bits = Log2(100) = 6.643
Document Page
Subnet Network
Address
Mask First Host
Address
Last Host
Address
Broadcast Bit mask
A 170.52.53.0 170.52.53.0/25 None None 170.52.53.255 00000000
00000000
00000000
01111111
B 170.52.53.0 170.52.53.0/25 None None 170.52.53.255 00000000
00000000
00000000
01111111
C 170.52.53.0 170.52.53.0/25 None None 170.52.53.255 00000000
00000000
00000000
01111111
D 170.52.53.0 170.52.53.0/25 170.52.53.0 170.52.53.255 170.52.53.255 00000000
00000000
00000000
01111111
E 170.52.53.0 170.52.54.0/25 170.52.53.1 170.52.53.254 170.52.53.255 00000000
00000000
00000000
01111111
F 170.52.53.0 170.52.55.0/25 170.52.53.2 170.52.53.253 170.52.53.255 00000000
00000000
00000000
01111111
3
Cables used for connection
Twisted pair cabling is wiring where two conductors are twisted with the aim of avoiding external
electromagnetic interference (EMI). The twisted cables carry opposite and equal signals to there
intended destinations which will detects the difference between the two signals. A logical topology
is the descriptions of how devices within a network are physically connected to each other. Twisted
pair means that the cable is design with two independent twisted ones on each other. This is the
most perfect way of overcoming the spectrum of the electromagnetic interference hence allowing
the network devices to work perfectly with any noise or any other kind of interference outside other
Document Page
sources. The logic is the network can be connected physically using wires and cables but also it can
be connect using wires devices as well. Sub-netting is process of utilizing larger networks by
dividing them into smaller sub-networks known as sub-nets. IP address is always used to to identify
the sub-net and for broadcasting also within the sub-net. Smaller networks create smaller broadcast
domains therefore less network broadcast traffic is experienced in the boundaries. Isolation of
network by trouble-shouting will simplify large networks when braked into smaller networks.
Switches and routers are the main components which facilitate the connection of the peripheral
devices in that particular network (van der Heijden, & Hartmann, 2016).
Straight cabling are used to connect different devices like switch to PC, switch to router, or router to
switch etc. It is mainly used to transmit and receive communications between different pairs of the
devices.
Cross Over cabling have sending and receiving wires cross over each other which are opposite to
each other. This allows similar devices to communicate such as PC to PC, Router to Router, Switch
to Switch, etc.
Devises cable used
1. Routers and Switches Straight Through Cable
2.Routers Cross Over Cable
3. Routers and Hosts (PCs) Straight Through Cable
4. Routers and Switches Straight Through Cable
5. Switches Cross Over Cable
6. Switches and Servers Straight Through Cable
4
Configure Logical Topology:
A logical topology is the criteria or the structure that is used to connect all the devices within a
network. A physical topology is how the network is connected using wires and cables. Logical
topology is a connection where the node is used as the main structure. Logical topology can also
refers to signal topology of a network. This is defined as how signals passes through a physical
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
network. The set up and transmissions of the signals in that network is restricted within the network
protocols. The connections of this devices can be in several types of topology such as star, ring
among other topology. Sub-netting is process of utilizing larger networks by dividing them into
smaller sub-networks known as sub-nets. IP address is always used to to identify the sub-net and for
broadcasting also within the sub-net. Smaller networks create smaller broadcast domains therefore
less network broadcast traffic is experienced in the boundaries. Isolation of network by trouble-
shouting will simplify large networks when braked into smaller networks. This is the most import to
consider when connecting a network since it will actually minimize the use of wires and cables
when the appropriate method is used (Zheng, Zheng, Chatzimisios, Xiang, & Zhou, 2015).
When designing a network before installations its important to consider this. Twisted pair cabling is
wiring where two conductors are twisted with the aim of avoiding external electromagnetic
interference (EMI). The twisted cables carry opposite and equal signals to there intended
destinations which will detects the difference between the two signals (Smed, & Hakonen, 2017).
