designing a network and the IP addressing schemes required by the networks to communicate.​

User Generated

SbheEpvpvf

Computer Science

Description

In this assignment, you will study the need for understanding user requirements before designing a network and the IP addressing schemes required by the networks to communicate.

Using the Internet, research about the following:

  • TCP/IP
  • NOS and the services they provide

Continuing with the scenario you worked with in Weeks 1–3, this week, you will complete the following tasks:

  • Prepare a preinstallation document that captures the requirements for the Dreamz Inc. network.
  • Analyze and describe the cost factor for each hardware and software component of the network.
  • Mention the IP classes that can be used in the private network of Dreamz Inc. and why.
  • Design the IP addressing scheme for the Dreamz Inc. network.
  • Assess whether additional IP addresses are required to connect to the Internet or the network can simply connect to the Internet. Give reasons for your answer.
  • Design the IP addressing for hundred users on the third floor. You should use minimal number of IPs while designing. Use the class C addresses.
  • Create eight IP subnets and each IP subnet should suffice for twenty-two users. Use the class B private IP addresses. Also, define the broadcast address for the fourth subnet.

Prepare a 2- to 3-page report using Microsoft Word to document your work. It is important to pay close attention to the page limit.

Support your work with examples.

Cite any sources in APA format.

Unformatted Attachment Preview

Running head: NETWORK MODEL 1 A Network Model for Scenario Dreamz Inc. Cynthia Pate ITS2103 Networking Fundamentals April 18, 2017 Professor Jennifer Merritt South University NETWORK MODEL 2 Introduction The company continues to grow, and there is establishment of new branches across various regions. With this, the staff members will go on increasing, and thus they will need to communicate through the internet despite their different locations. The company needs to ensure this communication is readily available which can be provided by choosing the best network model whereby the TCP / IP Model will serve the best. This model utilizes the most recent architecture of the internet, and it stands for transmission control protocol together with internet protocol. Protocols can be termed as a set of regulations and rules that command all the communication across any network by describing data movement that occurs between destination and source together with across the internet. The protocols also provide a simplified way of giving names and scheme addressing. The model was established by the research agency in the Department of Defense (ARPA which changed to DARPA) like a project research of interconnecting network mainly in connecting machine remotely. Among the features which exist in this model is that it supports an architecture which is flexible and more devices can be easily added to a network, the network is made to be more robust, and connections can remain intact until the time when the machines used in destination and source start to function. With this model application, a computer can send packets of data to other applications which could be running on a different machine. The architecture of this model has four layers to complete the system used for communication (Forouzan, 2002). NETWORK MODEL 3 With this model, the systems used are compatible and can have communication with each other. Through this model communication throughout the whole network will be understood with a lot of ease, new technologies will be easily comprehended and also incorporated as the growth in technology occur, software and hardware will be seen and understood with ease and particularly on how they work together, and it will be very easy to troubleshoot especially in the separate networks. The model will allow interdependent operations for the network administrators and scalability is well enhanced. The client-server architecture is enabled which allows monitoring and organized communication between different parties. A significant NETWORK MODEL 4 number of protocols are utilized in routing with the help of this model. The connection is also made with a lot of ease among the various computers. The model bases itself on protocols which developed the internet and act as a protocol for communication allowing host connection over the network. Even though the transport layer in this model never guarantees packet delivery, it is the most reliable model. It utilizes an approach which is horizontal and does not have different session and presentation layer. The model also fully implements the OSI model. Network layer in this model support services which are connectionless and it is very hard to replace protocols thus it is more secure (Lakshman, & Madhow, 1997). Description of the numerous protocols The first layer This is the lowest also called host to the network layer and is used in connecting the host to allow packets to be sent through it. There are variations in one host and another and also in one network and another network. The second layer The layer is called the internet layer, and packet switch network is selected within an internetwork layer which is connectionless. The layer holds together the full architecture and aid packets to travel on their own to their destination. Order of receiving packet is not the same as sent and internet protocols are utilized within this layer. The third layer It is termed as the transport layer and make decisions concerning data transmission if they are to be on a single or parallel path. Here activities like segmenting, splitting and multiplexing data are performed. Applications can write and read in this layer. The layer includes the data header the NETWORK MODEL 5 header information and breaks data into minimal units to allow them to be handled in an efficient manner while they are on the network layer together with arranging packets which are to be sent in sequence. The fourth layer This layer is termed as application layer and describes application such as FTP, TELNET, DNS, and FTP. Telnet can be termed as a protocol for communication which is two-way allowing connection of machine which is remote and running application on the same. File Transfer Protocol enables transfer of files among those using computers and is connected to the network, and it is efficient, simple and reliable. Simple Mail Transfer Protocol is utilized in transporting mails electronically from source to destination mainly through a route. Domain Name Server provides IP addresses to those connected to the network. NETWORK MODEL 6 References Handel, T., & Sandford, M. (1996). Hiding data in the OSI network model. In Information Hiding (pp. 23-38). Springer Berlin/Heidelberg. Forouzan, B. A. (2002). TCP/IP protocol suite. McGraw-Hill, Inc. Lakshman, T. V., & Madhow, U. (1997). The performance of TCP/IP for networks with high bandwidth-delay products and random loss. IEEE/ACM Transactions on Networking (ToN), 5(3), 336-350. Ritchey, Ronald, Brian O'Berry, and Steven Noel. "Representing TCP/IP connectivity for topological analysis of network security." In Computer Security Applications Conference, 2002. Proceedings. 