a. Designing the network solution for M2M solutions
For formation of the system outline for M2M arrangement an investigation is required to be performed on the available network topology and apply the best suited topology in the network. For the advancement of the system the IP address 10.3.0.0 is used and the host connected in the network is required to be accommodated for and also support the future growth of the company. The routers installed in the network are configured following the created simple addressing solution and border gateway protocol is used for communicating with the hosts installed outside the network.
Finance Office:
IP Address: |
10.3.1.1 |
Network Address: |
10.3.1.1 |
Broadcast Address: |
10.3.1.255 |
Usable Host IP Range: |
10.3.1.1 – 10.3.1.254 |
Maximum no. of Usable Hosts: |
510 |
Total Number of Hosts: |
512 |
Wildcard Mask: |
0.0.1.255 |
Subnet Mask: |
255.255.254.0 |
IP Type: |
Private |
Binary Subnet Mask: |
11111111.11111111.1111111 0.00000000 |
CIDR Notation: |
/23 |
IP Class: |
A |
Transport Office:
IP Address: |
10.3.2.0 |
Network Address: |
10.3.2.0 |
Broadcast Address: |
10.3.2.1 – 10.3.2.254 |
Usable Host IP Range: |
10.3.2.255 |
A number of Usable Hosts: |
254 |
Total Number of Hosts: |
256 |
Wildcard Mask: |
0.0.0.255 |
Subnet Mask: |
255.255.255.0 |
IP Type: |
Private |
Binary Subnet Mask: |
11111111.11111111.1111111 0.00000000 |
CIDR Notation: |
/24 |
IP Class: |
A |
Research Office:
IP Address: |
10.3.3.0 |
Network Address: |
10.3.3.0 |
Broadcast Address: |
10.3.3.127 |
Usable Host IP Range: |
10.3.3.1 – 10.3.3.126 |
A number of Usable Hosts: |
126 |
Total Number of Hosts: |
128 |
Wildcard Mask: |
0.0.0.127 |
Subnet Mask: |
255.255.255.128 |
IP Type: |
Private |
Binary Subnet Mask: |
11111111.11111111.11111111.10000000 |
CIDR Notation: |
/25 |
IP Class: |
A |
Sales Office:
IP Address: |
10.3.3.128 |
Network Address: |
10.3.3.128 |
Broadcast Address: |
10.3.3.191 |
Usable Host IP Range: |
10.3.3.129 – 10.3.3.190 |
A number of Usable Hosts: |
62 |
Total Number of Hosts: |
64 |
Wildcard Mask: |
0.0.0.63 |
Subnet Mask: |
255.255.255.192 |
IP Type: |
Private |
Binary Subnet Mask: |
11111111.11111111.11111111.11000000 |
CIDR Notation: |
/26 |
IP Class: |
A |
Information technology:
IP Address: |
10.3.3.192 |
Network Address: |
10.3.3.192 |
Broadcast Address: |
10.3.3.255 |
Usable Host IP Range: |
10.3.0.1 – 10.3.3.254 |
A number of Usable Hosts: |
1,022 |
Total Number of Hosts: |
1,024 |
Wildcard Mask: |
0.0.3.255 |
Subnet Mask: |
255.255.252.0 |
IP Type: |
Private |
Binary Subnet Mask: |
11111111.11111111.11111100.00000000 |
CIDR Notation: |
/22 |
IP Class: |
A |
Head Office:
IP Address: |
10.3.4.0 |
Network Address: |
10.3.4.0 |
Broadcast Address: |
10.3.4.63 |
Usable Host IP Range: |
10.3.4.1 – 10.3.4.62 |
A number of Usable Hosts: |
62 |
Total Number of Hosts: |
64 |
Wildcard Mask: |
0.0.0.63 |
Subnet Mask: |
255.255.255.192 |
IP Type: |
Private |
Binary Subnet Mask: |
11111111.11111111.11111111.11000000 |
CIDR Notation: |
/26 |
IP Class: |
A |
The VLSM organize figuring system is utilized for the improvement of the system arrangement. There are distinctive hazard related with the advancement of the system arrangement and in the proposed network solution five routers are utilized that acts as an interface between the six structures of the workplace. Each of the six workplaces have isolate switch and a router is associated with the switch for interconnecting the hubs and the workstations introduced at the workplace (Li et al., 2016). The multilayer switch is required to be arranged with legitimate systems administration conventions for speaking with the hosts associated with the other switch in the system. The subnet mask of the address is calculated and the VLAN is required to be created with trunk protocol for creation of a communication channel between the network hosts.
