The M2M network requires an address scheme where it is using IP address named as 10.0.0.0 to come up with the subnets IP addresses.Below is the calculations involved in obtaining the address of the various office as follows:
1st Finance Office with 260 workstations
Calculations:
This department has a total of 260 workstations therefore requires a total of 260 hosts Ip addresses this can be calculated as below:
Hosts bits =2^k-2=260
2^k=260+2 ———> 2^k=262
This gives the Host bits as 9 bits .
Hence =8+8+8+8-9=23.
The network subnet mask is given in binary format as 11111111.11111111.11111110.00000000.
The network subnet mask is given in number format as i.e 255.255.254.000.
Therefore the Block size is given as 2^9=512.
Therefore the subnet IP address ranges from 10.0.0.0/23 to 10.0.0.511/23 with 260 workstations.
2nd Transport Office with 130 workstations
Calculations:
This department has a total of 130 workstations therefore requires a total of 130 hosts IP addresses this can be calculated as below:
Hosts bits =2^k-2=130
2^k=130+2 ———> 2^k=132
This gives the Host bits as 8 bits .
Hence =8+8+8+8-8=24.
The network subnet mask is given in binary format as 11111111.11111111.11111111.00000000
The network subnet mask is given in number format as i.e 255.255.255.000.
Therefore the Block size is given as 2^8=256
Therefore the subnet IP address ranges from 10.0.1.0/24 to 10.0.1.255/24 with 130 workstations.
3rd Research Office with 120 workstations
Calculations:
This department has a total of 120 workstations therefore requires a total of 120 hosts IP addresses this can be calculated as below:
Hosts bits =2^k-2=120
2^k=120+2 ———> 2^k=122
This gives the Host bits as 7 bits .
Hence =8+8+8+8-7=25.
The network subnet mask is given in binary format as 11111111.11111111.11111111.10000000
The network subnet mask is given in number format as i.e 255.255.255.128.
Therefore the Block size is given as 2^7=128
Therefore the subnet IP address ranges from 10.0.2.0/25 to 10.0.2.127/25 with 120 workstations.
4th Sales Office with 40 workstations
Calculations:
This department has a total of 40 workstations therefore requires a total of 40 hosts IP addresses this can be calculated as below:
Hosts bits =2^k-2=40
2^k=40+2 ———> 2^k=42
This gives the Host bits as 6 bits .
Hence =8+8+8+8-7=26.
The network subnet mask is given in binary format as 11111111.11111111.11111111.11000000 The network subnet mask is given in number format as i.e 255.255.255.192.
Therefore the Block size is given as 2^6=64
Therefore the subnet IP address ranges from 10.0.3.0/26 to 10.0.3.63/26 with 40 workstations.
5th Information technology with 520 workstations
Calculations:
This department has a total of 520 workstations therefore requires a total of 520 hosts IP addresses this can be calculated as below:
Hosts bits =2^k-2=520
2^k=520+2 ———> 2^k=522
This gives the Host bits as 10 bits .
Hence =8+8+8+8-10=22.
The network subnet mask is given in binary format as 11111111.11111111.11111100.00000000 The network subnet mask is given in number format as i.e 255.255.252.000.
Therefore the Block size is given as 2^10=1024
Therefore the subnet IP address ranges from 10.0.4.0/22 to 10.0.4.1023/22 with 520 workstations.
6th Head Office with 520 workstations
Calculations:
This department has a total of 60 workstations therefore requires a total of 60 hosts IP addresses this can be calculated as below:
Hosts bits =2^k-2=60
2^k=60+2 ———> 2^k=62
This gives the Host bits as 6 bits .
Hence =8+8+8+8-6=26.
The network subnet mask is given in binary format as 11111111.11111111.11111111.11000000 The network subnet mask is given in number format as i.e 255.255.252.192.
Therefore the Block size is given as 2^6=64.
Therefore the subnet IP address ranges from 10.0.5.0/26 to 10.0.5.64/26 with 60 workstations.
When the numbers of the host in each building rise beyond 1024 host these networks will not be able to host those devices in the network however to accommodate them one require to expand the ip hosts address by increasing the hosts mask to around /21 or more and this will enable the networks to have at least 2046 hosts addresses.