18th Annual, pp. 25-31. IEEE, 2002. Running Head: Dreamz Inc 1 A Network Model for Scenario Dreamz Inc. Cynthia Pate ITS2103 Networking Fundamentals April 25, 2017 Professor Jennifer Merritt South University Dreamz Inc 2 Hardware and Software Components for Dreamz Inc The Expansion of LAN requires the various categories of network hardware peripherals and software components to configure the peripheral as per the given specification to support the specific requirement of data communication within the LAN and WAN. It is also considered here that the LAN user access the WAN to connect with regional, branch and head office resources for the business functionalities of Dreamz Inc. The list of hardware and software components is as follows. Hardware for LAN • Bridge: Source Routing Bridges are used to connect two LANs of different departments. • Switch: A multi-station intelligent switch is used to distribute the traffic of network with each node or workstation (Cooper, 2016). • Server: The server system such as LAN, File, DHCP, Proxy etc are taken with given configuration to setup the LAN under the individual offices. The server configuration must be with Processor – Intel Xenon, HDD – 1 T.B, RAM – 8 GB to smooth handling of client services (Rainoff, 2016). • UPS: Uninterrupted power supply for each device, servers and workstations computers for constant functioning. Software for LAN • Operating System: The servers of LANs are configured and installed with Redhat Enterprise Linux Operating system. Each workstation of newly formed LAN must have configured and installed operating system such as Windows 7 or Windows 8 to operate the system. Windows 7 or Windows 8 is being installed on each workstation. Dreamz Inc • 3 TCP/IP Protocol Suite: Each Workstation and servers is configured with networking protocol suite like TCP/IP protocol to make the workstation to communicate the information in LAN. A client version protocol suite is also being installed. • Web Browser: A web browser such as Google Chrome is being installed. This web browser enables the user to access the LAN server resources like web applications, electronic messaging application, etc. • MS- Office 2010: Each workstation is being installed with Ms-Office application suite to facilitate the word processing, calculation work, and presentation work. • SNMP: Simple Network Management Protocol to remote setup and configuration of network equipments and devices of offices. Hardware and Software Components for WAN Wide Area Network for Dreamz Inc. is taken with the interface of Public Network such as Internet. An ISP based connection for WAN is suitable for each offices of Dreamz Inc. Hardware for WAN • Router: A routing device of network which forwards the packets from LANs to WAN link with defined destination address. This device is configured and installed on each end link of LAN of the individual office. • Firewall: A network hardware device which is required to be configured and placed with each router to filer the traffic incoming from WAN link and also outgoing from LAN of individual office to WAN link. This device secures the LAN from unauthorized access of LAN resources of Dreamz Inc. Dreamz Inc • 4 Connectors: This hardware equipments are used to connect the cables with male and female ports or sockets of network devices such as router, firewall etc (Jones, 2008). Software for WAN ▪ VPN Software: A bundle of Virtual Private network software suit that creates the secured end to end security of information between LANs of different Offices. In this respect the Detroit branch office LAN hardware devices are selected with following advanced configuration. ▪ Router: Cisco 2621XM is used with this branch WAN link to handle the heavy load like 100 Mbps data at a time. ▪ Switch: Cisco 2960 with 25 ports has the serial and Fast Ethernet interface to handle 100 Mbps and more data rate. Connection Media Specification The media is selected with defined specification for the LANs and server connectivity with following specification ▪ T.P Cat 7: used to connect LAN switch with Server Ethernet Card. ▪ T.P Cat 6: Used to connect each workstation system with switch. ▪ Serial Cable: Used to connect router with server of individual office LAN ▪ WAN: Specified by ISP. Dreamz Inc 5 References Cooper, S. (2016). 6 Required Components of a LAN. Smallbusiness.chron.com. Retrieved 22 April 2017, from http://smallbusiness.chron.com/6-required-components-lan-26555.html Rainoff, M. (2016). System Information - Networking, LAN, Local Area Network, NIC, Network Interface Card, Hub, Bridge, LAN Switch, Router, Network Management, SNMP, Simple Network Management Protoco, RMON, JAVA, JAVA-based Network Management System, RMON software probe, Mbp. Idp.net. Retrieved 22 April 2017, from https://www.idp.net/sysinfo/networking.asp Jones, C. (2008). Wide Area Network (WAN). EzineArticles. Retrieved 22 April 2017, from http://ezinearticles.com/?Wide-Area-Network-(WAN)&id=1225622 A summary of Hands-on Labs 1–3 results In week one, we discovered in the labs why protocols were important for networking, what the advantages were for a client-server network when compared to a peer-to-peer network, what the main characteristic was of a subnet and how to tell one subnet from another, also how the intranet is different from the internet and the purpose of the extranet. We also covered networking protocols and how a protocol suite differs from a protocol, how TCP is different from UDP, the differences between three email protocols: IMAP4, POP3, and SMTP, how SSH differs from Telnet, and how HTTPS is different from HTTP. We covered the numbering system: the difference between a binary number system and a hexadecimal numbering system, the possible values in a binary number, how many possible characters can be used for each number space in a hexadecimal number and how many possible combinations there were in a 3-bit binary number. In week two, we discovered cables and connectors and how to identify network cables by sight or name, how to identify network cable speed capabilities by name, how to identify network connectors by sight or name, why wires are twisted together in twisted pair cables, the difference between STP and UTP cabling, and the differences between Cat3 and Cat5 cables. Network Devices were also part of the discovery: the purpose of CRC, which layer of OSI layer that the network adapter card operates and the layer the media converter works, how to identify a network card manufacture from the MAC address and the two major differences between a modem and an Ethernet NIC. The Ethernet was covered: An Ethernet network supports which logical topologies, the purpose of the backoff on Ethernet networks, and how to eliminate collision on an Ethernet network. In week three, we have covered configuring switch port, creating VLANs, creating a Home Wireless Network, and configuring a PPP WAN Link. NETWORK PROJECT Computing networks are everywhere. They can be in our home or in a business. So far, this class has taught me and on some instances reminded of the networking fundamentals. A course project was started in week one that has evolved over the weeks. In week one, a network was designed for a fictitious organization called Dreamz Inc. There were various branches worldwide that required services of a LAN, proxy and database servers. The finance and HR department required a certain bandwidth and access applications from an Oracle server and the server was only accessible to user in these departments. There are three branch office that had to be setup and connected to the main office. Dreamz Inc also is connected to the internet from the same network. Hardware and software components were selected to build the LAN and the WAN so that Dreamz can connect to other public and private networks. Network equipment, a Cisco 2960 with 25 ports, for a branch in Detroit was selected so that each user would have at the minimum, 100 Mbps connection speed because the users have highly billable resources and cannot afford any network problems or down time. How data is flowing at each OSI layer is discovered during the third week. A MAC and IP address must be assigned since a computer in different geographical area is trying to access a computer in Dreamz network. A packet is generated at the network layer which will be sent to the Data Link for framing and transmit, then it is handed off to the physical layer for encoding of 0’s and 1’s. There is no fragmentation or collision occur. Experience The experience gained through the Hands-on Lab 1-3 and the creating of the course project has given me a sense of reality. From learning the different topologies of networks and the various best uses, to building a Home Wireless Network, all of it has been useful. One thing that helps so much is that while reading and learning, we then are able to recreate in the lab, plus being able to follow up with building Dreamz Inc. network and following along each week with changes that capture the material we have been studying. From layers, connectors, protocols, switches, routers and hubs, cables and connectors, network devise and adapters, the Ethernet, to PPP WAN Link, this class has been an experience of a multitude of resources. I feel like I can be knowledgeable on many different areas and yet that I still have so much more to learn. I plan to take these exercises so far and play with an old computer and reiterate what I have learned. Computers and technology are changing constantly so I know this class and this field is one that will never get old or boring.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: Dreamz Inc. Networking

