1. In context to communication analysis, protocols are defined as a system of rules that helps in allowing one or more entities of communication system in order to transmit information with the help of any kind of variation in a physical quantity. This is the rule that helps in defining the syntax, semantics as well as synchronization of communication as well as possible procedure in order to recover methods.
The main purpose of protocol analysis is to gather intermediate state evidence that are concerned with the processes and are utilized by a system in order to compute a function. Protocol analysis is defined as a research methodology that is mainly utilized for studying as well as analyzing different procedures that are used in the system in order to compute various functions. It is identified that protocol analysis is dependent on various distinctive gadgets as well as system conventions. In the process of convention investigation, it is analyzed that the information which is present on one specific layer can speak with different information that are present on a different layer after the procedure of correspondence they helps in exchanging one framework onto next level of organized framework. It is one of the important factor that helps in assuming is importance in checking various activities of a system administration.
When either a lag is found in the network or if the data packets are losing before they are reaching to their destination address then protocol analyzers are utilized. If an individual user send a specific file to another users connected within the same network and due to some problem the file is not received by that user then there is a prior need of building a protocol analyzer in order to monitor the network as well as the data packets flow.
The protocol analyzer that is present in the market are as follows:
2. The network protocol is mainly used in order to find out the deferral of 5 minutes while developing an association between different workstations as well as principle server. It is analyzed that the network protocol analyzer mainly comprises of a mix of programming as well as equipment that is needed for introducing it in the system of the organization and for discovering the system measurement of the current movement of the system. The protocol analyzer helps in analyzing the insignificant level of traffic that generally occurs from appoint that is needed to be connected with the help of the hub, which assists in centrally connecting the workstations with the help of the server. The hub helps in sharing all the data with the help of all the 24 port even if the devices are not connected properly with the port. This is considered as one of the significant reason to tab the hub and find out the main traffic generation point that causes delay in the server.
The pharmaceutical company helps in providing a network infrastructure which is considered to be outdated due to the different types of hubs which are quite obsolete and causes problems such as challenges I the broadcasting the data packets of the network to different ports.. The switch helps in passing the data only to some specific device which is connected with the help of the port that have a valid Mac address which required o programmed in order to eliminate the passage of various information as well as data sockets.
3. A network calculation is mainly used in case of distance network routing. This calculation I mainly utilized for manipulating the distance of the source as well as destination by sending a list of known network to the neighbor router. In case of routing the network, important information like the speed of the network as well as information about state of the network is analyzed. A shorter path is selected in the distance vector router irrespective of the medium of transmission. However, a link state that helps in routing the path is chosen which is generally utilized for interconnecting the device.
Distance routing protocol, examples are provided below that include:
The example of link state routing includes:
A figure is mainly created in order to understand the main principle of the Distance vector for linking the state routing.
, the packet will pass with the help of A, B as it is considered as one of the shortest path in order to reach to proper destination in case of distance vector routing. The network speed is generally calculated and the packet can achieve 10x additional time if the paths were not followed in the sequence A, C, D and B.
The challenge can be generally resolved with the help of link state routing where the speed of network routing is calculated and therefore the path of A, C, D, B would be selected by the router for reaching the destination address.
4.
i) Hands-On Project 1-1: Installation of Wireshark
Figure 1: Wireshark Download from www.wireshark.org
Figure 2: Accepting License Agreement for Installing Wireshark
Figure 3: Selecting Components For Installation
Figure 4: Selection of Additional Task For Installation
Figure 5: Selection of Directory For Installation
Figure 6: Selection of WinPcap for Installation
Figure 7: Installation of WinPcap
Figure 8: Accessing from Wireshark from Different Programs
Figure 9: Main Wireshark Window
Figure 10: Wireshark Capture Interface Window
Figure 11: Stopping Wireshark Live Capture
Figure 12: Viewing Information from The Conversation Window
Figure 13: Viewing Ethernet II Information From The Packet Details Pane
Figure 14: Viewing Information in The Packet Bytes Pane
Figure 15: Viewing Protocol Hierarchy Information
