TCP/IP Networking Report: Addressing Solution, Protocols, and Analysis

Verified

Added on  2020/03/01

|12
|2486
|406
Report
AI Summary
This report presents a comprehensive analysis of TCP/IP networking, focusing on the design and implementation of a simple addressing solution for a multi-site organization. It details the creation of subnets using Variable Length Subnet Masking (VLSM) to accommodate a large number of workstations across six buildings, ensuring efficient IP address utilization. The report also addresses the implications of increasing the number of hosts per network, necessitating subnet recalculation and potential supernetting. Furthermore, it explores various network communication protocols, discussing their roles in data transmission and error handling. The document includes an evaluation of network analyzer tools, such as ENA vector Network Analyzer and Wireshark, examining their benefits, associated costs, and ease of use, culminating in a recommendation for the most suitable tool for network analysis and security. The report emphasizes the importance of static IP addressing and network monitoring to mitigate potential security threats.
Document Page
Running head: TCP/IP NETWORKING
TCP / IP Networking
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
TCP/IP NETWORKING
Table of Contents
Task 1...................................................................................................................................2
a. Detailed Design of the Simple Addressing Solution...................................................2
b. Increase in the number of hosts...................................................................................6
Task 2...................................................................................................................................7
a. Network Communication Protocols-...........................................................................7
b. Analysis of the currently available network analyzer tools.........................................8
References..........................................................................................................................11
Document Page
2
TCP/IP NETWORKING
Task 1
a. Detailed Design of the Simple Addressing Solution
The network design for the six sites created for M2M solution is created after analyzing
the requirement of the organization. The organization needs to accommodate the current
departments across the six buildings with different subnets for each of the buildings. Each of the
sites or the office is required to accommodate 1200 workstations and using the private IP address
10.0.0.0. The detailed design of the network solution is created by analyzing the number of
workstations required for each of the office and calculating the subnet and range of IP address
required to be assigned to each of the nodes connected in the network (Goralski, 2017). The
variable length subnet masking is used for calculation of the range of IP address and minimizing
the wastage of the IP address. The step of the work out is provided in the report such it is easy
for the network administrator to configure the router with the range of the IP address.
Document Page
3
TCP/IP NETWORKING
Figure 1: Proposed Network Diagram for M2M Solutions
(Source: Created by author)
The different risk associated with the network are also discussed and mitigation strategy
is also provided for increasing the efficiency of the proposed network design. The solution for
meeting the current requirement of the organization is created for the accommodation of the
future growth of the organization. A router is required to be installed in each of the building and
for connecting the nodes and workstation in the network (Vasilakos, Zhang & Spyropoulos,
2016). The router is required to be created with the calculated subnet mask and the IP address for
interconnecting with the network. Six different subnet is created for the private IP address and
the nodes connected in the network is required to be configured with a static IP address. This
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
TCP/IP NETWORKING
organizational threats can be reduces with the implementation of the static IP addressing scheme
and the nodes can be monitored for any suspicious activities performed by any of the employees.
As the role of a Solution Architect the change in the current organizational network required to
be made by analyzing the network components (Kulkarni & Agrawal, 2014). The risk associated
with the development of the new network solution is also analyzed for the development of the
network and calculation of the subnet mark for each of the six buildings and offices.
Simple Addressing Solution
The addressing solution is created for the accommodation of the number of hosts and the
router and the other networking device is required to be configured according to the addressing
scheme for proper working of the devices. The subnets are created for minimizing the wastage of
the IP address and increasing the efficiency of the network.
