University Network Design: TCP/IP Implementation and Analysis Report
VerifiedAdded on 2020/02/24
|13
|2658
|47
Report
AI Summary
This report presents a comprehensive TCP/IP network design for M2M Solutions, addressing the company's requirements for connecting six departments across Sydney. The first task focuses on designing a simple addressing solution, detailing the network architecture, subnetting techniques, and network divisions, along with justifications for the design choices. The network is designed to accommodate approximately 1200 workstations, with specific subnet allocations for each department. Task two explores network communication protocols, including HTTP, FTP, and SMTP, and the role of network analyzer tools. The report recommends Wireshark for network analysis, outlining its benefits, associated costs, and ease of use. The report concludes with a summary of the network design and analysis, emphasizing the efficient sub-network division and the utility of Wireshark for network monitoring and security.

Running head: TCP/IP
TCP/IP
Name of the Student:
Name of the University:
Author Note
TCP/IP
Name of the Student:
Name of the University:
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
TCP/IP
Table of Contents
Task 1...........................................................................................................................................1
Introduction......................................................................................................................................1
Provided information about the network of the company...............................................................2
Design of the Simple Addressing solution......................................................................................3
Description of the Addressing solution...........................................................................................4
Justification of the network design..................................................................................................5
Conclusion.......................................................................................................................................6
Task 2...........................................................................................................................................6
Protocols in the communication Network and role of network analyzer tool.................................6
Currently available network analyzer tool.......................................................................................8
Benefits, associated costs, ease of usability.............................................................................8
Recommendation and preferences of using the tool................................................................9
Bibliography..................................................................................................................................10
TCP/IP
Table of Contents
Task 1...........................................................................................................................................1
Introduction......................................................................................................................................1
Provided information about the network of the company...............................................................2
Design of the Simple Addressing solution......................................................................................3
Description of the Addressing solution...........................................................................................4
Justification of the network design..................................................................................................5
Conclusion.......................................................................................................................................6
Task 2...........................................................................................................................................6
Protocols in the communication Network and role of network analyzer tool.................................6
Currently available network analyzer tool.......................................................................................8
Benefits, associated costs, ease of usability.............................................................................8
Recommendation and preferences of using the tool................................................................9
Bibliography..................................................................................................................................10

2
TCP/IP
Task 1
Introduction
The M2M Solutions is a medium sized organization. The organization currently looking
to expand its operations, and hence they are required to relay their network structure. For the
purpose of relaying the network architecture I have been entrusted with task of taking the full
responsibility of the task. I have also been also provided with a team of several administrators of
the system.
The task one of this report contains the information about the designing of the Addressing
solution for the organization.
The report provides the design for the Simple Addressing solution, the description of the
Simple Addressing Design and also provides information about the subnetting techniques and the
network divisions that are implemented for the system. In addition to this, some additional
justification for the network design has also been provided in the report.
Provided information about the network of the company
The M2M Company has already provided the information about their requirements. The
company has acquired about six sites across the city of Sydney. They are looking to implement a
network for the six different department of the company. The six different departments that are
present in the company are the Finance department, Transport Office, Research Office, Sales
Office, Information System and the Head Office. Now the company is looking to implement a
network that would be connecting all the departments of the company to the single network. The
TCP/IP
Task 1
Introduction
The M2M Solutions is a medium sized organization. The organization currently looking
to expand its operations, and hence they are required to relay their network structure. For the
purpose of relaying the network architecture I have been entrusted with task of taking the full
responsibility of the task. I have also been also provided with a team of several administrators of
the system.
The task one of this report contains the information about the designing of the Addressing
solution for the organization.
The report provides the design for the Simple Addressing solution, the description of the
Simple Addressing Design and also provides information about the subnetting techniques and the
network divisions that are implemented for the system. In addition to this, some additional
justification for the network design has also been provided in the report.
Provided information about the network of the company
The M2M Company has already provided the information about their requirements. The
company has acquired about six sites across the city of Sydney. They are looking to implement a
network for the six different department of the company. The six different departments that are
present in the company are the Finance department, Transport Office, Research Office, Sales
Office, Information System and the Head Office. Now the company is looking to implement a
network that would be connecting all the departments of the company to the single network. The
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
TCP/IP
company is also looking to subnet their network and it is also informed that they would be
having a single subnet for each of the departments in the company. In addition to this, the design
is required to accommodate around 1200 work station in their network. In addition to this, the
distribution of the workstation of the company is done in the following process:
 Finance Office - 260 workstations
 Transport Office - 130 workstations
 Research Office - 120 workstations
 Sales Office - 40 workstations
 Information technology - 520 workstations
 Head Office - 60 workstations
Hence, the network that is implemented should be accommodating the aforesaid number
of machines in the system.
