Protocols can be defined as the special set of rules used for the sending and receiving the data packets in the network. The protocols finds is application in the specifying the interaction between the entities used for communication. With respect to the network the protocols are used for interchanging data using the hardware devices and algorithms (Hoque et al., 2014). In the OSI model more than one protocol are use in each layer and is use for exchanging the information. In case of TCP/IP communication different protocols are used like TCP, IP, FTP, etc.
The protocol analysis is a research methodology used for studying the procedures used in the system for computing the function. Essentially the engineering of protocol analysis depends on layering of various system conventions and distinctive specialized gadgets. In the convention investigation the information which is available on one layer is speak with other information display on a similar layer and after the correspondence procedure they can exchange starting with one framework then onto the next organized framework (Elias & Ali, 2014). Protocol analysis additionally assumes its essential part in checking the activity of systems administration amid transmission.
A protocol analyzer can be used when a lag is noticed in the network or there the data packets are getting lost before they reach the destination address. If the users connected in a network send s a file to another user and it does not received and gets lost then there is a need to implement the protocol analyzed for monitoring the network traffic and flow of the data packets (Shi, Wang & Xu, 2015).
Protocol analyzer currently available in the market is as follows:
The network protocol analyzer is utilized for finding the 5 minute deferral while building up an association between the principle server and the work station. The network protocol analyzer is a mix of programming and equipment that is required to be introduced in the organization’s system and discover the measurements of the present movement of the system (Goyal & Arora, 2017). The protocol analyzer analyzes the unusual level of traffic arising from which point and is required to be connected with the hub that centrally connects the work stations and the server. The hub shares the data with all the 24 port even if no device is connected with the port. This is the reason to tap the hub and find the traffic generation point and the cause of the delay in the server.
The network infrastructure of the given pharmaceutical company is outdated because the Hubs are now obsolete because it causes delay in the network by broadcasting the data packets to all the ports. The hubs are being replaced with switch and it increases the efficiency of the network. The switch passes the data only to the device connected to the port having a valid Mac address and can be programmed for eliminating the passage of unnecessary data packets and information.
In case of distance vector routing a network calculation is used for calculating the distance of the source and the destination by sending a list of the know network to the next or neighbor router but in case of link state routing the router have all the information about the network such as which state is up or down and it also have the information about the speed of the network (Moussaoui, Semchedine & Boukerram, 2014). In distance vector routing a shorter path is chosen by the router irrespective of the transmission medium but in link state routing the path is selected based on the medium used for interconnecting the device and irrespective of the number of hops.
Some example of distance vector routing protocol are as follows:
Some examples of link state routing are:
A diagram is created and used for understanding the working of the Distance vector and the link state routing
Figure : Distance vector and Link state routing
(Source: Moussaoui, Semchedine & Boukerram, 2014)
In case of distance vector routing the packet would pass through A, B because it is the shortest path to reach the destination. The network speed is not calculated and the packets would take 10x more time to reach if the path A, C, D and B was followed.
This problem is solved in case of linked state routing where the network speed is calculated and the router would select the path A, C, D, B to reach the destination address.
i. Hands-On Project 1-1: Installation of Wireshark
Figure 1: Downloading wireshark from www.wireshark.org
Figure 2: Accepting license aggement for installing wireshark
Figure 3: Choosing components for installation
Figure 4: Selecting additional task for installation
Figure 5: Selecting directory for installation
Figure 6: Selecting WinPcap for installation
Figure 7: Installation of WinPcap
ii. Hands-On Project 1-2: Capturing the Basic Packets and Exploring Basic Packet Statistics
Figure 8: Accessing Wireshark from All Programs
Figure 16: Viewing IO graph statistics
From the above requirement the addressing solution is designed that would be easy for the network administrator to implement in the company’s network infrastructure.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
A |
200 |
254 |
10.0.2.0 |
/24 |
255.255.255.0 |
10.0.2.1 – 10.0.2.254 |
10.0.2.255 |
B |
125 |
126 |
10.0.4.0 |
/25 |
255.255.255.128 |
10.0.4.1 – 10.0.4.126 |
10.0.4.127 |
C |
135 |
254 |
10.0.3.0 |
/24 |
255.255.255.0 |
10.0.3.1 – 10.0.3.254 |
10.0.3.255 |
D |
122 |
126 |
10.0.4.128 |
/25 |
255.255.255.128 |
10.0.4.129 – 10.0.4.254 |
10.0.4.255 |
E |
312 |
510 |
10.0.0.0 |
/23 |
255.255.254.0 |
10.0.0.1 – 10.0.1.254 |
10.0.1.255 |
F |
105 |
126 |
10.0.5.0 |
/25 |
255.255.255.128 |
10.0.5.1 – 10.0.5.126 |
10.0.5.127 |
There is a need for recalculating the subnet mask if the requirement of the number of host jumps to 1024. The VLSM technique is used for the allocation of the host address because less number of IP address are wasted selecting this technique and increases the efficiency of the network. The host formula is used for the calculation of the subnet and 1024 host are accommodated for each of the six buildings connected in the network. The calculated subnet mask is shown below.