Twisted pair cabling is wiring where two conductors are twisted with the aim of avoiding external
electromagnetic interference (EMI). The twisted cables carry opposite and equal signals to there
intended destinations which will detects the difference between the two signals. Straight cabling are
used to connect different devices like switch to PC, switch to router, or router to switch etc. It is
mainly used to transmit and receive communications between different pairs of the devices.Cross
Over cabling have sending and receiving wires cross over each other which are opposite to each
other. This allows similar devices to communicate such as PC to PC, Router to Router, Switch to
Switch, etc (Zeydan, Bastug, Bennis, Kader, Karatepe, & Debbah, 201.
i) Network D
Host 1
IP Address 170.52.53.0
IP Mask 170.52.53.0/25
Gateway Address 170.52.53.1
Host 2
IP Address 170.52.53.0
IP Mask 170.52.53.0/25
Gateway Address 170.52.53.2
5
Host 3
Document Page
IP Address 170.52.53.0
IP Mask 170.52.53.0/25
Gateway Address 170.52.53.3
Host 4
IP Address 170.52.53.0
IP Mask 170.52.53.0/25
Gateway Address 170.52.53.4
Server
IP Address 170.52.53.0
IP Mask 170.52.53.0/25
Gateway Address 170.52.53.0
ii) Network E
Host 1
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.1
Host 2
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.2
Host 3
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.3
6
Document Page
Host 4
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.4
Host 5
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.5
Host 6
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.6
Host 7
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.7
Host 8
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.8
Host 9
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
Host 10
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.10
Host 11
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.11
Host 12
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.12
Host 13
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.13
Host 14
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.14
Host 15
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.15
Document Page
8
Host 16
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.16
Host 17
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.17
Host 18
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.18
Server
IP Address 170.52.53.0
IP Mask 170.52.54.0/25
Gateway Address 170.52.54.0
iii) Network F
Host 1
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.1
Document Page
Host 2
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.2
9
Host 3
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.3
Host 4
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.4
Host 5
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.5
Host 6
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.6
Host 7
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.7
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Host 8
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.8
10
Host 9
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.9
Host 10
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.10
Host 11
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.11
Host 12
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.12
Host 13
Document Page
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.13
Host 14
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.14
11
Host 15
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.15
Host 16
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.16
Host 17
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.17
Host 18
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.18
Document Page
Host 19
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.19
Host 20
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.20
Server
IP Address 170.52.53.0
IP Mask 170.52.55.0/25
Gateway Address 170.52.55.0
12
Host 1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
Host 2
Document Page
14
Host 3
Document Page
15
Host 4
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Host 5
16
PART B
Document Page
Demonstration of network design and configuration of the IP protocol in Cisco packer tracer
Packet Tracer is a useful tool that is used for network simulation. Students mostly used for training
to attain Cisco certifications. This tool will allow users to build network of very many devices and
also they can troubleshoot without having the real routers and switches that actually performs such
functions. It was developed by Cisco systems mainly for students to have platform of learning skills
of networking in laboratories using computers before they can go to field to practice with real
devices. It is always recommended for students to first learn networking using this tool as it will
give introduction of all the devices used by Cisco in network connections.
Document Page
17
Student ID: 1604308
How we can determine Network IP Address, IP Mask, and Sub-netting for the given IP
Address.
The most common IP versions used today are IPv4 and IPv6. IPv4 is stilled used today despite the
availability of the upgrade IPv6. Its 32-bit binary numbers which contains 2 sub-addresses. Internet
and other networks corporate uses IPv4 since it allows 232 addresses which is still useful.
Limitation was mainly lack of enough unique addresses for all the devices in the network. IPv6 is
an upgrade which contains increase number of addresses space and allow 2128 addresses. It's also
improved in terms of IP packet headers efficiency and also routing and security.
IP addresses are design mainly to work over a dynamic network. This implies that IP should only
work without a central directory or monitor which cannot on certain links. IP address is a
connectionless protocol which contains source IP address, destination IP address. The error is
always handled in the upper level protocol instead such as TCP (Kuss, & Griffiths, 2017) .
