University Networking Report: TCP/IP Addressing and Protocol Analysis
VerifiedAdded on 2020/02/24
|13
|2839
|44
Report
AI Summary
This report provides a detailed design solution for a Machine-to-Machine (M2M) network, addressing future growth and efficiency. It outlines a network diagram with subnetting for six buildings, utilizing VLSM to minimize IP address wastage. The report discusses the impact of increased hosts and proposes a new addressing solution using CIDR notation. It explains the role of a protocol analyzer, detailing its benefits, associated costs, and ease of use, with recommendations for implementation. The report analyzes tools like ENA Vector Network Analyzer and Wireshark, including cost breakdowns for hardware, installation, and maintenance, ultimately aiming to enhance network security and performance. The addressing solution is designed to meet current needs while accommodating future expansion, with static IP addresses for security and monitoring.

Running head: TCP/IP NETWORKING
TCP/IP Networking
Name of the Student
Name of the University
Author’s Note
TCP/IP Networking
Name of the Student
Name of the University
Author’s Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
TCP/IP NETWORKING
Table of Contents
Introduction..........................................................................................................................2
Task 1...................................................................................................................................2
a. Detailed Design of Addressing Solution......................................................................2
b. Explanation if the number of hosts increases..............................................................6
Task 2...................................................................................................................................7
a. Explanation of the protocol and role of network analyzer...........................................7
b. Analysis of the currently available tool.......................................................................8
i. Benefits, Associated Cost and Ease of Usability......................................................8
ii. Recommendation.....................................................................................................9
Conclusion.........................................................................................................................10
Bibliography......................................................................................................................11
TCP/IP NETWORKING
Table of Contents
Introduction..........................................................................................................................2
Task 1...................................................................................................................................2
a. Detailed Design of Addressing Solution......................................................................2
b. Explanation if the number of hosts increases..............................................................6
Task 2...................................................................................................................................7
a. Explanation of the protocol and role of network analyzer...........................................7
b. Analysis of the currently available tool.......................................................................8
i. Benefits, Associated Cost and Ease of Usability......................................................8
ii. Recommendation.....................................................................................................9
Conclusion.........................................................................................................................10
Bibliography......................................................................................................................11

2
TCP/IP NETWORKING
Introduction
The report is prepared for creation of a detailed design solution for the M2M solution and
accommodate its future growth. The network solution is prepared after analyzing the requirement
of the organization and subnets are used for minimizing the wastage of the IP address and
increase the efficiency of the network. The condition if the hosts per network increases are
discussed in the report and the solution is also proposed for mitigation of the risk. The benefits of
the application of the network protocol analyzer in the proposed network is discussed with
examples. The cost of installation and maintenance of the network protocol analyzer in the
network is given and the usability of the devices are also discussed for providing benefit top the
network. Some recommendation are added in the report for implementation of the tool or the
software program and the benefit that the organization can gain and reduce the risk of intruder
attack.
Task 1
a. Detailed Design of Addressing Solution
The design of the M2M network is created by analyzing the requirement of the
organization and the private IP address used for accommodation of the hosts connected in the
network.
TCP/IP NETWORKING
Introduction
The report is prepared for creation of a detailed design solution for the M2M solution and
accommodate its future growth. The network solution is prepared after analyzing the requirement
of the organization and subnets are used for minimizing the wastage of the IP address and
increase the efficiency of the network. The condition if the hosts per network increases are
discussed in the report and the solution is also proposed for mitigation of the risk. The benefits of
the application of the network protocol analyzer in the proposed network is discussed with
examples. The cost of installation and maintenance of the network protocol analyzer in the
network is given and the usability of the devices are also discussed for providing benefit top the
network. Some recommendation are added in the report for implementation of the tool or the
software program and the benefit that the organization can gain and reduce the risk of intruder
attack.