TCP/IP
company is also looking to subnet their network and it is also informed that they would be
having a single subnet for each of the departments in the company. In addition to this, the design
is required to accommodate around 1200 work station in their network. In addition to this, the
distribution of the workstation of the company is done in the following process:
 Finance Office - 260 workstations
 Transport Office - 130 workstations
 Research Office - 120 workstations
 Sales Office - 40 workstations
 Information technology - 520 workstations
 Head Office - 60 workstations
Hence, the network that is implemented should be accommodating the aforesaid number
of machines in the system.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
TCP/IP
Design of the Simple Addressing solution
Description of the Addressing solution
The network design is implemented according to the requirement stated by the company.
For the implantation the system central server is connected to the six departments of the
company. The six different servers are implemented for the six different sectors of the company
that they need to integrate into their system. Hence, the network would be subnetted efficiently
into six different sub networks. This provides the company with the benefit of stopping the
access to the different administrators of the different networks. Hence, this would be providing
various type secure facilities for the network of the company. In addition to this, the
authentication aspect within the network would also be improved efficiently by this design. The
calculations and the further discussions of the network are provided below.
For the subnetting of the network the major network was selected as 10.0.0.0/20.
The available IP addresses in major network: 4094
TCP/IP
Design of the Simple Addressing solution
Description of the Addressing solution
The network design is implemented according to the requirement stated by the company.
For the implantation the system central server is connected to the six departments of the
company. The six different servers are implemented for the six different sectors of the company
that they need to integrate into their system. Hence, the network would be subnetted efficiently
into six different sub networks. This provides the company with the benefit of stopping the
access to the different administrators of the different networks. Hence, this would be providing
various type secure facilities for the network of the company. In addition to this, the
authentication aspect within the network would also be improved efficiently by this design. The
calculations and the further discussions of the network are provided below.
For the subnetting of the network the major network was selected as 10.0.0.0/20.
The available IP addresses in major network: 4094

5
TCP/IP
The number of IP addresses needed: 1130
The available IP addresses in allocated subnets: 2036
In addition to this, it should also be noted that about 50% of available major network
address space is used and about 56% of subnetted network address space is used. The table
provided below displays the subnetting procedures efficiently.
Subnet Name Need
ed
Size
Mas
k
Dec Mask Assigna
ble
Range
Broadc
ast
Addres
s
Allocat
ed Size
Finance_Offfice 260 /23 255.255.254.
0
10.0.4.1 -
10.0.5.25
4
10.0.5.2
55
10.0.4.0 510
Transport_Office 130 /24 255.255.255.
0
10.0.6.1 -
10.0.6.25
4
10.0.6.2
55
10.0.6.0 254
Research_Office 120 /25 255.255.255.
128
10.0.7.1 -
10.0.7.12
6
10.0.7.1
27
10.0.7.0 126
Sales_Office 40 /26 255.255.255.
192
10.0.7.19
3 -
10.0.7.25
4
10.0.7.2
55
10.0.7.1
92
62
Infiormation_Techn
ology
520 /22 255.255.252.
0
10.0.0.1 -
10.0.3.25
4
10.0.3.2
55
10.0.0.0 1022
Head_Office 60 /26 255.255.255.
192
10.0.7.12
9 -
10.0.7.19
0
10.0.7.1
91
10.0.7.1
28
62
Justification of the network design
The network design is according to the needs mentioned by the company. The network
would be providing efficient communication facilities for the company and also the network
would allow integration of the different departments of the company within the same network
TCP/IP
The number of IP addresses needed: 1130
The available IP addresses in allocated subnets: 2036
In addition to this, it should also be noted that about 50% of available major network
address space is used and about 56% of subnetted network address space is used. The table
provided below displays the subnetting procedures efficiently.
Subnet Name Need
ed
Size
Mas
k
Dec Mask Assigna
ble
Range
Broadc
ast
Addres
s
Allocat
ed Size
Finance_Offfice 260 /23 255.255.254.
0
10.0.4.1 -
10.0.5.25
4
10.0.5.2
55
10.0.4.0 510
Transport_Office 130 /24 255.255.255.
0
10.0.6.1 -
10.0.6.25
4
10.0.6.2
55
10.0.6.0 254
Research_Office 120 /25 255.255.255.