In both IPv4 and IPv6, its very hard to remember IP address inn every devices attached to them
except on smallest networks. Name resolution technique gives a way much simpler to identify IP
address. This name resolution is handled by the Domain Name System (DNS). A name can be used
in place of the destination IP address. IP address is used for making communications when the
request is initiated (Khan, Rehmani, & Reisslein, 2016) .
Sub-netting is process of utilizing larger networks by dividing them into smaller sub-networks
known as sub-nets. IP address is always used to to identify the sub-net and for broadcasting also
within the sub-net. Smaller networks create smaller broadcast domains therefore less network
broadcast traffic is experienced in the boundaries. Isolation of network by trouble-shouting will
simplify large networks when braked into smaller networks (Banatwala, Brooks, & Russo, 2019).
IP address in classless has no relationship between the the value of byte of the specific address and
number of bits in that network. A different method can be used to measure the network size in that
portion of the IP address. It allows borrowing of the bits that are normally used to extend the
network portion. A router can manipulate binary numbers where 1 is used to identify bit in IP
address for that network and 0 to identify bit in that host addresses used.
1. Calculating the Net-mask Length:
First, we have to convert dotted-decimal of the given net-mask to binary. We will therefore
contiguous 1 bits is counted.
255.255.255.128 : 11111111 11111111 11111111 10000000
-----------------------------------
I counted twenty five - one 1s -------> /25
2. Calculating the Network Address:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The network address is the IP address representations of the in the respective binary bits logically.
Perform the logical alignment of the bits in each pair. Then we have to convert our original octets to
decimal (Tourani, Misra, Mick, & Panwar, 2018).
18
160.43.8.0 in binary: 10100000 00101011 000010000 00000000
255.255.255.128 in binary: 11111111 11111111 11111111 10000000
----------------------------------- [Logical AND]
10100000 00101011 000010000 00000000 ------> 160.43.8.0
3. Broadcast Address:
It will converts all host bits to 1s… (Shang, Bannis, Liang, Wang, & Zhang, L. 2016, April)
IP address
160.43.8.0 in binary: 10100000 00101011 000010000 00000000
My network mask will therefore be:
255.255.255.128 is: 11111111 11111111 11111111 10000000 in binary
This means our host bits are the last 11 bits of the IP address, because we have to invert network
mask to find host mask:
Host bit mask : 00000000 00000000 00000000 01111111
We can calculate the broadcast by making host bits to be 1s:
160.43.8.0 in binary: 10100000 00101011 000010000 00000000
Host bit mask : 00000000 00000000 00000000 01111111
----------------------------------- [Force host bits]
10100000 00101011 00001000 01111111 ----> 160.43.8.255
4. Calculating subnets:
By using of IP address given, it will identify both network and its unique interface. A subnet mask
can determine the end of network IP address when written in decimal notation. When it is expressed
in binary, any binary bit corresponding to IP address in that network has been set to one (Silberstein,
Hu, Wated, & Witchel, 2016) .