Figure 1: Proposed network solution for M2M solutions
(Source: Created by author)
The network is connected with a firewall for limiting the gatecrashers to pick up the entrance of the system assets. Two servers are introduced in the system for expanding the proficiency of the system correspondence and lessen the danger of infection and Trojan from outside messages. The network consists of two network server and the servers are configured with SMTP and DNS for acting as a mail server and the communication between the employees are done internally. A database server is introduced for storing the organizational information and expanding the productivity of the system. The workstations connected with the switch are assigned a static IP address and connect with the alternative host. A multilayer switch is used for connecting the hosts such that a VLAN is created and the network can be sub divided into small group and easily managed. The creation of the VLAN also increases the security of the network.
In future there is a possibility of increase in the users in the network and the host size can be increased to 1024 numbers. The subnet mask of the network is required to be calculated and the new hosts connected in the network is required to be assigned with a new IP address for communication with the other workstations in the same or other network. The recalculation of the subnet mask does not adds any extra cost in the expansion of the network and thus are calculated below:
Head Office 10.0.20.0 /22 255.255.252.0 10.0.20.1 – 10.0.23.254
Finance Office 10.0.0.0 /22 255.255.252.0 10.0.0.1 – 10.0.3.254
Transport Office 10.0.4.0 /22 255.255.252.0 10.0.4.1 – 10.0.7.254
Research Office 10.0.8.0 /22 255.255.252.0 10.0.8.1 – 10.0.11.254
Sales Office 10.0.12.0 /22 255.255.252.0 10.0.12.1 – 10.0.15.254
Information Technology 10.0.16.0 /22 255.255.252.0 10.0.16.1 – 10.0.19.254
a. Explanation and comparison of the communication network and network protocol analyzer role
Many distinctive system resolution analyzer are available and are utilized for distinguishing evidence of the breach of the information of the system. The workstations associated in the system are dissected and it is utilized for arrangement of the disclosure and investigation of the system. The information loss, retries and timeouts occurred during running the information system are controlled for expansion of the proficiency of the information system. The congestion in the network can be removed with the proper identification of the loss of the organizational information.
The planning of the system outlining for M2M solution the IP address 10.3.0.0 is utilized and execution of the Network Instruments is used for the examination of the activity of the system. The Network Instruments is used for analyzing different types of network environment such as LAN, WAN and wireless network. The user interface of the packet analyzer software is simple and there is an ability to replay the network packet components. There are diverse programming that can likewise be utilized for investigation of the movement, for example nmap, wireshark and so forth and these are accessible free of cost. The Network Instruments are introduced for social affair evidence from the system if there should arise an occurrence of network attack and the evidence are collected for future use. The expansion of the network are required to be considered and the nic cards installed in the network can be identified for finding the source of the handle the crisis of the network..
i. Benefits, associated costs and Ease of usability
With the application of the Network Instruments the network packets can be decoded easily and it is an excellent tool for the analysis of the distributed environment. The packets captured during the analysis the network can be stored in the database of the organization and replayed in future for analyzing. The packets can be analyzed for finding evidence of an attack of the network. A report can be generated demonstrating the current condition of the network with the inclusion of histograms and traffic matrixes (Demmer, Ott & Perreault, 2014). An alarm can be set using the Network Instruments for alerting the network administrator during an emergency condition. The packet summary can be observed at a glance and it is easy to use with improved graphics. The message blocked and the exchange of information can also be fetched using the tool and the packets can be decoded for reviewing the traffic flow in the network.
Network Instruments DX – license + 1st year PrimeSupport Priority – 1 |
|||
SL No. |
Product |
Cost |
Man Power |
1 |
Network Instruments – license + 1st year PrimeSupport Priority – 1 Integrated Network Analyzer |
$ 4769 |
3 |
2 |
NMap |
Free |
3 |
Total |
$ 4769 |
6 |
|
Cost of Network Instruments Installation & Maintenance |
|||
SL No. |
Expertise |
Cost |
|
1 |
Network Administration |
$750.00 |
|
2 |
Network Installation |
$750.00 |
|
3 |
Network Device Monitor |
$300.00 |
|
4 |
Network Monitor |
$270.00 |
|
5 |
Administrator |
$550.00 |
|
6 |
Maintenance Staff |
$320.00 |
|
Total |
$2940.00 |
||
Cost of NMAP Maintenance |
|||
SL No. |
Expertise |
Cost |
|
1 |
Network Administration Building Finance |
$190.00 |
|
2 |
Network Administration Building Transport |
$190.00 |
|
3 |
Network Administration Building Research |
$190.00 |
|
4 |
Network Administration Building Sales |
$190.00 |
|
5 |
Network Administration Building Information |
$190.00 |
|
6 |
Network Administration Building Head |
$190.00 |
|
Total |
$1140.00 |
||
Grand Total Cost |
$8849.00 |
The graphical user interface of Netasyst Network Analyzer is basic and it gives perceivability in the system and in this manner influences the system to clear. It can likewise be utilized for overseeing and approving the adjustments in the system structure and understand the execution issues in the system. The movement can be broke down with the snap of a catch and causes the system overseer to screen the system at an ongoing (István et al., 2016). The measurements of the gadget associated in the system can likewise be brought on a tick and aides in examination of the VLAN and switch course associated in the system. A record is made for the system overseer for dealing with the system application and the assets productively.