128
10.0.7.1 -
10.0.7.12
6
10.0.7.1
27
10.0.7.0 126
Sales_Office 40 /26 255.255.255.
192
10.0.7.19
3 -
10.0.7.25
4
10.0.7.2
55
10.0.7.1
92
62
Infiormation_Techn
ology
520 /22 255.255.252.
0
10.0.0.1 -
10.0.3.25
4
10.0.3.2
55
10.0.0.0 1022
Head_Office 60 /26 255.255.255.
192
10.0.7.12
9 -
10.0.7.19
0
10.0.7.1
91
10.0.7.1
28
62
Justification of the network design
The network design is according to the needs mentioned by the company. The network
would be providing efficient communication facilities for the company and also the network
would allow integration of the different departments of the company within the same network
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
TCP/IP
efficiently. The network would also provide very efficient security and the very efficient
authentication facilities for the company. The network has also been designed efficiently for
implementation of the network that would be accommodating about 1200 in the system. In
addition to this the division of the network has also been done according to the requirements
mentioned by the M2M Company. The sub netting of the company is also according to the
requirements of the mentioned by the company. The system would also allow only the allocated
number of machine in the network. The subnet /20 are being used in this system. Hence, the total
number of addresses that would be allowed in this system is 4096. But if the number of addresses
in each building exceeds more than 1024 them it would be impossible to allocate that number of
addresses in the network. As 1024 x 6 exceeds more than 4096 addresses and hence, this would
result in the congestion of the network.
Conclusion
For conclusion it can be said that the network design provided for the network would be
helpful for the company to implement their network in which the sub network would be
efficiently divided for the company. This report provides the details about the network design.
The task one of this report contains the information about the designing of the Addressing
solution for the organization. The report provides the design for the Simple Addressing solution,
the description of the Simple Addressing Design and also provides information about the
subnetting techniques and the network divisions that are implemented for the system. In addition
to this, some additional justification for the network design has also been provided in the report.
TCP/IP
efficiently. The network would also provide very efficient security and the very efficient
authentication facilities for the company. The network has also been designed efficiently for
implementation of the network that would be accommodating about 1200 in the system. In
addition to this the division of the network has also been done according to the requirements
mentioned by the M2M Company. The sub netting of the company is also according to the
requirements of the mentioned by the company. The system would also allow only the allocated
number of machine in the network. The subnet /20 are being used in this system. Hence, the total
number of addresses that would be allowed in this system is 4096. But if the number of addresses
in each building exceeds more than 1024 them it would be impossible to allocate that number of
addresses in the network. As 1024 x 6 exceeds more than 4096 addresses and hence, this would
result in the congestion of the network.
Conclusion
For conclusion it can be said that the network design provided for the network would be
helpful for the company to implement their network in which the sub network would be
efficiently divided for the company. This report provides the details about the network design.
The task one of this report contains the information about the designing of the Addressing
solution for the organization. The report provides the design for the Simple Addressing solution,
the description of the Simple Addressing Design and also provides information about the
subnetting techniques and the network divisions that are implemented for the system. In addition
to this, some additional justification for the network design has also been provided in the report.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
TCP/IP
Task 2
Protocols in the communication Network and role of network analyzer tool
The M2M Solutions is a medium sized organization. The organization currently looking
to expand its operations, and hence they are required to relay their network structure. For the
purpose of relaying the network architecture I have been entrusted with task of taking the full
responsibility of the task. I have also been also provided with a team of several administrators of
the system.
The task two in this report provides the information about the current company policies
and the discussions involving the network analyzers.
The report provides the information about the protocols that are used for the
communication in the network, the role of the network analyzer, selection of the network
analyzer and the various type of benefits for the network analyzer tool and other discussions
about the tool.
The company policies do not involve the use of network analyzers in their network
although the network analyzers are very efficient for the company to carry out their processes. In
addition to this, the network analyzer would also help the company tom identify the flaws that
are existent within the network. The information about the protocols that are being used in the
network is provided below.
The main protocols that are being used for the network are HTTP, FTP and SMTP
protocol. The HTTP is the hyper text transfer protocol, the FTP is the File transfer protocol and
the SMTP is the Simple mail transfer protocol. The HTTP protocol would enable the network to
TCP/IP
Task 2
Protocols in the communication Network and role of network analyzer tool
The M2M Solutions is a medium sized organization. The organization currently looking
to expand its operations, and hence they are required to relay their network structure. For the
purpose of relaying the network architecture I have been entrusted with task of taking the full
responsibility of the task. I have also been also provided with a team of several administrators of
the system.