Network Address Host Number IP Address
Document Page
160.43.8.0 0.0.0.0 160.43.8.0 /25
If we subnet the 160.43.8.0 /25 to 4 equal large subnets then we will have our network as follows:
Network Address Subnet 1 Host Number 160.43.8.0/25
Network Address Subnet 2 Host Number 160.43.8.0/25
Network Address Subnet 3 Host Number 160.43.8.0/25
Network Address Subnet 4 Host Number 160.43.8.0/25
19
The masklenght can be calculated by backing the number in prefix in host bits required to
accommodate 100 hosts. It is calculated using the formula below (Kleine, & Leister, 2016);
Host bits = Log2(100) = 6.643
Subnet Network
Address
Mask First Host
Address
Last Host
Address
Broadcast Bit mask
A 160.43.8.0 160.43.8.0/25 None None 160.43.8.255 00000000
00000000
00000000
01111111
B 160.43.8.0 160.43.8.0/25 None None 160.43.8.255 00000000
00000000
00000000
01111111
C 160.43.8.0 160.43.8.0/25 None None 160.43.8.255 00000000
00000000
00000000
01111111
D 160.43.8.0 160.43.8.0/25 160.43.8.0 160.43.8.255 160.43.8.255 00000000
00000000
00000000
01111111
E 160.43.8.0 160.44.8.0/25 160.43.8.1 160.43.8.254 160.43.8.255 00000000
00000000
00000000
01111111
F 160.43.8.0 160.45.8.0/25 160.43.8.2 160.43.8.253 160.43.8.255 00000000
00000000
00000000
Document Page
01111111
20
Cables Used for connections
Twisted pair means that the cable is design with two independent twisted ones on each other. This is
the most perfect way of overcoming the spectrum of the electromagnetic interference hence
allowing the network devices to work perfectly with any noise or any other kind of interference
outside other sources. A logical topology is the descriptions of how devices within a network are
physically connected to each other. Twisted pair means that the cable is design with two
independent twisted ones on each other. This is the most perfect way of overcoming the spectrum of
the electromagnetic interference hence allowing the network devices to work perfectly with any
noise or any other kind of interference outside other sources. The logic is the network can be
connected physically using wires and cables but also it can be connect using wires devices as well.
Sub-netting is process of utilizing larger networks by dividing them into smaller sub-networks
known as sub-nets. IP address is always used to to identify the sub-net and for broadcasting also
within the sub-net. Smaller networks create smaller broadcast domains therefore less network
broadcast traffic is experienced in the boundaries. Isolation of network by trouble-shouting will
simplify large networks when braked into smaller networks. Switches and routers are the main
components which facilitate the connection of the peripheral devices in that particular network
(Baktir, Ozgovde, & Ersoy, 2017).
Straight cabling are used for connection in devices like switch to PC, switch to router, also router to
switch . It is mainly used to transmit and receive communications between different pairs of the
devices (Truong, Lee, & Ghamri-Doudane, 2015, May).
Cross Over cabling have sending and receiving wires cross over each other which are opposite to
each other. This allows similar devices to communicate such as PCs, Routers and Switchs (Yu, Liu,
Dou, Liu, & Zhou, 2017).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Devices cable used
1. Routers and Switches Straight Through Cable
2. Routers Cross Over Cable
3. Routers and Hosts (PCs) Straight Through Cable
4. Routers and Switches Straight Through Cable
5. Switches Cross Over Cable
6. Switches and Servers Straight Through Cable
21
Configure Logical Topology:
A logical topology is the descriptions of how devices within a network are physically connected to
each other. Twisted pair means that the cable is design with two independent twisted ones on each
other. This is the most perfect way of overcoming the spectrum of the electromagnetic interference
hence allowing the network devices to work perfectly with any noise or any other kind of
interference outside other sources (Yan, & Yu, 2015). The logic is the network can be connected
physically using wires and cables but also it can be connect using wires devices as well. Sub-netting
is process of utilizing larger networks by dividing them into smaller sub-networks known as sub-
nets. IP address is always used to to identify the sub-net and for broadcasting also within the sub-
net. Smaller networks create smaller broadcast domains therefore less network broadcast traffic is
experienced in the boundaries. Isolation of network by trouble-shouting will simplify large
networks when braked into smaller networks. Switches and routers are the main components which
facilitate the connection of the peripheral devices in that particular network (Xia, Liu, Li, Ma, &
Vasilakos, 2015).
