M2M is a medium sized organization that is looking to expand its organizations. They are required looking to reconfigure the network structure for the system. I have been asked to supervise the reconstruction of the network of the company.
The report provides the information about the design of the reconstructed network for the company.
The task one in the report the information about the requirement for the company and also the design of the network system has been provided in the report. In addition to this, justification and the description about the network has also been provided ion the report.
The M2M Company has provided the data about their prerequisites. The organization has obtained around six destinations over the city of Sydney. They are hoping to execute a system for the six distinctive division of the organization. Presently the organization is hoping to execute a system that would be associating every one of the branches of the organization to the single system. The six distinct divisions that are available in the organization are the Finance office, Transport Office, Research Office, Sales Office, Information System and the Head Office. The organization is additionally looking to subnet their system and it is likewise educated that they would be having a solitary subnet for each of the divisions in the organization. Likewise, the outline is required to suit around 1200 work station in their system. In addition to this, the distribution of the workstation of the company is done in the following process:
The network that is to be implemented should be able to accommodate all the machines in their system and also they should be able to perform all the required functions of the system mentioned by the company.
The network design is done according to the requirements that are stated by the M2M Company. In the implemented system the server is located centrally. To this central server the servers of the different department of the company are connected. The six distinct servers are executed for the six unique segments of the organization that they have to incorporate into their framework. Henceforth, the system would be subnetted proficiently into six diverse sub systems. This gives the organization the advantage of ceasing the entrance to the diverse overseers of the distinctive systems. Henceforth, this would be giving different sort secure offices to the system of the organization. The subnetting calculations are provided in this segment of the report.
The major network is 10.1.0.0/21. The number of available IP addresses in major network is 2046. The Number of IP addresses required for the network is 1130.
Available IP addresses in allocated subnets: 2036. About 100% of available major network address space is used.
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Information_Technology |
520 |
1022 |
10.1.0.0 |
/22 |
255.255.252.0 |
10.1.0.1 – 10.1.3.254 |
10.1.3.255 |
Finance_Offfice |
260 |
510 |
10.1.4.0 |
/23 |
255.255.254.0 |
10.1.4.1 – 10.1.5.254 |
10.1.5.255 |
Transport_Office |
130 |
254 |
10.1.6.0 |
/24 |
255.255.255.0 |
10.1.6.1 – 10.1.6.254 |
10.1.6.255 |
Research_Office |
120 |
126 |
10.1.7.0 |
/25 |
255.255.255.128 |
10.1.7.1 – 10.1.7.126 |
10.1.7.127 |
Head_Office |
60 |
62 |
10.1.7.128 |
/26 |
255.255.255.192 |
10.1.7.129 – 10.1.7.190 |
10.1.7.191 |
Sales_Office |
40 |
62 |
10.1.7.192 |
/26 |
255.255.255.192 |
10.1.7.193 – 10.1.7.254 |
10.1.7.255 |
The designing of the network has been done according to the requirements of the company and it is also seen that all the requirements of the company are met efficiently by the network. The system has likewise been planned proficiently for execution of the system that would be pleasing around 1200 in the framework. The subnet of the organization is likewise as indicated by the prerequisites of the said by the organization. The framework would likewise permit just the allotted number of machine in the system. The subnet/21 is being utilized as a part of this framework. Thus, the aggregate number of addresses that would be permitted in this framework is 2046. Hence, if the total number of addresses form each of the buildings the increased to more than 1024, then it would be very difficult for the system to accommodate so many addresses in the network.
Conclusion
For conclusion of this part of the report it can be said the task 1 related with the efficient design of the solution required by the M2M Company. The report provides the information about the design of the reconstructed network for the company. The task one in the report provides the information about the requirement for the company and also the design of the network system has been provided in the report. In addition to this, justification and the description about the network has also been provided in this part of the report.
M2M is a medium sized organization that is looking to expand its organizations. They are required looking to reconfigure the network structure for the system. I have been asked to supervise the reconstruction of the network of the company.
This part of the report provides the information about the use of the network analyzers by the company.
