There are different communication protocols used for connecting the host in the internet and it acts as a gateway for sending and receiving the data packets to the sender and the receiver connected in the network. The OSI model is developed to act as a reference model but the TCP/IP model is developed from the OSI model. There are four layers in the TCP/IP model whereas the OSI reference model uses seven layers for its operations. The OSI model is based on networking theory and thus it is considered as a theoretical model and it does not find its application in the internet. The TCP/IP model is a practical model and it is more reliable than the OSI model. The OSI model has strict boundaries and protocols but the TCP/IP adds flexibility to the network and only follows the general guidelines that should be met for the development of the network. The connectionless protocols are supported by the TCP/IP model but both the connectionless and the connection oriented protocols are supported by the OSI reference model.
The TCP/IP model have distinct presentation and session layers whereas the OSI layer only has a single layer known as the application layer. The TCP/IP model is a primitive one and the protocol were developed after the development of the model was completed and hence the model follows a protocol independent standard. On the other hand the OSI model development was done after the development of the protocols and the model follows the protocol dependent standards.
The table provided below provides the subnet mask calculation for the IP4 addressing mode with the IP as 192.168.0.0 and the number of addresses to be 24.
IP address |
192.168.0.0 |
Class |
C |
Type |
PRIVATE (For Use in a private network. Not routabel in the Internet [rfc1918]) |
Network |
192.168.0.0 |
Bitmask |
24 |
Netmask |
255.255.255.0 |
Wildcardmask |
0.0.0.255 |
host range |
192.168.0.1- |
broadcast address |
192.168.0.255 |
total IP addresses |
254 |
Short |
192.168.0 |
integer ID |
3232235520 |
hexadecimal ID I |
0xc0a80000 |
hexadecimal ID II |
3139322e3136382e302e30 |
binary ID |
Top of Form Bottom of Form 11000000101010000000000000000000 |
in-addr.arpa format |
0.0.168.192.in-addr.arpa |
mapped IPv4 address |
::ffff:c0a8:0000 |
6to4 prefix |
2002:c0a8:0000::/48 |
Subnet calculation of IP 192.168.0.1
Subnet mask |
Subnet bits |
Mask Bits |
Hosts per subnet |
Host Address range |
Broadcast Address |
255.255.255.192 |
2 |
26 |
62 |
192.168.0.1 – 192.168.0.62 |
192.168.0.63 |
Subnet bits |
Maximum subnets |
Mask Bits |
Hosts per subnet |
Host Address range |
Broadcast Address |
8 |
256 |
16 |
65534 |
10.0.0.1 – 10.0.255.254 |
10.0.255.255 |
The transfer and reception of the data packets within the network the server should have knowledge about the data which is to be transferred and the address where the data is to be transferred. The computers in the network are identified by the MAC address and the IP addresses. The ARP or the Address Resolution protocol is used for the connection of the MAC address to the IP of the machines and this helps in the connection of the systems within the network.
The ARP Cache is also known as the ARP table. The ARP table is used to save the IP/MAC addresses in devices like switches and router. Once the devices in the network gets connected to the router, those IP addresses will be stored in cache memory, which is nothing but the ARP table. When a request is sent from a device for transferring the ARP table checks for the IP address connected to it and get the information convert it to packets and deliver them to the corresponding IP address. Hence, this reduces the waiting time during the transmission of management in a network and the efficiency of the network increase as a result.
The report is used for the description of the network layout and configuration of the network topology of the organization. It has been given that the organization is looking to expand their business procedures and the network would be distributed in six different sub networks. The company have also provide requirement about the use of IP addressing mode for the sub netting of the network. I as the Solution Architect is assigned with the responsibility of performing the task that would help the organization in implementing the required network architecture.
The description and calculations regarding the network topology are provided in this report.
This report contains the network topology and the justification of the network topology. In addition to this, the explanations about the number of hosts have also been provided in this report.
Figure 1: Network Diagram
(Source: created by author)
The network has been successfully divided into six different branches by using the sub netting method. The network contains a network that is divided by six different routers in which the connections are done according to the descriptions provided below:
The router in the Head Office and the Marketing Department are connected to the router of the Finance department. In addition to this, the Research and development router is connected to the routers of the IT Call Centre and router in the Information Technology. Additionally, the Finance Department router and the R and D router are connected with each other. This divides the network successfully however the employees in the network would be interact with each other without any barriers and the network efficiency would be maintained without too much congestion in the network.
The following requirements have been provided by the organization about the restructuring and expansion of their network:
Total number of machines to be allocated in the network: 1200 computers approximately.