i) Network D
Host 1
My IP Address 160.43.8.0
My IP Mask 160.43.8.0/25
My Gateway Address 160.43.8.1
Host 2
Document Page
My IP Address 160.43.8.0
My IP Mask 160.43.8.0/25
My Gateway Address 160.43.8.2
Host 3
My IP Address 160.43.8.0
My IP Mask 160.43.8.0/25
My Gateway Address 160.43.8.3
Host 4
My IP Address 160.43.8.0
My IP Mask 160.43.8.0/25
My Gateway Address 160.43.8.4
22
Server
My IP Address 160.43.8.0
My IP Mask 160.43.8.0/25
My Gateway Address 160.43.8.0
ii) Network E
Host 1
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.1
Host 2
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.2
Document Page
Host 3
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.3
Host 4
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.4
Host 5
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.5
Host 6
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.6
23
Host 7
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.7
Host 8
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.8
Host 9
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
My Gateway Address 160.44.8.9
Host 10
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.10
Host 11
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.11
Host 12
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.12
Host 13
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.13
24
Host 14
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.14
Host 15
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.15
Document Page
Host 16
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.16
Host 17
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.17
Host 18
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.18
Server
My IP Address 160.43.8.0
My IP Mask 160.44.8.0/25
My Gateway Address 160.44.8.0
25
iii) Network F
Host 1
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.1
Document Page
Host 2
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.2
Host 3
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.3
Host 4
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.4
Host 5
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.5
Host 6
IP Address 160.43.8.0
IP Mask 160.45.8.0/25
Gateway Address 160.45.8.6
26
Host 7
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.7
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Host 8
My IP Address 160.43.8.0
MyIP Mask 160.45.8.0/25
My Gateway Address 160.45.8.8
Host 9
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.9
Host 10
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.10
Host 11
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.11
Host 12
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.12
Host 13
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.13
27
Host 14
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
Document Page
My Gateway Address 160.45.8.14
Host 15
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.15
Host 16
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.16
Host 17
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.17
Host 18
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.18
Host 19
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.19
Host 20
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.20
28
Document Page
Server
My IP Address 160.43.8.0
My IP Mask 160.45.8.0/25
My Gateway Address 160.45.8.0
Host 1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
29
Host 2
Host 3
Document Page
30
Host 4
Document Page
31
Host 5
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
32
Security systems on the both routers and all other active devices
Network access control is the authorization to access the network through permissions on both users
and devices. The access can be authorized or denied depending on the parameters set on that
particular network for the devices to be allowed to access. The NAC requires more interactions
between the protocols and different technologies to be applied on the devices concerned. To have
access on servers then you must have the authorization from the admin or the relevant authorities.
Also to access network through WI-FI one must have the password (Amadeo, Campolo, Quevedo,
& Vasilakos, 2016).
1. How to set password in Telnet ;
Configure telnet password on both router & switches
The telnet protocol allows the user to gain access to the other computer device without leaving the
your desk. Launch connection to the telnet server you want to set up the password. Using of the
command line, type telnet and computer IP address. Follow the steps shown bellow (Iyengar, &
Brooks, 2016):
R1#conf t
R1(config)#line vty 0 4
R1(config-line)#password cisco
Document Page
R1(config-line)#login
R1(config-line)#end
R1#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
R1#
33
2. How to set your console password:
R1#conf t
R1(config)#line con 0
R1(config-line)#password cisco
R1(config-line)#login
R1(config-line)#end
R1#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
R1#
Document Page
3. How to set The Aux port password;
Auxiliary passwords can be set on the router since the port is connected to modem and back of the
router. For the router configurations to be secured then auxiliary ports passwords must be specified
(Amadeo, Campolo, & Molinaro, (2016):
1. Open CLI
2. Use the following steps:
34
UpaaeRouter1> enable
UpaaeRouter1# configure terminal
UpaaeRouter1(config)# line aux 0 // this is the command for entering into
auxiliary line configuration.
UpaaeRouter1(line-config)# // this prompt confirms that we are at
line configuration mode.
UpaaeRouter1(line-config)# password upaae123 // password is the command
followed by your desired password
UpaaeRouter1(line-config)# login // this command enforce the password for
accessing auxiliary port.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4. How to set Console password;
Console port are found on the back of all routers devices and it is used to connect PC directly. The
password therefore must be set to avoid unauthorized access. Below is the set up (Maier, Laumer,
Eckhardt, & Weitzel, 2015):
35
Document Page
5. How to set Enable password;
The enable password can be set on a Cisco device as shown below (Yan, Yu, Gong, & Li, 2016).