Task 1
a. Detailed Design of Addressing Solution
The design of the M2M network is created by analyzing the requirement of the
organization and the private IP address used for accommodation of the hosts connected in the
network.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
TCP/IP NETWORKING
Figure 1: Detailed Network Diagram of the proposed network
(Source: Created by author)
The above network diagram is created for connecting the six buildings in the network and
accommodate the expected growth of the network with 1200 workstation for all the offices. A
subnet is created for each of the building and the router is required to be configured with the
subnet. The VLSM technology is used for the calculation of network address and the subnet
mask and minimize the IP address wastage. The details of the assignable of the IP address and
the subnet mask for the accommodation of the host is shown in the table below:
Major Network: 10.0.0.0/21
Available IP addresses in major network: 2046
Number of IP addresses needed: 1130
Available IP addresses in allocated subnets: 2036
TCP/IP NETWORKING
Figure 1: Detailed Network Diagram of the proposed network
(Source: Created by author)
The above network diagram is created for connecting the six buildings in the network and
accommodate the expected growth of the network with 1200 workstation for all the offices. A
subnet is created for each of the building and the router is required to be configured with the
subnet. The VLSM technology is used for the calculation of network address and the subnet
mask and minimize the IP address wastage. The details of the assignable of the IP address and
the subnet mask for the accommodation of the host is shown in the table below:
Major Network: 10.0.0.0/21
Available IP addresses in major network: 2046
Number of IP addresses needed: 1130
Available IP addresses in allocated subnets: 2036
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
TCP/IP NETWORKING
About 100% of available major network address space is used
About 56% of subnetted network address space is used
Subnet
Name
Neede
d Size
Allocate
d Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadca
st
Finance
Office
260 510 10.0.4.0 /23 255.255.254.0 10.0.4.1 -
10.0.5.25
4
10.0.5.25
5
Transport
Office
130 254 10.0.6.0 /24 255.255.255.0 10.0.6.1 -
10.0.6.25
4
10.0.6.25
5
Research
Office
120 126 10.0.7.0 /25 255.255.255.1
28
10.0.7.1 -
10.0.7.12
6
10.0.7.12
7
Sales
Office
40 62 10.0.7.19
2
/26 255.255.255.1
92
10.0.7.19
3 -
10.0.7.25
4
10.0.7.25
5
Informatio
n
technology
520 1022 10.0.0.0 /22 255.255.252.0 10.0.0.1 -
10.0.3.25
4
10.0.3.25
5
Head 60 62 10.0.7.12 /26 255.255.255.1 10.0.7.12 10.0.7.19
TCP/IP NETWORKING
About 100% of available major network address space is used
About 56% of subnetted network address space is used
Subnet
Name
Neede
d Size
Allocate
d Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadca
st
Finance
Office
260 510 10.0.4.0 /23 255.255.254.0 10.0.4.1 -
10.0.5.25
4
10.0.5.25
5
Transport
Office
130 254 10.0.6.0 /24 255.255.255.0 10.0.6.1 -
10.0.6.25
4
10.0.6.25
5
Research
Office
120 126 10.0.7.0 /25 255.255.255.1
28
10.0.7.1 -
10.0.7.12
6
10.0.7.12
7
Sales
Office
40 62 10.0.7.19
2
/26 255.255.255.1
92
10.0.7.19
3 -
10.0.7.25
4
10.0.7.25
5
Informatio
n
technology
520 1022 10.0.0.0 /22 255.255.252.0 10.0.0.1 -
10.0.3.25
4
10.0.3.25
5
Head 60 62 10.0.7.12 /26 255.255.255.1 10.0.7.12 10.0.7.19

5
TCP/IP NETWORKING
Office 8 92 9 -
10.0.7.19
0
1
The risk associated with the development of the network solution and alleviation
procedure is additionally accommodated expanding the proficiency of the proposed arrange
outline. The answer for meeting the present prerequisite of the association is made for the
convenience without bounds development of the association (Clavel et al., 2015). A switch is
required to be introduced in each of the building and for interfacing the hubs and workstation in
the system. The switch is required to be made with the figured subnet veil and the IP address for
interconnecting with the system. Six diverse subnet is made for the private IP address and the
hubs associated in the system is required to be designed with a static IP address. This
authoritative dangers can be decreases with the usage of the static IP tending to plot and the hubs
can be observed for any suspicious exercises performed by any of the representatives (Lin et al.,
2013). As the part of a Solution Architect the adjustment in the current hierarchical system
required to be made by investigating the system segments. The hazard related with the
improvement of the new system arrangement is likewise dissected for the advancement of the
system and count of the subnet check for each of the six structures and workplaces.