The task two in this report provides the information about the current company policies
and the discussions involving the network analyzers.
The report provides the information about the protocols that are used for the
communication in the network, the role of the network analyzer, selection of the network
analyzer and the various type of benefits for the network analyzer tool and other discussions
about the tool.
The company policies do not involve the use of network analyzers in their network
although the network analyzers are very efficient for the company to carry out their processes. In
addition to this, the network analyzer would also help the company tom identify the flaws that
are existent within the network. The information about the protocols that are being used in the
network is provided below.
The main protocols that are being used for the network are HTTP, FTP and SMTP
protocol. The HTTP is the hyper text transfer protocol, the FTP is the File transfer protocol and
the SMTP is the Simple mail transfer protocol. The HTTP protocol would enable the network to

8
TCP/IP
have access to the internet connection and system would be able to go online. In addition to this,
the FTP protocol would allow the systems in enable to transfer files within the network. The
SMTP protocol would enable the components of the network to communicate among them very
efficiently. In addition to this, the communication in between the staffs of the company would
also be very efficient and they would be able to exchange emails among themselves.
The network analyzer is combination of the hardware and software. It plays various type
of roles for the network:
 It can be used for the analysis of the network.
 It can also be used for the security of the network.
Currently available network analyzer tool
The wire shark framework is used as a network analyzer for the analysis of the network
that is designed in task one. The wireshark network analyzer would be able to perform the
analysis about the data packets that are being transferred within the network. They are also going
to trace the packets that are flowing through the network.
Wireshark is one the most efficient tool that can be used as a network analyzer In
addition to this; the product is very popular in the market and posses quite a high ranking in the
market for the network analyzer department.
Benefits, associated costs, ease of usability
Wireshark provides various type of benefits for the network implemented by the users.
Firstly, it supports a wide range of protocols that vary from the IP and DHCP to the
AppleTalk and BitTorrent. In addition to this, with each of the update the tool is updated and a
TCP/IP
have access to the internet connection and system would be able to go online. In addition to this,
the FTP protocol would allow the systems in enable to transfer files within the network. The
SMTP protocol would enable the components of the network to communicate among them very
efficiently. In addition to this, the communication in between the staffs of the company would
also be very efficient and they would be able to exchange emails among themselves.
The network analyzer is combination of the hardware and software. It plays various type
of roles for the network:
 It can be used for the analysis of the network.
 It can also be used for the security of the network.
Currently available network analyzer tool
The wire shark framework is used as a network analyzer for the analysis of the network
that is designed in task one. The wireshark network analyzer would be able to perform the
analysis about the data packets that are being transferred within the network. They are also going
to trace the packets that are flowing through the network.
Wireshark is one the most efficient tool that can be used as a network analyzer In
addition to this; the product is very popular in the market and posses quite a high ranking in the
market for the network analyzer department.
Benefits, associated costs, ease of usability
Wireshark provides various type of benefits for the network implemented by the users.
Firstly, it supports a wide range of protocols that vary from the IP and DHCP to the
AppleTalk and BitTorrent. In addition to this, with each of the update the tool is updated and a
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
TCP/IP
new protocol is added to the application on a daily basis. The analyzer supports about 850
protocols.
The tool also helps in the analysis of the network and performs excellent monitoring of
the systems. Hence, they protect the systems form the external intruders.
The WireShark Network Protocol Analyzer tool is an open source tool that can be used
for both the individual use and also for the commercial uses as well. The cost for the
implementation of the analyzer on the network system is also very minimal and there are no
external hardware requirements for the analyzer. Hence, the associated cost for the analyzer is
almost nil.
For using the tool the minimum requirements of the network are:
60mb disk space, they also need a CPU with a clock speed of about 400 Mhz. In addition to this,
system is required to possess a Network Interface Controller.
Recommendation and preferences of using the tool
For recommendation it can be said that:
Understanding data: The user needs to understand the type of data provided by the
analyzer
Understanding configurations: The user needs to understand the type of configurations
that have been done in the network.
For conclusion it can be said that the Wireshark Network Protocol Analyzer is the best
tool that can be used for the network that is designed for the M2M to implement. The
information about the current company policies and the discussions involving the network
TCP/IP
new protocol is added to the application on a daily basis. The analyzer supports about 850
protocols.
The tool also helps in the analysis of the network and performs excellent monitoring of
the systems. Hence, they protect the systems form the external intruders.