Major Network: 10.0.0.0/21
Available IP addresses in major network: 2046
Number of IP addresses needed: 1130
Available IP addresses in allocated subnets: 2036
About 100% of available major network address space is used
About 56% of subnetted network address space is used
Subnet
Name
Neede
d Size
Allocate
d Size
Address Mas
k
Dec Mask Assignabl
e Range
Broadca
st
Finance
Office
260 510 10.0.4.0 /23 255.255.254.0 10.0.4.1 -
10.0.5.25
10.0.5.25
Document Page
5
TCP/IP NETWORKING
4 5
Transport
Office
130 254 10.0.6.0 /24 255.255.255.0 10.0.6.1 -
10.0.6.25
4
10.0.6.25
5
Research
Office
120 126 10.0.7.0 /25 255.255.255.1
28
10.0.7.1 -
10.0.7.12
6
10.0.7.12
7
Sales
Office
40 62 10.0.7.19
2
/26 255.255.255.1
92
10.0.7.19
3 -
10.0.7.25
4
10.0.7.25
5
Informatio
n
Technolog
y
520 1022 10.0.0.0 /22 255.255.252.0 10.0.0.1 -
10.0.3.25
4
10.0.3.25
5
Head
Office
60 62 10.0.7.12
8
/26 255.255.255.1
92
10.0.7.12
9 -
10.0.7.19
0
10.0.7.19
1
The implementation of the network protocol analyzer is required to be analyzing the data
packets and intercepting the log traffic in the network. The network problems can be analyzed
and the misuse of the network can be detected easily. The addressing solution of the network is
Document Page
6
TCP/IP NETWORKING
created for each of the six buildings with more number of nodes allocated than the required node
such the network is flexible to add new hosts in the network in future (Shang et al., 2016). The
creation of the addressing solution and documentation helps in easy management of the network
and administer network solution.
b. Increase in the number of hosts
If the number of hosts per network increases to 1,024 per office building the subnets is
required to be calculated again and super netting is required to be applied for accommodation of
the hosts in the organizational network. The subnets are required to be re calculated and the
routers are required to be reconfigured for the accommodation of the additional hosts in the
network. The static IP address assigned to the nodes and the workstations are also required to be
changed for adoption of the change in the network (Zhang et al., 2014). The implementation of
the classless routing and VLSM with CIDR notation is required to be used for the calculation of
the subnet mask address. The creation of the multiple subnets isolates each of the building and
direct access of the resources can be restricted and the security of the network can be increased.
IP address bits is required to be kept in reserve for the future growth of the organization and an
addressing scheme is required to be created for the development of the network. The host
formula is used for the calculation of the subnet mask.
The calculation of the subnet mask address for accommodating the 1024 number of hosts
per network is demonstrated below:
ï‚· Finance Office 10.0.0.0 /22 255.255.252.0 10.0.0.1 - 10.0.3.254
ï‚· Transport Office 10.0.4.0 /22 255.255.252.0 10.0.4.1 - 10.0.7.254
ï‚· Research Office 10.0.8.0 /22 255.255.252.0 10.0.8.1 - 10.0.11.254
ï‚· Sales Office 10.0.12.0 /22 255.255.252.0 10.0.12.1 - 10.0.15.254
ï‚· Information Technology 10.0.16.0 /22 255.255.252.0 10.0.16.1 - 10.0.19.254
ï‚· Head Office 10.0.20.0 /22 255.255.252.0 10.0.20.1 - 10.0.23.254
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
TCP/IP NETWORKING
Task 2
a. Network Communication Protocols-
The network protocol can be used for defining a set of network rules and use a network
communication channel for transmission of the data packets. The organization M2M solution
currently have 1200 hosts connected in the six sites. The network communication protocols is
defined using the semantics, rules and synchronization for finding the error recovery methods
(Zseby et al., 2016). The network protocols are arranged for the manipulation of the shared data
and different hardware and software can be used for the detection of the transmission route, error
and address mapping in the network (Severance, 2013). The loss of information, retries and
timeouts can be identified using the network communication protocols. The sequence control is
also important for analyzing the lost packets and asking for the retransmission of the data packets
in the network. A control in the flow of the data is required to be applied for increasing the
efficiency of the network.
A private address 10.0.0.0 is used by the organization for connecting the six buildings.
Modern protocols are used for networking and network packet switching technology is used for
the analyzing the sent and the receive message in the form of data packets. There are different
levels of protocols that can be used for communication such as high level and low level. The
example of the protocols consists of the TCP, UDP, ICMP, FTP, HTTP, SSH, etc (Yasukata et
al., 2016). The architecture of the routing protocols are required to be designed for identification
of the routers connected in the network and the path of communication of the data is required to
be identified for the development of the network architecture. The routers are required to be
configured with OSPF, BGP, EIGRP for communicating with the nodes connected in the other
building. After a successful configuration of the network the network analyzer is used for
Document Page
8
TCP/IP NETWORKING
measuring the performance of the network (Clavel et al., 2015). The vulnerability of the network
is required to be analyzed as there are several number of hosts connected across the six building
and the network analysis tool helps to analyze the vulnerability.