The execution of the protocol analyzer is required to breaking down the information
bundles and capturing the log activity in the system. The system issues can be broke down and
the abuse of the system can be identified effortlessly (Hoque et al., 2014). The tending to
arrangement of the system is made for each of the six structures with more number of hubs
designated than the required hub such the system is adaptable to include new has in the system in
TCP/IP NETWORKING
Office 8 92 9 -
10.0.7.19
0
1
The risk associated with the development of the network solution and alleviation
procedure is additionally accommodated expanding the proficiency of the proposed arrange
outline. The answer for meeting the present prerequisite of the association is made for the
convenience without bounds development of the association (Clavel et al., 2015). A switch is
required to be introduced in each of the building and for interfacing the hubs and workstation in
the system. The switch is required to be made with the figured subnet veil and the IP address for
interconnecting with the system. Six diverse subnet is made for the private IP address and the
hubs associated in the system is required to be designed with a static IP address. This
authoritative dangers can be decreases with the usage of the static IP tending to plot and the hubs
can be observed for any suspicious exercises performed by any of the representatives (Lin et al.,
2013). As the part of a Solution Architect the adjustment in the current hierarchical system
required to be made by investigating the system segments. The hazard related with the
improvement of the new system arrangement is likewise dissected for the advancement of the
system and count of the subnet check for each of the six structures and workplaces.
The execution of the protocol analyzer is required to breaking down the information
bundles and capturing the log activity in the system. The system issues can be broke down and
the abuse of the system can be identified effortlessly (Hoque et al., 2014). The tending to
arrangement of the system is made for each of the six structures with more number of hubs
designated than the required hub such the system is adaptable to include new has in the system in
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
TCP/IP NETWORKING
future. The making of the tending to arrangement and documentation helps in simple
administration of the system and control organize arrangement.
b. Explanation if the number of hosts increases
If a case arise that there is a sudden increase in the number of hosts and the hosts per
network jumps to 1024 then traffic broadcasting issues may arise in the network. For the subnet
255.255.252.0 maximum 1022 hosts can be accommodated and it exceeds the range and there
would be a requirement to redesign the addressing solution. The static IP address allocated to the
hubs and the workstations are likewise required to be changed for reception of the adjustment in
the system. The making of the different subnets separates each of the building and direct access
of the assets can be limited and the security of the system can be expanded. IP deliver bits is
required to be kept for possible later use for the future development of the association and a
tending to plot is required to be made for the improvement of the system. The host equation is
utilized for the estimation of the subnet veil. The use of the subnet address 255.255.248.0
increases accommodation of the hosts to 2046 and thus 1022 IP address would be left unused and
would decrease the efficiency of the network. A new addressing solution is calculated for the
accommodation of the 1024 hosts using the CIDR notation for minimizing the wastage of the IP
address.
Head Office 10.0.20.0 /22 255.255.252.0 10.0.20.1 - 10.0.23.254
Finance Office 10.0.0.0 /22 255.255.252.0 10.0.0.1 - 10.0.3.254
Transport Office 10.0.4.0 /22 255.255.252.0 10.0.4.1 - 10.0.7.254
Research Office 10.0.8.0 /22 255.255.252.0 10.0.8.1 - 10.0.11.254
Sales Office 10.0.12.0 /22 255.255.252.0 10.0.12.1 - 10.0.15.254
Information Technology 10.0.16.0 /22 255.255.252.0 10.0.16.1 - 10.0.19.254
TCP/IP NETWORKING
future. The making of the tending to arrangement and documentation helps in simple
administration of the system and control organize arrangement.
b. Explanation if the number of hosts increases
If a case arise that there is a sudden increase in the number of hosts and the hosts per
network jumps to 1024 then traffic broadcasting issues may arise in the network. For the subnet
255.255.252.0 maximum 1022 hosts can be accommodated and it exceeds the range and there
would be a requirement to redesign the addressing solution. The static IP address allocated to the
hubs and the workstations are likewise required to be changed for reception of the adjustment in
the system. The making of the different subnets separates each of the building and direct access
of the assets can be limited and the security of the system can be expanded. IP deliver bits is
required to be kept for possible later use for the future development of the association and a
tending to plot is required to be made for the improvement of the system. The host equation is
utilized for the estimation of the subnet veil. The use of the subnet address 255.255.248.0
increases accommodation of the hosts to 2046 and thus 1022 IP address would be left unused and
would decrease the efficiency of the network. A new addressing solution is calculated for the
accommodation of the 1024 hosts using the CIDR notation for minimizing the wastage of the IP
address.