The WireShark Network Protocol Analyzer tool is an open source tool that can be used
for both the individual use and also for the commercial uses as well. The cost for the
implementation of the analyzer on the network system is also very minimal and there are no
external hardware requirements for the analyzer. Hence, the associated cost for the analyzer is
almost nil.
For using the tool the minimum requirements of the network are:
60mb disk space, they also need a CPU with a clock speed of about 400 Mhz. In addition to this,
system is required to possess a Network Interface Controller.
Recommendation and preferences of using the tool
For recommendation it can be said that:
Understanding data: The user needs to understand the type of data provided by the
analyzer
Understanding configurations: The user needs to understand the type of configurations
that have been done in the network.
For conclusion it can be said that the Wireshark Network Protocol Analyzer is the best
tool that can be used for the network that is designed for the M2M to implement. The
information about the current company policies and the discussions involving the network
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
TCP/IP
analyzers have been provided in this report. The report provides the information about the
protocols that are used for the communication in the network, the role of the network analyzer,
selection of the network analyzer and the various types of benefits for the network analyzer tool
and other discussions about the tool. The usability of the network analyzer has also been
provided in this report.
TCP/IP
analyzers have been provided in this report. The report provides the information about the
protocols that are used for the communication in the network, the role of the network analyzer,
selection of the network analyzer and the various types of benefits for the network analyzer tool
and other discussions about the tool. The usability of the network analyzer has also been
provided in this report.

11
TCP/IP
Bibliography
Alexander, G., & Crandall, J. R. (2015, April). Off-path round trip time measurement via TCP/IP
side channels. In Computer Communications (INFOCOM), 2015 IEEE Conference
on (pp. 1589-1597). IEEE.
Bauer, G., Bawej, T., Behrens, U., Branson, J., Chaze, O., Cittolin, S., ... & Dupont, A. (2014).
10 Gbps TCP/IP streams from the FPGA for high energy physics. In Journal of Physics:
Conference Series (Vol. 513, No. 1, p. 012042). IOP Publishing.
Bishop, S., Fairbairn, M., Norrish, M., Ridge, T., Sewell, P., Smith, M., & Wansbrough, K.
(2015). Engineering with Logic: Rigorous Specification and Validation for TCP/IP and
the Sockets API. URL: http://www. cl. cam. ac. uk/pes20/Netsem/paper3. pdf.
Black, E. D. (2017). Introduction to the Network Analyzer and the Digital Fast Fourier
Transform (FFT).
Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: milestones, challenges, and new
research directions. IEEE Communications Magazine, 52(1), 85-96.
Jerger, M., Vasseli, Z., & Fedorov, A. (2017). In situ characterization of qubit control lines: a
qubit as a vector network analyzer. arXiv preprint arXiv:1706.05829.
Lewandowski, A., Wiatr, W., Gu, D., Orloff, N. D., & Booth, J. (2017). A Multireflect-Thru
Method of Vector Network Analyzer Calibration. IEEE Transactions on Microwave
Theory and Techniques, 65(3), 905-915.
TCP/IP
Bibliography
Alexander, G., & Crandall, J. R. (2015, April). Off-path round trip time measurement via TCP/IP
side channels. In Computer Communications (INFOCOM), 2015 IEEE Conference
on (pp. 1589-1597). IEEE.
Bauer, G., Bawej, T., Behrens, U., Branson, J., Chaze, O., Cittolin, S., ... & Dupont, A. (2014).
10 Gbps TCP/IP streams from the FPGA for high energy physics. In Journal of Physics:
Conference Series (Vol. 513, No. 1, p. 012042). IOP Publishing.
Bishop, S., Fairbairn, M., Norrish, M., Ridge, T., Sewell, P., Smith, M., & Wansbrough, K.
(2015). Engineering with Logic: Rigorous Specification and Validation for TCP/IP and
the Sockets API. URL: http://www. cl. cam. ac. uk/pes20/Netsem/paper3. pdf.
Black, E. D. (2017). Introduction to the Network Analyzer and the Digital Fast Fourier
Transform (FFT).
Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: milestones, challenges, and new
research directions. IEEE Communications Magazine, 52(1), 85-96.
Jerger, M., Vasseli, Z., & Fedorov, A. (2017). In situ characterization of qubit control lines: a
qubit as a vector network analyzer. arXiv preprint arXiv:1706.05829.
Lewandowski, A., Wiatr, W., Gu, D., Orloff, N. D., & Booth, J. (2017). A Multireflect-Thru
Method of Vector Network Analyzer Calibration. IEEE Transactions on Microwave
Theory and Techniques, 65(3), 905-915.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