In the information technology there is uses of communication protocols which are set of rules which the network devices use while communicating with each other ,therefore it acts as an interface between two networking devices.
During the transmission of data through the network telecommunication the protocols are used to transmit the data signals from the computer hardware through network software in a given network system.
In the networking there are standard models called open system interconnection and has a correction of layers and it is a standard that is used as an internationally.
There are various protocols used in the network through the internet as follows:
However there are other protocols used in the networking which include; Borders Gateway Protocols (BGP) and Dynamic Hosts Configurations Protocols (DHCP) and they also utilizes some set rules to communicate as well.
The protocols is divided into layers called OSI layers which are seven and they assist in propagation of data packets from the source to the destinations as discussed below:
Layer seven: The application layer. This is a layer that is used to establish communication between two nodes in a network ,in this layer the sender device creates contents and send through the network and the recipient devices opens the sent content ,therefore this layer assist in creating, sending and opening of content.
Layer six: The presentation layer. This is a layer located in the computers operating systems and it converts data from one formats to another formats ,that is analog signal to digital signal at the senders device and digital signal to analog signals at receivers device.
Layer five: The session layer. This is layer that assists in recreation of the broken communication or any communication that has some interruptions.
Layer four: The transport layer. This is the layer in which the movements of data packets is regulated though the network ,however also it controls delivering of data packets where it does error detection and elimination before the packets get to the destinations.
Layer three: The network layer. This is the layer that aids the routing of data packets and determination of the packets destination addresses in the network.
Layer two: The data-link layer. This is layers that establish connection through the network physically ,however it is used to do conversion of data packets to data frames in the network ,this layer is made of two parts namely linking controls layer and media access control layers where the network cables are used.
Layer one: The physical layer. This is the layer that is responsible of transmitting of the streams of data bits which is either in radio, electrical or optic signals through the recommended network hardware.
This is a correction of the hardware system and software program ,this is installed in the network or in some computer hardware in order to prevent any malicious activities in the network by some unauthorized persons (Cory, 2015)..
The network analyzers is meant to supplement the firewalls and the anti-virus applications in the computer and it can be used to do the following:
i. Wiresharks
The wireshark is very powerful networks protocols analyzer in the markets which can be obtained freely or through pay.
This tool is the most recommended tool in the network analysis tools since it is the most standardized ,this tool has multiple tools which includes live capturing and analysis in offline modes and support of many platforms like windows and linux.
The data used in the network is accessed though the graphical user interfaces and the TTY-modes TShark utilities.
However there are other features of this tool which entails powerful displays filter ,VoIP analysis ,ability to open multiple files formats ,ability to read Ethernets, Bluetooth’s signals ,also to enable decryption of signals among others (Richard, 2015).
This is a network analysis tool that automated to discover ,and management of any activities in the and notification ,measuring the network performance, and also it has some features that boost the service delivered.
This tools has two modules in the clients side this will assist them to locate the networks and detect any bandwidth loss, the network alarms and any network related interfaces. (Richard, 2015).
Microsoft Network Monitor is a analytical tool that do packets analysis and it therefore captures, views and analysis the traffics in any network being analysed.
This tool allow the users to do troubleshooting incase of any problem identified in the network or in any of software used in it ,however this tool can be used in many protocols where it detects the sessions ,monitors wireless protocol and detection of most frequent traffic in the network (Andrew, 2014).
The Network analyzer tool is a very important tool that enables the user to capture the analyzing netflow ,Jflow ,and Sflow in the network system .
The tool is used in tracing the computer networks traffic through identifying network users of the bandwidth and the details are updated simultaneously (Behrouz, 2015).
However this tool is used in analyzing the network activity and it helped the network users to trace the various operations and there are some benefits as discussed below:
There are various network analysis tool which are used to analyze the computer network ,however for the three network analysis tool the wireshark is the most recommended for analyzing the network in the world ,this is because it is strong and analysis any size of network.
The wireshark tool is best due to some desirable features where it is made of graphics which are user friendly where it uses the T-Sharks properties.
However the tool is used to do the display of data analyzed and also used to do filtering of the packets of data which has errors and also do analysis of Voices transmitted too (William,2014).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download