Switch1>enable
Switch1#configure terminal
Switch1(config)#enable password mypass
Switch1>enable
Password:
Switch1#show running-config | include enable password
enable password mypass
Switch1>enable
Switch1#configure terminal
Switch1(config)#enable password mypass
Switch1(config)#enable secret mysecret
36
PART B
Demonstration of network design and configuration of the IP protocol in Cisco packer tracer
Packet Tracer is a useful tool that is used for network simulation. Students mostly used for training
to attain Cisco certifications. This tool will allow users to build network of very many devices and
also they can troubleshoot without having the real routers and switches that actually performs such
functions. It was developed by Cisco systems mainly for students to have platform of learning skills
of networking in laboratories using computers before they can go to field to practice with real
devices. It is always recommended for students to first learn networking using this tool as it will
give introduction of all the devices used by Cisco in network connections.
Document Page
37
Configure all devices including the routers and switches.
Network will work properly when the installations and configurations of the devices are done
properly. The problems to be encountered are minimize. For a network to function effectively then
all routers, switches, PC and Hubs must be configured properly by using either wired or wireless
connections. The flow of the traffic will be very good and problems like downtime's or buffering are
actually minimized. Installation and Configurations of the switches and routers are really taken care
of and there are perfect and proper methods of doing them. There are many procedures of doing
them but always a network personnel must ensure that they use the recommended methods to avoid
the future problems (Amadeo, Campolo, Quevedo, & Vasilakos, 2016).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network operates by connecting the computers and its peripherals within that network using
switches and routers as the main devices. This two devices allows perfect and simplified
communications within that network. Routers and switches may look similar but there functions
greatly differ from each other (Xia, Liu, Li, Ma, & Vasilakos, 2015).
Switches are used to connect devices within the same network in the same building or campus.
Switch connects devices such computers, printers, servers by creating the sharing resource to all
those devices. It allows communication and sharing of information's between such devices in that
network. Unmanaged switch works outside the box and it doesn't allow any changes to be made.
Home network mainly uses such kind of switches. Managed switch will always allow you to access
and manage the switch. It allows great accessibility and flexibility to monitor and adjust the traffic
flow within the Network (Yan, Yu, Gong, & Li, 2016).
Routers main function is to capture and analyze the information within that network and package it
before sending to another network or network within. It connects you with other rest of the world,
also it provides security risks and also it can decide the priorities of the computer (Leung, Zhang, X.
(2016).
38
Verification's and records of the devices:
From To IP Address Results
Host 1 Gateway (Router 1, Fa0/0) 170.52.53.0 S
Host 1 Router 1, Fa0/1 170.52.53.0 F
Host 1 Host 2 170.52.54.0 S
Document Page
Host 1 Host 3 170.52.55.0 S
Host 1 Host 4 170.52.53.0 S
Host 1 Server 170.52.53.0 S
Host 2 Gateway (Router 1, Fa0/0) 170.52.53.0 S
Host 2 Router 1, Fa0/1 170.52.53.0 F
Host 2 Host 1 160.43.8.0 S
Host 2 Server 160.43.8.0 S
Host 3 Gateway (Router 2, Fa0/0) 160.43.8.0 S
Host 3 Router 2, Fa0/1 160.44.8.0 F
Host 3 Host 1 160.45.8.0 S
Host 4 Gateway (Router 2, Fa0/0) 160.43.8.0 S
Host 4 Router 2, Fa0/1 160.44.8.0 F
Host 4 Host 2 160.44.8.0 S
Server Gateway (Router 2, Fa0/0) 160.43.8.0 S
Server Router 1, Fa0/1 160.44.8.0 F
Server Router 2, Fa0/1 160.45.8.0 F
Server Host 2 160.43.8.0 S
39
Conclusion
Document Page
Network will work properly when the installations and configurations of the devices are done
properly. The problems to be encountered are minimize. For a network to function effectively then
all routers, switches, PC and Hubs must be configured properly by using either wired or wireless
connections. The flow of the traffic will be very good and problems like downtime's or buffering are
actually minimized. Installation and Configurations of the switches and routers are really taken care
of and there are perfect and proper methods of doing them. There are many procedures of doing
them but always a network personnel must ensure that they use the recommended methods to avoid
the future problems. The use Cisco packet tracer helps to design and install the network properly
(Leung, Zhang, X. (2016).