The task two in this report contains the information about the communication protocols required for the network, the role of the network analyzers. In addition to this, the benefits about the network analyzer and various other type of discussion about the network analyzer tool are done in this part of the report.
The protocols that are used for the communication within the network are HTTP, SMTP and FTP. Http is the Hypertext transfer protocol; this helps the network connectivity to the network. The SMTP is the simple mail transfer protocol, the simple mail transfer protocol enable efficient communication in between the different components of the network. This also helps the different users within the network to send and receive mails in between themselves. The FTP protocol is the File transfer protocol. This helps the network components to interchange the fie in between themselves and also this helps in the exchange of data within the network.
The company policies restrict them from using the network analyzers in the network. But from the point of view of the staffs of the company the network analyzers are very efficient for their network. The network analyzers play a vital role for the network. The role that are cited by the staffs of the company are:
In the design described in task 1, the use of Wireshark network protocol analyzer would be very useful for the company. The wireshark network analyzer performs various type tasks for the network.
The selection network analyzer is based on various factors. The wireshark protocol analyzer tool is very efficient and also the network is analyzer is very efficient. They also have a very high ranking in the market.
The benefits of the tool are:
The network analyzer is a open source product and hence, they are available for free in the market. Hence, no additional cost for the implementation of the network analyzer is required by the company.
The tool is very useful for the company. For using the tool the minimum requirements are 60mb disk space, they also need a CPU with a clock speed of about 400 Mhz. The system also requires a Network Interface controller.
Conclusion
For conclusion it can be said that, network analyzer is a very important tool for the company to be implemented in the network. The Wire shark network protocol analyzer is used for the implementation in the network. The task two in this report contains the information about the communication protocols required for the network, the role of the network analyzers. In addition to this, the benefits about the network analyzer and various other type of discussion about the network analyzer tool are done in this part of the report.
Alqahtani, A. H., & Iftikhar, M. (2013). TCP/IP attacks, defenses and security tools. International Journal of Science and Modern Engineering (IJISME), 1(10).
Han, S. N., Lee, G. M., & Crespi, N. (2014). Semantic context-aware service composition for building automation system. IEEE Transactions on Industrial Informatics, 10(1), 752-761.
Langenbach, U., Berthe, A., Traskov, B., Weide, S., Hofmann, K., & Gregorius, P. (2013, September). A 10 GbE TCP/IP hardware stack as part of a protocol acceleration platform. In Consumer Electronics¿ Berlin (ICCE-Berlin), 2013. ICCEBerlin 2013. IEEE Third International Conference on (pp. 381-384). IEEE.
Lansiti, M., & Lakhani, K. R. (2017). The truth about blockchain. Harvard Business Review, 95(1), 119-127.
Lee, S., Tewolde, G., & Kwon, J. (2014, March). Design and implementation of vehicle tracking system using GPS/GSM/GPRS technology and smartphone application. In Internet of Things (WF-IoT), 2014 IEEE World Forum on (pp. 353-358). IEEE.
Li, H., Chen, X., Huang, B., Tang, D., & Chen, H. (2014). High bandwidth visible light communications based on a post-equalization circuit. IEEE photonics technology letters, 26(2), 119-122.
Persson, M., Fhager, A., Trefná, H. D., Yu, Y., McKelvey, T., Pegenius, G., … & Elam, M. (2014). Microwave-based stroke diagnosis making global prehospital thrombolytic treatment possible. IEEE Transactions on Biomedical Engineering, 61(11), 2806-2817.
Tömösközi, M., Seeling, P., Ekler, P., & Fitzek, F. H. (2015, August). Performance Evaluation and Implementation of IP and Robust Header Compression Schemes for TCP and UDP Traffic in the Wireless Context. In Engineering of Computer Based Systems (ECBS-EERC), 2015 4th Eastern European Regional Conference on the (pp. 45-50). IEEE.
Wang, Q., Wang, W. T., Chen, W., Liu, J. G., & Zhu, N. H. (2017). Optical Vector Network Analyzer with an Improved Dynamic Range Based on a Polarization Multiplexing Electro-Optic Modulator. Chinese Physics Letters, 34(5), 054205.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download