Head Office 10.0.20.0 /22 255.255.252.0 10.0.20.1 - 10.0.23.254
Finance Office 10.0.0.0 /22 255.255.252.0 10.0.0.1 - 10.0.3.254
Transport Office 10.0.4.0 /22 255.255.252.0 10.0.4.1 - 10.0.7.254
Research Office 10.0.8.0 /22 255.255.252.0 10.0.8.1 - 10.0.11.254
Sales Office 10.0.12.0 /22 255.255.252.0 10.0.12.1 - 10.0.15.254
Information Technology 10.0.16.0 /22 255.255.252.0 10.0.16.1 - 10.0.19.254
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
TCP/IP NETWORKING
Task 2
a. Explanation of the protocol and role of network analyzer
The protocol analyzer is characterized utilizing the semantics, guidelines and
synchronization for finding the mistake recuperation techniques. The system conventions are
organized for controlling the common information and distinctive equipment and programming
can be utilized for the discovery of the transmission course, mistake and address mapping in the
system (Kagan, 2017). The loss of data, retries and timeouts can be recognized utilizing the
system correspondence conventions. The arrangement control is likewise essential for dissecting
the lost parcels and requesting the retransmission of the information bundles in the system. A
control in the stream of the information is required to be connected for expanding the
effectiveness of the system.
A private address 10.0.0.0 /22 is utilized by the association for interfacing the six
structures. Current conventions are utilized for systems administration and system parcel
exchanging innovation is utilized for the dissecting the sent and the get message as information
bundles. There are distinctive levels of conventions that can be utilized for correspondence, for
example, abnormal state and low level (Kriger, Behardien & Retonda-Modiya, 2013). The case
of the conventions comprises of the TCP, UDP, ICMP, FTP, HTTP, SSH, and so forth. The
engineering of the directing conventions are required to be intended for recognizable proof of the
switches associated in the system and the way of correspondence of the information is required
to be distinguished for the improvement of the system design (Jing et al., 2015). The switches are
required to be arranged with OSPF, BGP, EIGRP for transferring data packets with the routers
associated in the other building.
TCP/IP NETWORKING
Task 2
a. Explanation of the protocol and role of network analyzer
The protocol analyzer is characterized utilizing the semantics, guidelines and
synchronization for finding the mistake recuperation techniques. The system conventions are
organized for controlling the common information and distinctive equipment and programming
can be utilized for the discovery of the transmission course, mistake and address mapping in the
system (Kagan, 2017). The loss of data, retries and timeouts can be recognized utilizing the
system correspondence conventions. The arrangement control is likewise essential for dissecting
the lost parcels and requesting the retransmission of the information bundles in the system. A
control in the stream of the information is required to be connected for expanding the
effectiveness of the system.
A private address 10.0.0.0 /22 is utilized by the association for interfacing the six
structures. Current conventions are utilized for systems administration and system parcel
exchanging innovation is utilized for the dissecting the sent and the get message as information
bundles. There are distinctive levels of conventions that can be utilized for correspondence, for
example, abnormal state and low level (Kriger, Behardien & Retonda-Modiya, 2013). The case
of the conventions comprises of the TCP, UDP, ICMP, FTP, HTTP, SSH, and so forth. The
engineering of the directing conventions are required to be intended for recognizable proof of the
switches associated in the system and the way of correspondence of the information is required
to be distinguished for the improvement of the system design (Jing et al., 2015). The switches are
required to be arranged with OSPF, BGP, EIGRP for transferring data packets with the routers
associated in the other building.

