The design of the network is created is proposed for the M2M solution and the requirement of the organization is studied for the preparation of the network diagram. There is a need of connecting 1200 nodes and workstation in the network and the private address 10.1.1.1 is used for the whole network. The number of workstation required to be installed in each of the office is given in the requirement and the network solution is created according to it. A central router is installed for communicating with the branches and the offices of the organization. Each of the workstation in the office are assigned with a router and switch is used for connecting the hosts. The subnet is calculated for the allocation of the hosts and the range of the IP address is required to be calculated for the accommodation of the IP address. VLSM technique is applied for the calculation and some extra IP address are allocated such that the future growth of the organization can be easily handled.
Figure 1: Proposed network solution for the M2M solution
(Source: Created by author)
There are several risk related with the development of the network solution and it is required to be resolved for increasing proficiency of the proposed network solution. A proper cabling plan is required to be followed for increasing the transmission speed and minimizing the congestion in the network. The unused ports in the switches is required to be disabled such that the intruders cannot use it for accessing the network resources. A firewall is installed in the entry and the exit point of the network such that the traffic can be monitored and controlled (Vasilakos, Zhang & Spyropoulos, 2016). Each of the routers are configured with a different subnet and the routers are configured with border gateway protocol for communicating with each other. Access control list is required to be configured on the router for permitting or denying access of the network resources. The nodes and the workstations connected in the network are assigned with the static IP address calculated from the addressing scheme such that the official network cannot be used by the employees with their personal usage (Kulkarni & Agrawal, 2014). Servers are also required to be installed for communicating between the employees and scope of future expansion is there for the network to meet the growing demand of the organization. The backbone of the network is required to be strong and thus fiber optics cable is used for communication for communicating with the different branches.
The simple addressing solution is created for the accommodation of the all the 1130 IP address needed in different offices of the organization. The routers are required to be configured according to the addressing solution for the development of the network and increase the efficiency of the organizational network.
Private IP address: 10.1.0.0/21
Maximum number of IP address available in the network: 2046
Number of IP address required for the accommodation of the Workstation: 1130
Number of IP address allocated in the network: 2036
Subnet Name |
Allocated Size |
Needed Size |
Address |
Dec Mask |
Mask |
Assignable Range |
Broadcast |
Finance Office |
510 |
260 |
10.1.4.0 |
255.255.254.0 |
/23 |
10.1.4.1 – 10.1.5.254 |
10.1.5.255 |
Transport Office |
254 |
130 |
10.1.6.0 |
255.255.255.0 |
/24 |
10.1.6.1 – 10.1.6.254 |
10.1.6.255 |
Research Office |
126 |
120 |
10.1.7.0 |
255.255.255.128 |
/25 |
10.1.7.1 – 10.1.7.126 |
10.1.7.127 |
Sales Office |
62 |
40 |
10.1.7.192 |
255.255.255.192 |
/26 |
10.1.7.193 – 10.1.7.254 |
10.1.7.255 |
Information Technology |
1022 |
520 |
10.1.0.0 |
255.255.252.0 |
/22 |
10.1.0.1 – 10.1.3.254 |
10.1.3.255 |
Head Office |
62 |
60 |
10.1.7.128 |
255.255.255.192 |
/26 |
10.1.7.129 – 10.1.7.190 |
10.1.7.191 |
The network protocol analyzer can be installed in the proposed solution for analyzing the data packets and the log traffic can be intercepted for finding the data flow in the network (Shojafar et al., 2015). The errors in the network is required to be analyzed and mitigated for efficiently develop the network solution. A default route is required to be set on the routers for transferring the data packets and they are required to be configured properly and network address translation is required to be implemented for securing the network from external access.
With the increase in the number of host per network of the office building the subnets are calculated and the current network configuration is required to be changed in the routers for application of the change. The subnets are calculated for the accommodation of the 1024 hosts per network and this causes change in the static IP address of the hosts, unblocking the ports on the switches and configuring the routers with the new IP address and the subnet mask. Multiple subnets are created for the network and for addition of the host there are different technique that can be applied but the cost effective solution is the reconfiguration of the routers and the other hardware devices connected in the network. Some IP bits are kept in reserve and the host formula is used calculating the new subnet and accommodate the increased number of hosts in the network. The calculation work and the result is given below:
Address 10.0.0.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.0.1 – 10.0.3.254
Address 10.0.4.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.4.1 – 10.0.7.254
Address 10.0.8.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.8.1 – 10.0.11.254
Address 10.0.12.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.12.1 – 10.0.15.254
Address 10.0.16.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.16.1 – 10.0.19.254
Address 10.0.20.0
Mask /22
Dec Mask 255.255.252.0
Assignable Range 10.0.20.1 – 10.0.23.254
The protocol requirements in the network are HTTP, FTP and SMTP. The HTTP is the hyper text transfer protocol, SMTP is the Simple mail transfer protocol and FTP is the File transfer protocol. The HTTP protocol would empower the system to approach the web association and framework would have the capacity to go on the web. Furthermore, the FTP protocol would enable the frameworks in empower to exchange records inside the system (Edwards & Bramante, 2015). The SMTP protocol would empower the segments of the system to convey among them proficiently. Furthermore, the correspondence in the middle of the staffs of the organization would likewise be extremely productive and they would have the capacity to trade messages among themselves.