Number of braches the network is to be sub netted to: 6
The number if machines to be allocated to the sic buildings approximately:
Finance Office – 260 workstations
IT Call Centre – 520 workstations
Research and Development Office – 120 workstations
Marketing Department – 40 workstations
Information technology – 130 workstations
Head Office – 60 workstations
Subnet Name |
Needed Size |
Allocated Size |
Mask |
Dec Mask |
Address |
Assignable Range |
Broadcast |
Head_Office |
60 |
62 |
/26 |
255.255.255.192 |
10.0.7.128 |
10.0.7.129 – 10.0.7.190 |
10.0.7.191 |
Finance_office |
260 |
510 |
/23 |
255.255.254.0 |
10.0.4.0 |
10.0.4.1 – 10.0.5.254 |
10.0.5.255 |
IT_Call Centre |
520 |
1022 |
/22 |
255.255.252.0 |
10.0.0.0 |
10.0.0.1 – 10.0.3.254 |
10.0.3.255 |
Research_and_Development_Office |
120 |
126 |
/25 |
255.255.255.128 |
10.0.7.0 |
10.0.7.1 – 10.0.7.126 |
10.0.7.127 |
Marketing_Department |
40 |
62 |
/26 |
255.255.255.192 |
10.0.7.192 |
10.0.7.193 – 10.0.7.254 |
10.0.7.255 |
Information_Technology |
130 |
254 |
/24 |
255.255.255.0 |
10.0.6.0 |
10.0.6.1 – 10.0.6.254 |
10.0.6.255 |
The system is configured with the 10.0.0.0/21 addresses. For the IP address 10.0.0.0/21 2046 number of IP address are available and among them 1130 are required, but 2036 addresses are allocated in the subnet. This helps us in minimization of the number of IP that are wasted in this network configuration.
If the number of hosts increases to a number more than 1024 then there might arise a case of the calculation of the network setup has to be altered in order to allocate more machines to the system. The configuration of the network would be have to be set up from scratch, and hence and a new system have to be used for the calculation of the subnet of the network. The configurations in the in the router interfaces have to be deleted and the some other network other than /21 sub netting system.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Finance_office |
1024 |
2046 |
10.0.0.0 |
/21 |
255.255.248.0 |
10.0.0.1 – 10.0.7.254 |
10.0.7.255 |
Head_Office |
1024 |
2046 |
10.0.8.0 |
/21 |
255.255.248.0 |
10.0.8.1 – 10.0.15.254 |
10.0.15.255 |
IT_Call Centre |
1024 |
2046 |
10.0.16.0 |
/21 |
255.255.248.0 |
10.0.16.1 – 10.0.23.254 |
10.0.23.255 |
Information_Technology |
1024 |
2046 |
10.0.24.0 |
/21 |
255.255.248.0 |
10.0.24.1 – 10.0.31.254 |
10.0.31.255 |
Marketing_Department |
1024 |
2046 |
10.0.32.0 |
/21 |
255.255.248.0 |
10.0.32.1 – 10.0.39.254 |
10.0.39.255 |
Research_and_Development_Office |
1024 |
2046 |
10.0.40.0 |
/21 |
255.255.248.0 |
10.0.40.1 – 10.0.47.254 |
10.0.47.255 |
Conclusion
For conclusion it can be said that the network topology has been designed according to the requirement of the organization. The report provides the justification about the network topology. In addition to this, calculation regarding the IP of different machines have been provided in the report. The /21 routing system has been used for the assignment of IP to the network. However if the number machines increase in the system the calculation and the router configuration details would require to be changed. The supporting calculation and proper justification has also been provided in the report. Hence, it can be said that the network architecture for the organization has been defined efficiently in the report, however the calculation are limited for the /21 network whereas any increase the number of systems in the network would call for a redesigning of the network.
References
Bishop, S., Fairbairn, M., Norrish, Marketing., Ridge, T., Sewell, P., Smith, M., & Wansbrough, K. (2015). Engineering with Logic: Rigorous Specification and Validation for TCP/IP and the Sockets API. URL: https://www. cl. cam. ac. uk/pes20/Netsem/paper3. pdf.
Carey, M. F., & Chan, V. W. (2015, October). Internetworking service architecture for transporting mission-critical data over heterogeneous subnetworks with probabilistic guarantees. In Military Communications Conference, MILCOM 2015-2015 IEEE (pp. 1002-1008). IEEE.
Comer, D. (2014). Fundamentals Of Computer Networking And Internetworking.
Edwards, J., & Bramante, R. (2015). Networking self-teaching guide: OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and maintenance. John Wiley & Sons.
Fu, B., & Xiao, Y. (2017, April). An Intrusion Detection Scheme in TCP/IP Networks Based on Flow-Net and Fingerprint. In Proceedings of the SouthEast Conference (pp. 13-17). ACM.
Goralski, W. (2017). The illustrated network: how TCP/IP works in a modern network. Morgan Kaufmann.
Grasa, E., Bergesio, L., Tarzan, M., Trouva, E., Gaston, B., Salvestrini, F., … & Colle, D. (2016). Recursive InterNetwork Architecture, Investigating RINA as an Alternative to TCP/IP (IRATI). In Building the Future Internet through FIRE (pp. 491-520).
Shah, M., Soni, V., Shah, H., & Desai, M. (2016, March). TCP/IP network protocols—security threats, flaws and defense methods. In Computing for Sustainable Global Development (INDIACom), 2016 3rd International Conference on (pp. 2693-2699). IEEE.
Trossen, D., Reed, M. J., Riihijärvi, J., Georgiades, M., Fotiou, N., & Xylomenos, G. (2015, June). Ip over icn-the better ip?. In Networks and Communications (EuCNC), 2015 European Conference on (pp. 413-417). IEEE.
Yamamoto, T., Hara, T., Ishikawa, T., Oyama, H., Takada, H., & Azumi, T. (2017, August). TINET+ TECS: Component-Based TCP/IP Protocol Stack for Embedded Systems. In Trustcom/BigDataSE/ICESS, 2017 IEEE (pp. 784-791). IEEE.
Zhao, K., & Zhang, Q. (2018). Network protocol architectures for future deep-space internetworking. Science China Information Sciences, 61(4), 040303.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download