Ip Address Classification Of Organization

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

1.0 Introduction

Today every business in the world from banking to airlines offices, corporate organizations, postal services, universities and a even a home where there are two or more computers, need a network to communicate with other people

This network proposal is request by OSS Retails Private limited company. This company is providing computer equipments according the user requirements. As per scenario given, this company has a branch office in north Delhi and head office in south Delhi. In their branch office they have requirement of at least 120 computers and 20 for Wi-Fi services. In this network we had used technology for 150 computers.

As per assignment give to us we are supposed to conduct a research on a network technology that contributes to the security as well as network management. I have select well known Wi-Fi technology with Ethernet technology in LAN. In this network we had used firewall to secure each department so that it will provide security features to the user. For WAN connectivity we had used frame-relay because it has advantage that we can get bandwidth according to the user requirement, and if we are not using bandwidth on some other network than we can use that bandwidth also. For the given scenario we had used TCP/IP protocol with in this protocol we had selected HTTP and FTP protocol. HTTP protocol is used for web browsing and FTP is for file sharing.

2.0 Description of Network, Protocol, device and Technology

A network is a collection of computers and networking equipments interconnected by communication channels that allow sharing of resources and information. When one device is exchanging their information to another device than two devices are called networked and the technology to make this process possible is called networking.

Based on the size of network and geographical distances network has been divided in to three basic parts i.e. Local Area Network (LAN), Metropolitan Area Network (MAN), Wide Area Network (WAN)

LAN: A Local Area Network (LAN) is a network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using networking media equipments.

Advantage of network

Sharing Audio and Video: We can share audio and video by using networking services. This is the fastest way to get any audio and video files from the long geographical distances.

Sharing Files: we can share files with the help of network, we can use a single printer or we can share data through a centralize database this all is possible with the help of networks.

Communication: the most important service which we are using is communication through the help of network. We are using mail services to send small amount of files, we can use chat services to texting someone, we can chat face to face through video chatting service and most important service is calling service that is through cell phones. So all these services are possible because of networks.

Disadvantage of network

Failure of network: The computer can no longer do its job without a properly functioning network. If the network was originally only a convenience, there may not be any attention given to what might happen if the network were to fail, even after the network becomes indispensable. All of the computers in an office building might become completely useless if a single network component fails.

Cost Factor: Cost does matter for creating a network. To create network we have required cables, switches, routers these equipments are expensive and increase the price of network. By increment in network we need expert to handle this network that may increase the cost of network.

Viruses: In the network if one system is infected by the computer virus i.e. unwanted program than whole system within that network will be affected.

Hacking: In network if we are not going to provide any security and if there will any loop hole to enter into the network than hacker can inter in the network and remove the files from the system or they steal the details from the system.

Internet

Internet is the interconnection of computer networks that is connected with the help of Internet Protocol Suit (TCP/IP) in simple term it is the network of interconnected computer networking worldwide, which is accessible in general public. Today’s most popular communication media including telephone, video, music, and text-interchange are reshaped by internet.

2.1 Network Topology

The topology of a network is the actual physical layout of workstations. For every network we have to select an appropriate topology according to the organization requirement. Before selecting any topology for any organization we have to consider some factor that may affect to the network design.

Cost

Reliability

Installation

Fault isolation

Maintenance

Topology has been classified into 5 different types

Bus Topology

Star Topology

Mesh Topology

Ring Topology

Topology for this given scenario we had selected Star topology. In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection. Start Topology have the advantage that is less expensive, easy to configure and easy fault isolation so that is best option for oss retails pvt ltd. to select star topology for their network. We had selected start topology on the basis of this comparison chart of start topology among other topologies.

Bus Topology

Ring Topology

Star Topology

Mesh Topology

Definition

Each node is connected to a single cable i.e. backbone

Each device is connected with other two devices beside of that device in circular mode.

Each network host is connected to a central hub with a point-to-point connection.