QoS or quality of service is applied in a network where there is a requirement to control and monitor the data packets. It is a primary IP based concept and used in the TCP/Ip network for the following purpose:
IP precedence – In the Qos the data packets are marked and classified according to the network policy and the traffic of the network and it can be carried out with the help of IP precedence and DSCP. It is most effective in case of long distance transmission (Feng et al., 2014). In the IP packets the first 3 bits are the IP precedence and it is used for setting the value or priority of the packets. During congestion the router can drop the packet with lower values.
TOS – Type of service is the next 4 bits of the TOS byte and it used for specifying the delay. The bits are assigned to the IP packets for setting priority to the IP packets sent over the network. For the 3rd bit 0 stands for normal delay and 1 stands for low delay, for the 4th bit, 0 is equal to normal throughput and 1 is equal to high throughput, for the 5th bit 0 is normal reliability and 1 is high reliability. One extra bit is reserved for future use (Mancas & Mocanu, 2013).
ECN – Explicit congestion notification is an extension used for controlling the transmission and the internet protocol. It is used for getting end to end notification about the congestion in the network without loss in the data packets (Zhang et al., 2016). Using the ECn a mark is set up in the IP header without dropping the network packet.
Diffserv functionalities – In case of the differentiated services the first six bits are used for setting a codepoint that affects the per hop behavior for each of the node. The codepoint is also termed as DSCP value and is quite similar to the TOS byte (Geib & Black 2017). In DiffServ the each of the device are configured separately and the codepoints are used for setting different priorities in the network. Using Diffserv more number of priorities can be set in the router than the TOS.
Clavel, F., Savary, E., Angays, P., & Vieux-Melchior, A. (2015). Integration of a new standard: A network simulator of IEC 61850 architectures for electrical substations. IEEE Industry Applications Magazine, 21(1), 41-48.
Elias, M. S., & Ali, A. Z. M. (2014). Survey on the challenges faced by the lecturers in using packet tracer simulation in computer networking course. Procedia-Social and Behavioral Sciences, 131, 11-15.
Feng, S., Hu, C., Ma, K., Zhang, X., Lan, W., & Chen, H. (2014). Implementation and Application of QoS in Power Ethernet Switch. Advanced Materials Research.
Geib, R., & Black, D. (2017). Diffserv-interconnection classes and practice.
Goyal, V., & Arora, G. (2017). Implementation of Enhanced Interior Gateway Routing Protocol (EIGRP) in IPv6 Network. Research Journal of Advanced Engineering and Science, 2(1), 90-95.
Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications, 40, 307-324.
Jang, J. Y., & Kim, N. W. (2014). The case study for Implementation and verification of Network based on VLSM. The Journal of the Korea institute of electronic communication sciences, 9(11), 1267-1276.
Jing, R., Zhang, C., Zhao, Y., Ma, Y., Li, J., Huo, X., … & Fu, S. (2015, March). Experimental demonstration of hierarchical control over multi-domain OTN networks based on extended OpenFlow protocol. In Optical Fiber Communication Conference (pp. W4J-4). Optical Society of America.
Mancas, C., & Mocanu, M. (2013, July). QoS optimization in congested multimedia networks. In Telecommunications and Signal Processing (TSP), 2013 36th International Conference on (pp. 38-42). IEEE.
Moussaoui, A., Semchedine, F., & Boukerram, A. (2014). A link-state QoS routing protocol based on link stability for Mobile Ad hoc Networks. Journal of Network and Computer Applications, 39, 117-125.
Shi, H. H., Wang, Y. J., & Xu, X. (2015, June). Teaching the single arm routing method for communication between VLANs of ioT based on Packet Tracer. In Management, Information and Educational Engineering: Proceedings of the 2014 International Conference on Management, Information and Educational Engineering (MIEE 2014), Xiamen, China, November 22-23, 2014 (pp. 337-340). CRC Press.
Zhang, H., Chen, S., Wang, Q., & Liu, J. (2016). A Congestion Control Mechanism for Streaming Media Transmission Over Wireless Environment. International Journal of Multimedia and Ubiquitous Engineering, 11(8), 257-270.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download