Figure 16: Viewing IO graph statistics
5. Based on the needs, the solution is generally designed as well as developed which would be quite easy for the use of administrator of the network for implementing the network infrastructure of the company.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
A |
200 |
254 |
10.0.2.0 |
/24 |
255.255.255.0 |
10.0.2.1 – 10.0.2.254 |
10.0.2.255 |
B |
125 |
126 |
10.0.4.0 |
/25 |
255.255.255.128 |
10.0.4.1 – 10.0.4.126 |
10.0.4.127 |
C |
135 |
254 |
10.0.3.0 |
/24 |
255.255.255.0 |
10.0.3.1 – 10.0.3.254 |
10.0.3.255 |
D |
122 |
126 |
10.0.4.128 |
/25 |
255.255.255.128 |
10.0.4.129 – 10.0.4.254 |
10.0.4.255 |
E |
312 |
510 |
10.0.0.0 |
/23 |
255.255.254.0 |
10.0.0.1 – 10.0.1.254 |
10.0.1.255 |
F |
105 |
126 |
10.0.5.0 |
/25 |
255.255.255.128 |
10.0.5.1 – 10.0.5.126 |
10.0.5.127 |
There is a requirement for recalculating the mask of subnet of there is a need of host jumps up to 1024. For the allocation of host address, the technique that is used is VLSM as few number of IP addresses are generally selected by utilizing the technique. It helps in increasing the overall efficiency of the network. The formula of host is mainly used for calculating the 1034 host as well as subnet, which are accommodated for six buildings that are connected with the help of a network. The subnet masks, which are calculated, are shown below:
6. QoS or Quality of Service is mainly utilized inside a network when there is a need of controlling as well as monitoring the data packets. It is considered as one of the main IP based concept that is mainly utilized in the TCP/IP network for the various purposes, which include:
TOS: The next 4 bit of the TOS byte is generally considered as the type of service. It is used mainly when there is a required of specifying different types of delay. The assigned bits are generally present in various IP packets in order to set proper priorities to the packets of IP, which is mainly sent over the network. It is analyzed that for the 3rd bit, 1 is mainly considered for slow delay whereas 0 reveals normal delay. In the 4th bit, 0 is considered to be normal and 1 is considered for high delay. For the 5th bit, 0 is considered for reliability whereas 1 is utilized for high reliability. One extra bit is mainly reserved for the future use.
IP precedence: The policy of the network is mainly utilized in order to mark as well as classify the data packets as per the quality of service. DSCP or precedence is generally utilized for carrying the network traffic. In long distance transmission, it is quite very much effective. The first 3 bits of the IP packets are considered precedence, which is mainly used for setting up proper priority of the network as well as its value. During congestion, the router is quite helpful in dropping the value of the packets.
ECN: Explicit congestion notification is considered as an extension that is mainly used for controlling internet protocol. It is mainly used for getting end-to-end notification about different types of network congestion without the loss of data packets. A mark is set in the header of the IP while utilizing ECN without dropping the packet of the network.
Diffserv functionalities: In various differentiated services, the first six bits are generally utilized in order to set a code point, which helps in affecting the behavior of each node. DSCP value is the name of the code point that is identical to the byte of TOS. In DiffServ, all the devices are connected properly as well as separately and therefore the endpoints are mainly used for setting different types of priorities in the network.
A network simulator of IEC 61850 architectures for electrical substations. IEEE Industry Applications Magazine, 21(1), 41-48.
Elias, M. S., & Ali, A. Z. M. (2014). Survey on the challenges faced by the lecturers in using packet tracer simulation in computer networking course. Procedia-Social and Behavioral Sciences, 131, 11-15.
Feng, S., Hu, C., Ma, K., Zhang, X., Lan, W., & Chen, H. (2014). Implementation and Application of QoS in Power Ethernet Switch. Advanced Materials Research.
Geib, R., & Black, D. (2017). Diffserv-interconnection classes and practice.
Goyal, V., & Arora, G. (2017). Implementation of Enhanced Interior Gateway Routing Protocol (EIGRP) in IPv6 Network. Research Journal of Advanced Engineering and Science, 2(1), 90-95.
Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network attacks: Taxonomy, tools and systems. Journal of Network and Computer
Mancas, C., & Mocanu, M. (2013, July). QoS optimization in congested multimedia networks. In Telecommunications and Signal Processing (TSP), 2013 36th International Conference on (pp. 38-42). IEEE.
Moussaoui, A., Semchedine, F., & Boukerram, A. (2014). A link-state QoS routing protocol based on link stability for Mobile Ad hoc Networks. Journal of Network and Computer Applications, 39, 117-125.
Shi, H. H., Wang, Y. J., & Xu, X. (2015, June). Teaching the single arm routing method for communication between VLANs of ioT based on Packet Tracer. In Management, Information and Educational Engineering: Proceedings of the 2014 International Conference on Management, Information and Educational Engineering (MIEE 2014), Xiamen, China, November 22-23, 2014 (pp. 337-340). CRC Press.
Zhang, H., Chen, S., Wang, Q., & Liu, J. (2016). A Congestion Control Mechanism for Streaming Media Transmission Over Wireless Environment. International Journal of Multimedia and Ubiquitous Engineering, 11(8), 257-270.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download