1

Dreamz Inc. Networking
Name of Student:
Name of Instructor:
Course title:
Date:

Dreamz Inc. Networking

2

Introduction
A computer network refers to a group of connected computers that communicate with one
another for a common goal. It is a collection of more than two computers interconnected by a coaxial cable, satellite links, telephone lines, radio and microwave transmission and other
communication methods.
A computer network can be categorized into two; Wide Area Network (WAN) and the Local
Area Network (LAN).
Wide Area Network (WAN)
This is a type of network that links separate geographical location. It can be a public system like
the Public Switched Telephone Network (PSTN), or any of the various packets switched services
provided by public telecommunication authorities. This type of network can also use the most of
the varieties of other types of a circuit like the Value Added Networks (VANs/VADs), satellite
networks, ISDN.
A WAN can be a private system made up from the local telephone company or can be a set up
using public systems as a virtual private network. A virtual private network operates the same
way as a private network but uses public switched services for the transmission of data.
Unlike LAN, WAN is not under complete control of the owner, and it needs the involvement of
another authority like a telephone company. Another distinguishing aspect of WAN to LAN is
the ability of LAN to do high data transfers rate at very low cost because of its limited area
covered. It is also known that LAN has a lower error rate compared to Wide Area Networks.
WAN Hardware/Devices.

Dreamz Inc. Networking

3

1. Routers.
Routers are used to connect networks that might not be similar. They provide connectivity
between two WANs and two LANs over a geographical distance. Routers operate at the network
layer (layer 3) of the OSI model. All routers take part in the routing protocols to access the
network topology. By participating in the routing pr...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags