IP Addressing

Subject: Technology
Type: Descriptive Essay
Pages: 4
Word count: 1076
Topics: Computer Science, Cyber Crime, Cyber Security
Text
Sources

In the connection of the data centre or host server, the Routing Information protocol would be the most elaborate for the deployment of the application. This would ensure that data does not remain in transit too long after transmission by the server (Amoroso 37). This is due to the limited number of hops that may be made in a network using this protocol.

The workstations at the data centre should be assigned to a different subnet. This is to facilitate for effective and proportionate bandwidth allocation. The five machines including the one at the conference room should be allocated less bandwidth since they are fewer (Tanenbaum 96). The computers on that side of the premises should have their IP addresses with the prefix 192.168.6.2. The last digit in the name denotes the number of the subnet in the network. Arranging the system in subnets facilitates for better security and management instead of having a single large network.

Need a custom paper ASAP?
We can do it today.
Tailored to your instructions. 0% plagiarism.

The IP address of the premises is to be provided for by the Internet service provider. Since the radio device for the web link is connected to the router, IP settings are implemented through the routers’ interface. The router is to assign addresses to the other nodes on the network through the DHCP protocol. Therefore, individual nodes on the network will be allocated localised IP addresses using the default ‘192.168.6.x’, Where x is an integer between 2 and 255. To access the internet, all nodes on the network will use the IP address assigned to the router by the Internet Service Provider.

Mass Deployment

Outside the data centre, the Border Gateway protocol would be ideal. This is because networks using this protocol transmit data in the most convenient of directions. That is, data is transmitted through the route most likely to get to the recipient (Bezanov 36). The advantages of this approach are reliability since data frames can take any path, services on the application are likely to be available in the event of the unavailability of part of the network.

At the application layer, various applications are used by the occupants of the premises. The software used includes payroll systems, human resource management systems and accounting software among others. Data from these applications are stored locally on the workstations with a copy being stored on the server. The server acts as storage and central point for network applications.

Data sent and from these applications is sent to the presentation layer which converts the data to compatible formats that can be transmitted over the network. Data received is also converted to appropriate arrangements to be presented to the user (Bezanov 49). The operating systems installed on the workstations have the presentation layer and thus need not be established.

Communication within the network may be controlled by a firewall or router by setting up the maximum time where two nodes can be in contact. Session layers within the various network nodes monitor the communication with other nodes within and external to the network. Once the duration of a session is set, exceeding the period of discussion leads to timeout errors.

After communication is established, data being sent to or from the nodes are divided into datagrams if the network is using UDP protocols or packets if the system is using the TCP protocol. If the data is being received, an acknowledgement message is sent from this layer. Augmentation and multiplexing take place in this segment.

After being broken down into several layers, data can then be addressed and routed to the recipient. A localised domain name server would hasten the process of resolving domain names into IP addresses (Tanenbaum 85). Error monitoring and control information such as checksums are added at this stage. Appending the IP address is done on the headers of the data frames to be transmitted. The data link layer on the nodes monitors the state of the network to avoid collisions and conflict. Typically, additional error and security information are added to some of the frame headers to reinforce integrity and security. This layer also ensures that frames will be sent along the most convenient paths to minimise the chances of packet loss during transmission.

Get your paper done on time by an expert in your field.
plagiarism free

The physical layer is the physical components of the network. The sheet is primarily tasked with receiving and transmitting signals to and from a given connection link (Tanenbaum 111). The layer consists of the cabling, wireless media, network cards and other transmission media involved in the transmission of data. Packets have the mac address of the receiver and sender appended to their headers at this layer.

Reliability and Performance

To successfully implement a fully functional and reliable network, requirements and limitations must be taken into account. The interface is to service premises that house ten workstations for the project team, four offices for the management staff (Tanenbaum 164). The system should include a printer, wireless network connectivity and servers for various applications. The building is connected to the internet through the wireless WiMAX link.

The IP address of the premises is to be provided for by the Internet service provider. Since the radio device for the web link is connected to the router, IP settings are implemented through the routers’ interface. The router is to assign addresses to the other nodes on the network through the DHCP protocol. Therefore, individual nodes on the network will be allocated localised IP addresses using the default ‘192.168.6.x’, Where x is an integer between 2 and 255. To access the internet, all nodes on the network will use the IP address assigned to the router by the Internet Service Provider.

Deadlines from 1 hour
Get A+ help
with any paper

Since the system does not comprise a vast number of nodes, the use of a subnet/s may be foregone. However, to make provisions for expansion, subnets may be implemented. A subnet is a subdivision of a network. The assignment of subnets may be done by appending 0/24 to the local IP address. The added digits imply that of the 32 bits assigned, eight are preserved for hosts, which are the nodes that act as a link between the subnet nodes and the link.

A subnet mask is necessary to tabulate the primary IP address from the subnet’s IP address and the subnet. This is done by performing a bitwise AND on the two addresses. The subnet mask is also used to determine the maximum number of addresses that can be assigned in a given subnet. In this case, the conventional 255.255.255.0 is necessary.

Did you like this sample?
  1. Amoroso, Edward. Cyber Security. New Jersey: Silicon Press, 2016. Print.
  2. Bezanov, Goran. Computer Networks. London: MIG Consulting, 2010. Print.
  3. Tanenbaum, Andrew. Computer Networks. Harlow: Pearson, 2010. Print.
Related topics
More samples
Related Essays