Discuss about the Efficient Flat Addressing Scheme For the Fast Query.
OSI Reference Model |
TCP/IP Networking Model |
It is a generic standard independent of the protocol that can act as a gateway for communicating with the end users connected in the network (Goralski, 2017). |
It is dependent on the standard of protocols using which the internet works and has a communication protocol that is used for connecting the hosts in the network. |
The delivery of the data packets depends on the transport layer |
The delivery of the data packets is not solely dependent on the transport layer and thus it does not guarantees the delivery (Edwards & Bramante, 2015). But the TCP/IP model is more reliable than OSI reference model |
The OSI reference model follows a vertical approach |
The TCP/IP model follows a horizontal approach |
In this model both the presentation layer and the session layer is separate |
In this model the presentation and the session layer is combined to form an application layer. |
The transport layer follows connection oriented approach |
The transport layer of TCP/IP model can connection less or connection oriented |
The network layer of TCP/IP can be connection less or connection oriented (Alani, 2014) |
The network layer follows connection less approach |
OSI model faces problem while application of different protocols into the model |
This model does not fits any network protocols into the model |
The protocols can be replaced with new if there is a change in the technology |
Replacement of the protocol is not possible |
The services, protocols and the interfaces can be distinct easily as it is independent of any protocols |
It is dependent on the protocol and the services, interfaces and the protocols cannot be separated (Yadav, 2015). |
The OSI model consists of 7 layers |
The TCP/IP model has 4 layers |
The TCP/IP networking model is the most useful for the development of a network because it enables a full control of the network by specifying how the data is changed over internet. It also increases the reliability of the network with the application of the automatic recovery of the network if any of the network devices fails. It helps in better management of the network by assembling the data into small packets and send over the network to reach the right node.
The website “gestioip.net” is visited and the Ipv4 address is inputted for finding the details of the IP address. The bitmask is kept 24 for allowing 254 number of host to be connected in the network and it can also be used for mapping of the IPv4 address with the IPv6 address and configure a dual stack network for enabling communication with the network configured with IPv6 address scheme.
Subnet calculation for the IP Address 192.168.0.1
Subnet mask |
Subnet bits |
Mask Bits |
Hosts per subnet |
Host Address range |
Broadcast Address |
255.255.255.192 |
2 |
26 |
62 |
192.168.0.1 – 192.168.0.62 |
192.168.0.63 |
The subnet of the IP address “192.168.0.1” is calculated from the website subnet-calculator.com and the subnet mask, subnet bits, mask bits, host per subnet, host address range and the broadcast address is noted. The values of the subnet are changed and the change in the rest of the vales are noted and attached in the above table.
Subnet calculation for the IP Address 10.0.0.1
Subnet bits |
Maximum subnets |
Mask Bits |
Hosts per subnet |
Host Address range |
Broadcast Address |
8 |
256 |
16 |
65534 |
10.0.0.1 – 10.0.255.254 |
10.0.255.255 |
The Class A network is selected for evaluation and the mask bits is changed from 255.0.0.0 to 255.255.0.0 and available number of host per subnet is noted and it has been found that the host per subnet decreased.
More experiment is done and the class B is also selected and the IP address changed to 172.16.0.1 and the range of the first octet range becomes 128 – 198.
The address resolution protocol (ARP) is applied for the mapping of the IP address with physical machine address of the computers. It uses the data link protocol for the mapping of IP address with the hardware address. The main operation of the address resolution protocol is done beneath the network layer as an interface of OSI and the OSI link layer. It finds its application in an IPv4 network (Bruschi et al., 2017). The address resolution is used for finding the address of a computer from a network. The address can be resolved utilizing the protocol where an information is sent from the local computer to the server. The network system can be uniquely identified by analyzing the information received from the server with the help of the address. The procedure of address resolution is completed after receiving response from the server with the required address at the client end.
The main purpose of the ARP cache is to maintain a correlation between the IP address and its corresponding MAC address. The ARP cache table is populated with the resolution of the hostname and the IP address and maintain communication between the devices connected with the router. There are several disadvantage of the ARP cache because the hackers can access the cache table to modify the data traffic and cause session hijacking and denial of service (Younes, 2018). Address resolution protocol is stateless because the hosts connected in the network cache the replies of the ARP. There are different defense mechanism that can be applied for the prevention of the ARP spoofing attacks and secure the network from unauthorized users (Yang, 2015). The application of static Arp entry, spoof detection and prevention software and increasing the security of the operating system of the hosts can reduce the risk of ARP spoofing attacks. The redundancy in the network service can be implemented and the Arp cache can be used for debugging the IP traffic between the hosts for communicating in the network.
The report is prepared for Foreshore IT solutions for the development of a network solution to connect the six different branches of the company. The prototype of the network is designed and attached with the report. A simple network address solution is created for the configuration of the router according to the address plan and enabling communication between the different departments. With the calculation of the network address and the range of IP address the security of the network can be increased and the whole network can be monitored from a single point.