8
TCP/IP NETWORKING
b. Analysis of the currently available tool
i. Benefits, Associated Cost and Ease of Usability
Benefits- The protocol analyzer can be hardware or software programs used for analyzing
the data flow of a network and the traffic generated from the source and the destination address.
The usage of the equipment ZVA40 helps in breaking down the execution of the system and
measuring the RF switch, links, couplers, speakers and radio wires utilized as a part of the
system (Dianu, Riihijarvi & Petrova, 2014). It is critical to screen the above gadgets for
expanding the productivity of the system and recognize the blunder between the source and the
goal. A product program like Wire shark can likewise be utilized for the dissecting the system
conventions and recognize the wellspring of era of the movement. The flow of data packets in
the system can be caught for disconnected investigation and live examination on the system and
it should likewise be possible utilizing the wire shark (Vasilakos, Zhang & Spyropoulos, 2016).
The bundle separating alternative makes it more proficient and enhances the productivity of the
system monitoring.
Associated cost
Hardware Network Device Cost
SL
No.
Product Cost Man Power
1 ENA vector Network Analyzer 9Hz to 20 GHz $ 14,500.00 3
2 Wireshark Free 4
Total $ 14,500.00 7
Maintenance and Installation budget for ENA Vector Network Analyzer
SL No. Proficiency Cost
1 Network Design $450.00
2 Network Installation $350.00
3 Technical Staffs $250.00
4 Maintenance Staffs $250.00
5 Network Administrator $350.00
TCP/IP NETWORKING
b. Analysis of the currently available tool
i. Benefits, Associated Cost and Ease of Usability
Benefits- The protocol analyzer can be hardware or software programs used for analyzing
the data flow of a network and the traffic generated from the source and the destination address.
The usage of the equipment ZVA40 helps in breaking down the execution of the system and
measuring the RF switch, links, couplers, speakers and radio wires utilized as a part of the
system (Dianu, Riihijarvi & Petrova, 2014). It is critical to screen the above gadgets for
expanding the productivity of the system and recognize the blunder between the source and the
goal. A product program like Wire shark can likewise be utilized for the dissecting the system
conventions and recognize the wellspring of era of the movement. The flow of data packets in
the system can be caught for disconnected investigation and live examination on the system and
it should likewise be possible utilizing the wire shark (Vasilakos, Zhang & Spyropoulos, 2016).
The bundle separating alternative makes it more proficient and enhances the productivity of the
system monitoring.
Associated cost
Hardware Network Device Cost
SL
No.
Product Cost Man Power
1 ENA vector Network Analyzer 9Hz to 20 GHz $ 14,500.00 3
2 Wireshark Free 4
Total $ 14,500.00 7
Maintenance and Installation budget for ENA Vector Network Analyzer
SL No. Proficiency Cost
1 Network Design $450.00
2 Network Installation $350.00
3 Technical Staffs $250.00
4 Maintenance Staffs $250.00
5 Network Administrator $350.00
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
TCP/IP NETWORKING
6 Hardware maintenance staffs $700.00
Total $2,350.00
Maintenance cost of Wireshark
SL No. Proficiency Cost
1 Finance office building administration $175.00
2 Transport office building administration $175.00
3 Research office building administration $175.00
4 Sales office building administration $175.00
5 Information Technology office building administration $175.00
6 Head office building administration $175.00
Total $1050.00
Grand Total Cost $17,900.00
Usability- The hardware device connected in the network is required to be secured from
unauthroised access and increase the security of the network solution. The operating frequency is
required to be set for increasing the flexibility of the system and reduce the number of errors
generated from the network.
ii. Recommendation
For the application of the network analysis tool it is recommended that the router and the
firewalls in the network is required to be configured properly. It is suggested for expanding the
security of the system and diminishing the quantity of mistakes produced amid the transmission
of information packet in the network. The utilization of programming for investigating the
system required specialized knowledge and skill in the network analyzer ought to have great
assessment ability for examining the system. The protocol analyzer is required to be deployed in
the network for maintaining the security of the network and analyze the vulnerability of the
system.