40
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Reference
1.Kreutz, D., Ramos, F. M., Verissimo, P., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015).
Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 14-76.
2.Johannisson, B. (2017). Networking and entrepreneurial growth. The Blackwell handbook of
entrepreneurship, 368-386.
3.Keeble, D., & Wilkinson, F. (2017). High-technology clusters, networking and collective learning
in Europe. Routledge.
4.Xia, W., Wen, Y., Foh, C. H., Niyato, D., & Xie, H. (2015). A survey on software-defined
networking. IEEE Communications Surveys & Tutorials, 17(1), 27-51.
5.Wang, M., Carver, J. J., Phelan, V. V., Sanchez, L. M., Garg, N., Peng, Y., ... & Porto, C. (2016).
Sharing and community curation of mass spectrometry data with Global Natural Products Social
Molecular Networking. Nature biotechnology, 34(8), 828.
6.Pathak, P. H., Feng, X., Hu, P., & Mohapatra, P. (2015). Visible light communication, networking,
and sensing: A survey, potential and challenges. IEEE communications surveys & tutorials, 17(4),
2047-2077.
7.van der Heijden, M. G., & Hartmann, M. (2016). Networking in the plant microbiome. PLoS
Biology, 14(2), e1002378.
Document Page
41
8.Oberst, U., Wegmann, E., Stodt, B., Brand, M., & Chamarro, A. (2017). Negative consequences
from heavy social networking in adolescents: the mediating role of fear of missing out. Journal of
adolescence, 55, 51-60.
9.Mestres, A., Rodriguez-Natal, A., Carner, J., Barlet-Ros, P., Alarcón, E., Solé, M., ... & Estrada,
G. (2017). Knowledge-defined networking. ACM SIGCOMM Computer Communication
Review, 47(3), 2-10.
10.Blenk, A., Basta, A., Reisslein, M., & Kellerer, W. (2016). Survey on network virtualization
hypervisors for software defined networking. IEEE Communications Surveys & Tutorials, 18(1),
655-685.
11.Hwang, J., Ramakrishnan, K. K., & Wood, T. (2015). NetVM: high performance and flexible
networking using virtualization on commodity platforms. IEEE Transactions on Network and
Service Management, 12(1), 34-47.
12.Comer, D. E. (2018). The Internet book: everything you need to know about computer
networking and how the Internet works. Chapman and Hall/CRC.
13.Leung, V. C., Yu, F. R., & Zhang, X. (2016). Green communications and networking. CRC Press.
14.Banatwala, M., Brooks, D. A., & Russo, J. A. (2019). U.S. Patent Application No. 16/154,273.
Document Page
15.Zeydan, E., Bastug, E., Bennis, M., Kader, M. A., Karatepe, I. A., Er, A. S., & Debbah, M.
(2016). Big data caching for networking: Moving from cloud to edge. IEEE Communications
Magazine, 54(9), 36-42.
42
16.Smed, J., & Hakonen, H. (2017). Algorithms and networking for computer games. John Wiley &
Sons.
17.Zheng, K., Zheng, Q., Chatzimisios, P., Xiang, W., & Zhou, Y. (2015). Heterogeneous vehicular
networking: a survey on architecture, challenges, and solutions. IEEE communications surveys &
tutorials, 17(4), 2377-2396.
18.Khan, A. A., Rehmani, M. H., & Reisslein, M. (2016). Cognitive radio for smart grids: Survey of
architectures, spectrum sensing mechanisms, and networking protocols. IEEE Communications
Surveys & Tutorials, 18(1), 860-898.
19.Kuss, D., & Griffiths, M. (2017). Social networking sites and addiction: Ten lessons
learned. International journal of environmental research and public health, 14(3), 311.
20.Tourani, R., Misra, S., Mick, T., & Panwar, G. (2018). Security, privacy, and access control in
information-centric networking: A survey. IEEE communications surveys & tutorials, 20(1), 566-
600.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
21.Shang, W., Bannis, A., Liang, T., Wang, Z., Yu, Y., Afanasyev, A., ... & Zhang, L. (2016, April).
Named data networking of things. In 2016 IEEE first international conference on internet-of-things
design and implementation (IoTDI) (pp. 117-128). IEEE.
22.Silberstein, M., Kim, S., Huh, S., Zhang, X., Hu, Y., Wated, A., & Witchel, E. (2016). GPUnet:
Networking abstractions for GPU programs. ACM Transactions on Computer Systems
(TOCS), 34(3), 9.
43
23.Silberstein, M., Kim, S., Huh, S., Zhang, X., Hu, Y., Wated, A., & Witchel, E. (2016). GPUnet:
Networking abstractions for GPU programs. ACM Transactions on Computer Systems
(TOCS), 34(3), 9.
24.Baktir, A. C., Ozgovde, A., & Ersoy, C. (2017). How can edge computing benefit from software-
defined networking: A survey, use cases, and future directions. IEEE Communications Surveys &
Tutorials, 19(4), 2359-2391.
25.Yu, S., Liu, M., Dou, W., Liu, X., & Zhou, S. (2017). Networking for big data: A survey. IEEE
Communications Surveys & Tutorials, 19(1), 531-549.
26.Truong, N. B., Lee, G. M., & Ghamri-Doudane, Y. (2015, May). Software defined networking-
based vehicular adhoc network with fog computing. In 2015 IFIP/IEEE International Symposium
on Integrated Network Management (IM) (pp. 1202-1207). IEEE.
Document Page
27.Truong, N. B., Lee, G. M., & Ghamri-Doudane, Y. (2015, May). Software defined networking-
based vehicular adhoc network with fog computing. In 2015 IFIP/IEEE International Symposium
on Integrated Network Management (IM) (pp. 1202-1207). IEEE.
28.Xia, F., Liu, L., Li, J., Ma, J., & Vasilakos, A. V. (2015). Socially aware networking: A
survey. IEEE Systems Journal, 9(3), 904-921.
29.Kleine, T., & Leister, D. (2016). Retrograde signaling: organelles go networking. Biochimica Et
Biophysica Acta (BBA)-Bioenergetics, 1857(8), 1313-1325.
44
30.Amadeo, M., Campolo, C., Quevedo, J., Corujo, D., Molinaro, A., Iera, A., ... & Vasilakos, A. V.
(2016). Information-centric networking for the internet of things: challenges and
opportunities. IEEE Network, 30(2), 92-100.
31.Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined networking
with cloud computing. IEEE Communications Magazine, 53(4), 52-59.
32.Iyengar, S. S., & Brooks, R. R. (Eds.). (2016). Distributed Sensor Networks: Sensor Networking
and Applications (Volume Two). CRC press.
Document Page
33.Amadeo, M., Campolo, C., & Molinaro, A. (2016). Information-centric networking for
connected vehicles: a survey and future perspectives. IEEE Communications Magazine, 54(2), 98-
104.
34.Amadeo, M., Campolo, C., & Molinaro, A. (2016). Information-centric networking for
connected vehicles: a survey and future perspectives. IEEE Communications Magazine, 54(2), 98-
104.
35.Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking (SDN) and
distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some
research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602-622.
36.Maier, C., Laumer, S., Eckhardt, A., & Weitzel, T. (2015). Giving too much social support: social
overload on social networking sites. European Journal of Information Systems, 24(5), 447-464.
45
chevron_up_icon
1 out of 55
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]