Each device is connected to each device with in network, this is fully meshed network

Cost

Cheapest

Less Expensive

Less Expensive than Mesh

More Expensive

Cabling

Minimum Cable required

Less cable than Star and more than bus

More cables required than bus and ring.

Maximum cable requirement.

Installation

Easy to install

Difficult than bus

Ease of installation

Difficult to install

Fault Isolation

Difficult to find fault

Fault isolation is can be simplified

Easy fault isolation

fault isolation and detection is easy

Robustness

Whole network is depending on a single backbone if backbone fails whole network is failure.

If a single system or link is fail then whole network is dead.

If one link fails than only that link will be affected other will remain in working.

If one link fails that will not affect to whole network.

Addition of device

Difficult

Make some changes in two connections.

Easy to add a new device.

More difficult to add new device.

According to above comparison chart we can find out that star topology is suitable for this organization.

C:\Users\Bijayant\Desktop\Star-Network-Topology.png

2.2 Network Protocol

Protocol is a set of rules that govern data communications. It define what how and when is communicated. The key elements of a protocol are syntax, semantics and timing. In this scenario on Protocol selection we had selected Internet Protocol Suit (TCP/IP). It is foundation of all modern internetworking. It is commonly known as TCP/IP protocol where TCP stands for Transmission Control Protocol and IP stands for Internet Protocol.

2.3 Network Device

Networking devices are also known as network equipment. Networking devices are such devices that are used to make the connectivity between computers and networks, without networking devices we are unable to connect to each other.

2.4 Network Technology

Network technologies are classified in three types LAN, MAN and WAN. LAN stands for Local Area Network this is used to create network with in building or local campus using different connecting medium. MAN stands for Metropolitan Area Network that is used to connect city or a large campus, a MAN usually connects different LAN’s. WAN stand for Wide Area Network is a network that covers large geographical areas such as cities, country or intercontinental distances.

3.0 IP address classification of organization

Internet Protocol address (IP address) is the way to identify the devices through their unique address. IP address are binary addresses, current version of IP address is IPV6 (Internet Protocol Version 6) it is defined as 128 bit number and it is develop in 1995, but still we are using IPV4 (Internet Protocol Version 4).IP address is classified in 5 classes: Class A, Class B, Class C, Class D and Class E. Class D and E are not available for public.

In this organization we have two offices head office and branch office. We had done sub netting for reduce the wastage of IP address. We have 5 departments in branch office. We had used class B addresses and IP classifications are as follows.

Sales Department: For sales department we have required 45 computers, IP range is as follows.

Network Address: 172.16.1.0

First Usable Address: 172.16.1.1

Last Usable Address: 172.16.1.62

Broadcast Address: 172.16.1.63

Subnet Mask: 255.255.255.192

Accounts Department: For accounts department we have required 4 computers, IP range is as follows.

Network Address: 172.16.1.72

First Usable Address: 172.16.1.73

Last Usable Address: 172.16.1.78

Broadcast Address: 172.16.1.79

Subnet Mask: 255.255.255.248

HR Department: For HR department we have required 4-5 computers, IP range is as follows.

Network Address: 172.16.1.64

First Usable Address: 172.16.1.65

Last Usable Address: 172.16.1.70

Broadcast Address: 172.16.1.71

Subnet Mask: 255.255.255.248

Network Admin Department: For network admin department we have required 3 computers, IP range is as follows.

Network Address: 172.16.1.80

First Usable Address: 172.16.1.81

Last Usable Address: 172.16.1.86

Broadcast Address: 172.16.1.87

Subnet Mask: 255.255.255.248

Cafeteria: For Cafeteria we had assigned 50 IP address for the employee of this company, IP range is as follows.

Network Address: 172.16.1.128

First Usable Address: 172.16.1.129

Last Usable Address: 172.16.1.190

Broadcast Address: 172.16.1.191

Subnet Mask: 255.255.255.192

For head office we had 3 departments. We had used class C addresses and IP address classification are as follows.

Management: For management we had required 4 systems of this company, IP range is as follows.

Network Address: 192.168.1.0

First Usable Address: 192.168.1.1

Last Usable Address: 192.168.1.6

Broadcast Address: 192.168.1.7

Subnet Mask: 255.255.255.248

Recruitment Cell: For Recruitment Cell we had required 8 IP address for the employee of this company, IP range is as follows.

Network Address: 192.168.1.80

First Usable Address: 192.168.1.81

Last Usable Address: 192.168.1.94

Broadcast Address: 192.168.1.95

Subnet Mask: 255.255.255.240

Cafeteria: For Cafeteria we had assigned 26 IP address for the employee of this company, IP range is as follows.

Network Address: 192.168.1.96

First Usable Address: 192.168.1.97

Last Usable Address: 192.168.1.126

Broadcast Address: 192.168.1.127

Subnet Mask: 255.255.255.224

4.0 Core component of Protocol

In this organization we are using internet protocol suit (TCP/IP). TCP/IP protocol has 5 layers application, transport, network, data link and physical layer. For this organization we had required only HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol). HTTP is used for web browsing; this protocol is working on application layer in TCP/IP protocol. FTP is used for file sharing with in organization. For classification of network we had used IPV4 (Internet Protocol Version 4), we had used this protocol to identify each system uniquely with in network. IPV4 protocol is work on network layer.

Advantage of TCP/IP protocol

It operates independently on the operating system.

TCP/IP can used to make connection between different types of computer and servers.

TCP/IP is an open protocol and it has an industry standard so that it cannot be control by a single institute.

TCP/IP protocol supports most of the routing protocols.

Disadvantage of TCP/IP protocol

TCP/IP is slower than IPX protocol.

TCP/IP is complicated to setup and manage.

Overhead of IPX is lesser than TCP/IP.

5.0 Core component of device

In this organization we had used networking devices to make connectivity we had used Routers and Switches for connecting devices and we had used CAT5 cable for connectivity between router, switches and computers. DTE and DCE cable for connectivity between router and cloud.

Router: the router is responsible for the delivery of packets across different networks. Router works on network layer and it can understand the IP addresses. For this organization we had used D-link routers.

C:\Users\Bijayant\Desktop\dlink router.jpg

Advantage of Router

Router forward data based on routing algorithms stored in router to other router or hosts.

Router controls the collision domain.

Router can determine the best path for packets to reach its destination.

Router works on network layers and its understand IP address so it can function on LAN and WAN and it can filter broadcast and network addresses.

It is the responsibility of the routers to deliver the packets in a timely manner.

D-link router has firewall software already included so it will protect this network from hackers.

D-link routers filter the broadcasting communication on the network that makes network faster.

Disadvantage of Router

Router is expensive than switch.

Routing updates consumes bandwidth.

Router is required to configure to transfer packet from source to destination.

Switch: Switch is the device that receives the message form a device connected to it and that transmits the message only to the device for which that message is. For this organization we are using D-Link switches to consider the budget of company. We can use hub for this organization but hub has a negative factor that if a message will come to hub than hub will transmit that message to all network devices but in switch it sends message to target receivers only.

C:\Users\Bijayant\Desktop\dlink switch.png

Advantage of Switch

Switch can manage to transmit a larger amount of data in transit at any given time.

Increase network performance.

Reduce work load of computers.

Disadvantage of Switch

D-link switch doesn’t support VPN (Virtual Private Network).

It is difficult to find network problems in switches.

Twisted Pair Cable: Twisted Pair cable is also known as CAT 5 cable (Category 5 cable) for carrying signals from physical layer in TCP/IP protocol. Twisted pair cable can have 100 MHz speed of data transfer, data in terms of telephony, video, audio and text. Twisted pair cable is suitable for 10BASE-T and 100BASE-TX (Fast Ethernet).

C:\Users\Bijayant\Desktop\CAT-5.gif

Advantage of Twisted Pair Cable

CAT 5 cable is capable for transferring up to four signals at same time.

CAT 5 cable is cheaper than any other networking cable.

CAT 5 cable is easy to install.

It is compatible in any technology.

Disadvantage of twisted pair cable

Electromagnetic interference which can cause for loss of data while transferring.

Cross talk problem, if one CAT 5 cable is combined with than this problem will occur due to cross talk transfer speed can reduce.

It has data transfer speed of 100 Mbps so it is not effective for larger organization.

6.0 Core component of Technology

In this project we had used LAN and WAN technologies. In LAN technologies we had use guided media and unguided media for communication. For guided media we had used Ethernet and for unguided media we had used Wi-Fi services. In WAN technologies we had used Frame Relay.

LAN description:

Guided Media

Ethernet 802.3

Speed: 10 Mbps to 10 Gbps

Access Mode: CSMA/CD

Topology: Star and Bus

Media: Copper or Fiber Optic

Unguided Media

802.11 x wirelesses

Access Method: CSMA/CA

Topology: wireless access point to user

Media: Radio Frequency

Advantage of LAN

Using LAN technology we can share printer, scanner and external devices easily.

Cost of LAN setup is low.

Sharing data is easy.

Disadvantage of LAN

In LAN security is essential if security will not available any unauthorized user can access.

Area covered by LAN is limited.

All computers with in a LAN shares single internet connection so if all user start using net service than speed will decrease.

WAN Description: We had used Frame Relay it is a WAN technology. It is working on physical and data link layer for effective and fast communication from one location to another.

Advantage of Frame Relay

Can buy bandwidth according to the requirement of user.

Low cost.

It provides network highly redundant.

Disadvantage of Frame Relay

Frame Relay is not suitable for Audio and Video transmissions.

It is less reliable.

It is difficult to configure and manage.

7.0 Relationship between selected protocol/device/technology and network management and/or security

Protocol

In this scenario about protocol we had selected TCP/IP protocol. In TCP/IP protocol we are selecting HTTP and FTP protocols. HTTP protocol is used for web browsing in company for employees. Employees can access their company website by using this protocol. For accessing file we had used FTP protocol by the help of this protocol employees can share and access required files from a centralized server. They can upload file also which is required for the employees on the FTP server using FTP protocol. HTTP and FTP both protocols are worked on application layer. For connectivity to each computer we had used IPV4 protocol to identify uniquely each computer by providing IP address to each computer. IPV4 is working on network layer.

Device

In this scenario we had selected Router and Switch to create network for this organization. In this project we had used two routers for branch office and one router for head office. In branch office we had used router1 for connectivity from cloud and router2 is used to make star topology for the switches and then we had make connection between both routers router1 and router2 using DCE & DTE cable. In router2 we had connected four switches and one Wi-Fi router, four switches are used to connect four different departments Sales, Accounts, HR, Administrator and Wi-Fi router is used for Wi-Fi connectivity in cafe. In head office we had used one router we had make connectivity to cloud through that router. We had make connection for different department from that router only. We had used two switches for each department one switch is for head of the company and another is for management team of this company we had used one Wi-Fi router for Wi-Fi services in Cafe. In this scenario when head office wants to make connectivity to the branch office than head will connect through the WAN services in which we had used frame relay services.

Technology

In this scenario we had used two technology LAN and WAN. In LAN we had used two medium to communicate i.e. guided and unguided medium. For guided medium we had CAT 5 cables and for unguided we had used radio frequency. In branch office each system is connected through guided media. We had classified each department by sub netting to reduce the wastage of IP address. Each system can communicate with each other. In WAN we had used frame relay connectivity make inter connection between branch office and head office. If a employee from head office want to make connectivity to branch office than employee will communicate through WAN technology using frame relay.

Security

In this scenario we are using firewalls to block unauthorized users in this network. Firewall is software-based or hardware-based and it used help to make our network secure. It controls incoming and outgoing network traffic by analyzing the data packets. We are using D-link routers and in D-link router we firewall is already install so we can use this firewall to make our network secure. In firewall we can block the IP address which we don’t want to enter in our network. In firewall we can restrict access of employee to some limited to computer if we don’t want to provide access to admin computers than we can block the IP address of admin for employees.

8.0 Conclusion



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now