For the improvement of the current network infrastructure some recommendations are made and a detailed analysis is made on the recent technologies that can be applied for reducing the congestion in the network and increase the security. A separate subnet can be used for each of the floors or office in the building and isolate it from external access. The Network Instruments can be used for the capturing of the remote packets and it also supports the wireless network. The future expansion of the network can also be supported for adaptation of the new network solution. There are different features such as alarms, capture filtering, triggers and name filtering for dealing with the network solution and help to deal with the remote management system. The configuration of the firewall with the business rules of the organization is also important for supporting the hardware and network devices installed in the network.
Chen, S., Yuan, Z., & Muntean, G. M. (2013, April). An energy-aware multipath-TCP-based content delivery scheme in heterogeneous wireless networks. In Wireless Communications and Networking Conference (WCNC), 2013 IEEE (pp. 1291-1296). IEEE.
Demmer, M., Ott, J., & Perreault, S. (2014). Delay-Tolerant Networking TCP Convergence-Layer Protocol (No. RFC 7242).
Edwards, J., & Bramante, R. (2015). Networking self-teaching guide: OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and maintenance. John Wiley & Sons.
Georgopoulos, P., Elkhatib, Y., Broadbent, M., Mu, M., & Race, N. (2013, August). Towards network-wide QoE fairness using openflow-assisted adaptive video streaming. In Proceedings of the 2013 ACM SIGCOMM workshop on Future human-centric multimedia networking (pp. 15-20). ACM.
István, Z., Sidler, D., Alonso, G., & Vukolic, M. (2016, March). Consensus in a Box: Inexpensive Coordination in Hardware. In NSDI (pp. 425-438).
Li, Z., Chen, Y., Shi, H., & Liu, K. (2016). NDN-GSM-R: a novel high-speed railway communication system via named data networking. EURASIP Journal on Wireless Communications and Networking, 2016(1), 48.
Mena, J., Bankole, P., & Gerla, M. (2017, June). Multipath TCP on a VANET: A Performance Study. In Proceedings of the 2017 ACM SIGMETRICS/International Conference on Measurement and Modeling of Computer Systems (pp. 39-40). ACM.
Nguyen, K., Minh, Q. T., & Yamada, S. (2013, July). A software-defined networking approach for disaster-resilient WANs. In Computer Communications and Networks (ICCCN), 2013 22nd International Conference on (pp. 1-5). IEEE.
Peng, Q., Walid, A., Hwang, J., & Low, S. H. (2016). Multipath TCP: Analysis, design, and implementation. IEEE/ACM Transactions on Networking, 24(1), 596-609.
Shang, W., Bannis, A., Liang, T., Wang, Z., Yu, Y., Afanasyev, A., … & Zhang, L. (2016, April). Named data networking of things. In Internet-of-Things Design and Implementation (IoTDI), 2016 IEEE First International Conference on (pp. 117-128). IEEE.
Shang, W., Yu, Y., Droms, R., & Zhang, L. (2016). Challenges in IoT networking via TCP/IP architecture. NDN Project, Tech. Rep. NDN-0038.
Torres, D., Friedman, J., Schmid, T., Srivastava, M. B., Noh, Y., & Gerla, M. (2015). Software-defined underwater acoustic networking platform and its applications. Ad Hoc Networks, 34, 252-264.
Yasukata, K., Honda, M., Santry, D., & Eggert, L. (2016, June). StackMap: Low-Latency Networking with the OS Stack and Dedicated NICs. In USENIX Annual Technical Conference (pp. 43-56).
Zinner, T., Jarschel, M., Blenk, A., Wamser, F., & Kellerer, W. (2014, May). Dynamic application-aware resource management using Software-Defined Networking: Implementation prospects and challenges. In Network Operations and Management Symposium (NOMS), 2014 IEEE (pp. 1-6). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download