M2M Solutions is a company that is medium sized and they are looking to expand their operations. Therefore they are required to reconstruct the network structure for their company. I have been entrusted with the job of implementing a network design. The organization strategies don’t include the utilization of network analyzers in their system in spite of the fact that the network analyzers are extremely productive for the organization to do their procedures. Likewise, the network analyzer would likewise enable the organization tom to recognize the imperfections that are existent inside the system. The data about the protocols that are being utilized as a part of the system is given beneath.
The network analyzer is very useful for the network and it provides various type of facilities for the network. The network analyzer serves different type of purposes for the network and the main roles of the network analyzer are:
The wireshark network analyzer tool can be used in different formats by the network. The tool acts as a network analyzer for the network. They are also used for the purpose of monitoring the network. They perform analysis of the data and the files that flows throughout the network. Tracing the packets is one of the process that is performed by the analyzer tool (Clavel et al., 2015). Wireshark is one the most effective software that can be utilized as a system analyzer likewise; the item is extremely prevalent in the market and forces a significant high positioning in the market for the division of network analyzer.
The network analyzer protocol is very beneficial to the network. The device additionally helps in the examination of the system and performs observing of the frameworks. Henceforth, they secure the frameworks shape the outer gatecrashers. It supports an extensive variety of protocols such as the IP, BitTorrent, AppleTalk and DHCP. Likewise, with each of the refresh the apparatus is refreshed and another convention is included to the application a regular routine. The network analyzer underpins around eight hundred and fifty protocols.
The Wireshark Network analyzer is a tool that is free to use and hence it does not require any additional cost for the company to bear. The cost for the implementation of the system is almost null. The cost for the incorporation of the analyzer on the system framework is extremely insignificant. Thus, the related cost for the analyzer is nearly nil. For utilizing the instrument the base necessities of the system are: 60mb space on the hard drive, a processor that has a clock speed of about 400 Mhz. Additionally the Network Interface Controller is also recommended.
For recommendation it can be said that:
Understanding data: The user of the network should be able to understand the type of data and also the flow of the data through the network. This would result in better handling of the network analyzer.
Understanding configurations: The configurations in the network should also be utilized efficiently by the user and they should also be able to understand all the major functionalities in the network.
It can be said that the selected network analyzer for the designed network layout. The task 2 of this report is concerned with the information about the network analyzer. M2M Solutions is a company that is medium sized wants to expand their operations. Therefore the company is required to reconstruct the network structure for their company. The job of implementing a network design has been entrusted to me. The organization strategies don’t include the utilization of network analyzers in their system in spite of the fact that the network analyzers are extremely productive for the organization to do their procedures. But the staffs are looking to cite the importance of the network analyzer tool to the company. This report provides the required information about the tool.
Clavel, F., Savary, E., Angays, P., & Vieux-Melchior, A. (2015). Integration of a new standard: A network simulator of IEC 61850 architectures for electrical substations. IEEE Industry Applications Magazine, 21(1), 41-48.
Edwards, J., & Bramante, R. (2015). Networking self-teaching guide: OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and maintenance. John Wiley & Sons.
Goralski, W. (2017). The Illustrated network: How TCP/IP works in a modern network. Morgan Kaufmann.
Kulkarni, S., & Agrawal, P. (2014). Introduction. In Analysis of TCP Performance in Data Center Networks (pp. 1-15). Springer New York.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP architecture. NDN Project, Tech. Rep. NDN-0038.
Shojafar, M., Cordeschi, N., Abawajy, J. H., & Baccarelli, E. (2015, December). Adaptive energy-efficient qos-aware scheduling algorithm for tcp/ip mobile cloud. In Globecom Workshops (GC Wkshps), 2015 IEEE (pp. 1-6). IEEE.
Sidler, D., Alonso, G., Blott, M., Karras, K., Vissers, K., & Carley, R. (2015, May). Scalable 10Gbps TCP/IP stack architecture for reconfigurable hardware. In Field-Programmable Custom Computing Machines (FCCM), 2015 IEEE 23rd Annual International Symposium on (pp. 36-43). IEEE.
Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (Eds.). (2016). Delay tolerant networks: Protocols and applications. CRC press.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download