TCP/IP NETWORKING
6 Hardware maintenance staffs $700.00
Total $2,350.00
Maintenance cost of Wireshark
SL No. Proficiency Cost
1 Finance office building administration $175.00
2 Transport office building administration $175.00
3 Research office building administration $175.00
4 Sales office building administration $175.00
5 Information Technology office building administration $175.00
6 Head office building administration $175.00
Total $1050.00
Grand Total Cost $17,900.00
Usability- The hardware device connected in the network is required to be secured from
unauthroised access and increase the security of the network solution. The operating frequency is
required to be set for increasing the flexibility of the system and reduce the number of errors
generated from the network.
ii. Recommendation
For the application of the network analysis tool it is recommended that the router and the
firewalls in the network is required to be configured properly. It is suggested for expanding the
security of the system and diminishing the quantity of mistakes produced amid the transmission
of information packet in the network. The utilization of programming for investigating the
system required specialized knowledge and skill in the network analyzer ought to have great
assessment ability for examining the system. The protocol analyzer is required to be deployed in
the network for maintaining the security of the network and analyze the vulnerability of the
system.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
TCP/IP NETWORKING
Conclusion
From the above solution it can be concluded that for the development of the network
solution for the M2M solution the requirement of the organization is analyzed. A network
diagram is developed and with the accommodation of the hosts. The maintenance cost of the
network, benefits for the application of the network protocol analyzer and usability is analyzed
for recommending the implementation of the network protocol. Two types of tool are discussed
and the report is prepared for covering all the necessary point for the deployment of the network
design of the M2M solution.
TCP/IP NETWORKING
Conclusion
From the above solution it can be concluded that for the development of the network
solution for the M2M solution the requirement of the organization is analyzed. A network
diagram is developed and with the accommodation of the hosts. The maintenance cost of the
network, benefits for the application of the network protocol analyzer and usability is analyzed
for recommending the implementation of the network protocol. Two types of tool are discussed
and the report is prepared for covering all the necessary point for the deployment of the network
design of the M2M solution.

11
TCP/IP NETWORKING
Bibliography
Clavel, F., Savary, E., Angays, P., & Vieux-Melchior, A. (2015). Integration of a new standard:
A network simulator of IEC 61850 architectures for electrical substations. IEEE Industry
Applications Magazine, 21(1), 41-48.
Dianu, M. D., Riihijarvi, J., & Petrova, M. (2014, June). Measurement-Based Study of the
Performance of IEEE 802.11 ac in an Indoor Environment. In Communications (ICC),
2014 IEEE International Conference on (pp. 5771-5776). IEEE.
Edwards, J., & Bramante, R. (2015). Networking self-teaching guide: OSI, TCP/IP, LANs,
MANs, WANs, implementation, management, and maintenance. John Wiley & Sons.
Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., & Kalita, J. K. (2014).
Network attacks: Taxonomy, tools and systems. Journal of Network and Computer
Applications, 40, 307-324.
Islam, N. N., & Zareen, F. (2014). Comparison analysis of wireless network audits using open
source tools (Doctoral dissertation, BRAC University).
Jing, R., Zhang, C., Zhao, Y., Ma, Y., Li, J., Huo, X., ... & Fu, S. (2015, March). Experimental
demonstration of hierarchical control over multi-domain OTN networks based on
extended OpenFlow protocol. In Optical Fiber Communication Conference (pp. W4J-4).
Optical Society of America.
Jyothi, V., Addepalli, S. K., & Karri, R. (2015, October). Deep packet field extraction engine
(DPFEE): A pre-processor for network intrusion detection and denial-of-service detection
TCP/IP NETWORKING
Bibliography
Clavel, F., Savary, E., Angays, P., & Vieux-Melchior, A. (2015). Integration of a new standard:
A network simulator of IEC 61850 architectures for electrical substations. IEEE Industry
Applications Magazine, 21(1), 41-48.
Dianu, M. D., Riihijarvi, J., & Petrova, M. (2014, June). Measurement-Based Study of the
Performance of IEEE 802.11 ac in an Indoor Environment. In Communications (ICC),
2014 IEEE International Conference on (pp. 5771-5776). IEEE.
Edwards, J., & Bramante, R. (2015). Networking self-teaching guide: OSI, TCP/IP, LANs,
MANs, WANs, implementation, management, and maintenance. John Wiley & Sons.
Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., & Kalita, J. K. (2014).
Network attacks: Taxonomy, tools and systems. Journal of Network and Computer
Applications, 40, 307-324.
Islam, N. N., & Zareen, F. (2014). Comparison analysis of wireless network audits using open
source tools (Doctoral dissertation, BRAC University).
Jing, R., Zhang, C., Zhao, Y., Ma, Y., Li, J., Huo, X., ... & Fu, S. (2015, March). Experimental
demonstration of hierarchical control over multi-domain OTN networks based on
extended OpenFlow protocol. In Optical Fiber Communication Conference (pp. W4J-4).
Optical Society of America.
Jyothi, V., Addepalli, S. K., & Karri, R. (2015, October). Deep packet field extraction engine
(DPFEE): A pre-processor for network intrusion detection and denial-of-service detection
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

12
TCP/IP NETWORKING
systems. In Computer Design (ICCD), 2015 33rd IEEE International Conference on (pp.
266-272). IEEE.
Kagan, A. (2017). U.S. Patent No. 9,696,180. Washington, DC: U.S. Patent and Trademark
Office.
Kriger, C., Behardien, S., & Retonda-Modiya, J. C. (2013). A detailed analysis of the GOOSE
message structure in an IEC 61850 standard-based substation automation system.
International Journal of Computers Communications & Control, 8(5), 708-721.
Lin, H., Slagell, A., Di Martino, C., Kalbarczyk, Z., & Iyer, R. K. (2013, January). Adapting bro
into scada: building a specification-based intrusion detection system for the dnp3
protocol. In Proceedings of the Eighth Annual Cyber Security and Information
Intelligence Research Workshop (p. 5). ACM.
Montero, Á. M., & Manzano, D. R. (2017). Design and Deployment of Hands-on Network Lab
Experiments for Computer Science Engineers. International Journal of Engineering
Education (IJEE).
Mulder, J., Schwartz, M. D., Berg, M., Van Houten, J. R., Urrea, J. M., King, M. A., ... & Jacob,
J. (2015). U.S. Patent No. 9,032,522. Washington, DC: U.S. Patent and Trademark
Office.
Mulfari, D., Celesti, A., Villari, M., & Puliafito, A. (2014, February). Using virtualization and
noVNC to support assistive technology in cloud computing. In Network Cloud
Computing and Applications (NCCA), 2014 IEEE 3rd Symposium on (pp. 125-132).
IEEE.
TCP/IP NETWORKING
systems. In Computer Design (ICCD), 2015 33rd IEEE International Conference on (pp.
266-272). IEEE.
Kagan, A. (2017). U.S. Patent No. 9,696,180. Washington, DC: U.S. Patent and Trademark
Office.
Kriger, C., Behardien, S., & Retonda-Modiya, J. C. (2013). A detailed analysis of the GOOSE
message structure in an IEC 61850 standard-based substation automation system.
International Journal of Computers Communications & Control, 8(5), 708-721.
Lin, H., Slagell, A., Di Martino, C., Kalbarczyk, Z., & Iyer, R. K. (2013, January). Adapting bro
into scada: building a specification-based intrusion detection system for the dnp3
protocol. In Proceedings of the Eighth Annual Cyber Security and Information
Intelligence Research Workshop (p. 5). ACM.
Montero, Á. M., & Manzano, D. R. (2017). Design and Deployment of Hands-on Network Lab
Experiments for Computer Science Engineers. International Journal of Engineering
Education (IJEE).
Mulder, J., Schwartz, M. D., Berg, M., Van Houten, J. R., Urrea, J. M., King, M. A., ... & Jacob,
J. (2015). U.S. Patent No. 9,032,522. Washington, DC: U.S. Patent and Trademark
Office.
Mulfari, D., Celesti, A., Villari, M., & Puliafito, A. (2014, February). Using virtualization and
noVNC to support assistive technology in cloud computing. In Network Cloud
Computing and Applications (NCCA), 2014 IEEE 3rd Symposium on (pp. 125-132).
IEEE.
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.