The network is designed for Foreshore IT solutions for connecting all the different branches located in different location. Each of the department is sub divided for the calculation of the subnet plan and a router is used for each of the department. The six offices have six different routers and it is connected with a central router for the management of the data traffic and communicating in the network. A firewall is placed between the ISP and the central router such that the traffic can be controlled and the router interface is configured with the first IP of the assignable IP range calculated for the network. Some extra IP address are kept in reserve such that it can meet the growth of the organization and the network solution is tested for enabling the nodes connected in the network to communicate with each other.
Major Network: 10.0.0.0/21
Available IP addresses in major network: 2046
Number of IP addresses needed: 1130
Available IP addresses in allocated subnets: 2036
About 100% of available major network address space is used
About 56% of subnetted network address space is used
Subnet Name |
Needed Size |
Allocated Size |
Address |
Mask |
Dec Mask |
Assignable Range |
Broadcast |
Finance office |
260 |
510 |
10.0.4.0 |
/23 |
255.255.254.0 |
10.0.4.1 – 10.0.5.254 |
10.0.5.255 |
IT Call Centre |
520 |
1022 |
10.0.0.0 |
/22 |
255.255.252.0 |
10.0.0.1 – 10.0.3.254 |
10.0.3.255 |
Research and Development Office |
120 |
126 |
10.0.7.0 |
/25 |
255.255.255.128 |
10.0.7.1 – 10.0.7.126 |
10.0.7.127 |
Marketing Department |
40 |
62 |
10.0.7.192 |
/26 |
255.255.255.192 |
10.0.7.193 – 10.0.7.254 |
10.0.7.255 |
Information Technology |
130 |
254 |
10.0.6.0 |
/24 |
255.255.255.0 |
10.0.6.1 – 10.0.6.254 |
10.0.6.255 |
Head Office |
60 |
62 |
10.0.7.128 |
/26 |
255.255.255.192 |
10.0.7.129 – 10.0.7.190 |
10.0.7.191 |
The above table is created by analyzing the requirement of Foreshore IT solutions for the accommodation of the 1200 workstations for the six sites in the building. The subnet is calculated keeping in mind the minimum wastage of the IP address and the assignable range of IP address is calculated for designing the simple addressing solution for the company. A router needs to be configured with DHCP protocol for allocation of the IP address to the hosts connected in the network according to the subnet created for each of the department. Different pools must be created with the range of assignable IP range and the gateway is set with the IP address of the router for automatically assigning IP address to the hosts.
If there is a sudden increase in the number of hosts in the network the network configuration needs to be reconfigured without implementation of the extra network device in the network. The subnet must be calculated and the router should be configured according to the new subnet calculation for the accommodation of the new hosts in the network. The gateway interface of the routers should be used for DHCP configuration and the range of the IP address for each of the subnet. The multiple subnet is created for the isolation of each of the departments and controlling the departments. The subnet mask is calculated with the application of the host formula and the subnet mask needs to be re calculated if the host per building increases to 1024. For the calculation of the new subnet mask VLSM and CIDR notation is used. For connecting each of the department the central router is configured with VLAN configuration such that each of the department is assigned with the range of IP address. It increases the security of the network by isolating the hosts. The routers can also be configured with access control list for blocking a range of Ip address to access the organizational resources.
Conclusion
The report concludes that with the development of the simple addressing solution for the network designed for Foreshore IT solutions the effort of the network administrator can be decreased. It helps in configuring the routers with the DHCP protocol according to the address plan. Some extra number of address are kept in reserve for the accommodation of the organizational growth. If case of sudden increase of the host to1204 for each of the department the whole address plan needs to be reconfigured with the application of the new address plan.
Alani, M. M. (2014). Guide to OSI and TCP/IP models.
Bruschi, D., Di Pasquale, A., Ghilardi, S., Lanzi, A., & Pagani, E. (2017, September). Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking-A Case Study. In International Conference on Integrated Formal Methods (pp. 391-406). Springer, Cham.
Edwards, J., & Bramante, R. (2015). Networking self-teaching guide: OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and maintenance. John Wiley & Sons.
Goralski, W. (2017). The illustrated network: how TCP/IP works in a modern network. Morgan Kaufmann.
Hua, Y. (2016, April). Cheetah: An efficient flat addressing scheme for fast query services in cloud computing. In INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, IEEE (pp. 1-9). IEEE.
IPv4/IPv6 subnet calculator and addressing planner. (2018). Gestioip.net. Retrieved 19 March 2018, from https://www.gestioip.net/cgi-bin/subnet_calculator.cgi
Ma, C., Xie, Y., Chen, H., Deng, Y., & Yan, W. (2014, May). Simplified addressing scheme for mixed radix FFT algorithms. In Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on (pp. 8355-8359). IEEE.
Porter, C. (2018). Online IP Subnet Calculator. Subnet-calculator.com. Retrieved 19 March 2018, from https://www.subnet-calculator.com/
Yadav, S. (2015). OSI Model.
Yang, J. P. (2015). Web-Based Enterprise Management-Address Resolution Protocol: An Efficient Scheme for Preventing Address Resolution Protocol Spoofing. Advanced Science, Engineering and Medicine, 7(11), 1003-1006.
Younes, O. S. (2018). Modeling and performance analysis of a new secure address resolution protocol. International Journal of Communication Systems, 31(1).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download