b. Analysis of the currently available network analyzer tools
i. Benefits- The network analyzer can a set of hardware of software programs used for
analyzing the network packets and traffics. The implementation of the hardware ZVA40 helps in
analyzing the performance of the network and measuring the RF switch, cables, couplers,
amplifiers and antennas used in the network (Edwards & Bramante, 2015). It is important to
monitor the above devices for increasing the efficiency of the network and identify the error
between the source and the destination. A software program like Wire shark can also be used for
the analyzing the network protocols and identify the source of generation of the traffic (Sidler et
al., 2015). The data packets flowing in the network can be captured for offline analysis and live
analysis on the network can also be done using the wire shark. The packet filtering option makes
it more efficient and improves the efficiency of the network monitoring.
Associated Cost-
The cost associated with the development of the network is analysed for the
implementation of the protocol analyzer and listed in the following tables.
Network Device Cost
SL
No.
Product Cost Man Power
1 ENA vector Network Analyzer 5Hz to 20 GHz $ 15,000.00 5
2 Wireshark Free 4
Total $ 15,000.00 9
Document Page
9
TCP/IP NETWORKING
Installation and maintenance cost of ENA
SL No. Proficiency Cost
1 Installation of Network $350.00
2 Technical Staffs $250.00
3 Network Device Monitor $220.00
4 Maintenance Staffs $150.00
5 Network Administrator $500.00
6 Hardware maintenance staffs $800.00
Total $2,270.00
Maintenance cost of the software used
SL No. Proficiency Cost
1 Finance office building administration $180.00
2 Transport office building administration $180.00
3 Research office building administration $180.00
4 Sales office building administration $180.00
5 Information Technology office building administration $180.00
6 Head office building administration $180.00
Total $1080.00
Grand Total Cost $18,350.00
Ease of Usability-
The hardware devices are easy to use and it required less technical knowledge in network
administration. It can be used for offline analysis but the use of the wireshark software
installation helps in the analysis of the data packets in the network and identification of the errors
generated in the network (Shojafar et al., 2015). Technical skill and knowledge is required for
the analysis of the network using wireshark and it can be used for capturing the packets and
analyze the network later.
ii. Recommendation for the tool required to be used for network analysis
It is recommended that the implementation of the hardware device for analyzing the
network is recommended for increasing the security of the network and reducing the number of
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
TCP/IP NETWORKING
errors generated during the transmission of data packets in the network. The use of software for
analyzing the network required technical expert and they should have good inspection capability
for analyzing the network. The hardware device is easy to manage and the maintenance cost of
the device is less when compared with the software protocol analyzer.
Document Page
11
TCP/IP NETWORKING
References
Clavel, F., Savary, E., Angays, P., & Vieux-Melchior, A. (2015). Integration of a new standard:
A network simulator of IEC 61850 architectures for electrical substations. IEEE Industry
Applications Magazine, 21(1), 41-48.
Edwards, J., & Bramante, R. (2015). Networking self-teaching guide: OSI, TCP/IP, LANs,
MANs, WANs, implementation, management, and maintenance. John Wiley & Sons.
Goralski, W. (2017). The Illustrated network: How TCP/IP works in a modern network. Morgan
Kaufmann.
Kulkarni, S., & Agrawal, P. (2014). Introduction. In Analysis of TCP Performance in Data
Center Networks (pp. 1-15). Springer New York.
Severance, C. (2013). Van Jacobson: content-centric networking. Computer, 46(1), 11-13.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP
architecture. NDN Project, Tech. Rep. NDN-0038.
Shojafar, M., Cordeschi, N., Abawajy, J. H., & Baccarelli, E. (2015, December). Adaptive
energy-efficient qos-aware scheduling algorithm for tcp/ip mobile cloud. In Globecom
Workshops (GC Wkshps), 2015 IEEE (pp. 1-6). IEEE.
Sidler, D., Alonso, G., Blott, M., Karras, K., Vissers, K., & Carley, R. (2015, May). Scalable
10Gbps TCP/IP stack architecture for reconfigurable hardware. In Field-Programmable
Custom Computing Machines (FCCM), 2015 IEEE 23rd Annual International
Symposium on (pp. 36-43). IEEE.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]